79
Enforced Client Product Guide Using Enforced Client
Viewing reports
3
Why use reports?
Reports provide valuable tools for managing your security strategy. Only the reports available
for the installed protection services appear on this page.
Detections
The types of potentially malicious code or unwanted programs that have
been found on your network.
Use this report to manage detections of viruses and potentially unwanted
programs.
See View detections on page 103 for instructions.
Unrecognized
Programs
Programs that your spyware protection or firewall protection detected on
your network.
Use this report to manage your potentially unwanted program detections and
Internet applications blocked by the firewall protection service.
See View unrecognized programs on page 105 and View unrecognized
Internet applications on page 123 for instructions.
Inbound Events
Blocked by Firewall
Computers where inbound or outbound communications were blocked by
the firewall protection service.
Use this report to manage blocked communications.
See View inbound events blocked by the firewall on page 124 for
instructions.
Duplicate Computers
Computers that appear more than once in administrative reports.
Use this report to track down obsolete computers and those where Enforced
Client has been incorrectly overinstalled and tracked as multiple
installations.
See View duplicate computers on page 80 for detailed instructions.
Computer Profiles
The version of the Windows operating system and the Internet Explorer web
browser running on each client computer.
Use this report to locate computers where you need to install software
patches for a specific browser or operating system.
See View computer profiles on page 81 for detailed instructions.
Detection History
A graphical summary of the number of detections and the number of
computers where detections occurred on your network over the past year.
Use this report to evaluate the effectiveness of your security strategy.
See View your detection history on page 107 for instructions.
Email Security Reports
A page on the email security service’s portal, where you can access reports
on your site’s mailflow and detections.
Use these reports to monitor email activity and detections.
See Viewing reports for the email security service on page 141 for
instructions.
Can I customize reports?
Select the data to display (see Customize listings and reports on page 60).
Print a report, save it, or send it to users (see Make the most of your online data on page 59).
Add a customized logo (see Add your logo to reports on page 82).
Use this report... To view...