McAfee MTP10EMB3RAA Processor Guide - Page 52

Emailing and scheduling reports

Page 52 highlights

Using the SecurityCenter Generation of security reports Emailing and scheduling reports You can run reports on demand or schedule them to at run regular intervals and then send them as email attachments to one or more recipients. NOTE: For more information about reports for specific types of protection, see the chapters for those types of protection. For versions of Total Protection Service that include vulnerability scanning, reports are available on the vulnerability scanning portal. Use this report... Detections To view... The types of potentially malicious code or unwanted programs that have been found on your network. Use this report to manage detections of viruses and potentially unwanted programs. Unrecognized Programs Programs that spyware protection or firewall protection detected on your network. Use this report to manage your potentially unwanted program detections and Internet applications blocked by firewall protection. You can add approved programs and allowed Internet applications to policies directly from the report. Inbound Events Blocked by Firewall Computers where inbound or outbound communications were blocked by firewall protection. Use this report to manage blocked communications. NOTE: For blocked events to be reported, the Report blocked events option must be enabled in the Firewall Protection policy. Blocked events are logged for all computers that are assigned a policy where this option is enabled. Duplicate Computers Computer Profiles Computers that appear more than once in administrative reports. Use this report to track down obsolete computers and those where Total Protection Service has been incorrectly reinstalled and tracked as multiple installations. For each client computer, the version of the Microsoft Windows operating system and Microsoft Internet Explorer web browser running, which group it belongs to, whether it is configured as a relay server, and other details. Use this report to locate computers where you need to install software patches for a specific browser or operating system, check the version of the client software, identify relay servers, and identify the group number for use in silent installation. Detection History A graphical summary of the number of detections and the number of computers where detections occurred on your network over the past year. Use this report to evaluate the effectiveness of your security strategy. Web Filtering Report A summary of browsing activity on your account. Shows the types of sites that client computers attempted to access by content rating and category. Includes successful, warned, and blocked access attempts. (Available only when web filtering policy options are 52 McAfee Total Protection Service Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134

52
McAfee Total Protection Service Product Guide
Using the SecurityCenter
Generation of security reports
Emailing and scheduling reports
You can run reports on demand or schedule them to at run regular intervals and then send
them as email attachments to one or more recipients.
NOTE:
For more information about reports for speciļ¬c types of protection, see the chapters for
those types of protection. For versions of Total Protection Service that include vulnerability
scanning, reports are available on the vulnerability scanning portal.
To view...
Use this report...
The types of potentially malicious code or unwanted
programs that have been found on your network.
Detections
Use this report to manage detections of viruses and
potentially unwanted programs.
Programs that spyware protection or firewall protection
detected on your network.
Unrecognized Programs
Use this report to manage your potentially unwanted
program detections and Internet applications blocked by
firewall protection. You can add approved programs and
allowed Internet applications to policies directly from the
report.
Computers where inbound or outbound communications
were blocked by firewall protection.
Inbound Events Blocked by Firewall
Use this report to manage blocked communications.
NOTE:
For blocked events to be reported, the
Report
blocked events
option must be enabled in the Firewall
Protection policy. Blocked events are logged for all
computers that are assigned a policy where this option is
enabled.
Computers that appear more than once in administrative
reports.
Duplicate Computers
Use this report to track down obsolete computers and
those where Total Protection Service has been incorrectly
reinstalled and tracked as multiple installations.
For each client computer, the version of the Microsoft
Windows operating system and Microsoft Internet
Computer Profiles
Explorer web browser running, which group it belongs
to, whether it is configured as a relay server, and other
details.
Use this report to locate computers where you need to
install software patches for a specific browser or
operating system, check the version of the client
software, identify relay servers, and identify the group
number for use in silent installation.
A graphical summary of the number of detections and
the number of computers where detections occurred on
your network over the past year.
Detection History
Use this report to evaluate the effectiveness of your
security strategy.
A summary of browsing activity on your account. Shows
the types of sites that client computers attempted to
Web Filtering Report
access by content rating and category. Includes
successful, warned, and blocked access attempts.
(Available only when web filtering policy options are