Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual page 271

Implementation guide
Table of Contents

Advertisement

3
In the Select a report list box, select the name of the report you want to
customize.
For the Network Compliance Status report and the Compliance Status report,
in the Status list box, select a saved filter configuration that you want to use,
or leave the default filter.
For the Top Risk Detections Correlation report, you can select values for the
X-axis and Y-axis list boxes to specify how you want to view the report.
For the Scan Statistics Histogram Scan report, you can select values for Bin
width and Number of bins.
For some reports, you can specify how to group the report results in the Group
list box. For other reports, you can select a target in the Target field on which
to filter report results.
4
In the Use a saved filter list box, select a saved filter configuration that you
want to use, or leave the default filter.
5
Under What filter settings would you like to use?, in the Time range list box,
select the time range for the report.
6
If you select Set specific dates, then use the Start date and End date list
boxes. These options set the time interval that you want to view information
about.
When you generate a Computer Status report and select Set specific dates,
you specify that you want to see all entries that involve a computer that has
not checked in with its server since the time you specify in the date and time
fields.
7
If you want to configure additional settings for the report, click Advanced
Settings and set the options that you want.
You can click Tell me more to see descriptions of the filter options in the
context-sensitive help.
Note: The filter option text boxes that accept wildcard characters and search
for matches are not case-sensitive. The ASCII asterisk character is the only
asterisk character that can be used as a wildcard character.
You can save the report configuration settings if you think you will want to
run this report again in the future.
8
Click Create Report.
See
Saving and deleting custom reports"
See
Printing and saving a copy of a report"
Monitoring protection with reports and logs
Running and customizing quick reports
on page 272.
on page 275.
271

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents