The endpoints tab can be found under the Infrastructure area of the feature set (Infrastructure > Endpoints).
How does CloudRadial obtain endpoint information?
This tab is always present, but it only populates when a CloudRadial data-gathering agent has been successfully installed on an endpoint machine (aka a desktop, laptop, or virtual machine).
Selecting a given endpoint machine will further drill down into its details, which currently includes:
- An overview of data protection information
- Windows 11 readiness
- Machine-specific policy exceptions
- Storage details
- OneDrive usage
- Cloud storage applications
- Location data (if willingly shared)
- Detailed configuration data
- Warranty info
- Note: HP's warranty API is broken and will not work. Dell, Lenovo, Mac, and Windows PCs and servers are supported.
- Ship date
- User information
- A software list
- A detailed security breakdown
How often is this data refreshed?
The endpoint information is derived from the CloudRadial data-gathering agent.
This agent performs an information ping once per day (by default, at night after operating hours). However, it can also be "forced" - the agent pings in the information upon startup of the machine.
Note that there is no way to force the information to report into CloudRadial from within the portal itself.
Can I review a list of all endpoints rather than for just one company?
Yes, you can view a list of all endpoints and servers via Partner > Reports > Endpoints & Servers.
You can download a spreadsheet of this information as needed using the options at the top right.
How should partners be using this information?
The primary purpose of aggregating data with an agent is to be able to standardize and summarize the results in an easy-to-understand manner. The endpoint data reported by the CloudRadial agent is fed directly to CloudRadial's compliance policy module.
Short of reporting metrics, the raw data captured by the agent can be used in several ways.
For example, to co-manage the responsibility of inventory tracking within a given organization. It can also be used to review the performance, security, and data compliance capabilities of individual endpoints to ensure appropriate levels across the entire organization.
Article is closed for comments.