Troubleshooting reporting
issues
This chapter includes the following topics:
■
Troubleshooting reporting issues
■
Troubleshooting context-sensitive help for the reporting console
■
Changing reporting fonts to display Asian languages
■
Accessing reporting pages when the use of loopback addresses is disabled
■
About recovering a corrupted client System Log on 64-bit computers
Troubleshooting reporting issues
You should be aware of the following information when you use reports:
■
Timestamps, including client scan times, in reports and logs are given in the
user's local time. The reporting database contains events in Greenwich Mean
Time (GMT). When you create a report, the GMT values are converted to the
local time of the computer on which you view the reports.
■
If managed clients are in a different time zone from the management server,
and you use the Set specific dates filter option, you may see unexpected results
The accuracy of the data and the time on both the client and the management
server may be affected.
■
If you change the time zone on the server, log off of the console and log on
again to see accurate times in logs and reports.
■
In some cases, the report data does not have a one-to-one correspondence with
what appears in your security products. This lack of correspondence occurs
because the reporting software aggregates security events.
25
Chapter
Summary of Contents for 20032623 - Endpoint Protection Small Business Edition
Page 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Page 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Page 34: ...34...
Page 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Page 70: ...Managing product licenses Licensing an unmanaged client 70...
Page 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Page 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Page 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Page 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Page 304: ...304...
Page 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Page 310: ...310...