Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual page 269

Implementation guide
Table of Contents

Advertisement

Scheduled reports, which run automatically based on a schedule that you
configure.
Reports include the event data that is collected from your management servers
as well as from the client computers that communicate with those servers. You
can customize reports to provide the information that you want to see.
The quick reports are predefined, but you can customize them and save the filters
that you used to create the customized reports. You can use the custom filters to
create custom scheduled reports. When you schedule a report to run, you can
configure it to be emailed to one or more recipients.
See
Running and customizing quick reports"
A scheduled report always runs by default. You can change the settings for any
scheduled report that has not yet run. You can also delete a single scheduled
report or all of the scheduled reports.
See
Creating scheduled reports"
You can also print and save reports.
See
Printing and saving a copy of a report"
Table 19-2
describes the types of reports that are available.
Report types available as quick reports and scheduled reports
Table 19-2
Report type
Computer Status
Network Threat Protection
Risk
Monitoring protection with reports and logs
on page 270.
on page 273.
on page 275.
Description
Displays the information about the operational status of
the computers in your network, such as which computers
have security features turned off. These reports include
information about versions, the clients that have not
checked in to the server, client inventory, and online status.
Displays the information about intrusion prevention, attacks
on the firewall, and about firewall traffic and packets.
The Network Threat Protection reports let you track a
computer's activity and its interaction with other computers
and networks. They record information about the traffic
that tries to enter or exit the computers through their
network connections.
Displays the information about risk events on your
management servers and their clients. It includes
information about TruScan proactive threat scans.
About the types of reports
269

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents