■
Scheduled reports, which run automatically based on a schedule that you
configure.
Reports include the event data that is collected from your management servers
as well as from the client computers that communicate with those servers. You
can customize reports to provide the information that you want to see.
The quick reports are predefined, but you can customize them and save the filters
that you used to create the customized reports. You can use the custom filters to
create custom scheduled reports. When you schedule a report to run, you can
configure it to be emailed to one or more recipients.
See
“Running and customizing quick reports”
on page 270.
A scheduled report always runs by default. You can change the settings for any
scheduled report that has not yet run. You can also delete a single scheduled
report or all of the scheduled reports.
See
“Creating scheduled reports”
on page 273.
You can also print and save reports.
See
“Printing and saving a copy of a report”
on page 275.
Table 19-2
describes the types of reports that are available.
Table 19-2
Report types available as quick reports and scheduled reports
Description
Report type
Displays the information about the operational status of
the computers in your network, such as which computers
have security features turned off. These reports include
information about versions, the clients that have not
checked in to the server, client inventory, and online status.
Computer Status
Displays the information about intrusion prevention, attacks
on the firewall, and about firewall traffic and packets.
The Network Threat Protection reports let you track a
computer’s activity and its interaction with other computers
and networks. They record information about the traffic
that tries to enter or exit the computers through their
network connections.
Network Threat Protection
Displays the information about risk events on your
management servers and their clients. It includes
information about TruScan proactive threat scans.
Risk
269
Monitoring protection with reports and logs
About the types of reports
Summary of Contents for 20032623 - Endpoint Protection Small Business Edition
Page 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Page 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Page 34: ...34...
Page 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Page 70: ...Managing product licenses Licensing an unmanaged client 70...
Page 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Page 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Page 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Page 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Page 304: ...304...
Page 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Page 310: ...310...