This set of Frequently Asked Questions (FAQs) answers queries that you may have about Endpoint Central. Send us an e-mail message, if you have any questions that remain unanswered.
The system requirements when using Endpoint Central Cloud include the following:
The hardware requirements for distribution servers include the following:
|No. of Computers Managed Using the Distribution Server||Processor Information||RAM Size||Hard Disk Space|
|1 to 250||Intel Core i3 (2 core/4 thread) 2.0 Ghz 3 MB cache||2 GB||10 GB*|
|251 to 500||Intel Core i3 (2 core/4 thread) 2.0 Ghz 3 MB cache||4 GB||20 GB*|
|501 to 1000||Intel Core i5 (4 core/4 thread) 2.3 GHz. 6 MB cache||4 GB||30 GB*|
*May increase depending on the number of software applications and patches that are deployed
The hardware requirements for agents include the following:
|Processor Speed||1.0 GHz|
|RAM Size||512 MB|
|Hard Disk Space||100 MB*|
*May increase dynamically depending on the operations performed on the client computer
This section gives you information about the software requirements for distribution servers, Endpoint Central servers and agents.
|Windows OS||Windows Server OS||Mac OS|
|Windows 10||Windows server 2016||10.15|
|Windows 8.1||Windows server 2012 R2||10.14|
|Windows 8||Windows server 2012||10.13|
|Windows 7||Windows server 2008 R2||10.12|
|Windows Vista||Windows server 2008||10.11|
|Windows server 2003 R2||10.10|
|Windows server 2003||10.9|
A TLS version of 1.2 and above is required for the legacy devices to be managed using Endpoint Central Cloud.
You are required to install any of the following browsers on your computer to access the web console:
Note: The screen resolution should be 1280 x 1024 pixels or higher.
Note: A TLS version of 1.2 and above is required for the legacy devices to be managed using Endpoint Central Cloud.
Credentials that have admin privileges need to be specified for carrying out certain activities in Endpoint Central :
|Acquired access||Operations performed|
|Registry access||For executing all the agent operations|
|Full control of file/folder||To read/write agent details for execution of agent operations|
|Network share access||For deploying configurations|
|Login access||For installation/uninstallation of agents|
|Remote access||For troubleshooting computers remotely|
|Access to install/uninstall software||For installation/uninstallation of software applications|
|Access to WMI||For fetching inventory details|