An EAD Service report allows a network administrator to view and analyze the statistics related to security services. It falls into the following types:
This report displays in a pie chart the statistics on insecurity events of various categories, which include anti-virus software, anti-spyware software, firewall software, anti-phishing software, hard disk encryption software, smart terminal software control, Windows patches, patch manager, applications - software, applications - processes, applications - services, applications - files, registry, traffic, OS password, sharing, smart terminal policy and asset registration. The statistics cover insecurity events related to removed services.
This report also allows you to read detailed information. Click an insecurity category in the pie chart to bring up the detail information page, where you can view the users who have triggered insecurity events of this category.
Parameters
Query start time and end time: Set the start and end time for querying the insecurity events. The data in the query time range will be displayed.
This report collects statistics on every category of insecurity events occurred to the current node and all its sub-nodes. Insecurity events fall into eighteen categories: anti-virus software, anti-spyware software, firewall software, anti-phishing software, hard disk encryption software, smart terminal software control, Windows patches, patch manager, applications - software, applications - processes, applications - services, applications - files, registry, traffic, OS password, sharing, smart terminal policy and asset registration. The report displays the statistics in a pie chart. The statistics cover insecurity events related to the removed users and services.
This report also allows you to read detailed information. Clicking the sector of an insecurity category in the pie chart, you can view the total number of insecurity events of this category occurred per day at each node.
Parameters
Query start time and end time: Set the start and end time for querying the safe log gather reports. The reports in the query time range will be displayed.
Query node: Set the name of the node you want to query.
This report displays the security status of the current online users in a pie chart. The security statuses fall into five types: no security authentication needed, waiting for security authentication, secure, insecure, and others.
This report also allows you to read detailed information. Clicking on the sector of each security status, you can view the detailed information of the online users in this security status.
Parameters
User group: Select the user group to view data of the online users. Note that you can only view the online users in the user group that you have rights to.
This report displays the number of failures of each security check item for a node, such as the number of user-services that have failed the anti-virus software check. If no data is received from a node, the report does not show the node.
Parameters
Query time: The query time and the report type (daily, weekly, monthly) that you select together determine the time range for query. The report displays the statistics collected during the specified time range.
This report displays the number of user-services that have failed a specific security check item on each node. If no data is received from a node, the report does not show the node.
Parameters
Query time: The query time and the report type (daily, weekly, monthly) that you select together determine the time range for query. The report will display the statistics collected during the specified time range.
Query item: Specify the item that the comparison chart displays.
This report displays the enabled/disabled status of the security check items in the security policies of each node. You can select the security check items that the report displays. For example, you can specify the report to display the enabled/disabled status of anti-virus software check but hide that of anti-phishing software check.
Parameters
None.
This report displays the security policies with the specified security check items enabled or disabled for each node. For example, this report can display the security policies with anti-virus software check enabled for terminal users on each node.
Parameters
None.
This report displays the real-time statistics on the user data of each node. The user data refers to the data related to users, such as the number of user accounts and the number of denylist users.
Parameters
None.
This report displays the category-based statistics on the online users of each node at a specific time. Online users are categorized to total online users, secure online users, insecure online users, and other online users. For example, the report can show the numbers of the four categories of online users counted at 2011-09-25 10:30. If no data is received from a node, the report does not show the node.
Parameters
Delay time: You can set the delay to five minutes or ten minutes. The statistics time is calculated as follows: the system deducts the delay from the query time, and then rounds the result down to a multiple of half an hour. For example, when the query time is 2011-07-01 08:07:00 and the delay is five minutes, the report collects the statistics of 2011-07-01 08:00:00. When you modify the delay to ten minutes, the system collects the statistics of 2011-07-01 07:30:00.
This report displays the number of users on the current node and that on each child node at a specific time. It compares the number of created access users, the number of denylist users, and the number of guest users on different nodes at a specific time (2011-7-1 8:30, for example). If no data is received from a node, the report does not show the node.
Parameters
Delay time: You can set the delay to five minutes or ten minutes. The statistics time is calculated as follows: the system deducts the delay from the query time, and then rounds the result down to a multiple of half an hour. For example, when the query time is 2011-07-01 08:07:00 and the delay is five minutes, the report collects the statistics of 2011-07-01 08:00:00. When you modify the delay to ten minutes, the system collects the statistics of 2011-07-01 07:30:00.
This report displays a node's 24-hour online users trend of a day. This reports include the 24-hour trends for the number of online users, the number the secure online users, the number of insecure online users, and the number of unknown online users.
Parameters
None.
This report displays the 24-hour online users trend of a day for all nodes. This reports include the 24-hour trends for the number of online users, the number of secure online users, the number of insecure online users, and the number of unknown online users.
Parameters
None.
Precautions
An asset report allows a network administrator to view and analyze the statistics related to assets. See DAM Report for detail.