SonicWALL 4.5 Manuale Utente
79
Enforced Client Product Guide
Using Enforced Client
Viewing reports
3
Why use reports?
Reports provide valuable tools for managing your security strategy. Only the reports available
for the installed protection services appear on this page.
Reports provide valuable tools for managing your security strategy. Only the reports available
for the installed protection services appear on this page.
Detections
The types of potentially malicious code or unwanted programs that have
been found on your network.
been found on your network.
Use this report to manage detections of viruses and potentially unwanted
programs.
programs.
See
Unrecognized
Programs
Programs
Programs that your spyware protection or firewall protection detected on
your network.
your network.
Use this report to manage your potentially unwanted program detections and
Internet applications blocked by the firewall protection service.
Internet applications blocked by the firewall protection service.
See
for instructions.
Inbound Events
Blocked by Firewall
Blocked by Firewall
Computers where inbound or outbound communications were blocked by
the firewall protection service.
the firewall protection service.
Use this report to manage blocked communications.
See
for
instructions.
Duplicate Computers
Computers that appear more than once in administrative reports.
Use this report to track down obsolete computers and those where Enforced
Client has been incorrectly overinstalled and tracked as multiple
installations.
Client has been incorrectly overinstalled and tracked as multiple
installations.
See
for detailed instructions.
Computer Profiles
The version of the Windows operating system and the Internet Explorer web
browser running on each client computer.
browser running on each client computer.
Use this report to locate computers where you need to install software
patches for a specific browser or operating system.
patches for a specific browser or operating system.
See
for detailed instructions.
Detection History
A graphical summary of the number of detections and the number of
computers where detections occurred on your network over the past year.
computers where detections occurred on your network over the past year.
Use this report to evaluate the effectiveness of your security strategy.
See
for instructions.
Email Security Reports
A page on the email security service’s portal, where you can access reports
on your site’s mailflow and detections.
on your site’s mailflow and detections.
Use these reports to monitor email activity and detections.
See
for
instructions.
Can I customize reports?
Select the data to display (see
Print a report, save it, or send it to users (see
).
Use this report...
To view...