Compliance Reporting
Figure 6-33
To run compliance reporting for this policy, perform the following steps:
1 Define the Send Time. This is the timeframe that data will be uploaded from the Endpoint
Security Client to the Policy Distribution Service.
2 Check each report category, or type, you wish to capture.
The following reporting features are available:
Endpoint
Location policy usage - the Endpoint Security Client will report all location policies enforced
and the duration of that enforcement
Detected network environments - the Endpoint Security Client will report all detected
network environment settings
System Integrity
Anti-virus, spyware, and custom rules - the Endpoint Security Client will report the
configured integrity messages based on test results
Endpoint tampering protection activity - the Endpoint Security Client will report any
attempts to tamper with the security client
Creating and Distributing Security Policies 119
Need help?
Do you have a question about the ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION and is the answer not in the manual?