Using the Compliance Report

This topic describes the compliance report.

Overview

The compliance report displays compliance status such as compliant, not compliant, remediated, not assessed information for each user based on the device activity in the selected time range.

To display the compliance report, select System > Reports > Compliance.

Table describes the different columns on the compliance report.

Column

Description

Username

Specifies the name of the user.

Realm

Specifies the realm.

Device ID

Specifies a unique identifier used to identify an end point. Click the device ID icon to view a single device report.

MAC Address

Specifies the MAC address of the device.

IP Address

Specifies the IP address of the device

Session Compliance

Specifies the Host Checker posture assessment results: Compliant, Not Compliant, Not Assessed, or Remediated.

Initial Host Check Time

Specifies the initial host check time.

Initial Host Check Details

Specifies the host check result.

The posture assessment chart is also a part of compliance report. It is displayed based on Initial Host Checker evaluation details (Login time).

Table lists the type and the failure reasons for Host Checker.

Type

Failure Reason

Antivirus

Anti-virus not installed

Anti-virus not running

Anti-virus not up to date

Anti-virus scan time check failed

Firewall

Firewall not installed

Firewall not running

Antimalware

Anti-malware not installed

Antispyware

Anti-spyware not installed

Anti-spyware not running

OS Checks

Unsupported OS

Port

Restricted ports open

Required ports not open

Process

Detected restricted processes

Required processes not detected

File

Detected restricted files

Required files missing

Registry

Incorrect registry settings

NetBIOS

Detected restricted NetBIOS names

Required NetBIOS names not found

MAC Address

Detected restricted MAC address

Required MAC address not present

Machine Certificate

Certificate missing

Patch Assessment

Patches missing

Remote IMV

Remote IMV failure

3rd party

NA (Not considered for reporting)

3rd party sub policy

3rd party sub policy failed

Rooting Detection

Detected rooted devices

Jail Breaking Detection

Detected jail broken devices

3rd party NHC Check

Generic failure

 

Type

Failure Reason

Statement of Health

Generic failure

Connection Control

Generic failure

HC

HDEncryption software not installed

Detected Unencrypted drives

Drives are missing

Unsupported client for HDEncryption check

Patch Management software not installed

Detected missing patches

Unsupported client for PatchMgmt check

Deprecated patch assessment rule

Creating a new Filter

To create a new filter:

  1. Select System > Reports > User Summary.
  2. Under Filter, enter the name of the filter.
  3. Under Filter by: Select one of the following periods from the Date Range list box:
    • Last 24 Hours– (Default) Refers to the last 24 hours from the current hour.
    • Last 7 Days– Refers to current day and the previous last 6 days.
    • Last 30 Days– Refers to current day and the previous last 29 days.
    • Custom– Enter the custom from and till date range.
  4. Enter search criteria in one or more of the following attribute columns:
    • Compliance Results
    • Username
    • Realm
    • MAC Address
  5. Click Save Filter.

Once the filter is created, it gets listed in the filter drop-down. Administrator can also choose to edit the existing filter to customize the report based on the requirement. The filter can also be deleted using the Delete Filter option.

Applying Data Filters

To apply a data filter:

  1. Select System > Reports > Compliance.
  2. Select one of the following periods from the Filter by: Date Range list box:
    • Last 24 Hours– (Default) Refers to the last 24 hours from the current hour.
    • Last 7 Days– Refers to current day and the previous last 6 days.
    • Last 30 Days– Refers to current day and the previous last 29 days.
    • Custom– Enter the custom from and till date range.
  3. Enter search criteria in one or more of the following columns:
    • Compliance Results
    • Username
    • Realm
    • MAC Address
  4. Click Apply Filter.

Sorting Records

The data source determines the default sort order of the data rows in the report. Typically, data appears randomly, so sorting is an important task in creating a useful report. You can sort single data column.

To sort the compliance report:

  1. Select System > Reports > Compliance.
  2. Select Initial Host Check Time or Username column and click either the ascending or descending order icon.

Exporting Compliance Report

To export a compliance report:

  1. Select System > Reports > Compliance.
  2. Select a Download Report option.
    • CSV– Exports the report in CSV format.
    • Tab Delimited– Exports the report in tab-delimited format.
    • PDF– Exports the report in PDF format.