Novell ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION Administration Manual page 119

Hide thumbs Also See for ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION:
Table of Contents

Advertisement

Compliance Reporting
Figure 6-33
To run compliance reporting for this policy, perform the following steps:
1 Define the Send Time. This is the timeframe that data will be uploaded from the Endpoint
Security Client to the Policy Distribution Service.
2 Check each report category, or type, you wish to capture.
The following reporting features are available:
Endpoint
Location policy usage - the Endpoint Security Client will report all location policies enforced
and the duration of that enforcement
Detected network environments - the Endpoint Security Client will report all detected
network environment settings
System Integrity
Anti-virus, spyware, and custom rules - the Endpoint Security Client will report the
configured integrity messages based on test results
Endpoint tampering protection activity - the Endpoint Security Client will report any
attempts to tamper with the security client
Creating and Distributing Security Policies 119

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION and is the answer not in the manual?

Subscribe to Our Youtube Channel

Table of Contents