Comodo Endpoint Security Manager - SME - Administrator Guide
• Include only non-compliant computers - The report will contains details of only the computers that are
non-compliant
• Generate downloadable report file - Select this option if you need to print or archive the report. You can
choose the printable file to be generated in portable document (.pdf) or spreadsheet (.xls) format. On
completion, the report generated can downloaded to the administrator's computer.
• Swipe the screen or click the right arrow to move to next step.
Step 4 - Generating the Report
• Click the Finish icon or swipe the screen to left to start generating the report.
Viewing the Report
• The 'reports explorer' screen will be opened with the running reports tab selected. All the reports being generated
currently will be listed with their status.
• On completion of required report generation, select the report and click the details icon . The report page will
be displayed.
• The report will contain a summary pie chart providing at-a-glance comparison on numbers of computers that are
compliant, non-compliant and are pending to be applied with the policy.
• Following the summary, details of each computer, with their associated group, IP addresses, applied Policy,
compliancy status, last compliancy checked time, when the non-compliant computers went non-compliant are
displayed.
• Clicking the Policy name from the list opens the 'Policy Properties' interface of it. The interface allows the administrator
to edit the policy and reapply it to the respective targets. Refer to Viewing Policies for more details.
Available Report Filters
Endpoint Security Manager - SME Administrator Guide | © 2013 Comodo Security Solutions Inc. | All rights reserved 168
Comments to this Manuals