Start XCS
- After installation, XCS will automatically start up whenever the device is started.
- The real-time virus monitor is enabled by default, so endpoints are protected immediately after the restart.
- Important - We recommend admins configure XCS via an Xcitium Enterprise profile rather than locally.
- Log into 'Xcitium Enterprise' > Click 'Assets' > 'Configuration Templates' > 'Profiles' > open a Mac OS profile > Click the 'Antivirus' tab.
- However, you can also configure the application at a local machine should you wish. The rest of this guide addresses how to use the application locally.
You can access the management interface in the following ways:
Launchpad- Open
the launchpad on your Mac device
- Click the Xcitium Client Security icon to open the application
The taskbar (top-right) lets you open the application, enable/disable real-time scanning, switch to silent mode, and manage your XCS configurations.
- Antivirus Security Level – Enable or disable the real-time virus monitor:
- On Access - Any file opened is scanned before it is allowed to run.
- Disabled - Switches the real-time scanner off.
- Silent Mode - Temporarily disable alerts so they don't interrupt you when running a full screen presentation or playing a game. Protection remains enabled.
- Configuration - Create, import and export CIS security configurations. This is useful if you want to implement specific settings on multiple endpoints.
- Open... - Open the XCS main interface.
- Click 'Open' to launch the application
- Use the quick launch icon on the MAC OS dock to open the interface at any time:
Tip: You can scan a file or folder by simply dragging it onto the XCS dock icon.If the icon is not present, you can add it as follows:
|
The summary screen opens:
- Click 'Do it now' to run your first full computer scan.
Before running the scan, XCS will first check for AV database updates. If updates are available they will be downloaded and installed.
The scan will commence after the update:
Scan results are shown at the end of the scan.
- The results window lists all threats discovered by the scan. You can remove selected threats or choose to ignore them:
See Scan and Clean Your Computer for more details.