About Computer Status reports and logs

Article:TECH95541  |  Created: 2009-01-14  |  Updated: 2009-01-14  |  Article URL http://www.symantec.com/docs/TECH95541
Article Type
Technical Solution


Issue






Solution



About the information in the Computer Status reports and logs

    The Computer Status log contains information about the real-time operational status of the computers in the network. Information available includes the computer name and IP address, last check-in time, definitions date, infected status, Auto-Protect status, server, group, domain, and user name. Filters for Computer Status reports have both standard configuration options and compliance-specific options.

    The table below describes some typical uses for the kind of information that you can get from Computer Status reports and logs.

    Report or logTypical uses
    Virus Definitions DistributionUse this report to make sure that all the groups, domains, or servers in your network use up-to-date virus definitions files versions.
    Computers Not Checked into ServerUse this report to find the computers that have not checked in with a server and therefore might be lost or missing.
    Symantec Endpoint Protection Product VersionsUse this report to check the versions of product software, virus definitions, IPS signatures, and proactive protection content in use in your network. With this information you can pinpoint the computers that need an update.
    Intrusion Prevention Signature Distribution Use this report to make sure that all the groups your network use up-to-date intrusion prevention signatures. You can also see which domains or servers are out-of-date.
    Client Inventory Use this report to see the number and percentage of computers that fall into certain hardware and software categories. Available information includes the computers' operating system, total memory, free memory, total disk space, free disk space, and processor type. For example, from the Client Inventory report, you might see that 22% of your computers have less than 1 GB of free disk space.
    Compliance Status DistributionUse this report to see which groups or subnets have the largest percentage of computers out of compliance. You may want to investigate if certain groups seem to have a lot more compliance problems than others.
    Client Online StatusUse this report to see which groups or subnets have the largest percentage of clients online. You may want to investigate why some groups or subnets currently experience more problems than others.
    Clients With Latest Policy Use this report to see which groups or subnets have the largest percentage of computers that don't have the latest policy on them.
    Client Count by GroupUse this report to see the total number of clients and users, by group.
    Security Status SummaryUse this report to quickly see the total number of computers that have the following problems:
    • Auto-Protect is disabled
    • The antivirus engine is turned off
    • Tamper Protection is turned off
    • The computer needs to be restarted
    • The computer failed a host integrity check
    • Network Threat Protection is turned off
    These computers may continue to be at risk unless you intervene.
    Protection Content VersionsUse this report to check the versions of Proactive Protection content in use in your network, to pinpoint any computers that need an update.
    Client MigrationUse this report to see the migration status of clients by domain, group, and server. You can quickly identify clients where migration has failed or has not yet started.
    Clients Online/ Offline Over Time (Snapshots)Use this report to pinpoint the clients that don't connect to the network frequently enough. This report is available only as a scheduled report.
    Clients With Latest Policy over Time (Snapshots)Use this report to pinpoint the clients that don't get policy updates frequently enough. This report is available only as a scheduled report.
    Client Software Rollout (Snapshots) Use this report to pinpoint the clients that don't have the latest software version deployed. This report is available only as a scheduled report.
    Non-compliant Clients Over Time (Snapshots)Use this report to pinpoint the clients that frequently fail host integrity checks. This report is available only as a scheduled report.
    Virus Definitions Rollout (Snapshots)Use this report to check to see the definitions versions that clients have. This report is available only as a scheduled report.
    Computer Status logCheck the Computer Status log if you need more details about any of the areas that the reports cover.


    References
    2009081409151448 - About the different types of Symantec Endpoint Protection Manager Reports





    Legacy ID



    2009081410381448


    Article URL http://www.symantec.com/docs/TECH95541


    Terms of use for this information are found in Legal Notices