Reports

Print Friendly, PDF & Email

The Reports page provide the latest information of all clients and keeps comprehensive logs about virus incidents, policy breaches, and updates.

You can view and generate reports for the listed categories. You can create your own custom category as per your requirement. There are default reports displayed for each category. You can create your own query and generate the custom reports. You can manage the generated queries.

On the reports page, you can do the following.

● View charts of the listed categories

● Create queries to generate custom reports

● Add custom category to generate reports

● Download the archived monthly reports from server

Note

Custom created reports can be viewed only by the user who has created the reports.

The following are the listed categories for the reports:

● Virus Scan – You can view the virus incidents after scanning the clients. You can also view the statistics of unscanned endpoints since the last 1 ,3 ,7 ,15, and 30 days.

● Anti-Malware Scan – You can view the malware incidents after scanning the clients.

● Web Security – You can view statistics of Web sites blocked through the Browsing Protection, Phishing Protection, or block Web site modules.

In the tabular report, you can view whether YouTube videos have been blocked.

● Google Access Controller Report – You can view reports of allowed or blocked Google logins. This report is only in the tabular format, not in the chart format.

● Tune-up – You can view the number of clients tuned up and not tuned up at all.

● Advanced Device Control – You can view whether removable devices have been blocked and what actions were taken against unauthorized device access.

● Device Exception – You can view details of devices added as exceptions in the Advance Device Control policy. This report is only in the tabular format, not in the chart format.

● Data Loss Prevention – You can view statistics about attempts of sending the data outside the organization in an unauthorized manner. Data-at-Rest scan reports are included in DLP on demand report. You can view the information related to the detected confidential data such as; the file path, threat type, and matched text. You can generate a DLP report for a single endpoint at a time.

● IDS/IPS – You can view whether there was any Port scanning attack, DDOS (Distributed Denial of Service) attack, or any attempt of intrusion, and actions taken.

● Firewall – You can view number of violations for Firewall such as; the blocked connection for communications (Inbound or Outbound) and Firewall security level.

● Asset Management – You can view reports related to the hardware/software assets of the Endpoints.

● Application Control – You can view statistics about how many applications were authorized or unauthorized. You can also view the application control scan reports here.

● Backup for Ransomware Protection – You can view reports when the backup is failed. The reports display the reason for the failure of backup. This report is only in the tabular format, not in the chart format.

● Vulnerability Scan – You can view reports of vulnerabilities present on the endpoints in the network.

● Host Integrity – You can view reports of compliant and non-compliant endpoints. This report is only in the tabular format, not in the chart format.

● ETH Scan – You can view the following reports of ETH Scan.

● Last Scan – Information of last ETH scans.

● Historical Data – Information of all ETH scans till date.

This report is only in the tabular format, not in the chart format.

● Patch Management – You can view reports of the installed/ missing patches on the endpoints in the network. In the Patch Management report, you can view the name of the patch in the hyperlink format. You can click the name to view details of the patch. This report is only in the tabular format, not in the chart format.

● File Activity Monitor by Event – You can view reports of file activity. The report shows how many files are deleted, how many files are modified/copied, and how many file extensions are changed.

● Encryption – You can view the Endpoint Encryption Status with volume details such as volume id, volume type, volume encryption status, and the recovery key. Only the Super Admin and Admin user roles are authorised to have access to the Recovery Key.
In the Endpoint Encryption Activities report you can view the date and time when the activity was performed and the other details around the activity.


The procedures written below are same for all the above categories including custom category.

On the reports page, you can do the following.

Was this page helpful?

Leave a Comment