Endpoint Admission Defense Help >> Operation Guide >> EAD Service Report

EAD Service Report

EAD Service Report contains EAD Report and DAM Report.

1, EAD Report

An EAD Service report allows a network administrator to view and analyze the statistics related to security services. It falls into the following types:

  1. Insecurity Category Statistics Report
  2. This report displays in a pie chart the statistics on insecurity events of various categories, which include anti-virus software, anti-spyware software, firewall software, anti-phishing software, hard disk encryption software, smart terminal software control, Windows patches, patch manager, applications - software, applications - processes, applications - services, applications - files, registry, traffic, OS password, sharing, smart terminal policy and asset registration. The statistics cover insecurity events related to removed services.

    This report also allows you to read detailed information. Click an insecurity category in the pie chart to bring up the detail information page, where you can view the users who have triggered insecurity events of this category.

    Parameters

    Query start time and end time: Set the start and end time for querying the insecurity events. The data in the query time range will be displayed.

  3. Safe Log Gather Statistic Report
  4. This report collects statistics on every category of insecurity events occurred to the current node and all its sub-nodes. Insecurity events fall into eighteen categories: anti-virus software, anti-spyware software, firewall software, anti-phishing software, hard disk encryption software, smart terminal software control, Windows patches, patch manager, applications - software, applications - processes, applications - services, applications - files, registry, traffic, OS password, sharing, smart terminal policy and asset registration. The report displays the statistics in a pie chart. The statistics cover insecurity events related to the removed users and services.

    This report also allows you to read detailed information. Clicking the sector of an insecurity category in the pie chart, you can view the total number of insecurity events of this category occurred per day at each node.

    Parameters

    Query start time and end time: Set the start and end time for querying the safe log gather reports. The reports in the query time range will be displayed.

    Query node: Set the name of the node you want to query.

  5. Online User Security Status Report
  6. This report displays the security status of the current online users in a pie chart. The security statuses fall into five types: no security authentication needed, waiting for security authentication, secure, insecure, and others.

    This report also allows you to read detailed information. Clicking on the sector of each security status, you can view the detailed information of the online users in this security status.

    Parameters

    User group: Select the user group to view data of the online users. Note that you can only view the online users in the user group that you have rights to.

  7. Single-Node Security Check Failure Report
  8. This report displays the number of failures of each security check item for a node, such as the number of user-services that have failed the anti-virus software check. If no data is received from a node, the report does not show the node.

    Parameters

    Query time: The query time and the report type (daily, weekly, monthly) that you select together determine the time range for query. The report displays the statistics collected during the specified time range.

  9. Multi-Node Single-Security Check Item Failures Comparison Chart
  10. This report displays the number of user-services that have failed a specific security check item on each node. If no data is received from a node, the report does not show the node.

    Parameters

    Query time: The query time and the report type (daily, weekly, monthly) that you select together determine the time range for query. The report will display the statistics collected during the specified time range.

    Query item: Specify the item that the comparison chart displays.

  11. Multi-Node Security Check Items Report
  12. This report displays the enabled/disabled status of the security check items in the security policies of each node. You can select the security check items that the report displays. For example, you can specify the report to display the enabled/disabled status of anti-virus software check but hide that of anti-phishing software check.

    Parameters

    None.

  13. Multi-Node Security Policy Statistics Report
  14. This report displays the security policies with the specified security check items enabled or disabled for each node. For example, this report can display the security policies with anti-virus software check enabled for terminal users on each node.

    Parameters

    None.

  15. Multi-Node User Data Statistics Comparison Report
  16. This report displays the real-time statistics on the user data of each node. The user data refers to the data related to users, such as the number of user accounts and the number of denylist users.

    Parameters

    None.

  17. Multi-Node Online Users Comparison Chart
  18. This report displays the category-based statistics on the online users of each node at a specific time. Online users are categorized to total online users, secure online users, insecure online users, and other online users. For example, the report can show the numbers of the four categories of online users counted at 2011-09-25 10:30. If no data is received from a node, the report does not show the node.

    Parameters

    Delay time: You can set the delay to five minutes or ten minutes. The statistics time is calculated as follows: the system deducts the delay from the query time, and then rounds the result down to a multiple of half an hour. For example, when the query time is 2011-07-01 08:07:00 and the delay is five minutes, the report collects the statistics of 2011-07-01 08:00:00. When you modify the delay to ten minutes, the system collects the statistics of 2011-07-01 07:30:00.

  19. Multi-Node User Counts Comparison Chart
  20. This report displays the number of users on the current node and that on each child node at a specific time. It compares the number of created access users, the number of denylist users, and the number of guest users on different nodes at a specific time (2011-7-1 8:30, for example). If no data is received from a node, the report does not show the node.

    Parameters

    Delay time: You can set the delay to five minutes or ten minutes. The statistics time is calculated as follows: the system deducts the delay from the query time, and then rounds the result down to a multiple of half an hour. For example, when the query time is 2011-07-01 08:07:00 and the delay is five minutes, the report collects the statistics of 2011-07-01 08:00:00. When you modify the delay to ten minutes, the system collects the statistics of 2011-07-01 07:30:00.

  21. Single-Node Online Users 24-Hour Trend Graph
  22. This report displays a node's 24-hour online users trend of a day. This reports include the 24-hour trends for the number of online users, the number the secure online users, the number of insecure online users, and the number of unknown online users.

    Parameters

    None.

  23. All-Node Online Users 24-Hour Trend Graph
  24. This report displays the 24-hour online users trend of a day for all nodes. This reports include the 24-hour trends for the number of online users, the number of secure online users, the number of insecure online users, and the number of unknown online users.

    Parameters

    None.

Precautions

2, DAM Report

An asset report allows a network administrator to view and analyze the statistics related to assets. See DAM Report for detail.