CyberGuard EDR QuickUserGuide 2023
CyberGuard EDR QuickUserGuide 2023
1. Introduction ............................................................................................................... 3
2. Agent on board........................................................................................................... 3
2.1 Main Interface ............................................................................................................... 3
2.2 Quarantine .................................................................................................................... 4
2.3 USB Scan ........................................................................................................................ 6
2.4 Event Log ....................................................................................................................... 6
2.5 About ............................................................................................................................. 7
2. Agent on board
2.1 Main Interface
To manage the solution, open the main interface window by clicking on the FireEye/Trellix
application icon in the Windows task bar below.
The main interface has 3 sections, “Event Log, Quarantine and About” which will be
explained on the following pages.
If any virus/malicious program has been detected, it will be displayed in this section.
In the example above we can see that two viruses were detected. They can be deleted or
restored.
You can delete a quarantined file simply by selecting the line and clicking on the [Delete]
button.
Click on the [Delete] button again to confirm the deletion of the virus infected file.
If the quarantined file is a known file and not a potential virus, you can choose to restore it
by clicking on the “Restore” button.
Click on the [Restore] button again to confirm the restoration of the known file.
When an USB drive is inserted, a Quick Scan is automatically triggered on its content. The
result will be listed in the Event Log section.
This section lists the scan summary results of the scheduled scans as well as any alerts when
a virus/malicious file has been detected while accessing it.
2.5 About
You can see at a glance the update status of the vessels and the machines.
You can get details on an individual machine by cliquing on the line of a given machine.