McAfee MTP08EMB3RUA Product Guide - Page 56

Generation of security reports, Reports

Page 56 highlights

3 Using the SecurityCenter Generation of security reports Generation of security reports Whenever a client computer checks for updates, it also sends information about itself It sends its scanning history, update status, and detections to the SecurityCenter website in encrypted XML files. It uploads the data directly through an Internet connection or via a relay server. Report data is saved for one year. To view this data, click the Reports tab to display the Reports page. You can display reports that include all the computers on your account (using the same company key) or only computers in a particular group. Why use reports? Reports provide valuable tools for monitoring detections and fine-tuning your protection strategy. Only the reports available for the types of protection installed appear on this page. Emailing and scheduling reports You can run reports on demand or schedule them to at run regular intervals and then send them as email attachments to one or more recipients. For more information about reports for specific types of protection, see the chapters for those types of protection. For versions of Total Protection Service that include vulnerability scanning, reports are available on the vulnerability scanning portal. Use this report... Detections Unrecognized Programs Inbound Events Blocked by Firewall To view... The types of potentially malicious code or unwanted programs that have been found on your network. Use this report to manage detections of viruses and potentially unwanted programs. Programs that spyware protection or firewall protection detected on your network. Use this report to manage your potentially unwanted program detections and Internet applications blocked by firewall protection. You can add approved programs and allowed Internet applications to policies directly from the report. Computers where inbound or outbound communications were blocked by firewall protection. Use this report to manage blocked communications. For blocked events to be reported, the Report blocked events option must be enabled in the Firewall Protection policy. Blocked events are logged for all computers that are assigned a policy where this option is enabled. 56 McAfee Total Protection Service 5.1.5 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

Generation of security reports
Whenever a client computer checks for updates, it also sends information about itself
It sends its scanning history, update status, and detections to the SecurityCenter website in encrypted
XML files. It uploads the data directly through an Internet connection or via a relay server. Report data
is saved for one year.
To view this data, click the
Reports
tab to display the Reports page. You can display reports that include
all the computers on your account (using the same company key) or only computers in a particular
group.
Why use reports?
Reports provide valuable tools for monitoring detections and fine-tuning your protection strategy. Only
the reports available for the types of protection installed appear on this page.
Emailing and scheduling reports
You can run reports on demand or schedule them to at run regular intervals and then send them as
email attachments to one or more recipients.
For more information about reports for specific types of protection, see
the chapters for those types of protection. For versions of Total
Protection Service that include vulnerability scanning, reports are
available on the vulnerability scanning portal.
Use this report...
To view...
Detections
The types of potentially malicious code or
unwanted programs that have been found on
your network.
Use this report to manage detections of viruses
and potentially unwanted programs.
Unrecognized Programs
Programs that spyware protection or firewall
protection detected on your network.
Use this report to manage your potentially
unwanted program detections and Internet
applications blocked by firewall protection. You
can add approved programs and allowed Internet
applications to policies directly from the report.
Inbound Events Blocked by Firewall
Computers where inbound or outbound
communications were blocked by firewall
protection.
Use this report to manage blocked
communications.
For blocked events to be reported, the
Report
blocked events
option must be enabled in the
Firewall Protection policy. Blocked events are
logged for all computers that are assigned a
policy where this option is enabled.
3
Using the SecurityCenter
Generation of security reports
56
McAfee Total Protection Service 5.1.5 Product Guide