Generating Endpoint Protection Reports



Hello. You have arrived at an outdated topic. Please click this link to be redirected to the updated Endpoint Protection Admin Guide.

With Endpoint Protection, you can view detailed reports about SecureAnywhere versions and threat activity on the endpoints. The following table provides suggestions for the types of reports you might want to generate, depending on your business needs.

Reports
To locate endpoints with different SecureAnywhere versions installed: Generate the Agent Version Spread report. An agent is the SecureAnywhere software running on the endpoint. You can use this report to locate endpoints that should be upgraded.
Note: You can also view the Agent Version Spread pie chart shown on the Status panel, although this chart is less detailed than the Agent Version Spread report.
To locate endpoints with newly installed SecureAnywhere software: Generate the Agent Installed report. From here, you can see the dates when SecureAnywhere was installed on an endpoint, as well as the number of endpoints receiving the installations.
To locate and manage detected threats: Generate either the All Threats Seen report or the Endpoints with Threats on Last Scan report.
  • The All Threats Seen report lists threats by filename, along with where SecureAnywhere detected them. From here, you can create an override for a file or restore it from quarantine. See Generating the All Threats Seen report.
  • The Endpoints with Threats on Last Scan report shows threats by endpoint location. From here, you can change the endpoint's policy, run a scan, create an override for a file, or restore a file from quarantine. See Generating the Endpoints with Threats on Last Scan report.
To locate files classified as Undetermined: Generate either the All Undetermined Software Seen or the Endpoints with Undetermined Software on Last Scan report.
  • The All Undetermined Software Seen report shows a list of files that are classified as Undetermined in that they appear legitimate, but also exhibit questionable behavior. This report lists items by filename, along with where SecureAnywhere detected them. You can use this report to create overrides and tag files as either Good or Bad, so SecureAnywhere knows how you want to classify them in the future. See Generating the All Undetermined Software Seen report.
  • The Endpoints with Undetermined Software on Last Scan report shows a list of endpoints reporting Undetermined files during the last scan. You can use this report to create overrides and tag files as either Good or Bad, so SecureAnywhere knows how you want to classify them in the future. See Generating the Endpoints with Undetermined Software on Last Scan report.
To view a summary of detected threats: Generate the Threat History (Collated) report. This report shows a bar chart for endpoints with detected threats and blocked programs. From here, you can create overrides for blocked programs and restore files from quarantine.
To view a summary of threats detected on a daily basis: Generate the Threat History (Daily) report. This report shows each day where SecureAnywhere found threats on endpoints.