About the information in the Computer Status reports and logs
Report or log | Typical uses |
Virus Definitions Distribution | Use this report to make sure that all the groups, domains, or servers in your network use up-to-date virus definitions files versions. |
Computers Not Checked into Server | Use this report to find the computers that have not checked in with a server and therefore might be lost or missing. |
Symantec Endpoint Protection Product Versions | Use this report to check the versions of product software, virus definitions, IPS signatures, and proactive protection content in use in your network. With this information you can pinpoint the computers that need an update. |
Intrusion Prevention Signature Distribution | Use this report to make sure that all the groups your network use up-to-date intrusion prevention signatures. You can also see which domains or servers are out-of-date. |
Client Inventory | Use this report to see the number and percentage of computers that fall into certain hardware and software categories. Available information includes the computers' operating system, total memory, free memory, total disk space, free disk space, and processor type. For example, from the Client Inventory report, you might see that 22% of your computers have less than 1 GB of free disk space. |
Compliance Status Distribution | Use this report to see which groups or subnets have the largest percentage of computers out of compliance. You may want to investigate if certain groups seem to have a lot more compliance problems than others. |
Client Online Status | Use this report to see which groups or subnets have the largest percentage of clients online. You may want to investigate why some groups or subnets currently experience more problems than others. |
Clients With Latest Policy | Use this report to see which groups or subnets have the largest percentage of computers that don't have the latest policy on them. |
Client Count by Group | Use this report to see the total number of clients and users, by group. |
Security Status Summary | Use this report to quickly see the total number of computers that have the following problems:
|
Protection Content Versions | Use this report to check the versions of Proactive Protection content in use in your network, to pinpoint any computers that need an update. |
Client Migration | Use this report to see the migration status of clients by domain, group, and server. You can quickly identify clients where migration has failed or has not yet started. |
Clients Online/ Offline Over Time (Snapshots) | Use this report to pinpoint the clients that don't connect to the network frequently enough. This report is available only as a scheduled report. |
Clients With Latest Policy over Time (Snapshots) | Use this report to pinpoint the clients that don't get policy updates frequently enough. This report is available only as a scheduled report. |
Client Software Rollout (Snapshots) | Use this report to pinpoint the clients that don't have the latest software version deployed. This report is available only as a scheduled report. |
Non-compliant Clients Over Time (Snapshots) | Use this report to pinpoint the clients that frequently fail host integrity checks. This report is available only as a scheduled report. |
Virus Definitions Rollout (Snapshots) | Use this report to check to see the definitions versions that clients have. This report is available only as a scheduled report. |
Computer Status log | Check the Computer Status log if you need more details about any of the areas that the reports cover. |
References
TechDoc: About the different types of Symantec Endpoint Protection Manager Reports