About Computer Status reports and logs
search cancel

About Computer Status reports and logs

book

Article ID: 177833

calendar_today

Updated On:

Products

Endpoint Protection

Issue/Introduction



Resolution

About the information in the Computer Status reports and logs

      The Computer Status log contains information about the real-time operational status of the computers in the network. Information available includes the computer name and IP address, last check-in time, definitions date, infected status, Auto-Protect status, server, group, domain, and user name. Filters for Computer Status reports have both standard configuration options and compliance-specific options.



      The table below describes some typical uses for the kind of information that you can get from Computer Status reports and logs.



Report or log Typical uses
Virus Definitions Distribution Use this report to make sure that all the groups, domains, or servers in your network use up-to-date virus definitions files versions.
Computers Not Checked into Server Use this report to find the computers that have not checked in with a server and therefore might be lost or missing.
Symantec Endpoint Protection Product Versions Use this report to check the versions of product software, virus definitions, IPS signatures, and proactive protection content in use in your network. With this information you can pinpoint the computers that need an update.
Intrusion Prevention Signature Distribution Use this report to make sure that all the groups your network use up-to-date intrusion prevention signatures. You can also see which domains or servers are out-of-date.
Client Inventory Use this report to see the number and percentage of computers that fall into certain hardware and software categories. Available information includes the computers' operating system, total memory, free memory, total disk space, free disk space, and processor type. For example, from the Client Inventory report, you might see that 22% of your computers have less than 1 GB of free disk space.
Compliance Status Distribution Use this report to see which groups or subnets have the largest percentage of computers out of compliance. You may want to investigate if certain groups seem to have a lot more compliance problems than others.
Client Online Status Use this report to see which groups or subnets have the largest percentage of clients online. You may want to investigate why some groups or subnets currently experience more problems than others.
Clients With Latest Policy Use this report to see which groups or subnets have the largest percentage of computers that don't have the latest policy on them.
Client Count by Group Use this report to see the total number of clients and users, by group.
Security Status Summary Use this report to quickly see the total number of computers that have the following problems:
  • Auto-Protect is disabled
  • The antivirus engine is turned off
  • Tamper Protection is turned off
  • The computer needs to be restarted
  • The computer failed a host integrity check
  • Network Threat Protection is turned off
These computers may continue to be at risk unless you intervene.
Protection Content Versions Use this report to check the versions of Proactive Protection content in use in your network, to pinpoint any computers that need an update.
Client Migration Use this report to see the migration status of clients by domain, group, and server. You can quickly identify clients where migration has failed or has not yet started.
Clients Online/ Offline Over Time (Snapshots) Use this report to pinpoint the clients that don't connect to the network frequently enough. This report is available only as a scheduled report.
Clients With Latest Policy over Time (Snapshots) Use this report to pinpoint the clients that don't get policy updates frequently enough. This report is available only as a scheduled report.
Client Software Rollout (Snapshots) Use this report to pinpoint the clients that don't have the latest software version deployed. This report is available only as a scheduled report.
Non-compliant Clients Over Time (Snapshots) Use this report to pinpoint the clients that frequently fail host integrity checks. This report is available only as a scheduled report.
Virus Definitions Rollout (Snapshots) Use this report to check to see the definitions versions that clients have. This report is available only as a scheduled report.
Computer Status log Check the Computer Status log if you need more details about any of the areas that the reports cover.



References
TechDoc: About the different types of Symantec Endpoint Protection Manager Reports