Seqrite Endpoint Security must be registered immediately after installation to activate the copy, otherwise endpoint deployment will not start.
- Introducing Seqrite Endpoint Security
- Best Cyber Security Practices
- Post Installation Tasks [3]
- Dashboard [4]
- Clients [12]
- Client Deployment [13]
- Groups [6]
- Policies [4]
- Assets
- Settings [22]
- Reports [20]
- Client [14]
- Reports for Virus Scan
- Reports for AntiMalware scan
- Reports for Web Security
- Reports for Tuneup
- Reports for Advanced Device Control
- Reports for Data Loss Prevention
- Reports for Application Control
- Reports for IDS/IPS
- Reports for Firewall
- Reports for Vulnerability Scan
- Reports for File Activity Monitor
- Reports for Asset Management
- Reports for Patch Management
- Reports for Backup Data
- Server
- Managing Reports [3]
- Client [14]
- Update Manager [3]
- Admin Settings [19]
- License Manager [2]
- Patch Management [5]
- Uninstalling Seqrite Endpoint Security server
- Support
- Download PDF Guides
- Release Notes