■
Scheduled reports, which run automatically based on a schedule that you
configure.
Reports include the event data that is collected from your management servers
as well as from the client computers that communicate with those servers. You
can customize reports to provide the information that you want to see.
The quick reports are predefined, but you can customize them and save the filters
that you used to create the customized reports. You can use the custom filters to
create custom scheduled reports. When you schedule a report to run, you can
configure it to be emailed to one or more recipients.
See
“Running and customizing quick reports”
on page 270.
A scheduled report always runs by default. You can change the settings for any
scheduled report that has not yet run. You can also delete a single scheduled
report or all of the scheduled reports.
See
“Creating scheduled reports”
on page 273.
You can also print and save reports.
See
“Printing and saving a copy of a report”
on page 275.
Table 19-2
describes the types of reports that are available.
Table 19-2
Report types available as quick reports and scheduled reports
Description
Report type
Displays the information about the operational status of
the computers in your network, such as which computers
have security features turned off. These reports include
information about versions, the clients that have not
checked in to the server, client inventory, and online status.
Computer Status
Displays the information about intrusion prevention, attacks
on the firewall, and about firewall traffic and packets.
The Network Threat Protection reports let you track a
computer’s activity and its interaction with other computers
and networks. They record information about the traffic
that tries to enter or exit the computers through their
network connections.
Network Threat Protection
Displays the information about risk events on your
management servers and their clients. It includes
information about TruScan proactive threat scans.
Risk
269
Monitoring protection with reports and logs
About the types of reports
Содержание 20032623 - Endpoint Protection Small Business Edition
Страница 1: ...Symantec Endpoint Protection Small Business Edition Implementation Guide...
Страница 3: ...Symantec Corporation 350 Ellis Street Mountain View CA 94043 http www symantec com...
Страница 34: ...34...
Страница 54: ...Installing Symantec Endpoint Protection Manager What you can do from the console 54...
Страница 70: ...Managing product licenses Licensing an unmanaged client 70...
Страница 74: ...Preparing for client installation Preparing Windows operating systems for remote deployment 74...
Страница 84: ...Installing the Symantec Endpoint Protection Small Business Edition client Uninstalling the client 84...
Страница 128: ...Using policies to manage security Using the policy serial number to check client server communication 128...
Страница 204: ...Managing Tamper Protection Changing Tamper Protection settings 204...
Страница 236: ...Managing intrusion prevention Creating exceptions for IPS signatures 236...
Страница 303: ...Maintaining your security environment Chapter 22 Preparing for disaster recovery 3 Section...
Страница 304: ...304...
Страница 308: ...Preparing for disaster recovery Backing up the database and logs 308...
Страница 310: ...310...
Страница 314: ...Performing disaster recovery Reinstalling or reconfiguring Symantec Endpoint Protection Manager 314...
Страница 330: ...Troubleshooting reporting issues About recovering a corrupted client System Log on 64 bit computers 330...