16.3 Other Settings

Configuring Detection Agents

Computers marked with a small red flag icon "Red flag icon" are detection agents. A detection agent scans all online computers within its subnet and enforces control functions, blocking unauthorized computers.

To facilitate network management, administrators can designate one or more stable client machines—such as those without personal firewalls and rarely shut down—to have priority as detection agents. As long as these machines are running, one of them can act as the detection agent.

To set priority, select a computer and use the right-click menu Agent Level → Priority. The computer will display a blue flag icon. Only computers with the Normal type can be set as detection agents, and setting priority ensures it becomes the agent first.

To prevent a computer from becoming a detection agent, use the right-click menu Agent Level → Prohibit.

Predefined Computer Types

In addition to computers detected by the detection agent, administrators can manually add computers and assign their types for proactive management. Select Control → Add to add a computer. Administrators can set the type based on IP+MAC, or just IP or MAC, and configure the corresponding access rules.

Type Setting Description
IP-MAC Assign a type based on both IP and MAC addresses. The IP+MAC combination uniquely identifies a computer, and if this computer is later detected, its type will automatically update to the predefined type.
IP Assign a type based solely on the IP address. If a detected computer matches this IP and has no assigned type, it will automatically adopt this IP-based type.For example, if IP 192.168.1.1 is authorized, any scanned computer with this IP—regardless of its MAC—will automatically be IP Authorized.
MAC Assign a type based solely on the MAC address. If a detected computer matches this MAC and has no assigned type, it will automatically adopt this MAC-based type.For example, if MAC 00-F0-4C-8C-DE-6A is set as illegal, any scanned computer with this MAC will automatically be MAC Illegal.
Rule Administrators can assign a computer as Authorized, Illegal, Protected, or Normal.

Once added successfully, any computer that meets the specified criteria will automatically adopt the predefined type. The detection agent will then enforce access control based on this type.

Searching, Modifying, and Deleting Computers

When the computer list becomes large, administrators can use the search bar to filter computers by last online time, IP address range, name, access rule, or client status.

Double-click any record in the computer list, or select Control → Properties, to open the properties dialog. This dialog displays all identification information for the computer and allows administrators to modify its name, access rule, or agent level.

For computers that have not been used for a long time, administrators can delete them. If the computer reappears on the network, it will be displayed again in the list.