Encryption Solutions Reports; Client Self Defense Reports; Integrity Enforcement Reports - Novell ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION Administration Manual

Hide thumbs Also See for ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION:
Table of Contents

Advertisement

Network Usage Statistics by User
Lists packets sent, received, or blocked; and network errors, filtered by users. This report requires a
range of dates to be entered. Dates display in UTC.
Network Usage Statistics by Adapter Type
Lists packets sent, received, or blocked; and network errors, filtered by adapter type. This report
requires a range of dates to be entered and the Location. Dates display in UTC.

5.5.6 Encryption Solutions Reports

When endpoint encryption is activated, reports on the transference of files to and from the encrypted
folders is monitored and recorded.
Click the plus sign next to Encryption Solutions to expand the list to display the following reports:
"File Encryption Activity" on page 57
"Encryption Exceptions" on page 57
File Encryption Activity
Lists files that have had encryption applied.
Encryption Exceptions
Lists errors from the encryption subsystem (for example, a protected file could not be decrypted
because the user did not have the right keys).

5.5.7 Client Self Defense Reports

Client Self Defense reports provide feedback about users trying to prevent the Endpoint Security
Client from doing its job.
Click the plus sign next to Client Self Defense to expand the list to display the following report:
"Endpoint Security Client Hack Attempts" on page 57
Endpoint Security Client Hack Attempts
Lists instances where a user has made an unauthorized attempt to modify or disable the Endpoint
Security Client. Dates display in UTC.
Specify the date parameters, then click View to run the report.

5.5.8 Integrity Enforcement Reports

Provides reporting for anti-virus/anti-spyware integrity results.
Click the plus sign next to Integrity Enforcement to expand the list to display the following reports:
"Client Integrity History" on page 58
Using the ZENworks Storage Encryption Solution Management Console
57

Advertisement

Table of Contents
loading

Table of Contents