USER GUIDE: MaaS360 Services



Similar documents
USER GUIDE: MaaS360 Financial IT Reg Enforcement Service

Advanced Configuration Steps

Compliance Rule Sets in MaaS360

Charter Business Desktop Security Administrator's Guide

MaaS360 Mobile Device Management (MDM) Administrators Guide

MaaS360 Cloud Extender

MaaS360 On-Premises Cloud Extender

IBM MobileFirst Protect (MaaS360) Mobile Enterprise Gateway Migration Guide

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview

MaaS360 Mobile Enterprise Gateway

MaaS360 Mobile Enterprise Gateway

Using the Apple Configurator and MaaS3360

Accessing TP SSL VPN

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Table of Contents. Introduction...9. Installation Program Tour The Program Components...10 Main Program Features...11

Verizon Remote Access User Guide

Learn More MaaS360 Cloud Extender Checklist (MDM for Blackberry)

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

Kaspersky Security Center Web-Console

User Guide. version 1.2

Software Version 5.1 November, Xerox Device Agent User Guide

Kaspersky Security Center Web-Console

Configuration Information

MaaS360 Secure Productivity Suite (SPS): Secure Container User Guide

Core Protection for Virtual Machines 1

Pearl Echo Installation Checklist

AXIS Camera Station Quick Installation Guide

2013 ACT Special Study Learn to Administer the ACT Aspire Online Test

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

LockView CompX Database & Network Configuration & Installation Manual

Resource Online User Guide JUNE 2013

System Area Manager. Remote Management

SafeGuard Enterprise Web Helpdesk

Seagate Dashboard User Guide

HP IMC Firewall Manager

Installation Guide for Pulse on Windows Server 2012

Software Version 5.2 June Xerox Device Agent User Guide

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

Remark FTP Utility. For Remark Office OMR. User s Guide

VMware vcenter Support Assistant 5.1.1

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Installation Guide for Pulse on Windows Server 2008R2

How To Use Senior Systems Cloud Services

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

LockView 4.2 CompX Database & Network Configuration & Installation Manual

MaaS360 Mobile Service

Server Installation Guide ZENworks Patch Management 6.4 SP2

LifeSize Control Installation Guide

Enroll a Windows Phone 8 Device

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Endpoint Security VPN for Windows 32-bit/64-bit

HP A-IMC Firewall Manager

formerly Help Desk Authority Upgrade Guide

TECHNICAL BULLETIN. Configuring Wireless Settings in an i-stat 1 Wireless Analyzer

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Audit Management Reference

2X SecureRemoteDesktop. Version 1.1

Kaseya 2. User Guide. Version R8. English

Learn More Cloud Extender Requirements Cheat Sheet

SonicWALL SSL VPN 3.5: Virtual Assist

SQL Server 2008 R2 Express Installation for Windows 7 Professional, Vista Business Edition and XP Professional.

TANDBERG MANAGEMENT SUITE 10.0

PLATO Learning Environment System and Configuration Requirements. for workstations. April 14, 2008

Freshservice Discovery Probe User Guide

HP Client Automation Standard Fast Track guide

How to install/upgrade the LANDesk virtual Cloud service appliance (CSA)

Installing and Configuring vcloud Connector

Imaging Computing Server User Guide

Dial-up Installation for CWOPA Users (Windows Operating System)

Citrix Access Gateway Plug-in for Windows User Guide

Attix5 Pro Server Edition

vcloud Director User's Guide

Junos Pulse for Google Android

Sophos Endpoint Security and Control standalone startup guide

Dashboard Admin Guide

Citrix : Remediation - MAC


VPOP3 Your post office Getting Started Guide

Virtual Data Centre. User Guide

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X

Avigilon Control Center Server User Guide

Kaseya 2. User Guide. Version 1.0

For paid computer support call

Patch Management Reference

Patch Management Reference

MN-700 Base Station Configuration Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

efiletexas.gov Review Queue User Guide

Rev 7 06-OCT Site Manager Installation Guide

Sage ERP MAS 90 Sage ERP MAS 200 Sage ERP MAS 200 SQL. Installation and System Administrator's Guide 4MASIN450-08

Avalanche Remote Control User Guide. Version 4.1.3

System Administration Training Guide. S100 Installation and Site Management

Novell ZENworks Asset Management 7.5

Nexio Connectus with Nexio G-Scribe

Vantage RADIUS 50. Quick Start Guide Version 1.0 3/2005

Online Help StruxureWare Data Center Expert

Creating client-server setup with multiple clients

Version 3.8. Installation Guide

Enterprise Remote Control 5.6 Manual

AT&T Global Network Client User s Guide

Transcription:

USER GUIDE: MaaS360 Services 05.2010

Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license agreement or nondisclosure agreement. The software may be used or copied only in accordance with the terms of those agreements. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or any means electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Fiberlink Corporation. All brands and their products are trademarks or registered trademarks of their respective holders and should be noted as such. Fiberlink Corporation 1787 Sentry Parkway West Blue Bell, PA 19422 2

Table of Contents Introduction... 5 Major Features... 6 Navigation... 6 The Tabs... 7 My Watch List... 7 Managing Policies and Portal Administrators... 10 Manage Policies... 10 Portal Administrator Management... 12 Add User... 12 Edit User... 13 Delete User... 14 Search for Deleted Administrators... 14 Reset User Password... 16 Reactivate Locked Administrator Accounts... 17 MaaS360 Reports... 19 Reports Overview... 19 Types of Reports... 19 Graphs and Charts... 19 Tabs... 20 Filters... 20 Summary-to-Detail Drill-Down Views... 23 Printing and Downloading Report Information... 24 Navigating to Different Pages... 24 Device Summary Report... 25 Device List... 25 Agent Reports... 33 Agent Details... 33 Policy Enforcement Reports... 35 Policy Enforcement Overview... 35 Hardware Inventory Reports... 43 Device Summary Tab... 43 Hardware Identity Tab... 46 Hardware Capacity Tab... 47 Operating System Tab... 48 Network Information Tab... 49 Software Inventory Reports... 50 Installed Software Tab... 50 Software Details Tab... 51 Endpoint Security Reports... 52 Endpoint Security Overview... 52 Patch Management Reports... 60 Patch Management Overview Tab... 61 Patch Summary by Device Tab... 62 Summary by Patch Tab... 63 Patch Details Tab... 64 Data Protection Reports... 65 Data Protection Overview... 65 Summary by Device Tab... 68 Encryption Tab... 69 3

End User Instructions for MaaS360 Control Service... 71 Starting the Application... 71 Minimizing the Application Window... 72 Using Online Help... 72 Viewing Version and Copyright Information... 73 Getting Status Details... 73 Main View... 73 Status for Individual Applications... 74 Overall Status... 76 System Tray Icons... 76 Compliance Icon... 76 Background Update Icon... 77 Message History... 77 Activity Log... 78 Activity Log Codes... 81 Uploading the Activity Log... 82 Adjusting Preferences... 82 Changing the Language for Using Control Service... 82 Updates... 83 Getting Policy and Software Updates... 83 Troubleshooting... 84 Troubleshooting Compliance Events... 84 4

Introduction The MaaS360 Services allow Fiberlink customers to see detailed information about their end users computers. Both of the MaaS360 Services shows you information about the hardware and software on your end users computers, and provides the status of the security applications protecting them. After you load the software, it reports in to the MaaS360 Management Center web site where you can see graphs, charts and reports showing how well these computers are protected. It can show you how many of your users have no anti-virus protection, and how many have the software but the definitions are out of date. It can show you which computers are missing critical operating system patches and which drives on each computer are encrypted. You can then take action to enforce compliance to corporate security policies, as necessary. MaaS360 Service reports provide information about the following: Note: Anti-Virus Personal Firewall OS Patches Data Encryption Hardware Inventory Software Inventory The reports you see will depend on the services you have chosen. 5

Major Features Navigation The user interface provides easy-to-use navigation with links, menus and tabs, allowing quicker access to the available applications. Links on the My Watch List window take you directly to reports showing potential problems you may want to address immediately. Links on the My Actions and Reports window take you directly to reports you can use to proactively manage your organizations devices. Tabs correspond to a related set of available applications or tasks. The menus show the individual workflows, reports, etc. for the portal user. To access the menus, move your mouse over the tab and the menu will appear. Then click once to access the item. A breadcrumb trail allows you to move backwards through different screens. Links on the right side of the page provide quick access to additional information about the MaaS360 Services, the system requirements, etc. 6

The Tabs There are four tabs in the MaaS360 Platform: 1. Home - takes you to the Home screen. 2. Manage allows you to manage your portal administrators, and provides access to the Device Summary Report. Depending on the services you are using, you may also be able to manage your policy from this tab. 3. Reports provides access to the MaaS360 Platform reports. 4. Support displays the Get Help page, which has a variety of resources to help you. My Watch List The My Watch List block appears at the top of the Home page. It shows you critical information about your endpoints and allows you to access the details you need to remediate problems. For example, the MaaS360 Platform will tell you if any of your devices do not have Anti-Virus or Personal Firewall software installed. 7

You can click on the Watch List to see a list of those devices. The MaaS360 Platform displays how many devices are in a potentially problematic situation, allowing you to rectify the situation promptly. Watch List items include the following: Devices that do not have Anti-Virus or Personal Firewall software Devices that are not ready for Windows 7 Devices that are missing at least one critical patch Devices with disabled Anti-Virus software Devices with disabled Personal Firewall software Anti-Virus definitions that are older than seven days System drives with less than 10% free space Devices that do not have Encryption software Devices that have 512 MB RAM or less You can click on each Watch List item to see a MaaS360 report that shows you detailed information about that item. In many cases it is a MaaS360 report that is automatically filtered to list the devices that meet the Watch List criteria. For example, if you click on the Watch List item for devices with disabled Anti-Virus software, MaaS360 displays the Anti-Virus Details Report, with the Status filter set to Stopped. 8

9

Managing Policies and Portal Administrators To make your MaaS360 Services run smoothly, there are a few basic maintenance tasks that a portal administrator will need to do. All of these workflows are accessible from the Manage tab. You must have the MaaS360 Control Service to have the Persistent Policy Enforcement Service. Manage Policies This item appears on the Home page, as well as from the Manage tab. You should set up your policy before installing the MaaS360 service on any of your end users computers. After the software is installed, it will automatically download the latest policy and put it into practice. Policies tell the MaaS360 service which of your applications to monitor, and what actions to take when a computer is out of compliance. To create or change your policy settings, perform the following steps: 1. Click Manage Now, or select Manage Policies from the Manage tab. The Customize Policy page appears. 10

2. If you want the MaaS360 service to monitor your end users anti-virus applications, click the check box. This will expand the setting so you can select an action to be taken if a device does not have an anti-virus application, does not have it enabled, or if the anti-virus definitions are out of date. You have two choices: a. Log Information and Warn the user this will display a warning icon in the users system tray and log the non-compliance. It will not, however, do anything to restrict the user. b. Disconnect any established VPN connection this will display the warning icon and log the non-compliance. It will also disconnect the device from the VPN. 3. If you want the MaaS360 service to monitor your end users personal firewall applications, click the check box. This will expand the setting so you can select an action to be taken if a device does not have a personal firewall application or does not have it enabled. You have two choices: a. Log Information and Warn the user this will display a warning icon in the users system tray and log the non-compliance. It will not, however, do anything to restrict the user. b. Disconnect any established VPN connection this will display the warning icon and log the non-compliance. It will also disconnect the device from the VPN. 4. If you want the MaaS360 service to monitor your end users encryption applications, click the check box. This will expand the setting so you can select an action to be taken if a device does not have a data encryption application or it is inactive. You have two choices: a. Log Information and Warn the user this will display a warning icon in the users system tray and log the non-compliance. It will not, however, do anything to restrict the user. b. Disconnect any established VPN connection this will display the warning icon and log the non-compliance. It will also disconnect the device from the VPN. 11

5. If you want the MaaS360 service to prevent certain types of applications from running on your end users devices, click the check box. This will expand the setting so you can select one or more types of applications to restrict. 6. When you are finished, click Save. The date and time at the top of this page will be updated. Every 15 minutes, the last saved policy (if there is one) is made available to your users, and the version number at the top of this page is incremented. Your end users will receive the updated policy automatically the next time they access the Internet. Portal Administrator Management Portal administrators can create portal administrators and give them the appropriate access. These users do not necessarily have the MaaS360 service software on their own machines. Add User Administrators can create new portal administrators and assign them one or more roles. To add a new portal administrator: 1. Hover over the Manage tab. 2. Select Add User under the Create Portal Administrators heading. 3. Enter the user name in the User Name field. Make sure it has a minimum of six characters. 4. Enter a valid email address in the Email Address field. The password for this person will be automatically generated and sent to this email address. 5. Click to select one or more roles to assign to the new user. When you click to select a role, the role description appears in the Role Description field. 6. Click the arrow buttons to move selected options or all options between the fields. 7. Click Add to finalize the changes. 8. A message confirms successful addition of the user and roles. 12

Edit User Administrators can view, edit, or delete a portal administrator s role assignments. To edit portal administrator role assignments: 1. Hover over the Manage tab. 2. Select Manage Portal Administrators to view the Search Portal User screen. 3. Enter or select desired search criteria in the User Name box, the Email Address box and the Role drop-down list, if required. 4. Click Search to view results matching the entered search criteria. 5. Click the Edit icon associated with the user to view the Edit Portal User screen. 6. Click the arrow buttons to move selected roles or all roles between the fields, as necessary. 7. Click Save to save your changes and view the confirmation message. 13

Delete User To delete a portal administrator: 1. Hover over the Manage tab. 2. Select Manage Portal Administrators to view the Search User screen. 3. Enter or select desired search criteria in the User Name box, the Email Address box and the Role drop-down list, if required 4. Click Search to view results matching the entered search criteria. 5. Click the Delete icon to delete the selected portal administrator accounts. A deletion confirmation message displays. Search for Deleted Administrators As part of the User Management Audit feature, the new Search for Deleted Administrators menu item allows you to search and view a list of all deleted portal administrator accounts and the associated audit details. To view deleted administrator accounts: 1. Hover over the Manage tab, and select Search for Deleted Administrators. 14

2. Enter or select desired search criteria in the User Name field, the Email Address box and the Deletion Date boxes, if required. 3. Click Search. Results matching the search criteria display. 4. Click the Audit History icon to view the View Change History screen. 5. If required, click the View Change link to view the View Changes screen. 15

Note: The changes highlighted in yellow indicate an updated or modified value, the green text indicates a new value, and text with a red strike-through indicates that the value was deleted. Reset User Password You can also reset a user password. You may choose to reset a password when a user has forgotten his password or if a new portal user has requested you to reset and resend his password. To reset a portal administrator password: 1. Hover over the Manage tab and click Manage Portal Administrators menu to view the Search Portal User screen. 2. Enter or select desired search criteria in the User Name field, the Email Address field or the Role drop-down list, as necessary. 3. Click Search. Results matching the search criteria display. 4. Click the Reset icon to reset the password. 5. The Reset Password Confirmation message displays. 16

6. Click Confirm to reset the selected portal administrator s password. A confirmation message displays. The new password will be sent to the portal administrator s email address. Reactivate Locked Administrator Accounts Due to the enhanced security features in the MaaS360 Services, if a user belonging to the MAS authentication domain enters an incorrect password five times consecutively, then the user account will be locked. If a user account is locked, it can be reactivated through the Manage Portal Administrators workflow. To re-activate a locked administrator account: 1. Hover over the Manage tab and click Manage Portal Administrators to view the Search Portal User screen. 2. Enter the desired search criteria. 3. Click Search to view the results matching the entered criteria. 4. Click the Reactivate icon to reactivate the locked user account. The Reset Password Confirmation screen displays. 17

5. Click Confirm to reactivate the locked user account. The Password Reset screen displays a confirmation message. The user account is reactivated and a new system-generated password is sent to the user s email address. 18

MaaS360 Reports Reports Overview The report generation features allow you to use enhanced reporting functions (such as the tabular presentation of reports) to group associated graphs and reports, and it provides easy navigation between the reports. The enhanced reporting solution also includes filters, which help you generate a variety of real-time reports or narrow down report details based on your filter criteria. The graphs and charts provide an enhanced representation of the data in summary and detailed reports. The Print and Download links allow you to print and download the displayed tables to a variety of file formats. Types of Reports The MaaS360 Management Center provides the following types of reports: 1. Device Summary 2. Agent Details 3. Policy Enforcement 4. Endpoint Security Overview a. Anti-Virus b. Personal Firewall 5. Data Protection Overview a. Encryption 6. Hardware Inventory 7. Software Inventory 8. Hardware Inventory for BlackBerry Handhelds 9. Software Inventory for BlackBerry Handhelds 10. Patch Management 11. VPN Note: 12. Any Connection Reporting Not all reports are available for all services. If you have any questions access our Support page. Graphs and Charts Most of the data is presented in charts and graphs, and you can click on one bar or pie section to see details about that piece of data. You can also hover your mouse over a bar or pie section to see the number being represented graphically. 19

To view report graphs, you must have installed the Flash plug-in with your browser. You can get the Flash plug-in at http://www.adobe.com. Tabs Additional tabs further organize the data, helping you to understand it more easily. Most of the reports have a summary tab, and additional facts appear on subsequent tabs. For example, when you first access Hardware Inventory from the Reports tab, you see data on the Device Summary tab. If you click each of the subsequent tabs (Hardware Identity, Hardware Capacity, Operating System and Network Information), the data is presented with a different focus and in greater detail. Filters Filters allow you to change what you see in the reports based on specific selection criteria. Select the options you want from the drop-down lists and click Apply Filters. If you want to return to the default values for all the selection criteria, click Clear Filters. 20

In some cases the filter options you choose affect the other tabs for that report. If you find unexpected results on a report, try clearing the filters. Saving a Filter You can also save filters so you can use them again later. To save a filter, perform the following steps: 1. Set the desired filters by selecting options from the pull-down menus, and then click Apply Filters. 21

2. Click Filter Options to see the choices on the pull-down menus. 3. Click Save Current Filters and then click For Me. 4. A pop-up box allows you to enter a name for the filter and set it as the default for the page. 5. Make your changes and click OK to save the filter. 22

Using a Saved Filter To use a filter you had previously saved, perform the following steps: 1. Click Filter Options to see the different choices. 2. Hover your cursor over the Apply Saved Filters option to display all your saved filters, and select the filter you want to use. Summary-to-Detail Drill-Down Views You can click on a bar or pie chart section to see the details that pertain to that item. For example, if you are looking at the Operating System Summary chart, you can click on the Microsoft Windows XP, SP2 pie section: 23

You will automatically see the Operating System tab, with the appropriate filter options (Microsoft Windows XP for the Operating System and XP for the Service Pack). Printing and Downloading Report Information Each report has two links at the bottom, Print and Download. When you click Print, a menu appears giving you the option to export the report in either HTML or PDF format so it can be printed. When you click Download, a menu appears giving you the option to download the chart, graph or report as an Excel, PowerPoint, Excel 2000 or CSV file. Navigating to Different Pages To help you see the data in long reports, MaaS360 provides buttons at the bottoms of the pages. 24

Button Description Go to the first page of records. Go to the previous page. Go to the next page. Display all pages, showing all the records. Device Summary Report This report provides detailed information about your end users computers. The data is refreshed throughout the day. Device List This overview shows all the computers in the trial, and when they contacted the Fiberlink servers. 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 25

Computer Name OS Username OS User Domain Operating System First Reported (GMT) Last Reported (GMT) Troubleshooting Support Name of the machine on which the service is installed. Username used to log in to the machine. Domain used by the service. Operating system used by the computer. Date and time the computer first contacted the Fiberlink servers. Date and time the computer most recently contacted the Fiberlink servers. Link to a report about the computer s interactions with the Fiberlink servers. Click on the Computer Name link to see detailed information about that computer. Hardware Report This tab contains the Hardware Report, which provides visibility into the specified computer. 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. 2. Click the link for the computer you want to examine. You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 3. Click the link for the computer you want to examine. 26

System Manufacturer System Model BIOS Serial Number Mother Board Serial Number Computer Name MaaS360 Hardware ID Processor Architecture Processor Speed Total Physical Memory (in MB) Page File (in MB) Name of the computer s manufacturer. Computer s model number. Unique identifier for the basic input/output system boot firmware. Unique identifier for the computer s mother board. Name of the device on which the software is installed. Unique identifier of the computer, as detected by the software. Type of processor architecture in use on the computer. Computer s processor speed, in GHz. Amount of memory on the computer. Size of the computer s page file. This report also lists the following for each drive on the computer: Drive type Total space (in GB) on the drive Free space (in GB) on the drive If the drive is a system drive Operating System Report This report provides detailed information about the computer s operating system. 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. 2. Click the link for the computer you want to examine. 27

You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 3. Click the link for the computer you want to examine. Operating System Version Service Pack OS Language Installed Language Packs Logged On User User Privileges NetworkProvider HW Order NetworkProvider Order This report also lists: Operating system in use on the computer. Version number of the operating system. Service pack version information. Language in which the operating system displays information to the user. All the available language packs that were installed. Username that was used to log in to the computer. Access granted to that username. Ordered list of protocols for hardware, with the highest priority first. Ordered list of protocols, with the highest priority first. All the components of the operating system and displays the version of each component Missing patches for Microsoft Windows, including their importance and Bulletin ID Network Report This report shows you important information about your network settings and your network adapters. 28

1. Click the Device Summary link in the My Actions and Reports section of the Home screen. 2. Click the link for the computer you want to examine. You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 3. Click the link for the computer you want to examine. Automatically Detect Proxy Settings Use Automatic Configuration Script Manually Configure a Static Proxy Server System Dialup Use Lan Settings User Dialup Use Lan Settings Specifies if the computer has been set up to automatically detect proxy settings. Specifies if the computer has been set up to use an automatic configuration script. Specifies if the computer has been set up to manually configure a static proxy server. Indicates if the computer will use Lan settings for system dialup. Indicates if the computer will use Lan settings for user dialup. The report also shows the following information about your network adapters: Name Adapter ID Type DHCP Enabled IP Address Gateway DNS Servers Name of the network adapter. Unique identifier of that adapter. Type of network adapter. Indicates if it can be used with Dynamic Host Configuration Protocol. IP address of the network adaptor. Address of the gateway the computer uses. Addresses of the Domain Name System servers used by the computer. 29

All Applications Report This report shows you important information about the applications installed on the computer. 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. 2. Click the link for the computer you want to examine. You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 3. Click the link for the computer you want to examine. Name Version Name of the application detected by the MaaS360 Service. Version of that application. Security Applications Report This report shows you important information about your network settings and your network adapters. 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. 2. Click the link for the computer you want to examine. You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 3. Click the link for the computer you want to examine. 30

It provides the following information about the computer s firewalls: Name Vendor Version Status Fiberlink Supported Name of the firewall application detected by the MaaS360 Service. Company that created the firewall application. Version of the application. Indicates if the application is active or not. Indicates if Fiberlink supports this application. The report also shows the following information about your anti-virus applications: Name Vendor Version Status Fiberlink Supported Virus Def Version Virus Def Date Virus Def Server Name of the anti-virus application detected by the MaaS360 Service. Company that created the anti-virus application. Version of the application. Indicates if the application is active or not. Indicates if Fiberlink supports this application. Version number of the latest anti-virus definition. Date of the latest anti-virus definition. Server from which the computer downloaded the latest anti-virus definition. It provides the following information about the computer s anti-spyware applications: Name Vendor Version Status Fiberlink Supported Virus Def Version Virus Def Date Virus Def Server Name of the anti-spyware application detected by the MaaS360 Service. Company that created the anti-spyware application. Version of the application. Indicates if the application is active or not. Indicates if Fiberlink supports this application. Version number of the latest anti-spyware definition. Date of the latest anti-spyware definition. Server from which the computer downloaded the latest anti-spyware definition. 31

The report also shows the following information about your VPN: Name Vendor Version Binary Path Description Fiberlink Supported Name of the application detected by the MaaS360 Service. Company that created the application. Version of the application. Location of the binary used by the VPN. Description of the application. Indicates if Fiberlink supports this application. Connection Manager(s) Report This report shows you important information about the applications installed on the computer. 1. Click the Device Summary link in the My Actions and Reports section of the Home screen. 2. Click the link for the computer you want to examine. You can also: 1. Hover your cursor over the Manage tab. 2. Click Device Summary under the Manage Devices heading. 3. Click the link for the computer you want to examine. Name Version Description Binary Path Name of the multi-transport connection manager detected by the MaaS360 Service. Version of the connection manager software. Description of the connection manager. Location of the binary used by the VPN. It also shows the following information about your Wi-Fi Connection Manager: 32

Name Version Description Binary Path Name of the Wi-Fi connection manager detected by the MaaS360 Service. Version of the Wi-Fi connection manager software. Description of the connection manager. Location of the binary used by the VPN. Agent Reports These reports are designed to help you understand which products each user has. Agent Details The reports appear on the following tabs: Agent Details Agent Policy Details Agent Details Tab This tab contains the Agent Details Report. The tab has the following filters: Computer Name OS Username Agent Username Domain (Windows only) Operating System Product(s) EEA Installed Installed Date Fiberlink Software Last Reported Agent Details This report shows detailed information about the computers in your organization and the Fiberlink software installed on those computers. To access this report: 1. Hover your cursor over the Reports tab. 2. Click Agent Details under the Agent Reports heading. 33

Computer Name OS Username Agent Username Domain (Windows only) Operating System Product(s) EEA Installed Installed Date Fiberlink Software Last Reported Name of the device on which the service is installed. Username used to log into the computer. Username used to log into the service. Windows domain into which the user logged in. Device s operating system. Name and version of the MaaS360 Service running on the computer. Specifies if the Extend360 Enforcement Agent (EEA) is installed on the computer. Date that the MaaS360 Service was installed on the computer. Date that the software last contacted the Fiberlink servers. Agent Policy Details Tab This tab contains the Agent Policy Details Report. The tab has the following filters: Computer Name OS Username Agent Username Fiberlink Software Last Reported Operating System Product(s) EEA Installed Policy Set Agent Policy Details This report shows detailed information about the policies in force on the computers in your organization. To access this report: 1. Hover your cursor over the Reports tab. 2. Click Agent Details under the Agent Reports heading. 3. Click the Agent Policy Details tab. 34

Computer Name OS Username Agent Username Operating System Product(s) EEA Installed Policy Set UI Configuration Policy (Version) Connectivity Policy (Version) Security Policy (Version) Software Administration Policy (Version) Fiberlink Software Last Reported Name of the device on which the service is installed. Username used to log into the computer. Username used to log into the service. Device s operating system. Name and version of the MaaS360 Service running on the computer. Specifies if the Extend360 Enforcement Agent (EEA) is installed on the computer. Name of the policy set in force on the device Name and version of the UI Configuration Policy in force on the device. Name and version of the Connectivity Policy in force on the device. Name and version of the Security Policy in force on the device. Name and version of the Software Administration Policy in force on the device. Last date that the computer contacted the Fiberlink servers. Policy Enforcement Reports Policy Enforcement reports show which applications MaaS360 is monitoring for compliance with your company s policies. These reports also show what, if anything, they will do when computers are out of compliance. Policy Enforcement Overview This reporting module shows policy enforcement and compliance events that were reported on security logs sent by the MaaS360 service. Policy Enforcement Summary Tab This tab contains reports that provide an overview of the out-of-compliance events logged by the MaaS360 service. 35

This tab contains the following filter: Event Period Out-of-Compliance Events by Application This report breaks down the out-of-compliance events by different applications: Anti Virus, Firewall, Data Encryption, etc. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. Out-of- Compliance Events Application Number of times the computer has gone out of compliance during the timeframe specified in the Event Period filter. Type of software that has gone out of compliance (e.g., Anti-Virus or Firewall). Out-of-Compliance Events by Cause This report shows which applications have the greatest number of out-of-compliance events by cause for the timeframe specified in the Event Period filter. You can hover the cursor over each bar to see the actual number of events. This report shows how many software applications are not running properly (e.g., an Anti-Virus application with outdated virus definitions), which are disabled, and which were never properly installed to begin with. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 36

X axis Application Type of security software (e.g., Anti-Virus or Firewall) that the MaaS360 services are monitoring. Y axis Number of out-ofcompliance events Number of out-of-compliance events for the different reasons. Out-of Compliance Enforcement Actions This report specifies which actions the MaaS360 service took when it found an outof-compliance event. You defined these actions when you set up the policy in the Manage Policies section. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 37

Out-of- Compliance Enforcement Actions The actions performed when the MaaS360 Control Service discovered that an application was out of compliance, based on your policy settings. Out-of-Compliance Events (Last 7 Days) This report specifies the number of compliance events for the last seven days. The value in the Event Period filter does not affect this report. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. X axis Date Date of the last seven days. Y axis Number of out-ofcompliance Number of out-of-compliance events. events Devices Out-of-Compliance (Top 10) This report lists the 10 computers that have the most out-of-compliance events by computer name. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 38

X axis Events Number of out-of-compliance events during the timeframe specified by the Event Period filter. Y axis Computer Name Machine names of the 10 computers with the most outof-compliance events. Devices by Out-of-Compliance Events This report shows how many computers have had a certain number of out-ofcompliance events. The number of events are organized into ranges: 1 to 3 events, 4 to 10 events, greater than 10 events. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 39

Devices Events Number of devices that have gone out of compliance. Number of times the devices have gone out of compliance, organized into ranges. Out-of-Compliance Events Tab This tab contains one report, the Out-of-Compliance Events report. It contains the following filters: Event Period Computer Name OS Username Domain (for Windows only) Agent Username Application Type Application Name Out-of-Compliance Cause Out-of-Compliance Events Report This report lists the out-of-compliance events that took place within the timeframe specified in the Event Period filter. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 3. Click the Policy Details tab. Event Time Computer Name OS OS Username Domain (for Windows only) Agent Username Application Date and time that the computer went out of compliance. Name of the machine on which the application is installed. Operating system installed on the machine. Username used to log in to the machine. Windows domain on which the user has logged in. Username used to log in. Third party application that was out of compliance. 40

Name Out-of- Compliance Cause Reason the application was out of compliance. Enforcement Actions Tab This tab shows one report, the Out-of-Compliance Enforcement Actions report. It contains the following filters: Event Period Computer Name OS Username Domain (for Windows only) Agent Username Application Name Enforcement Action Out-of Compliance Enforcement Actions Report This report lists the out-of-compliance events, and displays how the MaaS360 service responded to the event. 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 3. Click the Enforcement Actions tab. Event Time Computer Name OS OS Username Domain (for Windows only) Agent Username Application Name Enforcement Action Description Date and time that the computer went out of compliance. Name of the machine on which the software is installed. Operating system installed on the machine. Username used to log in to the machine. Windows domain on which the user has logged in. Username used to log in. Name of the third party software that went out of compliance. Action taken by the MaaS360 service because the watched application fell out of compliance. Additional information about the Enforcement Action. 41

Compliance Details Tab This tab displays information about out-of-compliance events and enforcement actions together. It contains the following filters: Event Period Computer Name OS Username Domain (for Windows only) Agent Username Application Name Event Type Out-of-Compliance Events and Enforcement Actions Report This report combines information about out-of-compliance events and enforcement actions so you can clearly see how the MaaS360 software is finding the events and acting on them (based on what is defined in your policy). 1. Hover your cursor over the Reports tab. 2. Click Policy Enforcement Overview under the Policy Enforcement Reports heading. 3. Click the Compliance Details tab. Event Time Computer Name OS OS Username Domain (for Windows only) Agent Username Event Type Application Name Date and time that the computer went out of compliance. Name of the machine on which the MaaS360 software is installed. Operating system installed on the machine. Username used to log in to the machine. Windows domain on which the user has logged in. Username used to log in. Specifies if the event was an Out-of-Compliance Event, a Remediation Action, or an Enforcement Action. Out-of-Compliance Event no action is taken by Extend360 Enforcement Action Extend360 will restrict access (e.g., terminate a VPN connection) Remediation Action the MaaS360 service will help the computer become compliant (e.g., provide a link to updated Anti-Virus definitions) Name of the third party software that went out of compliance. 42

Enforcement Action Description Specifies the action taken by the MaaS360 service because the watched application fell out of compliance. Additional information about the Enforcement Action. Hardware Inventory Reports Hardware Inventory reports display information about the hardware deployed in your organization. Device Summary Tab This tab contains graphs and charts which provide you with an overview of your users hardware. This tab does not have any filters. Device Summary by Manufacturer (Top 10) This report shows how many devices are provided by each of the top manufacturers (up to 10). 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. X axis Manufacturers Names of the device manufacturers. Y axis Number of devices Number of computers provided by each manufacturer. Free Space on System Drive This report shows how much free space is available on users hard drives. The users are grouped into ranges based on the amount of free space they have. 43

1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. Amount of free space Number of devices Percentage of the system drive that is available. Number of users that have a certain percentage of free space, grouped by range. Physical Memory Installed This report shows how much physical memory has been installed on the users hard drives. The users are grouped into ranges based on the amount of memory installed. 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. 44

X axis Number of devices Number of computers in each range. Y axis Physical memory Amount of memory installed, grouped into ranges. Operating System Summary This report shows how many computers are using each of the different operating systems. 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. 45

Operating Systems Computers Different operating systems your organization is using. Number of computers that have each operating system. Hardware Identity Tab This tab contains the Hardware Identity Report. It has the following filters: Computer Name OS Username Last Reported Manufacturer Model Computer Model ID Device Type BIOS Serial Number Motherboard Serial Number Processor Physical Memory Installed Total Hard Drive(s) Space (GB) Hardware Identity Report This report provides detailed information about the users hardware. 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. 2. Click the Hardware Identity tab. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. 3. Click the Hardware Identity tab. 46

Computer Name OS Username Manufacturer Model Computer Model ID Device Type BIOS Serial Number Motherboard Serial Number Processor Physical Memory Installed Total Hard Drive(s) Space (GB) Last Reported Name of the machine on which the application is installed. Username used to log in to the machine. Company that made the computer. Model of the computer. Model ID of the computer. Specifies if the computer is a laptop or a desktop. Serial number of the basic input/output system boot firmware. Serial number of the computer s motherboard. Computer s processor. Amount of physical memory the computer has. Amount of hard drive space the computer has. Date that the device last contacted the Fiberlink servers. Hardware Capacity Tab This tab contains the Hardware Capacity Report. It has the following filters: Computer Name OS Username Last Reported Total Hard Drive(s) Space (GB) Free Hard Drive Space(s) Space (GB) Total Space on System Drive (GB) Free Space on System Drive (GB) Free Space on System Drive (%) Hardware Capacity Report This report provides detailed information about the space on devices drives. 47

1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. 2. Click the Hardware Capacity tab. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. 3. Click the Hardware Capacity tab. Computer Name OS Username Total Hard Drive(s) Space (GB) Free Hard Drive(s) Space (GB) Total Space on System Drive (GB) Free Space on System Drive (GB) Free Space on System Drive (%) Last Reported Name of the machine on which the application is installed. Username used to log in to the machine. Total amount of space on the machine s hard drive. Amount of free hard drive on the machine s hard drive. Total amount of space on the machine s system drive. Amount of free space on the machine s system drive. Percentage of free space on the machine s system drive. Date that the device last contacted the Fiberlink servers. Operating System Tab This tab contains the Operating System Details Report. It has the following filters: Computer Name OS Username Last Reported Operating System Architecture Service Pack Version 48

Default OS Language Operating System Details Report This report provides detailed information about the users operating systems. 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. 2. Click the Operating System tab. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. 3. Click the Operating System tab. Computer Name OS Username Operating System Architecture Service Pack Version Default OS Language Last Reported Name of the machine on which the application is installed. Username used to log in to the machine. Operating system on the computer. Specific architecture of the operating system. Latest service pack installed on the computer. Operating system s version. Default operating system language. Date that the device last contacted the Fiberlink servers. Network Information Tab This tab contains the Network Information Details Report. It has the following filters: Computer Name OS Username Domain (Windows only) Last Reported Network Adapter(s) IP Address (Last Reported) MAC Address Network Information Details Report This report provides detailed information about the users networks. 1. Click the Hardware Inventory Overview link in the My Actions and Reports section of the Home screen. 49

2. Click the Network Information tab. You can also: 1. Hover your cursor over the Reports tab. 2. Click Hardware Inventory Overview under the Inventory Management Reports heading. 3. Click the Network Information tab. Computer Name OS Username Domain (Windows only) Network Adapter(s) IP Address MAC Address Last Reported Name of the machine on which the application is installed. Username used to log in to the machine. Computer s domain. This is only available for computers running Windows. Network adapters used by the computer. IP address for the computer. Unique identifier assigned to a network adapter. Date that the device last contacted the Fiberlink servers. Software Inventory Reports Software Inventory reports are designed to help you manage the software installed on your users computers. Installed Software Tab This tab contains the Installed Software Report. It has one filter, Application Name. Installed Software Report This report lists the applications installed on your users computers, the version numbers and the number of computers that have them. 1. Click the Software Inventory Overview link in the My Actions and Reports section of the Home screen. 2. Click the Software tab. You can also: 1. Hover your cursor over the Reports tab. 50

2. Click Software Inventory Overview under the Inventory Management Reports heading. 3. Click the Software tab. Application Name Major Versions Install Count Name of the software application. Version number installed on the computers. Number of computers using the specified version of the application. Software Details Tab This tab contains the Software Details Report. It has the following filters: Computer Name OS Username Last Reported Application Vendor Application Name Major Version Installed Date Software Details Report This report provides detailed information about the applications installed on your users computers. 1. Click the Software Inventory Overview link in the My Actions and Reports section of the Home screen. 2. Click the Software Details tab. You can also: 1. Hover your cursor over the Reports tab. 2. Click Software Inventory Overview under the Inventory Management Reports heading. 3. Click the Software Details tab. 51

Computer Name OS Username Application Vendor Application Name Major Version Full Version Installed Date Last Reported Name of the machine on which the application is installed. Username used to log in to the machine. Company that provides the application. Name of the software application. Major version number of the application. Unabridged version information. Date the application was installed. Date the data leak prevention application last contacted the Fiberlink servers. Endpoint Security Reports Endpoint security reports focus on specific security applications that the MaaS360 Services monitor. Endpoint Security Overview The Endpoint Security Reports appear on a series of tabs, and describe the anti-virus and personal firewall applications on your end users computers. The reports also provide visibility into the critical OS patches that should be installed. Endpoint Security Summary Tab This tab contains reports about the types of security applications that are installed or are being installed on your users computers. This tab does not have any filters. Installed Endpoint Security Applications Report This report shows how many of the different security applications are currently installed on your users computers. 1. Click the Endpoint Security Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Report tab. 2. Click Endpoint Security Overview under the Endpoint Security Reports heading. 52

X axis Application Different endpoint security applications that your company has put on end users computers and that the MaaS360 Services are set up to monitor. Y axis Computers Number of computers using each application. Devices by Anti-Virus Definition Age Report This report shows how many computers have anti-virus definitions that are a number of days old. The days are grouped into ranges to make the report easier to use. For example, you can easily tell how many of your users computers have anti-virus definitions that are older than 30 days, and what part of the total population they comprise. 1. Click the Endpoint Security Overview link in the My Actions and Reports section of the Home screen. You can also: 1. Hover your cursor over the Report tab. 2. Click Endpoint Security Overview under the Endpoint Security Reports heading. 53