Next Topic

Previous Topic

Book Contents

Security Reporting

All security protection events are logged within the system and available for executive summary and detailed management reporting.

Executive Summary

The Reports > Executive Summary report includes a section called Endpoint Security Last N Days. It includes the following statistics.

  • Threats Detected
  • Threats Cleaned
  • Threats Restored
  • Threats Deleted
  • Threats Quarantined
  • Threats Failed to Clean
  • Threats Failed to Restore
  • Threats Failed to Delete
  • Threats Failed to Quarantine
  • Threats With No Action
  • Threats Action Pending
  • Scans Completed
  • Updates Performed
  • Machines with KES installed

The Network Health Score of the Executive Summary includes an Endpoint Score category. Untreated threats are the threats that have not yet been dispositioned using the Security > View Threats page. Untreated threats represent potential system problems. The number of untreated threats generated by each machine over the specified period of time is scored as follows:

0 untreated threats

100%

1 to 4 untreated threats

75%

5 to 10 untreated threats

50%

more than 10 untreated threats

25%

You can adjust how heavily each category effects the total Network Health Score by adjusting the weight value for each category. Weights range from 0 to 100. Set the weight to zero to turn off that category.

Security Log

The Reports > Logs page generates reports for log data maintained by the VSA, including the EPS log.

Security Report

The Reports > Security page generates reports for KES protected machines, including Security Profile Configuration, Current Threats and Historical Threats.