跳至主要內容
  • 簡單快速地下訂單
  • 檢視訂單及追蹤商品運送狀態
  • 建立並存取您的產品清單
  • 使用「公司管理」來管理您的 Dell EMC 網站、產品和產品層級連絡人。

What is Absolute

摘要: Absolute is an adaptive endpoint security solution.

本文可能採用自動翻譯。如果您對翻譯品質有任何寶貴意見,請使用此頁面底部的表單告訴我們,謝謝。

文章內容


說明

Absolute offers multiple solutions for ensuring endpoint protection and integrity by way of Resilience, Control, and Visibility. Resilience allows an admin to specify certain applications that must always be installed on the endpoint. Absolute takes steps to either repair the application if it is not running properly, or to automatically reinstall the application if it has been removed from the endpoint. Absolute Visibility gives insights into each endpoint and provides information such as installed applications, hardware inventory, device usage, security posture such as encryption compliance and anti-virus application inventory and version information. Absolute Control allows admins to freeze or wipe a device remotely. It can also detect where the device was last detected geographically when it is turned on and can connect to the internet. These features give administrators a high-level view of the endpoints in their environment with the ability to perform multiple operations against the endpoint if needed. Absolute is controlled using policies that can be configured for different groups of endpoints in the organization. Dell endpoints that are sold with Absolute contain a BIOS setting that allows the endpoint to automatically call out to the Absolute server and reinstall the Absolute agent if the endpoint is reimaged or if the user uninstalls the Absolute agent.

This guide gives a brief description on the functions and features of Absolute.


Affected Products:

  • Absolute

Affected Operating Systems:

  • Windows

The following are common questions that are asked about Absolute.

Note: Some questions may redirect you to a different page due to the complexity and length of the answer.

Absolute can be downloaded from https://cc.absolute.com/This hyperlink is taking you to a website outside of Dell Technologies.. For more information, reference How to Download and Install Absolute.

The version of Absolute is identified using the endpoint, installer, or the web console. For more information, reference How to Identify the Absolute Version.

Absolute system requirements differ between endpoint and console. For more information, reference Absolute System Requirements.

Absolute can be installed through the Windows user interface (UI). For more information, reference How to Download and Install Absolute.

Absolute’s presence on an endpoint can be verified from https://cc.absolute.com/This hyperlink is taking you to a website outside of Dell Technologies.. For more information, reference How to Download and Install Absolute.

Users may be reinvited through the Absolute web console. For more information, reference How to Resend an Absolute Console User Invitation.

The log collection process for Absolute varies between install logs and agent logs. For more information, reference How to Collect Logs for Absolute.

Absolute requires a removal request be placed at https://cc.absolute.com/This hyperlink is taking you to a website outside of Dell Technologies.. For more information, reference How to Uninstall Absolute.


To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

其他資訊

影片

 

文章屬性


受影響的產品

Absolute

上次發佈日期

30 1月 2024

版本

16

文章類型

How To