beautypg.com
ix
11 EAD audit ··························································································································································· 230
Security logs ································································································································································· 230
Security log list contents ······································································································································ 230
Security log details ·············································································································································· 231
Viewing the security log list ································································································································ 231
Viewing security log details ······························································································································· 232
Querying security logs ········································································································································ 232
Client driver audit ························································································································································ 234
iNode driver list contents ···································································································································· 234
Viewing client driver errors in the iNode Driver list ························································································ 234
Querying client driver errors ······························································································································ 234
Security status audit for local and roaming online users ························································································· 235
Local online user list contents ····························································································································· 235
Roaming online user list contents ······················································································································· 235
Viewing the local online user list ······················································································································· 236
Viewing the roaming online user list ················································································································· 236
Customizing the local online user list ················································································································ 236
Performing a computer security check ······················································································································· 237
Computer security check result details ·············································································································· 237
Performing a computer security check ·············································································································· 239
12 EAD service reports ··········································································································································· 241
Real-time reports ··························································································································································· 242
All-node online users 24-hour trend graph ······································································································· 243
Asset information report ····································································································································· 244
Asset Report by Software ··································································································································· 245
Asset type report ·················································································································································· 246
Asset usage report ··············································································································································· 248
CPU report ··························································································································································· 249
Hard Disk capacity report ·································································································································· 250
Illegal peripheral use report ······························································································································· 251
Insecurity category statistic report ····················································································································· 253
Multi-node certain security policy statistics report ···························································································· 255
Multi-node online users comparison chart ········································································································ 256
Multi-node security check items report ·············································································································· 258
Multi-node single-security check item failures comparison chart ···································································· 259
Multi-node user counts comparison chart ········································································································· 261
Multi-node user data statistics report ················································································································· 263
Online user security status report ······················································································································· 264
OS language report ············································································································································ 265
OS version report ················································································································································ 267
Safe log gather statistic report ··························································································································· 268
Single-node online users 24-hour trend graph ································································································· 270
Single-node security check failure report ·········································································································· 271
Software installation report ································································································································ 273
Software Report by Asset ··································································································································· 274
Scheduled reports ························································································································································ 275
Asset Report by Software ··································································································································· 276
Asset type report ·················································································································································· 278
Asset usage report ··············································································································································· 280
CPU report ··························································································································································· 282
Hard disk capacity report··································································································································· 284
Illegal peripheral use report ······························································································································· 286
Insecurity category statistic report ····················································································································· 290
Online user security status report ······················································································································· 292