User guide

Security Reporting
32
Security Reporting
The following data sets are available to support the creation of custom Endpoint Security report
definitions and report templates. They are located in the Info Center > Configure & Design > Report
Parts.
KES Alarm Set
KES Alarm Set Assignment
KES Event Log
KES Exchange Status
KES Machine Status
KES Threats
KES Threat Statistics
In addition, the following legacy "fixed format" report definitions are provided.
In This Section
Executive Summary - Endpoint Security 32
Security - Configuration 33
Security - Security 33
Security - Historical Threats 33
Security - KES Log 34
Executive Summary - Endpoint Security
Executive Summary
The Info Center > Reporting > Reports > Executive Summary report includes a section called Endpoint
Security Last N Days. It includes the following statistics.
Total threats detected
Current Active Threats
Current Threats in Vaults
Threats Resolved
Scans Completed
Updates Performed
Machines with KES installed
The Network Health Score of the Executive Summary includes an Endpoint Score category. Untreated threats
are the threats that are listed on the Current Threats tab of the Security > View Threats (page 11) page.
Untreated threats represent potential system problems. The number of untreated threats generated by
each machine over the specified period of time is scored as follows:
0 untreated threats
100%
1 to 4 untreated threats
75%
5 to 10 untreated threats
50%
more than 10 untreated threats
25%
You can adjust how heavily each category effects the total Network Health Score by adjusting the weight
value for each category. Weights range from 0 to 100. Set the weight to zero to turn off that category.