Available Reports
Ivanti Endpoint Security features a variety of reports. Each report documents Ivanti Endpoint Security activities and statistics.
The reports available for generation change based on which modules you have installed.
Available Core Reports
Ivanti Endpoint Security provides various HTML and PDF formatted reports that display core data. The following reports are available within Ivanti Endpoint Security when no modules are installed.

This report returns a list of endpoint agent policies. In the report, each policy value is listed in the Policy Name column. When using groups as a parameter to select multiple endpoints, the group policies are not part of the actual results.
Optional Parameters: Endpoints, Groups
If no parameter selection is made, the report generates using all available data.
The following table describes each report field.
Column |
Definition |
---|---|
Device Name |
The name of the endpoint. |
Policy Name |
The name of the agent policy. |
Current Value |
The policy setting. |
Policy Desc |
The agent policy’s description. |

This report lists details for endpoints associated with the specified agent groups and job (Discovery Scan or Agent Management). This report includes a pie chart that shows the agent status counts for the agent groups and scan job. A Not Installed agent status assigned to an endpoint that exists only in the job and not a selected agent group. Details are also displayed for each endpoint.
Required Parameters: Selection of one or multiple agent group(s) and one completed job.
Optional Parameters (default setting): Sort by (IP address, machine name, operating system [OS]), Included OSs, Included IP addresses.
This following table describes each report field and column.
Field / Column |
Definition |
---|---|
General Information |
|
Server Name |
The Ivanti Endpoint Security server name. |
Agent Groups |
The agent groups included in the report. |
Job Name |
The job name. |
Date and Time Information |
|
Run Date |
The date the selected job ran. |
Start Time |
The time the selected job began. |
Duration |
The duration of the selected job. |
Version |
The version of the scan engine in use. |
Endpoint Inventory Summary |
|
Total Known Endpoints |
The total number of endpoints with agents installed. |
Agents Checking In |
The number of agents checking in to the Ivanti Endpoint Security. |
Online |
The total number/percentage of endpoints online. |
Agents Not Checking In |
The number of agents that are not checking in to Ivanti Endpoint Security. |
Offline |
The number (or percentage) of agents that are offline. |
Disabled |
The number (or percentage) of agents that are disabled. |
No Agent Installed |
The number (or percentage) of endpoints with no agent installed. |
Not Installed |
The number (or percentage) of endpoints with no agent installed. |
Endpoint Inventory Summary Graph |
|
Disabled |
The number (or percentage) of agents that are disabled. |
Not Installed |
The number (or percentage) of endpoints with no agent installed. |
Offline |
The number (or percentage) of agents that are offline. |
Online |
The total number/percentage of endpoints online. |
Total |
The total number of endpoints assessed. |
Composite Inventory Table |
|
Agent IP |
The IP address of the endpoint the agent is installed on. |
Agent Name |
The name endpoint that hosts the agent. |
Operating System |
The operating system name and description. |
Agent Status |
The current status of the endpoint. |

This report comprehensively details a selected job’s configuration. Use the Job Configuration report to document all configuration settings and options assigned to a selected job (Discovery Scan or Agent Management). This report generates a listing of discovery options used by a specific job and can be used to maintain configuration control.
Required Parameters: Selection of one completed job. The following table describes each report field.
Field |
Definition |
---|---|
General Information |
|
Job Name |
The job name. |
Job Type |
The job type. |
Merged Job |
Indicates if the job is a merged job (True or False). |
Schedule Information |
|
Schedule Method |
The job schedule method. |
Start Time |
The time the selected job began. |
Version |
The version of the scan engine in use. |
Discovery Options |
|
Verify with Ping |
Indicates if the Verify with Ping discovery option was selected. |
ICMP Discovery |
Indicates if ICMP Discovery was selected. |
Port Scan Discovery |
Indicates if Port Scan Discovery was selected. |
SNMP Discovery |
Indicates if SNMP Discovery was selected. |
Windows Version Discovery |
Indicates if Windows Version Discovery was selected. |
Resolve DNS Names |
Indicates if Resolve DNS Names was selected. |
Resolve MAC Addresses |
Indicates if Resolve MAC Addresses was selected. |
Resolve NetBIOS Names |
Indicates if Resolve NetBIOS Names was selected. |
Scan Options |
|
Scan for Services |
Indicates if the Scan for Services scan option was selected. |
Scan for Shares |
Indicates if Scan for Shares was selected. |
Scan for Users |
Indicates if Scan for Users was selected. |
Scan for Groups |
Indicates if Scan for Groups was selected. |
Discovery Methods |
|
IP Range |
Indicates a single IP address, wildcard IP address, or IP range designated for detection during a job. This field is associated with the Single/Wildcard IP and IP Range discovery methods. |
Machine Name |
Indicates the NetBIOS or DNS name of an endpoint designated for discovery during a job. This field is associated with the Named Target discovery method. |
Network Discovery |
Indicates a network neighborhood designated for discovery during a job. This field is associated with the Network Neighborhood discovery method. |
Credentials included in the credential set |
|
Credential Type |
The type of credentials entered during job configuration (Windows, Posix, SNMP). |
Description |
A description of the credentials used. |
User Name |
The user name entered during job credential configuration. This field is associated with Windows and Posix credentials. |
Community String |
The community string entered during job credential configuration. This field is associated with SNMP credentials. |
The Discovery Methods and Credentials included in the credential set fields displayed depend on how the job was configured. For example, a report representing a job that did not use the IP Range discovery method will not display an IP Range field. Similarly, Credential included in the credential set fields are only populated if you entered credentials during job configuration.

This report lists the endpoints, along with basic identification information, that were discovered during a job (Discovery Scan or Agent Management).
Required Parameters: Selection of one completed job.
Optional Parameters: Sort by (IP Address, Machine Name, Operating System [OS]), Included OSs, Included IP addresses.
Enter a single IP or a range of IP addresses (leave blank for all).
The following table describes the report field and columns.
Field / Column |
Definition |
---|---|
General Information |
|
Job Name |
The job name. |
Version |
The version of the scan engine in use. |
Target Information |
|
Targets Found |
The number of endpoints discovered during scanning. |
Non-responsive IPs |
The number of IP addresses designated for discovery during job configuration that were unresponsive. |
Date and Time Information |
|
Run Date |
The date the selected job ran. |
Start Time |
The time the selected job began. |
Duration |
The duration of the selected job. |
Network Inventory Table Columns |
|
Target IP |
The IP address of the discovered endpoint. |
Target Name |
The DNS name of the endpoint. |
Operating System |
The operating system name and description. |
MAC Address |
The MAC address of the endpoint. |