Devices

The Devices Page displays the list of Devices on which the Seqrite Data Privacy Agent is installed, in a tabular format as follows,

Device List

Column Name Description
Device Name Device name on which the Seqrite Data Privacy Agent is installed.
Status Device Status – Online/Offline.
Agent Status Seqrite Data Privacy Agent Status – Enabled, Disabled.
Operating System Operating System Edition on the device on which the Agent is installed.
Agent Version Seqrite Data Privacy Agent Version.
Risk Score Privacy Risk Score of an endpoint. (Please refer the Risk Score Section for more details.)
Last Active Seqrite Data Privacy Agent Last Active Timestamp.

You can search the devices based on following criteria,

  • Device Name
  • Operating System
  • Agent Version

Select the appropriate criteria from the dropdown, the adjacent dropdown gets populated with the corresponding values for the selected criteria.
Select the value from the dropdown, then the matching devices list appears.

To export the device list to an excel file, click Export.

The Event Log Tab displays the list of actions performed on the Seqrite Data Privacy Agent, in a tabular format as follows,

Event Logs

Column Name Description
Device Name Device name on which the Seqrite Data Privacy Agent action is performed.
Initiated By Who initiated the Agent action – System/User Name.
Action Type An action performed on the Agent – Uninstall/Upgrade/Enable/Disable.
Status The status of the action taken against the Agent Pending/Successful/Cancelled/Fail/Expired.
Last Updated Action and Status change Timestamp.

You can search the devices based on following criteria,

  • Device Name
  • Initiated By
  • Action Type
  • Status

Select the appropriate criteria from the dropdown, the adjacent dropdown gets populated with the corresponding values for the selected criteria.
Select the value from the dropdown, then the matching devices list appears.

To export the action logs to an excel file, click Export.

In the action logs list, each action log record is clickable. On clicking, the right panel appears and shows the following details,

Event Log Right Panel

Risk Score

The Risk Score indicates criticality of a device based on the number of classified data records found on the device.

The default privacy Risk Score model for a device or endpoint is as follows.

Endpoint Privacy Risk Score No. of Classified Data Records No. of Classified Data Records
  Lower Limit Upper Limit
Very Low 100
Low 101 500
Medium 501 1000
High 1001 5000
Critical 5001

A Risk Score is of Very Low indicates an endpoint with a lower number of classified data records, ranging from 0 to 100.

A Risk Score is of Critical indicates an endpoint with a larger number of classified data records, exceeding 5001.

Admin can create groups of endpoint that he want to scan at controlled time by creating group and defining schedule on group

Proxy Support for Full On-Premises Instance : In a full on-prem setup, users can configure a proxy to manage agent communication securely. Once the proxy is set, agent installation and classification are routed through it, ensuring centralized control and seamless integration. Simply define the proxy settings, assign them to agent groups, and proceed with agent deployment—classification will occur automatically via the configured proxy.

Support for HA Version 1.4.0: Version 1.4.0 introduces enhanced High Availability (HA) support, enabling seamless failover and improved resilience. Users can configure active-passive or active-active HA setups, ensuring continuous availability of services. Proxy configurations, agent installations, and classifications are fully compatible with HA, maintaining consistent behavior across nodes.

Was this page helpful?