Alcatel-Lucent ics dissolvable agent for safeguard Manual De Usuario
ICS Dissolvable Agent for SafeGuard Administration Guide
37
Chapter 5: Reports
Access Statistics
Use the Access Statistics report to see what the results were for all the users who
attempted to connect to your gateway. Attempted user connections are counted per
session, with the session determined by the persistence of the cookie. If a user connects to
your gateway, disconnects and reconnects again, that is counted as one connection
attempt, unless the cookie has expired.
attempted to connect to your gateway. Attempted user connections are counted per
session, with the session determined by the persistence of the cookie. If a user connects to
your gateway, disconnects and reconnects again, that is counted as one connection
attempt, unless the cookie has expired.
This report shows how many users were compliant with your security rules and what
happened to those who were not compliant. Use the legend to see details about the users
in each category.
happened to those who were not compliant. Use the legend to see details about the users
in each category.
You can use the information in this report to refine your policies. If an excessive amount
of users are being warned, or even restricted, your rules may be too strict or you may not
be providing enough remediation information. Use the Rules Broken report to see which
rules your end point users are having the most trouble with. Once most users are
compliant, you can increase your security requirements.
of users are being warned, or even restricted, your rules may be too strict or you may not
be providing enough remediation information. Use the Rules Broken report to see which
rules your end point users are having the most trouble with. Once most users are
compliant, you can increase your security requirements.
Security Scan Results
The Security Scan Results report shows the total numbers of enforcement rules broken
and the total amount of spyware found for each user’s scan. You can use this report to
find out why a user was warned or restricted. Using this information, you can then
provide remediation information to the user.
and the total amount of spyware found for each user’s scan. You can use this report to
find out why a user was warned or restricted. Using this information, you can then
provide remediation information to the user.
Spyware Found
Use the Spyware Found report to see how often particular spyware applications were
found on your end point computers. If you find that ICS is scanning for a particular
spyware application that you want to allow, you can add it to the ignore list. See
found on your end point computers. If you find that ICS is scanning for a particular
spyware application that you want to allow, you can add it to the ignore list. See
.
Rules Broken
Use the Rules Broken report to determine which rules are causing your end point users
the most trouble. This report includes rules that are set to ‘observe’. If a rule is
consistently being broken at a high rate, that may indicate the rule is too strict or that you
are not providing enough remediation information for that rule.
the most trouble. This report includes rules that are set to ‘observe’. If a rule is
consistently being broken at a high rate, that may indicate the rule is too strict or that you
are not providing enough remediation information for that rule.
Anti-Keylogger
The Anti-Keylogger report shows processes that were flagged by ICS as potentially being
keyloggers. This reports shows you how ICS protects your network and end point users
from keyloggers.
keyloggers. This reports shows you how ICS protects your network and end point users
from keyloggers.