262
Monitoring protection with reports and logs
Monitoring endpoint protection
Task
Review the security
status of your network
Which computers are infected?
Which computers need scanning?
What risks were detected in the network?
Note: Symantec Endpoint Protection Small Business Edition pulls the events that
appear in the reports from the event logs on your management servers. The event
logs contain time-stamps in the client computers' time zones. When the
management server receives the events, it converts the event time-stamps to
Greenwich Mean Time (GMT) for insertion into the database. When you create
reports, the reporting software displays information about events in the local
time of the computer on which you view the reports.
Tasks for monitoring endpoint protection
Table 19-1
Description
The following list describes some of the tasks that you can perform to monitor the security
status of your client computers.
Obtain a count of detected viruses and other security risks and view details for each
virus and security risk.
See
Viewing risks"
on page 266.
Obtain a count of unprotected computers in your network and view the details for each
computer.
See
Viewing system protection"
View the number of computers with up-to-date virus and spyware definitions.
See
Viewing system protection"
View the real-time operational status of your client computers.
See
Viewing the protection status of clients and client computers"
View the number of computers that are offline.
See
Finding offline computers"
Review the processes that run in your network.
See
Monitoring SONAR detection results to check for false positives"
Locate which computers are assigned to which groups.
See
Viewing assigned computers"
Locate which policies are assigned to which groups.
See
Viewing assigned policies"
View the licensing information on the client computers, which includes the number
of valid seats, over-deployed seats, expired seats, and expiration date.
See
Checking license status"
See
Viewing client inventory"
See
Viewing a daily or weekly status report"
on page 264.
on page 264.
on page 265.
on page 105.
on page 124.
on page 64.
on page 266.
on page 263.
on page 109.
on page 198.
Need help?
Do you have a question about the 20032623 - Endpoint Protection Small Business Edition and is the answer not in the manual?