System information
Comodo Endpoint Security Manager - SME - Administrator Guide
• Missing - means either the component is absent on both the policy and the endpoint sides or on the endpoint side.
• Changed - means the configuration of the component in the endpoint side is different from the policy applied.
• Not Changed - means the configuration of the component is the same on both the policy and the endpoint sides.
Sorting the Entries
Clicking any column heading switches the sorting of the entries based on the ascending/descending order of the entries as per
the information displayed in the respective column.
Available Report Filters
The report screen allows the administrator to optimize the search by using the filter option. The available filters for the Policy
Delta report are:
• Policy Component - Searches the report based on the policy component's name
• Status - Filters the report based on the status of the policy component
To filter the results:
• Click the filter icon in any of the respective column header to search for a particular item
• Type or enter the filter criteria fully or partly or select and click 'Apply'
Only the entries that match the criteria will be displayed in the report.
• Click 'Reset' to display all the items
Downloading the Report
If the administrator had opted for generating a printable report file in step 2, the report can be downloaded by clicking the
Download icon at the bottom of the report page.
2.5.1.9. Malware Statistics Report
The Malware Statistics report provides a graphical representation of the total malware identified at the target endpoints and the
actions taken against them by CIS during a selected period and a list of those malware with details on the target computers from
which they are identified. The report enables the administrator to learn the trend of malware attacks that have occurred during a
certain period of time.
To generate a 'Malware Statistics' report click the 'statistics' tile from the 'reports gallery' screen.
Endpoint Security Manager - SME Administrator Guide | © 2013 Comodo Security Solutions Inc. | All rights reserved 173