Novell ZENworks Endpoint Security Management 3.5 User Manual

Page of 245
ZENworks® ESM 3.5
Administrator’s Manual
42
Encryption Solution Reports
When endpoint encryption is activated, reports on the transference of files to and from the 
encrypted folders is monitored and recorded. The following reports provide information on 
encrypted files: 
File Encryption Activity 
Shows files that have had encryption applied.
Encryption Exceptions 
Shows errors from the encryption subsystem (e.g., A protected file could not be decrypted 
because the user didn’t have the right keys).
File Encryption Volumes 
Shows volumes (e.g., removable drives or hard-disk partitions) that have been managed by the 
Novell Encryption Solution.
Endpoint Activity Reports
Endpoint activity reports provide feedback for individual policy components and the effect they 
have on the operation of the endpoint. 
Blocked Packets by IP Address
Block Packet Report filtered by Destination IP. Dates displayed in UTC.
Select the destination IP from the list and set the date parameters. The report displays the dates, 
locations, affected ports, and the name of the blocked packets.
Blocked Packets by User
Block Packet Report filtered by User. Dates displayed in UTC. The data provided is essentially 
the same as Blocked Packets by Destination IP, just broken down by user.
Network Usage Statistics by User
Report of packets sent, received or blocked, and network errors, filtered by end-users. This report 
requires a range of dates to be entered. Dates displayed in UTC.
Network Usage Statistics by Adapter Type
Report of packets sent, received or blocked, and network errors filtered by adapter type. This 
report requires a range of dates to be entered and the Location. Dates displayed in UTC.
Endpoint Updates Report
Shows the status of the ZSC Update process (see “ZSC Update” on page 100). Dates displayed in 
UTC.