Reporting in Endpoint Protection

Endpoint protection comes with six reports out-of-the-box; these reports enable you to drill down further to obtain more information about the malware problem. You can make these available to appropriate management using RBA (by configuring a user or group of users and an associated custom role) to constrain what reports the user or group has access to. Typically, the individuals reading the reports are not necessarily working within the console, so configuring users for access to these reports is a good idea. Here is information about the included reports:

Top Users by Threats: This report shows the list of users with the most number of detected threats; it prompts you to enter a collection name and optionally ...

Get System Center 2012 Configuration Manager Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.