Generating App Reputation Reports



Hello. You have arrived at an outdated topic. Please click this link to be redirected to the updated Endpoint Protection Admin Guide.

You can generate reports that display information about the breakdown of all apps reported within the organization.

To generate an App Reputation report:

  1. Access the SecureAnywhere website.
  2. Log in.
  3. Click the Mobile Protection tab. The Mobile Protection console displays.
  4. Click the Reports tab. The Reports tab displays.
  5. In the Select your report column, select App Reputation. If needed, click the Expand arrow to expand the Alerts and Infections tree.
  6. Select any of the following reports:
    • App Reputation Distribution — View the status of each app, broken down by reputation, as described in the table below. 
    • Android - Top Installed Apps — View the top ten installed Android apps, including its reputation.
    • iOS - Top Installed Apps — View the top ten installed iOS apps, including its reputation.
    The following table describes the app reputation definitions. You can rearrange the order of the distributions, as needed.
    FIELD NAMEDESCRIPTION
    Benign The application is non-whitelisted, contains no dangerous permissions and has received favorable scores from machine classifiers. 
    Moderate The application does not appear to be suspicious, but contains dangerous permissions such as Send, SMS, Call Phone, etc.
    Trustworthy The application appears in our whitelist and is safe to use.
    Malicious The application was detected as a threat such as Trojan, Rootkit, etc., by Webroot definitions.
    Unknown The application is detected as a Potentially Unwanted Application, or PUA. A PUA is not malware but has unwanted characteristics which may include, aggressive ads and popups, intrusive privacy policies, marketing to contacts, etc.
    Moderate** This value is returned in a special case when reputation is computed based on package name, that is, no md5 information is available, and means that both malicious and whitelisted application have been found with the same package name.  
    Suspicious The application has not triggered any definitions but has received machine classifiers in the malicious and unwanted range.
  7. Do either of the following, as needed:
    • To display specific devices, use the Search field at the top of the list.
    • To see more information about a specific item, double-click the entry.
  8. When you're done, click a different tab to exit out of the Reports tab.