During an Advanced Search, use the following search criteria options for Users and Endpoints.
| 
 Category  | 
 Description  | 
|---|---|
| 
 User name  | 
 The account name of local users or people belonging to an Active Directory structure  | 
| 
 Direct manager  | 
 The account name of the person who users are assigned to report to  | 
| 
 Location in Active Directory  | 
 The organization unit from which to begin your search  | 
| 
 Department  | 
 The name of the department in your company that groups users based on their function (for example, Accounting) or other criteria  | 
| 
 Active Directory group  | 
 A collection of Active Directory user and computer accounts, contacts and other groups that can be managed as a single unit  | 
| 
 Threat type  | 
 Select a security threat type from the third drop-down list  | 
| 
 Security threat  | 
 Search for a specific security threat by typing a malware name, URL, IP address, or sender email address  | 
| 
 Threat status  | 
 The remediation status indicated by the flag icon in the first column on the Security Threats screen: Resolved by product, Action required, Resolved manually For more information, see Security Threats for Users.  | 
| 
 Importance  | 
 The assigned importance level For more information, see User or Endpoint Importance.  | 
| 
 Active Directory site  | 
 The site name synchronized from the Active Directory For more information, see Endpoint and User Grouping.  | 
| 
 Reporting line  | 
 The display name for the reporting line synchronized from the Active Directory For more information, see Endpoint and User Grouping.  | 
| 
 Category  | 
 Description  | 
|---|---|
| 
 Endpoint name  | 
 The host or device name of the endpoint  | 
| 
 IP address  | 
 The IPv4 address range Note:
 
Searching by IPv4 segment requires a specific range starting with the first octet. The search returns all endpoints with IP addresses containing the entry.  | 
| 
 Endpoint type  | 
 The type of computer or device: server, desktop, laptop, mobile device, or other  | 
| 
 Operating system  | 
 The type of operating system on the endpoint  | 
| 
 Location in Active Directory  | 
 The organization unit from which to begin your search  | 
| 
 Threat type  | 
 Select a security threat type from the third drop-down list  | 
| 
 Security threat  | 
 Search for a specific security threat by typing a malware name, URL, IP address, or sender email address  | 
| 
 Threat status  | 
 The remediation status indicated by the flag icon in the first column on the Security Threats screen: Resolved by product, Action required, Resolved manually For more information, see Security Threats on Endpoints.  | 
| 
 Compliance  | 
 The antivirus pattern compliance or Data Loss Prevention compliance status For more information, see Compliance Indicators.  | 
| 
 Importance  | 
 The assigned importance level For more information, see User or Endpoint Importance.  | 
| 
 Active Directory site  | 
 The site name synchronized from the Active Directory For more information, see Endpoint and User Grouping.  | 
| 
 Reporting line  | 
 The display name for the reporting line synchronized from the Active Directory For more information, see Endpoint and User Grouping.  | 
| 
 Installation mode  | 
 The security agent installation mode For more information, see Downloading Security Agent Installation Packages.  | 
| 
 Services  | 
 The security agent service For more information, see the Apex Central Widget and Policy Management Guide.  | 
| 
 Apex One domain hierarchy  | 
 The location of the endpoint within the Apex One domain hierarchy  | 
		