Print Download PDF Send Feedback

Previous

Next

Reporting Tab

The Reporting tab includes many different types of Endpoint Security status reports. Each report shows a summary chart and list of monitoring information. You can sort and filter the monitoring information by different criteria.

To see monitoring reports:

  1. In SmartEndpoint, click the Reporting tab.
  2. Select a report type from the Monitoring tree.
    The report shows in the pane.
  3. Double-click an object in the User or Computer Name field to open a Details window.

    You can assign, create, and change policies from the Details window.

Each report contains a chart that shows a graphical status summary of the select report item and an Endpoint List that shows all applicable users and computers. You can search and filter the list to see only the relevant items. Double-click a user or computer to see its status and the configured rules and actions for each installed blade.

Endpoint List Section - Icons and Controls

Item

Description

Search

Enter a text string to search all columns and results that contain the string are shown.

Status:

Select a status to filter by. The options are based on the open report. Endpoints with that status are shown.

In:

Narrow the results to an OU, node or group in the organization. Click ... to select an item in the Select Node window.

or

Double click to open the selected user or computer.

Click to see other options available. Some options are not available for all reports.

  • Export to file

    Export the report results to an XLS, HTML, or CSV file.

  • Toggle chart percentage

    Add and remove the percentages shown on the graph.

  • Navigate To

    Lets you navigate to specified users or computers.

  • Anti-Malware

    Run a Push Operations for Anti-Malware on the endpoint.

  • Client Settings

    Run a Push Operations for Client Settings on the endpoint.

  • Add to virtual group

    Add the selected objects to a virtual group.

Related Topics

Alerts

Endpoint Security Analysis Report

Push Operations

Compliance

Activity Reports

Software Deployment

Full Disk Encryption

User Authentication (OneCheck)

Media Encryption & Port Protection

Anti-Malware

Licenses Report

Custom Report