Using the Compliance Report
This topic describes the compliance report.
About the Compliance Report
The compliance report displays compliance status such as compliant, not compliant, remediated, not assessed information for each user based on the device activity in the selected time range.
Displaying the Compliance Report
To display the compliance report, select System > Reports > Compliance.
Figure shows the compliance report for Pulse Connect Secure.
Table describes the different columns on the compliance report.
The posture assessment chart is also a part of compliance report. It is displayed based on Initial Host Checker evaluation
Column |
Description |
Username |
Specifies the name of the user. |
Realm |
Specifies the realm. |
Device ID |
Specifies a unique identifier used to identify an end point. Click the device ID icon to view a single device report. |
MAC Address |
Specifies the MAC address of the device. |
Session Compliance |
Specifies the Host Checker posture assessment results: Compliant, Not Compliant, Not Assessed, or Remediated. |
Initial Host Check Time |
Specifies the initial host check time. |
Initial Host Check Details |
Specifies the host check result. |
details (Login time).
Table lists the type and the failure reasons for Host Checker.
Type |
Failure Reason |
Antivirus |
Anti-virus not installed Anti-virus not running Anti-virus not up to date Anti-virus scan time check failed |
Firewall |
Firewall not installed Firewall not running |
Antimalware |
Anti-malware not installed |
Antispyware |
Anti-spyware not installed Anti-spyware not running |
OS Checks |
Unsupported OS |
Port |
Restricted ports open Required ports not open |
Process |
Detected restricted processes Required processes not detected |
File |
Detected restricted files Required files missing |
Registry |
Incorrect registry settings |
NetBIOS |
Detected restricted NetBIOS names Required NetBIOS names not found |
MAC Address |
Detected restricted MAC address Required MAC address not present |
Machine Certificate |
Certificate missing |
Patch management |
Patches missing |
Cache Cleaner |
Cache cleaner failed |
SVW |
NA (Not considered for reporting) |
SVW sub policy (.SVWActive) |
Connected from non-SVW |
Remote IMV |
Remote IMV failure |
EES |
Enhanced Endpoint Security failed (no longer supported) |
3rd party |
NA (Not considered for reporting) |
3rd party sub policy |
3rd party sub policy failed |
Rooting Detection |
Detected rooted devices |
Jail Breaking Detection |
Detected jail broken devices |
3rd party NHC Check |
Generic failure |
Statement of Health |
Generic failure |
Connection Control |
Generic failure |
Applying Data Filters
To apply a data filter:
1.Select System > Reports > Compliance.
2.Select one of the following periods from the Filter by: Date Range list box:
•Last 24 Hours - (Default) Refers to the last 24 hours from the current hour.
•Last 7 Days - Refers to current day and the previous last 6 days.
•Last 30 Days - Refers to current day and the previous last 29 days.
3.Enter search criteria in one or more of the following columns:
•Compliance Results
•Username
•Realm
•MAC Address
4.Click Apply Filter.
Figure shows the compliance report for Pulse Connect Secure.
Sorting Records
The data source determines the default sort order of the data rows in the report. Typically, data appears randomly, so sorting is an important task in creating a useful report. You can sort single data column.
To sort the compliance:
1.Select System > Reports > Compliance.
2.Select Initial Host Check Time or Username column and click either the ascending or descending order icon.
Figure shows the compliance report sorted by last login time for Pulse Connect Secure.
Exporting Compliance Report
To export a compliance report:
1.Select System > Reports > Compliance.
2.Select a Download Report option.
•CSV - Exports the report in CSV format.
•Tab Delimited - Exports the report in tab-delimited format.
Figure shows the export compliance report displayed for Pulse Connect Secure.