Introduction to Endpoint Manager 
 
Endpoint Manager (EM) lets you manage, monitor and secure devices which connect to your network.
- Admins must first add users to EM then enroll devices/endpoints for those users. Supported operating systems include Android, iOS, Mac OS, Windows and Linux.
 
- Once
	a device has been added, admins can apply profiles which determine
	the device's network access rights, security settings and other
	features. 
 
- Each license covers one device per user. You will need additional licenses for each device you add for a user.
 

Guide
Structure
This guide will take you through
the configuration and use of Endpoint Manager
and is broken down into the following sections:
The Administrative Console
The Dashboard
Devices and Device Groups
Users and User Groups
Configuration Templates
Security Systems
Network Management Application Store
- Security Events
 
- View Security Events By Time
 - View Security Events By Files
 - View Security Events By Device
 - View Android Threat History
 - View And Manage Blocked Threats
 - View And Manage Quarantined Threats
 - View Contained Threats
 - View And Manage Autorun Alerts
 
License Management
Configure Endpoint Manager
Appendix 1b: Endpoint Services - IP Nos, Host Names and Port Details - US Customers
Appendix 2 - Endpoint Manager License Types
Appendix 3: Pre-configured Profiles

                                
                                                    