Web Dashboard and Reports for PGP Encryption Server
search cancel

Web Dashboard and Reports for PGP Encryption Server

book

Article ID: 385968

calendar_today

Updated On: 01-15-2025

Products

Desktop Email Encryption Drive Encryption Encryption Management Server Endpoint Encryption File Share Encryption Gateway Email Encryption Information Centric Encryption Mobile Encryption for iOS PGP Encryption Suite Policy Based Encryption Tape Encryption

Issue/Introduction

PGP Encryption Server 11.0 and above employs a redesigned Dashboard that will display key information about the encryption environment as well as redesigned web reports that are available remotely. 

Authorized users are able to login to the new web portal and see information about the encryption environment and build reports for most of the critical data needed.

This article will guide you through some of the key screens to provide easy insight into your encryption environment. 

 

For Symantec Endpoint Encryption Dashboard and Reports, see the following article:
240649 - Symantec Endpoint Encryption Web Dashboard and Reports

Resolution

There is a lot of new design to PGP Encryption Server 11. The becomes noticeable when logging into the new portal.

In previous versions, there was the "OMC" which was the old management UI. In PGP 11 and beyond, many elements are being ported into the new UI which is called the "SMC".

You will notice this immediately when logging in with the new URL:

https://keys.example.com:9000/smc/login

 

 

Note: To login to the old management console, simply type:

https://FQDN:9000/omc

(where FQDN is your hostname.  In future examples, it is keys.example.com.)


EPG-37024

 

 

Once you login, you will be presented with the new main dashboard.  What you see all depends on the PGP Administrator role access.

In this example, Super User's dashboard example is shown:

The new Dashboard provides a plethora of useful information to help you know the status of your environment at a glance.

Notice the "smc" in the URL above. This is how you will get access to all this new functionality and future features porting over with every new version.

On the left side, you'll see each of these icons to represent the "Dashboard" with all the KPIs, the "Reporting" with the graph icon, and the "Settings", represented with a cogwheel:

To view each of the reports, click the reports icon and the following screen appears:

In total, there are 7 different reports and more may be added to each version and will help to build solid information about the environment.

 

Report Name: Client Login Failures
Description: Provides information about users who were unsuccessful in booting or attempts made at preboot.

Report Name: Disk Encryption Status
Description: Provides information on the encryption status of all disks in the environment.

Report Name: Disk Tokens Accessed
Description: Provides information on Recovery Tokens accessed by administrators. 

Report Name: Expiring user certificates
Description: Provides information on the user certificates that are going to expire in the next 30 days and already expired.

Report Name: External User Activity
Description: Provides information on external user accounts and their recent login times.

Report Name: Internal User Key Status
Description: A report about Internal Users and their corresponding key status (Expired, Revoked, Valid, and Total keys)

Report Name: User Group Policy Report
Description: Provides information on the user effective group and associated policies, features, ADK and Group key.

 

Each of the above reports can be fully customized to suite the needs of just about every scenario. 


Filters exist for the purpose viewing only what's needed:

The customization can get very granular and supports operators, such as the following:

Most of the default reports will satisfy most, but if some slight modification is needed, you can even click on a default report and modify to specific needs and save the updated report.

Reports created can be used by other administrators, but only the creator can modify.  None of the default reports can be deleted.

 

To duplicate a report, simply go into an existing report, and click "Duplicate". 

For example, a report called "Client Login Failures" was duplicated, and the duplicate name is now called "Client Login Failures-10":

The name can then be renamed to anything needed. 

 

To download the report, click "Share":

Most any report can be duplicated, but if you are seeing a report that is missing that should be here, reach out to Symantec Encryption Support for further guidance.

 

Note: The new SMC console is available only when the PGP Encryption Server is fully up and running.  
EPG-37006

 

Additional Information