Alcatel-Lucent ics dissolvable agent for safeguard Manual De Usuario

Descargar
Página de 44
ICS Dissolvable Agent for SafeGuard Administration Guide
37
Chapter 5: Reports
Access Statistics
Use the Access Statistics report to see what the results were for all the users who 
attempted to connect to your gateway. Attempted user connections are counted per 
session, with the session determined by the persistence of the cookie. If a user connects to 
your gateway, disconnects and reconnects again, that is counted as one connection 
attempt, unless the cookie has expired.
This report shows how many users were compliant with your security rules and what 
happened to those who were not compliant. Use the legend to see details about the users 
in each category. 
You can use the information in this report to refine your policies. If an excessive amount 
of users are being warned, or even restricted, your rules may be too strict or you may not 
be providing enough remediation information. Use the Rules Broken report to see which 
rules your end point users are having the most trouble with. Once most users are 
compliant, you can increase your security requirements.
Security Scan Results
The Security Scan Results report shows the total numbers of enforcement rules broken 
and the total amount of spyware found for each user’s scan. You can use this report to 
find out why a user was warned or restricted. Using this information, you can then 
provide remediation information to the user.
Spyware Found 
Use the Spyware Found report to see how often particular spyware applications were 
found on your end point computers. If you find that ICS is scanning for a particular 
spyware application that you want to allow, you can add it to the ignore list. See 
.
Rules Broken 
Use the Rules Broken report to determine which rules are causing your end point users 
the most trouble. This report includes rules that are set to ‘observe’. If a rule is 
consistently being broken at a high rate, that may indicate the rule is too strict or that you 
are not providing enough remediation information for that rule.
Anti-Keylogger 
The Anti-Keylogger report shows processes that were flagged by ICS as potentially being 
keyloggers. This reports shows you how ICS protects your network and end point users 
from keyloggers.