USER GUIDE: MaaS360 Services 05.2010
Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license agreement or nondisclosure agreement. The software may be used or copied only in accordance with the terms of those agreements. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or any means electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Fiberlink Corporation. All brands and their products are trademarks or registered trademarks of their respective holders and should be noted as such. Fiberlink Corporation 1787 Sentry Parkway West Blue Bell, PA 19422 2
Table of Contents Introduction... 5 Major Features... 6 Navigation... 6 The Tabs... 7 My Watch List... 7 Managing Policies and Portal Administrators... 10 Manage Policies... 10 Portal Administrator Management... 12 Add User... 12 Edit User... 13 Delete User... 14 Search for Deleted Administrators... 14 Reset User Password... 16 Reactivate Locked Administrator Accounts... 17 MaaS360 Reports... 19 Reports Overview... 19 Types of Reports... 19 Graphs and Charts... 19 Tabs... 20 Filters... 20 Summary-to-Detail Drill-Down Views... 23 Printing and Downloading Report Information... 24 Navigating to Different Pages... 24 Device Summary Report... 25 Device List... 25 Agent Reports... 33 Agent Details... 33 Policy Enforcement Reports... 35 Policy Enforcement Overview... 35 Hardware Inventory Reports... 43 Device Summary Tab... 43 Hardware Identity Tab... 46 Hardware Capacity Tab... 47 Operating System Tab... 48 Network Information Tab... 49 Software Inventory Reports... 50 Installed Software Tab... 50 Software Details Tab... 51 Endpoint Security Reports... 52 Endpoint Security Overview... 52 Patch Management Reports... 60 Patch Management Overview Tab... 61 Patch Summary by Device Tab... 62 Summary by Patch Tab... 63 Patch Details Tab... 64 Data Protection Reports... 65 Data Protection Overview... 65 Summary by Device Tab... 68 Encryption Tab... 69 3
End User Instructions for MaaS360 Control Service... 71 Starting the Application... 71 Minimizing the Application Window... 72 Using Online Help... 72 Viewing Version and Copyright Information... 73 Getting Status Details... 73 Main View... 73 Status for Individual Applications... 74 Overall Status... 76 System Tray Icons... 76 Compliance Icon... 76 Background Update Icon... 77 Message History... 77 Activity Log... 78 Activity Log Codes... 81 Uploading the Activity Log... 82 Adjusting Preferences... 82 Changing the Language for Using Control Service... 82 Updates... 83 Getting Policy and Software Updates... 83 Troubleshooting... 84 Troubleshooting Compliance Events... 84 4
Introduction The MaaS360 Services allow Fiberlink customers to see detailed information about their end users computers. Both of the MaaS360 Services shows you information about the hardware and software on your end users computers, and provides the status of the security applications protecting them. After you load the software, it reports in to the MaaS360 Management Center web site where you can see graphs, charts and reports showing how well these computers are protected. It can show you how many of your users have no anti-virus protection, and how many have the software but the definitions are out of date. It can show you which computers are missing critical operating system patches and which drives on each computer are encrypted. You can then take action to enforce compliance to corporate security policies, as necessary. MaaS360 Service reports provide information about the following: Note: Anti-Virus Personal Firewall OS Patches Data Encryption Hardware Inventory Software Inventory The reports you see will depend on the services you have chosen. 5
Major Features Navigation The user interface provides easy-to-use navigation with links, menus and tabs, allowing quicker access to the available applications. Links on the My Watch List window take you directly to reports showing potential problems you may want to address immediately. Links on the My Actions and Reports window take you directly to reports you can use to proactively manage your organizations devices. Tabs correspond to a related set of available applications or tasks. The menus show the individual workflows, reports, etc. for the portal user. To access the menus, move your mouse over the tab and the menu will appear. Then click once to access the item. A breadcrumb trail allows you to move backwards through different screens. Links on the right side of the page provide quick access to additional information about the MaaS360 Services, the system requirements, etc. 6
The Tabs There are four tabs in the MaaS360 Platform: 1. Home - takes you to the Home screen. 2. Manage allows you to manage your portal administrators, and provides access to the Device Summary Report. Depending on the services you are using, you may also be able to manage your policy from this tab. 3. Reports provides access to the MaaS360 Platform reports. 4. Support displays the Get Help page, which has a variety of resources to help you. My Watch List The My Watch List block appears at the top of the Home page. It shows you critical information about your endpoints and allows you to access the details you need to remediate problems. For example, the MaaS360 Platform will tell you if any of your devices do not have Anti-Virus or Personal Firewall software installed. 7
You can click on the Watch List to see a list of those devices. The MaaS360 Platform displays how many devices are in a potentially problematic situation, allowing you to rectify the situation promptly. Watch List items include the following: Devices that do not have Anti-Virus or Personal Firewall software Devices that are not ready for Windows 7 Devices that are missing at least one critical patch Devices with disabled Anti-Virus software Devices with disabled Personal Firewall software Anti-Virus definitions that are older than seven days System drives with less than 10% free space Devices that do not have Encryption software Devices that have 512 MB RAM or less You can click on each Watch List item to see a MaaS360 report that shows you detailed information about that item. In many cases it is a MaaS360 report that is automatically filtered to list the devices that meet the Watch List criteria. For example, if you click on the Watch List item for devices with disabled Anti-Virus software, MaaS360 displays the Anti-Virus Details Report, with the Status filter set to Stopped. 8
9
Managing Policies and Portal Administrators To make your MaaS360 Services run smoothly, there are a few basic maintenance tasks that a portal administrator will need to do. All of these workflows are accessible from the Manage tab. You must have the MaaS360 Control Service to have the Persistent Policy Enforcement Service. Manage Policies This item appears on the Home page, as well as from the Manage tab. You should set up your policy before installing the MaaS360 service on any of your end users computers. After the software is installed, it will automatically download the latest policy and put it into practice. Policies tell the MaaS360 service which of your applications to monitor, and what actions to take when a computer is out of compliance. To create or change your policy settings, perform the following steps: 1. Click Manage Now, or select Manage Policies from the Manage tab. The Customize Policy page appears. 10
2. If you want the MaaS360 service to monitor your end users anti-virus applications, click the check box. This will expand the setting so you can select an action to be taken if a device does not have an anti-virus application, does not have it enabled, or if the anti-virus definitions are out of date. You have two choices: a. Log Information and Warn the user this will display a warning icon in the users system tray and log the non-compliance. It will not, however, do anything to restrict the user. b. Disconnect any established VPN connection this will display the warning icon and log the non-compliance. It will also disconnect the device from the VPN. 3. If you want the MaaS360 service to monitor your end users personal firewall applications, click the check box. This will expand the setting so you can select an action to be taken if a device does not have a personal firewall application or does not have it enabled. You have two choices: a. Log Information and Warn the user this will display a warning icon in the users system tray and log the non-compliance. It will not, however, do anything to restrict the user. b. Disconnect any established VPN connection this will display the warning icon and log the non-compliance. It will also disconnect the device from the VPN. 4. If you want the MaaS360 service to monitor your end users encryption applications, click the check box. This will expand the setting so you can select an action to be taken if a device does not have a data encryption application or it is inactive. You have two choices: a. Log Information and Warn the user this will display a warning icon in the users system tray and log the non-compliance. It will not, however, do anything to restrict the user. b. Disconnect any established VPN connection this will display the warning icon and log the non-compliance. It will also disconnect the device from the VPN. 11
5. If you want the MaaS360 service to prevent certain types of applications from running on your end users devices, click the check box. This will expand the setting so you can select one or more types of applications to restrict. 6. When you are finished, click Save. The date and time at the top of this page will be updated. Every 15 minutes, the last saved policy (if there is one) is made available to your users, and the version number at the top of this page is incremented. Your end users will receive the updated policy automatically the next time they access the Internet. Portal Administrator Management Portal administrators can create portal administrators and give them the appropriate access. These users do not necessarily have the MaaS360 service software on their own machines. Add User Administrators can create new portal administrators and assign them one or more roles. To add a new portal administrator: 1. Hover over the Manage tab. 2. Select Add User under the Create Portal Administrators heading. 3. Enter the user name in the User Name field. Make sure it has a minimum of six characters. 4. Enter a valid email address in the Email Address field. The password for this person will be automatically generated and sent to this email address. 5. Click to select one or more roles to assign to the new user. When you click to select a role, the role description appears in the Role Description field. 6. Click the arrow buttons to move selected options or all options between the fields. 7. Click Add to finalize the changes. 8. A message confirms successful addition of the user and roles. 12
Edit User Administrators can view, edit, or delete a portal administrator s role assignments. To edit portal administrator role assignments: 1. Hover over the Manage tab. 2. Select Manage Portal Administrators to view the Search Portal User screen. 3. Enter or select desired search criteria in the User Name box, the Email Address box and the Role drop-down list, if required. 4. Click Search to view results matching the entered search criteria. 5. Click the Edit icon associated with the user to view the Edit Portal User screen. 6. Click the arrow buttons to move selected roles or all roles between the fields, as necessary. 7. Click Save to save your changes and view the confirmation message. 13
Delete User To delete a portal administrator: 1. Hover over the Manage tab. 2. Select Manage Portal Administrators to view the Search User screen. 3. Enter or select desired search criteria in the User Name box, the Email Address box and the Role drop-down list, if required 4. Click Search to view results matching the entered search criteria. 5. Click the Delete icon to delete the selected portal administrator accounts. A deletion confirmation message displays. Search for Deleted Administrators As part of the User Management Audit feature, the new Search for Deleted Administrators menu item allows you to search and view a list of all deleted portal administrator accounts and the associated audit details. To view deleted administrator accounts: 1. Hover over the Manage tab, and select Search for Deleted Administrators. 14
2. Enter or select desired search criteria in the User Name field, the Email Address box and the Deletion Date boxes, if required. 3. Click Search. Results matching the search criteria display. 4. Click the Audit History icon to view the View Change History screen. 5. If required, click the View Change link to view the View Changes screen. 15
Note: The changes highlighted in yellow indicate an updated or modified value, the green text indicates a new value, and text with a red strike-through indicates that the value was deleted. Reset User Password You can also reset a user password. You may choose to reset a password when a user has forgotten his password or if a new portal user has requested you to reset and resend his password. To reset a portal administrator password: 1. Hover over the Manage tab and click Manage Portal Administrators menu to view the Search Portal User screen. 2. Enter or select desired search criteria in the User Name field, the Email Address field or the Role drop-down list, as necessary. 3. Click Search. Results matching the search criteria display. 4. Click the Reset icon to reset the password. 5. The Reset Password Confirmation message displays. 16
6. Click Confirm to reset the selected portal administrator s password. A confirmation message displays. The new password will be sent to the portal administrator s email address. Reactivate Locked Administrator Accounts Due to the enhanced security features in the MaaS360 Services, if a user belonging to the MAS authentication domain enters an incorrect password five times consecutively, then the user account will be locked. If a user account is locked, it can be reactivated through the Manage Portal Administrators workflow. To re-activate a locked administrator account: 1. Hover over the Manage tab and click Manage Portal Administrators to view the Search Portal User screen. 2. Enter the desired search criteria. 3. Click Search to view the results matching the entered criteria. 4. Click the Reactivate icon to reactivate the locked user account. The Reset Password Confirmation screen displays. 17
5. Click Confirm to reactivate the locked user account. The Password Reset screen displays a confirmation message. The user account is reactivated and a new system-generated password is sent to the user s email address. 18
MaaS360 Reports Reports Overview The report generation features allow you to use enhanced reporting functions (such as the tabular presentation of reports) to group associated graphs and reports, and it provides easy navigation between the reports. The enhanced reporting solution also includes filters, which help you generate a variety of real-time reports or narrow down report details based on your filter criteria. The graphs and charts provide an enhanced representation of the data in summary and detailed reports. The Print and Download links allow you to print and download the displayed tables to a variety of file formats. Types of Reports The MaaS360 Management Center provides the following types of reports: 1. Device Summary 2. Agent Details 3. Policy Enforcement 4. Endpoint Security Overview a. Anti-Virus b. Personal Firewall 5. Data Protection Overview a. Encryption 6. Hardware Inventory 7. Software Inventory 8. Hardware Inventory for BlackBerry Handhelds 9. Software Inventory for BlackBerry Handhelds 10. Patch Management 11. VPN Note: 12. Any Connection Reporting Not all reports are available for all services. If you have any questions access our Support page. Graphs and Charts Most of the data is presented in charts and graphs, and you can click on one bar or pie section to see details about that piece of data. You can also hover your mouse over a bar or pie section to see the number being represented graphically. 19
To view report graphs, you must have installed the Flash plug-in with your browser. You can get the Flash plug-in at http://www.adobe.com. Tabs Additional tabs further organize the data, helping you to understand it more easily. Most of the reports have a summary tab, and additional facts appear on subsequent tabs. For example, when you first access Hardware Inventory from the Reports tab, you see data on the Device Summary tab. If you click each of the subsequent tabs (Hardware Identity, Hardware Capacity, Operating System and Network Information), the data is presented with a different focus and in greater detail. Filters Filters allow you to change what you see in the reports based on specific selection criteria. Select the options you want from the drop-down lists and click Apply Filters. If you want to return to the default values for all the selection criteria, click Clear Filters. 20
In some cases the filter options you choose affect the other tabs for that report. If you find unexpected results on a report, try clearing the filters. Saving a Filter You can also save filters so you can use them again later. To save a filter, perform the following steps: 1. Set the desired filters by selecting options from the pull-down menus, and then click Apply Filters. 21
2. Click Filter Options to see the choices on the pull-down menus. 3. Click Save Current Filters and then click For Me. 4. A pop-up box allows you to enter a name for the filter and set it as the default for the page. 5. Make your changes and click OK to save the filter. 22
Using a Saved Filter To use a filter you had previously saved, perform the following steps: 1. Click Filter Options to see the different choices. 2. Hover your cursor over the Apply Saved Filters option to display all your saved filters, and select the filter you want to use. Summary-to-Detail Drill-Down Views You can click on a bar or pie chart section to see the details that pertain to that item. For example, if you are looking at the Operating System Summary chart, you can click on the Microsoft Windows XP, SP2 pie section: 23
You will automatically see the Operating System tab, with the appropriate filter options (Microsoft Windows XP for the Operating System and XP for the Service Pack). Printing and Downloading Report Information Each report has two links at the bottom, Print and Download. When you click Print, a menu appears giving you the option to export the report in either HTML or PDF format so it can be printed. When you click Download, a menu appears giving you the option to download the chart, graph or report as an Excel, PowerPoint, Excel 2000 or CSV file. Navigating to Different Pages To help you see the data in long reports, MaaS360 provides buttons at the bottoms of the pages. 24
Button Description Go to the first page of records. Go to the previous page. Go to the next page. Display all pages, showing all the records. Device Summary Report This report provides detailed information about your end users computers. The data is refreshed throughout the day. Device List This overview shows all the computers in the trial, and when they contacted the Fiberlink servers. 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 25
Computer Name OS Username OS User Domain Operating System First Reported (GMT) Last Reported (GMT) Troubleshooting Support Name of the machine on which the service is installed. Username used to log in to the machine. Domain used by the service. Operating system used by the computer. Date and time the computer first contacted the Fiberlink servers. Date and time the computer most recently contacted the Fiberlink servers. Link to a report about the computer s interactions with the Fiberlink servers. Click on the Computer Name link to see detailed information about that computer. Hardware Report This tab contains the Hardware Report, which provides visibility into the specified computer. 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. 2. Click the link for the computer you want to examine. You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 3. Click the link for the computer you want to examine. 26
System Manufacturer System Model BIOS Serial Number Mother Board Serial Number Computer Name MaaS360 Hardware ID Processor Architecture Processor Speed Total Physical Memory (in MB) Page File (in MB) Name of the computer s manufacturer. Computer s model number. Unique identifier for the basic input/output system boot firmware. Unique identifier for the computer s mother board. Name of the device on which the software is installed. Unique identifier of the computer, as detected by the software. Type of processor architecture in use on the computer. Computer s processor speed, in GHz. Amount of memory on the computer. Size of the computer s page file. This report also lists the following for each drive on the computer: Drive type Total space (in GB) on the drive Free space (in GB) on the drive If the drive is a system drive Operating System Report This report provides detailed information about the computer s operating system. 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. 2. Click the link for the computer you want to examine. 27
You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 3. Click the link for the computer you want to examine. Operating System Version Service Pack OS Language Installed Language Packs Logged On User User Privileges NetworkProvider HW Order NetworkProvider Order This report also lists: Operating system in use on the computer. Version number of the operating system. Service pack version information. Language in which the operating system displays information to the user. All the available language packs that were installed. Username that was used to log in to the computer. Access granted to that username. Ordered list of protocols for hardware, with the highest priority first. Ordered list of protocols, with the highest priority first. All the components of the operating system and displays the version of each component Missing patches for Microsoft Windows, including their importance and Bulletin ID Network Report This report shows you important information about your network settings and your network adapters. 28
1. Click the Device Summary link in the My Actions and Reports section of the Home screen. 2. Click the link for the computer you want to examine. You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 3. Click the link for the computer you want to examine. Automatically Detect Proxy Settings Use Automatic Configuration Script Manually Configure a Static Proxy Server System Dialup Use Lan Settings User Dialup Use Lan Settings Specifies if the computer has been set up to automatically detect proxy settings. Specifies if the computer has been set up to use an automatic configuration script. Specifies if the computer has been set up to manually configure a static proxy server. Indicates if the computer will use Lan settings for system dialup. Indicates if the computer will use Lan settings for user dialup. The report also shows the following information about your network adapters: Name Adapter ID Type DHCP Enabled IP Address Gateway DNS Servers Name of the network adapter. Unique identifier of that adapter. Type of network adapter. Indicates if it can be used with Dynamic Host Configuration Protocol. IP address of the network adaptor. Address of the gateway the computer uses. Addresses of the Domain Name System servers used by the computer. 29
All Applications Report This report shows you important information about the applications installed on the computer. 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. 2. Click the link for the computer you want to examine. You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 3. Click the link for the computer you want to examine. Name Version Name of the application detected by the MaaS360 Service. Version of that application. Security Applications Report This report shows you important information about your network settings and your network adapters. 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. 2. Click the link for the computer you want to examine. You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 3. Click the link for the computer you want to examine. 30
It provides the following information about the computer s firewalls: Name Vendor Version Status Fiberlink Supported Name of the firewall application detected by the MaaS360 Service. Company that created the firewall application. Version of the application. Indicates if the application is active or not. Indicates if Fiberlink supports this application. The report also shows the following information about your anti-virus applications: Name Vendor Version Status Fiberlink Supported Virus Def Version Virus Def Date Virus Def Server Name of the anti-virus application detected by the MaaS360 Service. Company that created the anti-virus application. Version of the application. Indicates if the application is active or not. Indicates if Fiberlink supports this application. Version number of the latest anti-virus definition. Date of the latest anti-virus definition. Server from which the computer downloaded the latest anti-virus definition. It provides the following information about the computer s anti-spyware applications: Name Vendor Version Status Fiberlink Supported Virus Def Version Virus Def Date Virus Def Server Name of the anti-spyware application detected by the MaaS360 Service. Company that created the anti-spyware application. Version of the application. Indicates if the application is active or not. Indicates if Fiberlink supports this application. Version number of the latest anti-spyware definition. Date of the latest anti-spyware definition. Server from which the computer downloaded the latest anti-spyware definition. 31
The report also shows the following information about your VPN: Name Vendor Version Binary Path Description Fiberlink Supported Name of the application detected by the MaaS360 Service. Company that created the application. Version of the application. Location of the binary used by the VPN. Description of the application. Indicates if Fiberlink supports this application. Connection Manager(s) Report This report shows you important information about the applications installed on the computer. 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. 2. Click the link for the computer you want to examine. You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 3. Click the link for the computer you want to examine. Name Version Description Binary Path Name of the multi-transport connection manager detected by the MaaS360 Service. Version of the connection manager software. Description of the connection manager. Location of the binary used by the VPN. It also shows the following information about your Wi-Fi Connection Manager: 32
Name Version Description Binary Path Name of the Wi-Fi connection manager detected by the MaaS360 Service. Version of the Wi-Fi connection manager software. Description of the connection manager. Location of the binary used by the VPN. Agent Reports These reports are designed to help you understand which products each user has. Agent Details The reports appear on the following tabs: Agent Details Agent Policy Details Agent Details Tab This tab contains the Agent Details Report. The tab has the following filters: Computer Name OS Username Agent Username Domain (Windows only) Operating System Product(s) EEA Installed Installed Date Fiberlink Software Last Reported Agent Details This report shows detailed information about the computers in your organization and the Fiberlink software installed on those computers. To access this report: 1. Hover your cursor over the Reports tab. 2. Click Agent Details under the Agent Reports heading. 33
Computer Name OS Username Agent Username Domain (Windows only) Operating System Product(s) EEA Installed Installed Date Fiberlink Software Last Reported Name of the device on which the service is installed. Username used to log into the computer. Username used to log into the service. Windows domain into which the user logged in. Device s operating system. Name and version of the MaaS360 Service running on the computer. Specifies if the Extend360 Enforcement Agent (EEA) is installed on the computer. Date that the MaaS360 Service was installed on the computer. Date that the software last contacted the Fiberlink servers. Agent Policy Details Tab This tab contains the Agent Policy Details Report. The tab has the following filters: Computer Name OS Username Agent Username Fiberlink Software Last Reported Operating System Product(s) EEA Installed Policy Set Agent Policy Details This report shows detailed information about the policies in force on the computers in your organization. To access this report: 1. Hover your cursor over the Reports tab. 2. Click Agent Details under the Agent Reports heading. 3. Click the Agent Policy Details tab. 34
Computer Name OS Username Agent Username Operating System Product(s) EEA Installed Policy Set UI Configuration Policy (Version) Connectivity Policy (Version) Security Policy (Version) Software Administration Policy (Version) Fiberlink Software Last Reported Name of the device on which the service is installed. Username used to log into the computer. Username used to log into the service. Device s operating system. Name and version of the MaaS360 Service running on the computer. Specifies if the Extend360 Enforcement Agent (EEA) is installed on the computer. Name of the policy set in force on the device Name and version of the UI Configuration Policy in force on the device. Name and version of the Connectivity Policy in force on the device. Name and version of the Security Policy in force on the device. Name and version of the Software Administration Policy in force on the device. Last date that the computer contacted the Fiberlink servers. Policy Enforcement Reports Policy Enforcement reports show which applications MaaS360 is monitoring for compliance with your company s policies. These reports also show what, if anything, they will do when computers are out of compliance. Policy Enforcement Overview This reporting module shows policy enforcement and compliance events that were reported on security logs sent by the MaaS360 service. Policy Enforcement Summary Tab This tab contains reports that provide an overview of the out-of-compliance events logged by the MaaS360 service. 35
This tab contains the following filter: Event Period Out-of-Compliance Events by Application This report breaks down the out-of-compliance events by different applications: Anti Virus, Firewall, Data Encryption, etc. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. Out-of- Compliance Events Application Number of times the computer has gone out of compliance during the timeframe specified in the Event Period filter. Type of software that has gone out of compliance (e.g., Anti-Virus or Firewall). Out-of-Compliance Events by Cause This report shows which applications have the greatest number of out-of-compliance events by cause for the timeframe specified in the Event Period filter. You can hover the cursor over each bar to see the actual number of events. This report shows how many software applications are not running properly (e.g., an Anti-Virus application with outdated virus definitions), which are disabled, and which were never properly installed to begin with. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 36
X axis Application Type of security software (e.g., Anti-Virus or Firewall) that the MaaS360 services are monitoring. Y axis Number of out-ofcompliance events Number of out-of-compliance events for the different reasons. Out-of Compliance Enforcement Actions This report specifies which actions the MaaS360 service took when it found an outof-compliance event. You defined these actions when you set up the policy in the Manage Policies section. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 37
Out-of- Compliance Enforcement Actions The actions performed when the MaaS360 Control Service discovered that an application was out of compliance, based on your policy settings. Out-of-Compliance Events (Last 7 Days) This report specifies the number of compliance events for the last seven days. The value in the Event Period filter does not affect this report. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. X axis Date Date of the last seven days. Y axis Number of out-ofcompliance Number of out-of-compliance events. events Devices Out-of-Compliance (Top 10) This report lists the 10 computers that have the most out-of-compliance events by computer name. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 38
X axis Events Number of out-of-compliance events during the timeframe specified by the Event Period filter. Y axis Computer Name Machine names of the 10 computers with the most outof-compliance events. Devices by Out-of-Compliance Events This report shows how many computers have had a certain number of out-ofcompliance events. The number of events are organized into ranges: 1 to 3 events, 4 to 10 events, greater than 10 events. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 39
Devices Events Number of devices that have gone out of compliance. Number of times the devices have gone out of compliance, organized into ranges. Out-of-Compliance Events Tab This tab contains one report, the Out-of-Compliance Events report. It contains the following filters: Event Period Computer Name OS Username Domain (for Windows only) Agent Username Application Type Application Name Out-of-Compliance Cause Out-of-Compliance Events Report This report lists the out-of-compliance events that took place within the timeframe specified in the Event Period filter. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 3. Click the Policy Details tab. Event Time Computer Name OS OS Username Domain (for Windows only) Agent Username Application Date and time that the computer went out of compliance. Name of the machine on which the application is installed. Operating system installed on the machine. Username used to log in to the machine. Windows domain on which the user has logged in. Username used to log in. Third party application that was out of compliance. 40
Name Out-of- Compliance Cause Reason the application was out of compliance. Enforcement Actions Tab This tab shows one report, the Out-of-Compliance Enforcement Actions report. It contains the following filters: Event Period Computer Name OS Username Domain (for Windows only) Agent Username Application Name Enforcement Action Out-of Compliance Enforcement Actions Report This report lists the out-of-compliance events, and displays how the MaaS360 service responded to the event. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 3. Click the Enforcement Actions tab. Event Time Computer Name OS OS Username Domain (for Windows only) Agent Username Application Name Enforcement Action Description Date and time that the computer went out of compliance. Name of the machine on which the software is installed. Operating system installed on the machine. Username used to log in to the machine. Windows domain on which the user has logged in. Username used to log in. Name of the third party software that went out of compliance. Action taken by the MaaS360 service because the watched application fell out of compliance. Additional information about the Enforcement Action. 41
Compliance Details Tab This tab displays information about out-of-compliance events and enforcement actions together. It contains the following filters: Event Period Computer Name OS Username Domain (for Windows only) Agent Username Application Name Event Type Out-of-Compliance Events and Enforcement Actions Report This report combines information about out-of-compliance events and enforcement actions so you can clearly see how the MaaS360 software is finding the events and acting on them (based on what is defined in your policy). 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 3. Click the Compliance Details tab. Event Time Computer Name OS OS Username Domain (for Windows only) Agent Username Event Type Application Name Date and time that the computer went out of compliance. Name of the machine on which the MaaS360 software is installed. Operating system installed on the machine. Username used to log in to the machine. Windows domain on which the user has logged in. Username used to log in. Specifies if the event was an Out-of-Compliance Event, a Remediation Action, or an Enforcement Action. Out-of-Compliance Event no action is taken by Extend360 Enforcement Action Extend360 will restrict access (e.g., terminate a VPN connection) Remediation Action the MaaS360 service will help the computer become compliant (e.g., provide a link to updated Anti-Virus definitions) Name of the third party software that went out of compliance. 42
Enforcement Action Description Specifies the action taken by the MaaS360 service because the watched application fell out of compliance. Additional information about the Enforcement Action. Hardware Inventory Reports Hardware Inventory reports display information about the hardware deployed in your organization. Device Summary Tab This tab contains graphs and charts which provide you with an overview of your users hardware. This tab does not have any filters. Device Summary by Manufacturer (Top 10) This report shows how many devices are provided by each of the top manufacturers (up to 10). 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. X axis Manufacturers Names of the device manufacturers. Y axis Number of devices Number of computers provided by each manufacturer. Free Space on System Drive This report shows how much free space is available on users hard drives. The users are grouped into ranges based on the amount of free space they have. 43
1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. Amount of free space Number of devices Percentage of the system drive that is available. Number of users that have a certain percentage of free space, grouped by range. Physical Memory Installed This report shows how much physical memory has been installed on the users hard drives. The users are grouped into ranges based on the amount of memory installed. 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. 44
X axis Number of devices Number of computers in each range. Y axis Physical memory Amount of memory installed, grouped into ranges. Operating System Summary This report shows how many computers are using each of the different operating systems. 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. 45
Operating Systems Computers Different operating systems your organization is using. Number of computers that have each operating system. Hardware Identity Tab This tab contains the Hardware Identity Report. It has the following filters: Computer Name OS Username Last Reported Manufacturer Model Computer Model ID Device Type BIOS Serial Number Motherboard Serial Number Processor Physical Memory Installed Total Hard Drive(s) Space (GB) Hardware Identity Report This report provides detailed information about the users hardware. 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. 2. Click the Hardware Identity tab. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. 3. Click the Hardware Identity tab. 46
Computer Name OS Username Manufacturer Model Computer Model ID Device Type BIOS Serial Number Motherboard Serial Number Processor Physical Memory Installed Total Hard Drive(s) Space (GB) Last Reported Name of the machine on which the application is installed. Username used to log in to the machine. Company that made the computer. Model of the computer. Model ID of the computer. Specifies if the computer is a laptop or a desktop. Serial number of the basic input/output system boot firmware. Serial number of the computer s motherboard. Computer s processor. Amount of physical memory the computer has. Amount of hard drive space the computer has. Date that the device last contacted the Fiberlink servers. Hardware Capacity Tab This tab contains the Hardware Capacity Report. It has the following filters: Computer Name OS Username Last Reported Total Hard Drive(s) Space (GB) Free Hard Drive Space(s) Space (GB) Total Space on System Drive (GB) Free Space on System Drive (GB) Free Space on System Drive (%) Hardware Capacity Report This report provides detailed information about the space on devices drives. 47
1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. 2. Click the Hardware Capacity tab. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. 3. Click the Hardware Capacity tab. Computer Name OS Username Total Hard Drive(s) Space (GB) Free Hard Drive(s) Space (GB) Total Space on System Drive (GB) Free Space on System Drive (GB) Free Space on System Drive (%) Last Reported Name of the machine on which the application is installed. Username used to log in to the machine. Total amount of space on the machine s hard drive. Amount of free hard drive on the machine s hard drive. Total amount of space on the machine s system drive. Amount of free space on the machine s system drive. Percentage of free space on the machine s system drive. Date that the device last contacted the Fiberlink servers. Operating System Tab This tab contains the Operating System Details Report. It has the following filters: Computer Name OS Username Last Reported Operating System Architecture Service Pack Version 48
Default OS Language Operating System Details Report This report provides detailed information about the users operating systems. 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. 2. Click the Operating System tab. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. 3. Click the Operating System tab. Computer Name OS Username Operating System Architecture Service Pack Version Default OS Language Last Reported Name of the machine on which the application is installed. Username used to log in to the machine. Operating system on the computer. Specific architecture of the operating system. Latest service pack installed on the computer. Operating system s version. Default operating system language. Date that the device last contacted the Fiberlink servers. Network Information Tab This tab contains the Network Information Details Report. It has the following filters: Computer Name OS Username Domain (Windows only) Last Reported Network Adapter(s) IP Address (Last Reported) MAC Address Network Information Details Report This report provides detailed information about the users networks. 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. 49
2. Click the Network Information tab. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. 3. Click the Network Information tab. Computer Name OS Username Domain (Windows only) Network Adapter(s) IP Address MAC Address Last Reported Name of the machine on which the application is installed. Username used to log in to the machine. Computer s domain. This is only available for computers running Windows. Network adapters used by the computer. IP address for the computer. Unique identifier assigned to a network adapter. Date that the device last contacted the Fiberlink servers. Software Inventory Reports Software Inventory reports are designed to help you manage the software installed on your users computers. Installed Software Tab This tab contains the Installed Software Report. It has one filter, Application Name. Installed Software Report This report lists the applications installed on your users computers, the version numbers and the number of computers that have them. 1. Click the Software Inventory Overview link in the My Actions and Reports section of the Home screen. 2. Click the Software tab. You can also: 1. Hover your cursor over the Reports tab. 50
2. Click Software Inventory Overview under the Inventory Management Reports heading. 3. Click the Software tab. Application Name Major Versions Install Count Name of the software application. Version number installed on the computers. Number of computers using the specified version of the application. Software Details Tab This tab contains the Software Details Report. It has the following filters: Computer Name OS Username Last Reported Application Vendor Application Name Major Version Installed Date Software Details Report This report provides detailed information about the applications installed on your users computers. 1. Click the Software Inventory Overview link in the My Actions and Reports section of the Home screen. 2. Click the Software Details tab. You can also: 1. Hover your cursor over the Reports tab. 2. Click Software Inventory Overview under the Inventory Management Reports heading. 3. Click the Software Details tab. 51
Computer Name OS Username Application Vendor Application Name Major Version Full Version Installed Date Last Reported Name of the machine on which the application is installed. Username used to log in to the machine. Company that provides the application. Name of the software application. Major version number of the application. Unabridged version information. Date the application was installed. Date the data leak prevention application last contacted the Fiberlink servers. Endpoint Security Reports Endpoint security reports focus on specific security applications that the MaaS360 Services monitor. Endpoint Security Overview The Endpoint Security Reports appear on a series of tabs, and describe the anti-virus and personal firewall applications on your end users computers. The reports also provide visibility into the critical OS patches that should be installed. Endpoint Security Summary Tab This tab contains reports about the types of security applications that are installed or are being installed on your users computers. This tab does not have any filters. Installed Endpoint Security Applications Report This report shows how many of the different security applications are currently installed on your users computers. 1. Click the Endpoint Security Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Report tab. 2. Click Endpoint Security Overview under the Endpoint Security Reports heading. 52
X axis Application Different endpoint security applications that your company has put on end users computers and that the MaaS360 Services are set up to monitor. Y axis Computers Number of computers using each application. Devices by Anti-Virus Definition Age Report This report shows how many computers have anti-virus definitions that are a number of days old. The days are grouped into ranges to make the report easier to use. For example, you can easily tell how many of your users computers have anti-virus definitions that are older than 30 days, and what part of the total population they comprise. 1. Click the Endpoint Security Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Report tab. 2. Click Endpoint Security Overview under the Endpoint Security Reports heading. 53
Devices Anti-Virus Definition Age Number of devices that have anti-virus definitions of a certain age. How old the anti-virus definitions are, grouped into ranges. Devices by Anti-Virus Version (Top 10) Report This report shows how many computers have each of the top 10 anti-virus versions. (You will not see 10 if you have fewer than 10 versions.) 1. Click the Endpoint Security Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Report tab. 2. Click Endpoint Security Overview under the Endpoint Security Reports heading. 54
X axis Anti-Virus Versions Up to 10 anti-virus versions that could be on your users computers. Y axis Computers Number of computers using each version. Devices by Personal Firewall Version (Top 10) This report shows how many computers have each of the most popular versions of personal firewall, up to 10 versions. (You will not see 10 in the report if you have fewer than 10 versions.) 1. Click the Endpoint Security Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Report tab. 2. Click Endpoint Security Overview under the Endpoint Security Reports heading. 55
X axis Personal Firewall Up to 10 personal firewall versions that could be on Version your users computers. Y axis Computers Number of computers using each version. Devices by Personal Firewall Status This report displays how many of your users computers are running personal firewall software, and how many have it stopped. 1. Click the Endpoint Security Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Report tab. 2. Click Endpoint Security Overview under the Endpoint Security Reports heading. 56
Devices Personal Firewall Status Number of devices with personal firewall software. If the personal firewall software is running or if it is stopped. Summary by Device Tab This tab contains the Endpoint Security Details report, which provides visibility into the different security applications on individual computers. This tab contains the following filters: Computer Name OS Username Last Reported Application Installed Endpoint Security Details Report This report lists the security applications (including the version numbers) on individual computers. 1. Click the Endpoint Security Overview link in the My Actions and Reports section of the Home screen. 2. Click the Summary by Device tab. You can also: 1. Hover your cursor over the Report tab. 2. Click Endpoint Security Overview under the Endpoint Security Reports heading. 3. Click the Summary by Device tab. 57
Computer Name OS Username Last Reported Anti-Virus Detected Anti-Spyware Detected Zero Day Threat Protection Detected Personal Firewall Detected Name of the machine on which the service is installed. Username used to log in to the machine. Date and time that the service or EEA last contacted the Fiberlink servers. Indicates if anti-virus software has been installed on the computer. Indicates if anti-spyware software has been installed on the computer. Indicates if ZDTP software has been installed on the computer. Indicates if personal firewall software has been installed on the computer. Anti-Virus Tab This tab contains the Anti-Virus Details report, which provides visibility into anti-virus applications on individual computers. It contains the following filters: Computer Name OS Username Last Reported Installed Date Application Vendor Application Name Version Status Anti-Virus Definition Anti-Virus Definition Age Anti-Virus Details Report This report lists the anti-virus software that has been installed on end users computers. 1. Click the Endpoint Security Overview link in the My Actions and Reports section of the Home screen. 2. Click the Anti-Virus tab. You can also: 1. Hover your cursor over the Report tab. 2. Click Endpoint Security Overview under the Endpoint Security Reports heading. 58
3. Click the Anti-Virus tab. You can also access this report directly: 1. Hover your cursor over the Report tab. 2. Click Anti-Virus under the Endpoint Security Reports heading. Computer Name OS Username Application Vendor Application Name Version Installed Date Status Anti-Virus Definition Anti-Virus Definition Date Last Reported Name of the machine on which the MaaS360 Service is installed. Username used to log in to the machine. Name of the company that provided the anti-virus software that has been installed on the computer. Name of the anti-virus application. Version number of the anti-virus software. Date that the software was installed. Indicates if the software is running or if it has been stopped. Latest anti-virus version installed on the computer. Date the anti-virus software was last revised. Date and time the computer last contacted the Fiberlink servers. Personal Firewall Tab This tab shows detailed information about personal firewall applications that have been installed on end users computers. It contains the following filters: Computer Name OS Username Last Reported Installed Date Application Vendor Application Name Version Status 59
Personal Firewall Details Report This report displays information about the personal firewall software installed on the end users computers if, according to your policies, a MaaS360 Service is monitoring it. 1. Click the Endpoint Security Overview link in the My Actions and Reports section of the Home screen. 2. Click the Personal Firewall tab. You can also: 1. Hover your cursor over the Report tab. 2. Click Endpoint Security Overview under the Endpoint Security Reports heading. 3. Click the Personal Firewall tab. You can also access this report directly: 1. Hover your cursor over the Report tab. 2. Click Personal Firewall under the Endpoint Security Reports heading. Computer Name OS Username Application Vendor Application Name Version Installed Date Status Last Reported Name of the machine on which the MaaS360 Service is installed. Username used to log in to the machine. Company that provided the personal firewall software. Name of the personal firewall software. Version of the software that is running on the computer. Date the personal firewall software was installed. Indicates if the software is running or stopped. Date that the MaaS360 Service last contacted the Fiberlink servers. Patch Management Reports Patch Management reports show you the Microsoft patches that have not yet been installed on your end users devices. They provide information about both the patches and the devices which are missing the patches. 60
Patch Management Overview Tab This tab contains reports about the Microsoft patches that are missing from your end users devices. This tab does not have any filters. Devices Missing Critical Microsoft Patches Report This report shows how many devices are missing critical patches, organized into ranges. 1. Hover your cursor over the Reports tab. 2. Click Application Updates Overview under the Application Updates Reports heading. X axis Devices Number of devices missing critical Microsoft patches, organized into ranges. Y axis Patches Number of patches that are missing. Total Missing Microsoft Patches by Severity Report This report shows how many devices are missing critical patches, organized into ranges. 1. Hover your cursor over the Reports tab. 2. Click Application Updates Overview under the Application Updates Reports heading. 61
X axis Severity How critical the missing patches are. Y axis Number of patches Number of patches that are missing. Patch Summary by Device Tab This tab contains the Devices Missing Critical Microsoft Patches Report. It has the following filters: Computer Name OS Username Last Reported Critical Missing Patches Devices Missing Critical Microsoft Patches Report This report shows how many devices are missing critical patches, organized into ranges. 1. Hover your cursor over the Reports tab. 2. Click Application Updates Overview under the Application Updates Reports heading. 3. Click the Patch Summary by Device tab. 62
Computer Name OS Username Missing Critical Patches Missing Important Patches Other Missing Patches Total Missing Patches Last Reported Name of the machine on which the software is installed. Username used to log in to the machine. Number of missing patches that are considered critical. Number of missing patches that are considered important. Number of missing patches that are not considered critical or important. Total number of missing patches. Last date that the computer last contacted the Fiberlink servers. Summary by Patch Tab This tab contains the Missing Microsoft Patches Summary by Patch Report. It has the following filters: Patch Name Patch Category KB ID Release Date Severity Missing Microsoft Patches Summary by Patch Report This report shows how many devices are missing critical patches, organized into ranges. 1. Hover your cursor over the Reports tab. 2. Click Application Updates Overview under the Application Updates Reports heading. 3. Click the Summary by Patch tab. 63
Patch Name Patch Category Source KB ID File Size (MB) Release Date Severity Computers Missing Patch Actions Name of the patch that is missing from at least one computer. Type of patch. Vendor that supplied the application and the patch. Unique identifier for the Knowledgebase article that provides more information about the patch. Size of the patch. When the patch was first made available. How important the patch is. Number of devices that do not have the patch. Click on the number to see a list of those devices. Actions you can take for the patch. Valid values are: Details displays a pop-up box with information about the patch Deploy initiates a workflow to deploy the patch to your users Status displays the status of a patch deployment Note: If you do not see the Deploy or Status options, your organization may not have purchased the Patch Self Service feature. Contact your account representative for more information. Patch Details Tab This tab contains the Missing Microsoft Patch Details Report and it has the following filters: Computer Name OS Username Last Reported Patch Name Severity Missing Microsoft Patch Details Report This report shows detailed information about each of the patches that are missing from your computers. 64
1. Hover your cursor over the Reports tab. 2. Click Application Updates Overview under the Application Updates Reports heading. 3. Click the Patch Details tab. Computer Name OS Username Patch Name KB ID Severity File Size (MB) Date Detected Name of the machine on which the software is installed. Username used to log in to the machine. Unique identifier for the missing patch. Unique identifier for the Knowledgebase article that provides more information about the patch. How important the patch is. Size of the patch. Date that the patch was first discovered. Data Protection Reports Data Protection Overview Endpoint security focuses on protecting your end users computers. Data protection, on the other hand, focuses on protecting the data on those computers. MaaS360 s Data Protection reports provide visibility into the data and how it is kept safe. Data Protection Summary Tab This tab contains summary reports giving you a high-level look at the data on your users computers. Installed Data Protection Applications Report This report shows the different data protection applications installed on your users computers. 1. Click the Data Protection Overview link in the My Actions and Reports section of the Home screen. You can also: 65
1. Hover your cursor over the Reports tab. 2. Click Endpoint Security Overview under the Endpoint Security Reports heading. X axis Application Different data protection applications that your company has put on end users computers and that the service is set up to monitor. Y axis Computers Number of computers using each application. Devices by Encryption Status Report This report shows the status of the encryption process by indicating how many computers are in each phase. 1. Click the Data Protection Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Reports tab. 2. Click Data Protection Overview under the Data Protection Reports heading. 66
Devices Encryption Status Number of encrypted devices in each phase of the process. Where the devices are in the encryption process. Devices by Encryption Application (Top 10) Report This report specifies how many computers are encrypted, categorized by encryption application. Only the 10 most common applications are shown. 1. Click the Data Protection Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Reports tab. 2. Click Data Protection Overview under the Data Protection Reports heading. 67
X axis Encryption Application The top 10 applications your organization uses to encrypt data. Y axis Devices Number of devices using each encryption application. Summary by Device Tab This tab contains the Data Protection Summary Report. It has the following filters: Computer Name OS Name Last Reported Applications Installed Summary by Device Report This report provides visibility into the data protection applications on individual computers. 1. Hover your cursor over the Reports tab. 2. Click Data Protection Overview under the Data Protection Reports heading. 3. Click the Summary by Device tab. You can also: 1. Click the Data Protection Overview link in the My Actions and Reports section of the Home screen. 68
Computer Name OS Username Last Reported Encryption Detected Backup & Recovery Detected Data Leak Prevention Detected Name of the machine on which the service is installed. Username used to log in to the machine. Date that the service agent or Endpoint Enforcement Agent (EEA) last contacted the Fiberlink servers. Specifies if encryption software is installed on the user s machine. Specifies if Backup & Recovery software is installed on the user s machine. Specifies if Data Leak Prevention is installed on the user s machine. Encryption Tab This tab contains the Encryption Details report. It has the following filters: Computer Name OS Username Last Reported Installed Date Device Type Application Vendor Application Name Version Encryption Status Encryption Details Report This report describes, in detail, the status of the encryption process on individual computers. 1. Hover your cursor over the Reports tab. 2. Click Data Protection Overview under the Data Protection Reports heading. 3. Click the Full Disk Encryption tab. Computer Name OS Username Name of the machine on which the software is installed. Username used to log in to the machine. 69
Device Type Application Vendor Application Name Version Installed Date Encryption Status Encrypted Drives Last Reported Type of the device: Desktop, Laptop, or Not Available. Company that makes the encryption software. Name of the encryption software. Version of the encryption software installed on the device. Date the encryption software was installed on the device. Specifies where the computer is in the encryption process: No Encryption the application has been installed but no endpoint drives have been selected for encryption. This status also occurs when drives have been decrypted but the application has not been uninstalled Pending Encryption the application has been installed but it has not yet been activated, or the encryption has not yet begun Encryption In-Progress the encryption has been started but has not finished (it is currently encrypting) Encryption Complete all the selected volumes have been encrypted Installed and Active the application is installed and the service is running Installed and Not Active the application is installed, but the service is not running Not Available data is not available Names of the drives that have been encrypted. Date and time the encryption application last contacted the Fiberlink servers. 70
End User Instructions for MaaS360 Control Service Welcome to your new MaaS360 Control Service software. This intuitive, intelligent interface provides you with the highest levels of security enforcement to keep your endpoint and data safe. Among its features are: An easy-to-use interface (UI) Compliance monitoring and remediation Security Alerts with Systray notification and message balloons Activity Logs Message History User-friendly background updates with bandwidth sensitive resumable downloads to keep your software current at all times with no drain on your online productivity Online Help, including context-sensitive topics for Troubleshooting compliance events You must have the MaaS360 Control Service to have the Persistent Policy Enforcement Service. Starting the Application Control Service can be started from either your desktop or the Windows Programs menu. 71
To start Control Service from your desktop, follow these steps: 1. Locate the Control Service icon on your desktop. 2. Double-click the Control Service icon. This launches the application and displays it showing the Main View tab. To start Control Service from the Windows Programs menu, follow these steps: 1. Click the Windows Start button located on the lower left corner of your desktop. The Windows Start menu is displayed. 2. Click the Programs menu option. The Windows Programs menu is displayed. 3. Click the MaaS360 menu option. The Control Service menu options are displayed. 4. Click the Control Service menu option. This launches the application and displays it showing the Main View tab. Minimizing the Application Window Note: Minimizing or maximizing MaaS360 Control Service window does not terminate any security enforcement. The application continues to run on your laptop even when the application window is minimized. To minimize the application window from the MaaS360 Control Service user interface, follow these steps: When the application is maximized, click the X button in the upper right corner of the MaaS360 Control Service window. The window closes, but the icon remains active in the systray. To minimize the application window from the Windows task bar, follow these steps: 1. When the application is maximized, place your mouse cursor over the Control Service button on the Task Bar. 2. Click the left mouse button. The window closes, but the icon remains active in the systray. To re-display (or maximize) the application window, follow these steps: 1. When the application is minimized, place your mouse cursor over the Control Service icon in the systray. 2. Double-click the left mouse button. The application window is maximized on the desktop. or Click the right mouse button. Select Show MaaS360 Control Service. The application window is maximized on the desktop. Using Online Help The Help screen provides access to the online Help that is provided in each of the available languages for the User Interface. To launch the online Help, follow this step: 1. Click the Help tab. 2. Click MaaS360 Control Service Help to launch the online Help in a separate window on your desktop. The help appears in the same language that is selected in the Tools > Options drop-down list. 72
Viewing Version and Copyright Information The Help screen provides you with detailed version and copyright information for Control Service. Your System Administrator and Help Desk employees can use the version information to resolve issues associated with your copy of Control Service. To view version and copyright information, follow this step: 1. Click the Help tab. The About MaaS360 Control Service information displays on the screen, along with other information about the application. 2. Click Details to see specific details of the policies and current build. 3. Click Close to close the Details window. 4. Click End User License Agreement to view the License Agreement. 5. Click Copy to Clipboard if you wish to copy the License Agreement and save it to another location. 6. Click OK to close the License Agreement. Getting Status Details The following sections describe the different ways that MaaS360 Control Service provides status of your applications and your security. Information about individual applications is provided in the Main View; information about more general states is provided both in the Main View and in the Systray. Main View The Main View of the Control Service screen provides you with information about the Compliance Status for individual security software running on your system. It also indicates overall Compliance Status and Corporate Network Status. 73
Note: If there are multiple components of a security suite that are being monitored (such as a single product that contains both firewall and anti-virus,) the Main View will show a single listing for the security suite. Details about the status of each component will be shown within that listing when applicable. Status for Individual Applications Each separate panel contains the following information for the individual application being monitored: Name and version number of the security software application running on your system Symbolic icon indicating the policy status of the application Indicator of the Active/Inactive status of the application Individual Status Indicators In compliance. The application is running according to policy. Out of compliance, with warning. No restrictive action has been enforced. If this condition persists, contact your Help Desk. Out of compliance, with enforcement. A disconnect or restrict action 74
has been enforced. You should contact your Help Desk. Not currently monitored. Security Alerts Any time an application is out of compliance, its panel expands to show a Security Alert and details, which include: Status, or reason for the compliance violation Explanation of the event(s) Troubleshooting link that identifies the event further Clicking on the Troubleshooting link will take you to the appropriate Help page for the Troubleshooting Compliance Event that is identified. Note: When the monitoring information overflows the Main View, use the scroll bar to see information that is not visible initially. 75
Overall Status Control Service provides several methods for obtaining information about your overall security and VPN connection status. Although the application does not provide the connection capability, it monitors your connection status. Security and connection indicators are described below. A status indicator shows the overall compliance of the device. Indicates that you are in compliance. Indicates that you are out of compliance, but there is no action. Indicates that you are out of compliance, and action is being taken. Indicates that applications are not being monitored. System Tray Icons When you launch Control Service the Compliance icon is displayed in the Windows System Tray (Systray), located in the lower right corner of your desktop in the Windows Task Bar. This lets you view status even when the UI is not open. Overall, there are three Control Service icons that can appear in the Systray: The Compliance icon will always be present in the Systray. A Connection icon will appear only when connection status is present. A Background Update icon will appear only when an update is occurring. You can mouse over an icon to see details of its status. You will see the state of the compliance, update activity or connection, for example: Compliance Icon The Control Service Systray icon menu gives you access to the following option that opens the UI: Show MaaS360 Control Service - displays the Control Service application window. In addition to allowing you to interact with the application, the Control Service Systray icon plays an important role in letting you know the compliance status of your security enforcement. The following table describes the icons, the conditions under which they are displayed and the types of informational messages that display at each status. 76
Compliance Icon Description Mouse-over Message Security Alerts Message In compliance. Not in compliance, but no action is being taken. Not in compliance, and action is taken. Compliance is pending. Control Service, Security Enforcement: OK Control Service, <Application Name>:Requires Attention Control Service, <Application Name>:Requires Attention Control Service, Security Enforcement: Off (No Security Alerts displayed) Control Service, <Application Name>:Security Enforcement has detected device is out of compliance, click here for more details. Control Service, <Application Name>:Security Enforcement has detected device is out of compliance, click here for more details. (No Security Alerts displayed) Background Update Icon The Background Update icon appears briefly when an update to policy or software is occurring in the background. Pausing the mouse over this icon shows the percentage of completion. Message History The Message History keeps a record of messages indicating general system status, warnings, and other messages of interest, such as compliance results messages. These messages should assist you in the event of a problem. You can view Message History by clicking the Logs tab. This section is useful for troubleshooting because it shows the progression of states that your PC passes through during operation. You can copy this information and paste it into a document or email it to your corporate Help Desk or System Administrator for additional assistance. 77
To view the Message History, follow these steps: 1. Click the Logs tab on the main application screen. The Messages display in a list that presents entries dated in descending order by date and time. 2. Click Copy to Clipboard to save the list and send it to another application. 3. Click Detailed Logs if you wish to view the Activity Log. 4. Click Upload Logs if you wish to upload your logs to the server. This may take a few minutes, depending on your connection speed. Activity Log The Activity Log provides you with a history of your session activity. This information is valuable in assisting your Help Desk or System Administrator in tracing issues with your computer. 78
To view the Activity Log, follow these steps: 1. Click the Logs tab. The Messages screen is displayed with entries dated in descending order by date and time. 2. Click Detailed Logs. The Activity Log screen is displayed. 3. To see the details of any log item, highlight it and click Next> to display the Activity Log - Detail screen. Refer to the Activity Log Codes, below, to better understand each item. 79
1. To return to the Activity Log list, click <Back. To exit, click Cancel. 2. You can also copy the contents of the Activity Log list to the clipboard so you can save it to a spreadsheet. Click on Copy to Clipboard to do this. 80
Activity Log Codes While viewing the Activity Log - Detail screen there are several areas that display error codes and other details that inform you of the state or history of the activity. The following details display for the associated events: Error Code - Displays on any Activity Log Category, for instance, Connection Status or Connection Attempt. For every Error Code there will be an equivalent Error Description that will provide a reason for the error. Result - Displays on AppPolicyEnforcement. For every Result there will be an equivalent Result Description that will provide a reason for the result. If the Result Value is: 0 Not defined 1 Disconnect The Result Description is: 2 Access denied 3 Manual disable 4 No action per policy 5 User disconnect 6 Timeout disconnect 7 No policy defined 8 Disconnect tunnel 9 Disconnect tunnel 10 Tunnel reconnecting 11 Network Restrict enabled 12 Network Restrict disabled 13 14 15 16 Application or service started Application or service stopped Compliance VPN profile mode restored Restricted VPN profile mode activated Monitoring Enabled - Displays on applicationstatus. Valid values are ON and OFF. Status Code - Displays on applicationstatus. For every Status Code there will be an equivalent Status Description that will provide a reason for the status. 81
Application Status Code Application Status Description 100 Application is in compliance 101 Application is out of compliance because it is not running 102 Application is out of compliance because it is not installed 103 Application is not monitored 104 Unknown status 105* Application is out of compliance 106 Application is out of compliance because application is not enabled 107 Application is out of compliance because last full scan is too old 108 Application is out of compliance because definitions are out of date 109 Application is out of compliance because no drives or folders are encrypted 112 Application is out of compliance because no drives or folders are encrypted *In some instances applications can be installed and running, but display an out-ofcompliance status. There are different reasons for this. For example, with Anti-Virus and Anti-Spy applications this could be attributed to old. dat files. Uploading the Activity Log The Activity Log (located locally on your computer) captures information about your connection (e.g., when the connection was established, the speed of the connection, and so forth). This information is valuable in diagnosing connection problems and for collecting and reporting statistics about the usage of the application. Uploading the Activity Log sends this information to a MaaS360 server for use by the Help Desk. To upload your Activity Log: 1. Click the Logs tab. 2. Click Upload Logs. This uploads the Activity Log from your computer to a server on your corporate network. Status messages display in the Messages field as the upload takes place. Note: You must be connected to the Internet in order to upload your Activity Log. Adjusting Preferences Changing the Language for Using Control Service Control Service can be displayed in a number of languages, including: 82
English Chinese, Simplified or Traditional Dutch French German Italian Japanese Spanish Note: The set of available languages depends on how your system administrator configures Control Service to meet your site's language needs. To display Control Service in one of these languages, follow these steps: 1. Click the Tools tab to display Options. 2. Click the Language drop-down list, and click on your language to select it. Text, buttons, menus and messages will now display in your chosen language. Note these exceptions: a. Terms that have no equivalent in the selected language, or are commonly known in English (like OK) will display in English. b. Fields or screens that show dynamic text, (e.g., Logs will display in the language in which they were generated (previous language selection), until a new event occurs. Then the text will display in the current language selection. 3. To return to the original language or choose another language, return to the Tools tab and select a new Language option. If you don t update this setting, the language displayed in the UI will automatically be the same as the operating system s language (if that language is supported). Updates Getting Policy and Software Updates MaaS360 Control Service checks for Policy and Software updates silently, every 60 minutes after it detects an Internet connection. If updates are available, it automatically downloads them to your computer in the background, and applies them immediately. Note: You can also initiate the update process manually during the time you have an active network connection. To initiate a manual update of Policy information and Software, follow these steps: 1. Click the Tools tab. 2. Click Manual Update. This initiates a manual update of Policy and Software information through your active connection. 83
Troubleshooting A systray icon indicates whenever a background update takes place. You can mouse over the icon to get the progress of the update. Note: The Manual Update option is active only when you have a network connection. Troubleshooting Compliance Events When you encounter a compliance event, the Security Alerts portion of the screen lists the name of the application that is out of compliance. Clicking the Troubleshooting link launches the online Help and displays a context-sensitive topic with the possible Cause and Solutions for the out-of-compliance event. 84
An example of a Troubleshooting topic is shown here: 85