To view a full report on attack targets and sources
1
In the console, click Reports.
2
On the Quick Reports tab, specify the following information:
You select Network Threat Protection.
Report type
You select Full Report.
Select a report
You can optionally select the reports to include in the full
report.
Configure option
3
Click Create Report.
Configuring reporting preferences
You can configure the following reporting preferences:
■
The Home and Monitors pages display options
■
The Security Status thresholds
■
The display options that are used for the logs and the reports, as well as legacy
log file uploading
For information about the preference options that you can set, you can click Help
on each tab in the Preferences dialog box.
To configure reporting preferences
1
In the console, on the Home page, click Preferences.
2
Click one of the following tabs, depending on the type of preferences that you
want to set:
■
Home and Monitors
■
Security Status
■
Logs and Reports
3
Set the values for the options that you want to change.
4
Click OK.
About the types of reports
The following categories of reports are available:
■
Quick reports, which you run on demand.
Monitoring protection with reports and logs
Configuring reporting preferences
268
Содержание 20032623 - Endpoint Protection Small Business Edition
Страница 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Страница 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Страница 34: ...34...
Страница 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Страница 70: ...Managing product licenses Licensing an unmanaged client 70...
Страница 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Страница 84: ...Installing the Symantec Endpoint Protection Small Business Edition client Uninstalling the client 84...
Страница 128: ...Using policies to manage security Using the policy serial number to check client server communication 128...
Страница 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Страница 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Страница 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Страница 304: ...304...
Страница 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Страница 310: ...310...
Страница 314: ...Performing disaster recovery Reinstalling or reconfiguring Symantec Endpoint Protection Manager 314...
Страница 330: ...Troubleshooting reporting issues About recovering a corrupted client System Log on 64 bit computers 330...