Application Control Reports; Endpoint Activity Reports - Novell ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION Administration Manual

Hide thumbs Also See for ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION:
Table of Contents

Advertisement

Uninstall Attempt Alert Data
Lists users who have attempted to uninstall the Endpoint Security Client.
Unsecure Access Point Alert Data
Lists unsecured access points detected by the Endpoint Security Client.
Unsecure Access Point Connection Alert Data
Lists unsecured access points connected to by the Endpoint Security Client.

5.5.4 Application Control Reports

Lists all unauthorized attempts by blocked applications to access the network or run when not
permitted by the policy.
Click the plus sign next to Alert Drill-Down Reports to expand the list to display the following
report:
"Application Control Details" on page 56
Application Control Details
Lists the date, location, the action taken by the Endpoint Security Client, the application that
attempted run, and the number of times this was attempted. Dates display in UTC.
Enter the date parameters, select the application names from the list, select the user accounts, and
click View to run the report.

5.5.5 Endpoint Activity Reports

Endpoint Activity reports provide feedback for individual policy components and the effect they
have on the operation of the endpoint.
Click the plus sign next to Endpoint Activity to expand the list to display the following reports:
"Blocked Packets by IP Address" on page 56
"Blocked Packets by User" on page 56
"Network Usage Statistics by User" on page 57
"Network Usage Statistics by Adapter Type" on page 57
Blocked Packets by IP Address
Lists blocked packets filtered by the destination IP address. Dates display in UTC.
Select the destination IP from the list and set the date parameters. The report displays the dates,
locations, affected ports, and the name of the blocked packets.
Blocked Packets by User
Lists blocked packets filtered by users. Dates display in UTC. The data provided is essentially the
same as Blocked Packets by IP Address, but arranged by user.
56
ZENworks Endpoint Security Management Administration Guide

Advertisement

Table of Contents
loading

Table of Contents