Skip to main content
Matrix42 Self-Service Help Center

Reports

Overview

The Reports menu gives you an overview of various statistics on computers and users in your directory as well as on the individual components of EgoSecure Data Protection. Depending on the menu item, various options are available. 

Available Reports

The following tables give you an overview of statistics available in the Reports menu and the information they contain.

Tenants

Report

Available information

Secure Audit data usage

Summary table with the database information for each tenant. Click the tenant row to see details about the size of certain Secure Audit types in the database for the selected tenant.

License usage

Summary table of all activated licenses per each tenant. Mouse over the column name to see the full name of a product license.

In the Show license drop-down, select:

  • Total to see the total number of licenses activated for computers and users.
  • Users to see the number of licenses activated only for users.
  • Computers to see the number of licenses activated only for computers.
  • Users + computers to see the number of licenses activated for users and the numbers of licenses activated for computers.

See also: Managing tenants

General

Report

Available information

Management overview

Statistics to the following points:

  • Active users: the number of users with active products (green), and users with inactive products (grey).
  • Active computers: the number of computers with active products (blue), and computers with inactive products (grey).

Agents state

In the Computers area the number of computers where the EgoSecure Agent is installed and started, not started/not installed or offline (installed but cannot connect to the Server) is displayed.

In the Loaded agents area, the state of Agent components is shown: status OK, driver not loaded or tray not started.

Synchronization log

Overview of successful and failed synchronization attempts. You will also receive information about the number of objects read or the reason for the synchronization failure (e.g. due to an error code).

Revision

Overview of Console operations, type of administrator who performed an operation, and an operation result.

Active/inactive products

Overview of users, computers or groups where selected products are activated or not activated. If at least one of the selected products is activated/not activated for the object, this object is shown.

New objects

The list of objects (users and computers) added to the directory structure within a defined period of time.

Active Directory-/LDAP-/Novell eDirectory-/Azure AD objects appear in Reports after the synchronization

Own directory objects are displayed immediately once added.

Windows Subsystem for Linux (WSL)

Overview of computers where the WSL feature is enabled (WSL statuses radio button) and Linux distributions are installed (Linux distributions radio button).

To collect data from computers about WSL, enable WSL data collection.

Enabling WSL data collection
  • Go to Computer management.
  • In the Computer management work area, select default rights (computer) or a directory service object (OU, computer, group).
  • If you enable WSL settings in default rights, the settings are inherited to all computers.
  • In the Settings | Client settings tab, enable the following check boxes in the Windows Subsystem for Linux area to collect WSL data:
    • Check WSL enabled to collect information about the state of the WSL feature.
    • Detect installed Linux distributions to collect information about installed Linux distributions.
  • Click Save.
  • Data about WSL is now collected from selected directory objects.

Control

Report type

Available information

Not updated rights

Right changes which were defined in Console, but haven’t been applied to users or computers, for example, because a user didn’t log into the system

Analyzing of rights changes

Changes in the assigned access rights.

Rights analysis

Overview of the directory service objects that have selected access rights. For details, see: Showing rights analysis

Rights review – details

Overview of access rights for selected device classes. List of permissions per user, computer and/or group.

Rights review – summary

The percentage and the number of directory objects, to which certain access rights for the selected device class are assigned.

Difference with default rights

Directory objects, for which the assigned access rights for device classes differ from default access rights.

Broken inheritance

Directory objects, where the inheritance of access rights for device classes from a group has been deactivated

Temporary access rights

Directory objects, for which temporary access rights for a device classes are currently applied.

Unblocking codes review

Displaying unblocking codes generated for users and the time when users activated them.

Individual device permissions

All active and inactive individual device permissions assigned to directory objects.

See also: Access Control

Analyzing rights of a device type
  • Go to Reports | Control | Rights analysis.
  • Select a directory object type: users, computers and/or groups.
  • In the Time schema area, select the week day and time to see objects for which the selected access right is applied (scheduled access). This criterion also includes all objects for which one access right is applied constantly, in spite of a week day and time.
  • The directory service objects with the corresponding rights appear in the list.

Audit

Audit table display limitation. Each Secure Audit report can display only up to 1 million records. See also Archiving or deleting old audit data

Report type

Available information

Management overview

  • Files transfer: the number of files transferred to the external storage, network, and cloud storage.
  • Unencrypted files transfer: the number of files transferred without encryption.
  • Blocked access: the number of files with restricted access.

File access

All operations with files which are audited by the Secure Audit product.

Blocked access

All user access attempts which have been violated.

Devices connection

Data about connecting external storage devices.

Unencrypted files transfer

Files transferred to controlled clouds and devices (external storage and CD/DVD) without encryption if Removable Device Encryption and Cloud Storage Encryption are activated. If Encryption is disabled under Product settings | Encryption options, the Unencrypted files transfer report is not displayed.

If the shadow copy product is enabled for a user, open or save files directly from the Console.

Internet

The history of user browsers.

Wi-Fi

The facts of connection to the wireless networks and information whether the networks are secure or open (insecure).

Applications launch

Displaying the launch history of all applications, processes and dynamic link libraries.

Use of applications

Viewing the applications usage summary, including the usage date and duration.

System events

History of computer shut down, start, sleep, hibernation, etc.

 For details, see: Secure Audit

Filters

Report Type Available information
Assigned filters File type filters assigned to users. Group filters by filter names (Filter radio button) or by directory objects (Entities radio button).

For details, see: Filters: controlling access to the file formats

Encryption

Report Type Available information

Encrypted folders

Overview of local folders encrypted by an administrator and by users.

Encrypted network folders

Overview of network folders encrypted by an administrator and by users. Decrypted folders display with the Not encrypted status and are automatically deleted from the Console in 3 days after being decrypted.

BitLocker

Report type Available information

Encryption status

Overview of all drives encrypted with BitLocker Management and the status of the encryption. It is possible to select multiple computers and change their Bitlocker encryption status.

FDE

Report type

Available information

Management overview

  • FDE status: status of the FDE component installation and initialization.
  • PBA status: status of the PBA component installation and initialization.
  • Product version: version of the installed Full Disk Encryption product on computers.
  • Encryption status: status of disk encryption on computers. The Partially encrypted status means that not all drives of the computer are encrypted.
  • ERI file: computers with the activated FDE product where ERI file is available or not.

Antivirus (EgoSecure Antivirus)

Report type Available information

Management overview

  • Status: the status of the EgoSecure Antivirus installation on computers.
  • Version of virus signatures DB: the status of updating the database with virus signatures.
  • Other Antiviruses detected by EgoSecure Antivirus: statistics of other antivirus programs that prevented to install EgoSecure Antivirus.
  • Computer protection status: status of the EgoSecure Antivirus on computers.

Event log

Actions that an administrator performed with the Antivirus: installation, uninstallation, scans and their results, errors.

Threat found

Audits all infected and suspicious objects detected during a scan.

Quarantine

List of files that appear in Quarantine as a result of scan. For details, see: EgoSecure Antivirus quarantine

For details, see: EgoSecure Antivirus

Data Loss Prevention (DLP)

Report type Available information

Data in Use

The history of access to text files, where matches are found.

Data at Rest

The history of finding text files, where matches are found and the actions performed with the found files.

Scans

The history of scans performed within the DLR – DAR product.

Quarantine

Files moved to quarantine as a result of the scan performed by DLP – DAR. You can restore, delete of download these files.

For details, see: Data Loss Prevention

Green IT

Report type Available information

Your profit

A sum of money and power saved, and an amount of CO2 emissions reduced.

The data allows for calculating a forecast for a year.

Suspicious activity

The duration of computers activity. The detailed filtering feature allows for filtering only the desired time period.

For details, see: Green IT

Inventory

Report type Available information

Logical disks

Volume name, file system type, amount of filled space, volume size and data modified.

Disk drives

Disk model, its interface type, serial number, size, etc.

Physical memory

Physical memory, its manufacturer, serial number, capacity, and data modified.

Processors

Processor name, device and processor ID, family, manufacturer, architecture, speed, etc.

Video cards

Device ID, name, resolution, video memory, etc.

Applications

All applications installed on selected Agents with the following details: installation date, publisher, version, location.

Executable files (*.exe)

Files executed on Agents: date and time, size, hash value, vendor.

For details, see: Inventory

Exporting Reports

With EgoSecure, you can select reports for export and save them locally, and also send them by e-mail.

Sending reports via e-mail. To send report files by e-mail, specify an e-mail account from where to send reports. Define e-mail address settings under Administration | Servers | Mail, proxy and others. For details, see: Setting up SMTP

Setting up the export of reports

  • Go to Administration | Administrator | Reports export.
  • Enable the reports export.

clipboard_eb712bfc9bd62252e6de980cb06d3fa89.png

  • In the Server drop-down menu, select the Server where reports are exported and stored.
  • In the Directory field, specify the exact location where the reports are exported and stored on the Server computer.
  • In the Recipients field, enter e-mail address where reports are sent if the Send copy to E-mail check box is selected for a report entry. To send reports to multiple recipients, divide them with a semicolon (;). All generated reports are sent as a .zip archive.
  • Select a period or specific time and check the boxes with weekdays. On the example below, reports are sent every Friday at 20.00.

clipboard_e49661ece720b4a6c990080a5241801e0.png

  • Enable Hide user/computer data to generate reports with unreal user names.
  • Note: only in Synchronization Log, and Assigned filters real user names are written in any case.
  • In the Language drop-down menu, select in what language the reports are generated. Default (system) means that the language of the system, where the Server is installed, is used.
  • Under Reports for export, check the boxes with report types. If a report contains no information, this report type is generated, but has no data inside.
  • Selected reports are saved to the defined directory on the server computer.
  • Check the Send copy to e-mail box to send reports as zip archives to mail addresses defined in the Recipients field.
  • Selected reports are additionally sent to defined e-mail addresses.
  • Click Save.
  • Was this article helpful?