Functions in the Agent module allow users to create, edit, and delete machine IDs, customize the appearance of the machine's agent icon 
 in the system tray, control agent check-in frequency, and update the version of agent software that resides on managed machines. 
Note: If you're new to agent installation, see the quick start guide.
Functions  | 
Description  | 
Displays active user accounts, IP addresses and last check-in times.  | 
|
Displays logs of: 
  | 
|
Specifies how long to store log data.  | 
|
Specifies event log types and categories included in event logs.  | 
|
Creates agent install packages for installing agents on multiple machines.  | 
|
Creates machine ID accounts and/or install packages for installing agents on single machines.  | 
|
Deletes machine ID accounts.  | 
|
Renames existing machine ID accounts.  | 
|
Reassigns machines to a different machine group or subgroup.  | 
|
Mass copies settings from one machine account to other machine accounts.  | 
|
Imports and exports agent settings, including scheduled agent procedures, assigned monitor sets, and event sets, as XML files.  | 
|
Suspends all agent operations, such as agent procedures, monitoring, and patching, without changing the agent's settings.  | 
|
Customizes the agent menu on managed machines.  | 
|
Controls agent check-in frequency on agent machines.  | 
|
Sets the path to a directory used by the agent to store working files.  | 
|
Edits machine account information.  | 
|
Sets up accounts to allow machine users remote control access to their own machines.  | 
|
Sets a logon credential for the agent to use in Patch Management, the useCredential() procedure command, Endpoint Security, and Desktop Management.  | 
|
Designates a machine to act as a file source for other machines on the same LAN.  | 
|
Assigns machines to, and removes machines from, a selected LAN Cache machine.  | 
|
Updates the agent software on managed machines.  | 
|
Prevents unauthorized access to files on managed machines by rogue applications or users.  | 
|
Lets you approve or deny network access on a per application basis.  | 
|
Application blocker prevents any application from running on a managed machine.  |