Usb Devices Reports; Wireless Enforcement Reports; Generating Custom Reports; Section 5.6, "Generating Custom Reports - Novell ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION Administration Manual

Hide thumbs Also See for ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5 - ADMINISTRATION:
Table of Contents

Advertisement

Chart Percentage of ZSC Update Failures
Lists the percentage of ZENworks Security Client Update that have failed (and not been
remediated). No parameters are required to generate this report.
History of ZSC Update Status
Shows the history of the status of the ZENworks Security Client Update process. Select the date
range and click View to run the report. The report displays the users that have checked in and
received the update.
Chart Types of Failed ZSC Updates
Shows ZENworks Security Client Updates that have failed (and not been remediated). Select the
date range and click View to run the report. The report displays the users that have checked in, but
had a failed update installation.

5.5.13 USB Devices Reports

Shows security client USB device inventory that is listed by user or machine. This report shows
whatever a user has plugged into a USB port and is recorded for either the user or the machine.

5.5.14 Wireless Enforcement Reports

Provides reports regarding Wi-Fi environments the endpoint is exposed to.
Click the plus sign next to Wi-Fi Enforcement to expand the list to display the following reports:
"Wireless Connection Availability" on page 60
"Wireless Connection Attempts" on page 60
"Wireless Environment History" on page 60
Wireless Connection Availability
Displays the access points available for connection by policy and location. Includes the channel,
SSID, MAC address, and whether or not the access point was encrypted.
Wireless Connection Attempts
Displays the access points connection attempts, by location and by ZENworks Endpoint Security
Management account.
Wireless Environment History
Provides a survey of all detected access points, regardless of ownership. Includes the frequency,
signal strength, and whether or not the access point was encrypted. Dates display in UTC. Select the
desired locations and the date range to generate this report.

5.6 Generating Custom Reports

ZENworks Endpoint Security Management lets you create custom reports to better manage endpoint
computers in your system.
60
ZENworks Endpoint Security Management Administration Guide

Advertisement

Table of Contents
loading

Table of Contents