Policy overrides - the Endpoint Security Client will report all attempts to initiate the
administrative override on the security client
Managed application enforcement activity - the Endpoint Security Client will report all
enforcement activities for managed applications
Storage Devices
Detected removable devices - the Endpoint Security Client will report all removable storage
devices detected by the security client
Files copied to a removable device - the Endpoint Security Client will report files that are
copied to a removable storage device
Files opened from a removable device - the Endpoint Security Client will report files that are
opened from a removable storage device
Encryption management and activity - the Endpoint Security Client will report encryption/
decryption activity using SES
Files written to fixed drives - the Endpoint Security Client will report the number of files that
have been written to the machine's fixed drives
Files written to CD - the Endpoint Security Client will report the number of files that have
been written to the machine's CD and DVD drives
Networking
Firewall activity - the Endpoint Security Client will report all traffic blocked by the firewall
configured for the applied location policy. Enabling this report may result in large volumes of
data being gathered
WARNING: The following data can overwhelm a database very quickly when gathered. A test
of ONE Endpoint Security Client reported 1,115 data uploads of blocked packets over a 20
hour period. It is recommended that a monitoring and tuning period with a test client in the
affected environment be run prior to wide-scale deployment.
Network adapter activity - the Endpoint Security Client will report all traffic activity for a
managed network device
®
Wi-Fi
Detected wireless access points - the Endpoint Security Client will report all detected access
points
Wireless access point connections - the Endpoint Security Client will report all access point
connections made by the endpoint
Device Inventory
USB Devices - the Endpoint Security Client will report all USB devices
120 ZENworks Endpoint Security Management Administration Guide
Need help?
Do you have a question about the ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION and is the answer not in the manual?