McAfee Endpoint Encryption Reporting Tool User Guide Version 5.2.13
McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 For more information regarding local McAfee representatives please contact your local McAfee office, or visit: www.mcafee.com Document: Endpoint Encryption Reporting Tool User Guide Last updated: June 19, 2013 Copyright (c) 1992-2013 McAfee, Inc., and/or its affiliates. All rights reserved. McAfee and/or other noted McAfee related products contained herein are registered trademarks or trademarks of McAfee, Inc., and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. Any other non-mcafee related products, registered and/or unregistered trademarks contained herein is only by reference and are the sole property of their respective owners.
Contents Preface... 4 Using this guide...4 Audience...4 Conventions...4 Contacting Technical Support...4 Endpoint Encryption Reporting... 5 Starting the Endpoint Encryption Reporting application...5 Endpoint Encryption Reports...5 Machines Assigned Users Report...5 Machines By Group Report...6 Machines Client Status Report...6 Machines Client Version Report...7 Machines Description Report...7 Machines Encryption Status Report...8 Machines Event Audit Report...9 Machines Failed Logon Report... 10 Machines Last Sync Date Report... 10 Machines Not Fully Encrypted Report... 11 Machines Recovery Events Report... 11 Orphaned Objects Report... 12 Users Admin Level Report... 12 Users Assigned To Machines Report... 13 Users By Group Report... 14 Users Event Audit Report... 14 Users Last Logon Date Report... 16 Users Not Assigned To Machines Report... 17 Users Recovery Events Report... 17 How to Create and Run Reports... 19 The Users Admin Level Report... 19 Generating the Users Admin Level Report... 20 The Machines Encryption Status Report... 22 The Machine Client Status Report... 26 The Machines by Group Report... 29 Scheduling a Report Run... 33 Scheduling a Report Run... 33 Viewing and Editing a Report Run... 37 Deleting a Report Run... 37 Further Reporting Options... 39 Creating Folders... 39 Editing a Report Configuration... 39 Renaming a Report Configuration... 39 Deleting a Report Configuration... 39 Viewing a Report... 39 Renaming a Report... 39 Deleting a Report... 40
Preface Preface Using this guide This guide describes how to create reports using the McAfee Endpoint Encryption Reporting Tool. Audience This guide is intended for anyone who will run reports using the Endpoint Encryption Reporting Tool. Conventions This guide uses the following conventions: Bold Condensed Courier Italic Blue Note Caution All words from the interface, including options, menus, buttons, and dialog box names. The path of a folder or program; text that represents something the user types exactly (for example, a command at the system prompt). Emphasis or introduction of a new term; names of product manuals. A web address (URL); a live link. Supplemental information; for example, an alternate method of executing the same command. Important advice to protect your computer system, enterprise, software installation, or data. Contacting Technical Support Please refer to www.mcafee.com for further information. 4
Endpoint Encryption Reporting Endpoint Encryption Reporting The Endpoint Encryption Reporting application allows administrators to quickly create and run a number of reports on Endpoint Encryption users, machines and encryption configurations. Each report can be produced in three different formats: a simple table, a graphical xml layout or a comma-separated file. See the How to Create and Run Reports section for examples of each format. The first step in creating a report is to specify a configuration. This is done via a set of wizard screens. The configuration determines what the report will contain and what format it will take. After setting the criteria for the report, the administrator can easily generate it and view the output. Starting the Endpoint Encryption Reporting application The Endpoint Encryption Reporting Tool is installed as part of the Management Center installation. It sits within the McAfee Endpoint Encryption Manager option on the Programs menu. 1. Click on Start Programs McAfee Endpoint Encryption Manager Endpoint Encryption Reporting to start the application. 2. Logon using the administration logon. The Endpoint Encryption Reports window will appear. Endpoint Encryption Reports Machines Assigned Users Report The Machines Assigned Users Report provides an overview of which users have access rights to which machines. This report can be generated by specifying all machine groups or just particular groups. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in a machine name, e.g. PC_P*, or, the question mark character (?) to match just one character, e.g. P?. 5
Endpoint Encryption Reporting Figure 1 A sample of the Machines Assigned Users Report in the simple table format Machines By Group Report The Machines by Group report lists the machine id, network name and machine network name of all machines contained within the specified group(s). This report can be generated on one or more machine groups or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in a machine or group name, e.g. Sale*, or, the question mark character (?) to match just one character, e.g. U?. Figure 2 A sample of the Machines by Group Report in the simple table format Machines Client Status Report The Machine Client Status report lists the Endpoint Encryption client status of specified machines, i.e. the status set by the Administrator for a machine, e.g. Enabled, Disabled, Remove + Reboot. The report includes the machine id, network name, description and status. 6
Endpoint Encryption Reporting This report can be generated on one or more machine groups or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in a machine or group name, e.g. Sale*, or, the question mark character (?) to match just one character, e.g. U?. Figure 3 A sample of the Machine Status Report in the simple table format Machines Client Version Report The Machines Client Version report provides an overview of the client software versions for specified machines within your environment. The report lists the Endpoint Encryption client version with respective machine name and group name (the group where the machine belongs). This report can be generated on one or more machine groups and/or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. Figure 4 A sample of the Machines Client Version Report in the simple table format Machines Description Report The Machines Description Report provides an overview of specified machines and their respective descriptions. It also includes the name of the group the machine belongs to. This report can be generated on one or more machine groups and/or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) 7
Endpoint Encryption Reporting to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. You can also use these wildcard characters to filter the contents of the Description field. This is useful, for example, if you have used the Description field to further categorize your machines, e.g. Sales Machine, London Sales Office, Board Computer. Figure 5 A sample of the Machines Description Report in the simple table format Machines Encryption Status Report The Machines Encryption Status report displays the encryption condition of specified Endpoint Encryption machines. The data displays by machine name and includes the encryption status, the expected encryption status and the encryption state summary. This report can be generated on one or more machine groups or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in a machine or group name, e.g. Sale*, or, the question mark character (?) to match just one character, e.g. U?. See section 3.2.3 The Machines Encryption Status Report for further information on the reported crypt state, expected crypt state and crypt state summary. 8
Endpoint Encryption Reporting Figure 6 A sample of the Machines Encryption Status Report in the simple table format Machines Event Audit Report The Machines Event Audit Report provides an overview of specified machines and events of importance for a machine, e.g. power fail, password changed successfully, logon failed. It also lists the time and date of the corresponding event. This report can be generated on one or more machine groups and/or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. Figure 7 a sample of the Machines Event Audit Report in the simple table format 9
Endpoint Encryption Reporting Machines Failed Logon Report The Machines Failed Logon Report provides a listing of machines which have acquired a certain amount of failed logons. It includes the user name of the person who attempted the logon as well as the date and time of each try. This report can be generated on one or more machine groups and/or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. You can also stipulate a date range or build the data from a specified number of days prior to the present day s date. Figure 8 A sample of the Machines Failed Logon Report in the simple table format Machines Last Sync Date Report The Machines Last Sync Report contains a listing of machines with the date and time they last synchronized with the main database. This report can be generated on one or more machine groups and/or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. 10
Endpoint Encryption Reporting Figure 9 A sample of the Machines Last Sync Date Report in the simple table format Machines Not Fully Encrypted Report The Machines Not Fully Encrypted Report contains a listing of machines that have an Encrypted state. This report can be generated on one or more machine groups and/or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. Figure 10 A sample of the Machines Not Fully Encrypted Report Machines Recovery Events Report The Machines Recovery Events Report contains a listing of machines and their associated recovery event including the event date and time. This report can be generated on one or more machine groups and/or machine names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. 11
Endpoint Encryption Reporting You can filter the report further by selecting which recovery event(s) you wish to report on, e.g. Boot Once Recovery, Screen Saver Recovery or Recovery Failed. You can also stipulate a date range or build the data from a specified number of days prior to the present day s date. Figure 11 A sample of the Machines Recovery Events Report in the simple table format Orphaned Objects Report The Orphaned Objects Report contains a list of objects (users or machines) that have become orphaned (detached) from the machine group or user group which they belong. This report is generated by specifying either users or machines only. Figure 12 A sample of the Orphaned Objects Report in the simple table format Users Admin Level Report The Users Admin Level report lists the administration level of users. The report contains the Endpoint Encryption User ID, the user name and respective administration level. You can generate the report to include all users in your environment, or, select one or more individual users. 12
Endpoint Encryption Reporting During creation of the report, you will be prompted to select data for the X and Y-axis. This allows you to determine your preference for displaying the user name or administration levels in a vertical (Y) or horizontal (X) fashion. Note: This is only relevant to the XML graph report. Figure 13 A sample of the Users Admin Level Report in the simple table format Users Assigned To Machines Report The Users Assigned To Machines Report contains a listing of users and the machines they have been assigned to. This report can be generated on one or more groups and/or user names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, Sales*, or, the question mark character (?) to match just one character, e.g. P?. Figure 14 A sample of the Users Assigned To Machines Report in the simple table format 13
Endpoint Encryption Reporting Users By Group Report The Users By Group Report lists the user group names and users within those groups. This report can be generated on one or more groups and/or user names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, Sales*, or, the question mark character (?) to match just one character, e.g. P?. Figure 15 A Sample of the Users by Group Report in the simple table format Users Event Audit Report The Users Event Audit Report contains a listing of users and their associated recovery event including the event date and time. This report can be generated on one or more user groups and/or user names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. You can filter the report further by selecting which recovery event(s) you wish to report on, e.g. Login failed, Machine Configuration failed, Boot Completion or, if necessary, all Recovery events. See pic below. 14
Endpoint Encryption Reporting Figure 16 Select all or some of the events You can also stipulate a date range or build the data from a specified number of days prior to the present day s date. Figure 17 A sample of the Users Event Audit Report in the simple table format 15
Endpoint Encryption Reporting Users Last Logon Date Report The Users Last Logon Date Report lists the users who have not logged onto the database over a specified period of days (minimum). This report can be generated on one or more user groups and/or user names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. This report can be filtered further by specifying the minimum number of days. You can also tailor this report to list users who have not logged on since their audit log was last cleared. You can specify or include client logon events and/or database logon events. Figure 18 The Users Last Logon Report in the simple table format Figure 19 Choose the minimum number of days and type of event 16
Users Not Assigned To Machines Report Endpoint Encryption Reporting The Users Not Assigned To Machines Report contains a listing of users that are not assigned to a machine. This report can be generated on one or more groups and/or user names. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, Sales*, or, the question mark character (?) to match just one character, e.g. P?. Figure 20 The Users Not Assigned to Machines Report in the simple table format Users Recovery Events Report The Users Recovery Events Report contains a listing of users and their associated recovery event including the event date and time. This report can be generated on one or more user groups and/or usernames. You can do this by using the wildcard filter: for example, use the asterix character (*) to match any number of characters in the name, e.g. Pay*, PC*, or, the question mark character (?) to match just one character, e.g. P?. You can filter the report further by selecting which recovery event(s) you wish to report on, e.g. Password Reset, Lockout Recovery, Change Token Recovery or Recovery Failed. You can also stipulate a date range or build the data from a specified number of days prior to the present day s date. 17
Endpoint Encryption Reporting Figure 21 A sample of the Users Recovery Event Report in the simple table format 18
How to Create and Run Reports How to Create and Run Reports This chapter describes the process of creating and running reports using the Endpoint Encryption Reporting Tool. The procedures for creating and running a report are the same across the board. For certain reports, there are some minor variations, e.g. the addition of dates or the selection of particular events (Users Event Audit Report, Users Recovery Event Report, Machine Recovery Event Report). The first stage is to create the configuration to determine what data the report should contain and what format it should be in, e.g. Comma Separated Values, Simple Table or XML. When you have created the report configuration, the next step is to generate it. This chapter describes the steps to follow when creating and running a report. It uses the examples of the Users Admin Level Report, Machines Encryption Status Report, Machine Status Report and the Machines by Group report to demonstrate report configuration and generation. It also includes examples of the different output types that are available. The Users Admin Level Report The Users Admin Level report lists the administration level of all, or, a specified group of users. The data contains the Endpoint Encryption User ID and includes the user name and administration level. Creating the Report Configuration Before running this and any other report, you must first create a report configuration. This allows you to specify the criteria for the Users Admin Level report, e.g. the minimum-security level number, the user group, etc. 1. Click on Start Programs McAfee Endpoint Encryption Manager Endpoint Encryption Reporting to start the application. 2. Logon using the Endpoint Encryption Administration user name and password. The Endpoint Encryption Reports window will appear. 3. Right-click on the Users Admin Level Report option in the left hand pane. 4. Select the Create Report Configuration option. The Report Configuration wizard will start. 5. Enter a name for the report and a meaningful description. Click Next. 6. The next screen asks you to specify a set of named users, or, all users: 19
How to Create and Run Reports Specify user groups and/or individual groups This option allows you to specify a group of users, or, a selection of users within one or more groups. Click Add then select the group or individual(s) within a group. Generate Report over all users This option will report on all users depending on the security level you stipulate at the next step. 7. The next screen prompts you to enter the minimum security level to report on, e.g. if you choose 11, the finished report would list those users with a minimum security level of 11 and above (the highest being 32); it would ignore users with a security level below 11, i.e. those between 1 and 10. Click on the Next button when you have chosen the number. 8. This report contains a graph. This screen allows you to specify the vertical (Y) axis label, e.g. Number of Users and the horizontal (X) axis label, e.g. Administration Level. You can rename these if you need to. Click Next to proceed. 9. The final screen requires you to select the format the report will be rendered in, e.g. a comma separated values file, a simple table or an XML formatted table. Select the renderer and click Finish to complete the creation of the Configuration. Figure 0-22 - The report renderer options Generating the Users Admin Level Report Now that you have created your report configuration, the report is ready to run. 1. Expand the Users Admin Level Report option in the left hand pane of the Endpoint Encryption Reports screen. 20
How to Create and Run Reports 2. Right-click on the configuration report name. A pop-up menu will appear. Alternatively, click the button on the toolbar. 3. Select the Generate Report option. 4. Enter a name for the report when prompted and click Ok. After a few moments the report name will appear underneath the Configuration Report. 5. To view the report, double click on it, or, right-click for the pop-up menu options. The report will appear in the right hand pane of Endpoint Encryption Reports window. Note: If you chose the Comma Separated Values renderer, you will be presented with a file to download. This file can be imported to the application of your choice, e.g. Excel. The Users Administration Level Report The Users Administration Level report lists the Endpoint Encryption User ID, the user name and level of administration that has been assigned to each user specified in the report configuration. The report also displays a result code and result description; a result code of 00000000 with a corresponding description of SUCCESS indicates the user id has been reported on successfully. For a full set of codes and errors, please refer to the Endpoint Encryption for PC Administrators Guide. The XML format of this report displays a graphical version of the data: you can chose from a column view, a line graph or a pie chart by selecting the respective button on the report. The final section of this chapter contains example reports with test data. Figure 23 - The Users' Admin Level Report - Simple Table Format 21
How to Create and Run Reports TIP: You can view a line graph or a pie chart version of the report by selecting the respective button. You can also sort the results of your report by clicking on any of the column headings. Exporting/Opening the Comma Separated Value File The Reporting tool allows you to create a Comma Separated Value file (data.csv) from your report configuration. This file can be opened in Excel or saved to a specified location and imported into the application of your choice. 1. Follow the steps in the Users Admin Level Report Creating the Report Configuration section. Make sure, in the final step, you select the Comma Separated Value file option. 2. Follow the steps in Generating the Users Admin Level Report. 3. To view the report, double click on it, or, right-click for the pop-up menu options. The right hand pane of Endpoint Encryption Reports window will display this message: Click here to download the results as a CSV file. 4. Click the underlined here text. 5. Select the Open button if you wish to view the contents of the file. If you are using MS Office the default should be Excel. 6. Alternatively, you can select Save to save it to a specified location. 7. The data is now ready to use. The Machines Encryption Status Report The Encryption Status report displays the encryption condition of specified Endpoint Encryption machines. The data is displayed by machine name and includes the encryption status, the expected encryption status and the encryption state summary. An explanation of the encryption status is discussed in more detail later in this chapter. Creating the Report Configuration Before running this report you must first create a Report Configuration. The Report Configuration allows you to specify the criteria for the report, e.g. machines within a group or machine names. 1. Click on Start Programs McAfee Endpoint Encryption Manager Endpoint Encryption Reporting to start the application. 2. Logon using the administration logon. The Endpoint Encryption Reports window will appear. 22
How to Create and Run Reports 3. Right-click on the Encryption Status Report option in the left hand pane. Alternatively, click the button on the toolbar. 4. Select the Create Report Configuration option. The Report Configuration wizard will start. 5. Enter a name for the report and a meaningful description and click Next. 6. The next screen asks you to specify a set of machine groups and/or individual machines or you can generate a report for all machine groups. Choose one of the following options before proceeding to the next step: Specify a set of machine groups and/or individual machines 1. Click the Next button. 2. Choose the Add button to load the Select Machine or Groups window. 3. Select a machine group from the left hand pane or an individual machine(s) from the right hand pane. 4. Click Ok when you have selected your machines. Generate report over all machine groups This option will report on all machine groups. Note: the results of this report are dependent on whether or not you set a machine name filter at the next stage. 7. The next screen allows you to specify a filter for the machine name. The filter allows you to create a report based on specific machine names, e.g. your machines may contain a country name that determines where they are located, e.g. Sweden1, Sweden2, etc. As an example, if you enter swe* (using the * wildcard) into the Filter dialog box, the report will list all machines that have Sweden in the name. Alternatively, if you leave it blank, the report will list all machines as specified in the Select Machine or Groups stage earlier. 8. This report contains a graph. This screen allows you to specify the vertical (Y) axis label, e.g. Number of Machines and the horizontal (X) axis label, e.g. Crypt State Summary. You can rename these if you need to. Click Next to proceed. 9. The final screen requires you to select the format the report will be rendered in, e.g. a comma separated values file, a simple table or an XML formatted table. Select the renderer and click Finish to complete the creation of the Configuration. 23
How to Create and Run Reports Figure 24 - The report renderer options Generating the Encryption Status Report Now that you have created your report configuration, the report is ready to run. 1. Expand the Encryption Status Report option in the left hand pane of the Endpoint Encryption Reports screen. 2. Right-click on the configuration report name (See below). A pop-up menu will appear. Alternatively, click the button on the toolbar. 3. Select the Generate Report option. 4. Enter a name for the report when prompted and click Ok. After a few moments the report name will appear underneath the Configuration Report. 5. To view the report, double click on it, or, right-click for the pop-up menu options. The report will appear in the right hand pane of Endpoint Encryption Reports window. Note: If you choose the Comma Separated Values renderer, you will be presented with a file to download. This file can be imported to another application of your choice, e.g. Excel. The Machines Encryption Status Report The Encryption Status Report depicts three key states for each machine: The Reported Crypt State: This column contains the status of the client machine s encryption as reported by the client machine to the Endpoint Encryption Administration system, e.g. No Encryption, Encrypted. The Expected Crypt State: This column contains the encryption state for the client machine as specified by the administrator on the Endpoint Encryption Administration system, e.g. C:Partial (partial encryption of c: drive), C:Full (full encryption of C: drive). 24
How to Create and Run Reports The Crypt State Summary: This is the present state of encryption for the client machine, e.g. Encrypting, Decrypting, Decrypted (drive is in plain text), Transitioning (this is when an encrypted drive is in the process is changing encryption, e.g. partial to full or encryption of another drive). The report also displays a result code and result description against each machine name: a result code of 00000000 with a corresponding description of SUCCESS indicates the machine name has been reported on successfully. For a full set of codes and errors, please refer to the Endpoint Encryption for PC Administrators Guide. The XML version of this report displays a graphical version of the data: you can chose from a column view, a line graph or a pie chart by selecting the respective button on the report. The final section of this chapter contains example reports with test data. Figure 25 - The Encryption Status Report - Simple Table format TIP: You can view a line graph or a pie chart version of the report by selecting the respective button. You can also sort the results of your report by clicking on any of the column headings Exporting/Opening the Comma Separated Value File The Reporting tool allows you to create a Comma Separated Value file (data.csv) from your report configuration. This file can be opened in Excel or saved to a specified location and imported into the application of your choice. 1. Follow the steps in the Creating the Report Configuration section. Make sure, in the final step, you select the Comma Separated Value file option. 2. Follow the steps in Generating the Encryption Status Report. 25
How to Create and Run Reports 3. To view the report, double click on it, or, right-click for the pop-up menu options. The right hand pane of Endpoint Encryption Reports window will display this message: Click here to download the results as a CSV file. 4. Click the underlined here text. 5. Select the Open button if you wish to view the contents of the file. If you are using MS Office the default should be Excel. 6. Alternatively, you can select Save to save it to a specified location. The data is now ready to use. The Machine Client Status Report The Machine Client Status report lists the details of specified Endpoint Encryption machines including the machine id, network name, description and Encryption status. Creating the Report Configuration Before running this report, you must first create a Report Configuration. The Report Configuration allows you to specify the criteria for the report, e.g. machines within a group or machine names. 1. Click on Start Programs McAfee Endpoint Encryption Manager Endpoint Encryption Reporting to start the application. 2. Logon using the administration logon. The Endpoint Encryption Reports window will appear. 3. Right-click on the Machine Client Status Report option in the left hand pane. 4. Select the Create Report Configuration option. The Report Configuration wizard will start. 5. Enter a name for the report and a meaningful description and click Next. 6. The next screen asks you to specify a set of machine groups and/or individual machines or you can generate a report for all machine groups. Choose one of the following options before proceeding to the next step: Specify a set of machine groups and/or individual machines 1. Click the Next button. 2. Choose the Add button to load the Select Machine or Groups window. 3. Select a machine group from the left hand pane or an individual machine(s) from the right hand pane. 26
How to Create and Run Reports 4. Click Ok when you have selected your machines. Generate report over all machine groups This option will report on all machine groups. Note: the results of this report are dependent on whether or not you set a machine name filter at the next stage. The next screen allows you to specify a filter for the machine name. The filter allows you to create a report based on specific machine names, e.g. your machines may contain a name relating to the department they belong to, e.g. HR, Sales. As an example, if you enter HR* (using the * wildcard) into the Filter dialog box, the report will list all machines that have HR in the name. Alternatively, if you leave it blank, the report will list all machines as specified in the Select Machine or Groups stage earlier. The final screen requires you to select the format the report will be rendered in, e.g. a comma separated values file, a simple table or an XML formatted table. Select the renderer and click Finish to complete the creation of the configuration. Figure 26 - The report renderer options Generating the Machine Client Status Report Now that you have created your report configuration, the report is ready to run. 1. Expand the Machines by Group Report option in the left hand pane of the Endpoint Encryption Reports screen. 2. Right-click on the configuration report name. A pop-up menu will appear. Alternatively, click the button on the toolbar. 3. Select the Generate Report option. 27
How to Create and Run Reports 4. Enter a name for the report when prompted and click Ok. After a few moments the report name will appear underneath the Configuration Report. 5. To view the report, double click on it, or, right-click for the pop-up menu options. The report will appear in the right hand pane of Endpoint Encryption Reports window. Note: If you chose the Comma Separated Values renderer, you will be presented with a file to download. This file can be imported to the application of your choice. The Machine Status Report The Machine Status report lists machine details and respective Endpoint Encryption status for specified computers. Information is listed by Endpoint Encryption machine ID and contains the machine name, network name, description and Endpoint Encryption status, i.e. the status set by the Administrator for a machine, e.g. Enabled, Disabled, Remove + Reboot. The report also displays a result code and result description: a result code of 00000000 with a corresponding description of SUCCESS indicates the machine has been reported on successfully. For a full set of codes and errors, please refer to the Endpoint Encryption for PC Administrators Guide. The XML format of this report displays a graphical version of the data: you can chose from a column view, a line graph or a pie chart by selecting the respective button on the report. The final section of this chapter contains example reports with test data. Figure 27 - The Machine Client Status Report - Simple Table 28
How to Create and Run Reports TIP: You can view a line graph or a pie chart version of the report by selecting the respective button. You can also sort the results of your report by clicking on any of the column headings. Exporting/Opening the Comma Separated Value File The Reporting tool allows you to create a Comma Separated Value file (data.csv) from your report configuration. This file can be opened in Excel or saved to a specified location and imported into the application of your choice. 1. Follow the steps in the Creating the Report Configuration. Make sure, in the final step, you select the Comma Separated Value file option. 2. Follow the steps in Generating the Machine Client Status Report. 3. To view the report, double click on it, or, right-click for the pop-up menu options. The right hand pane of Endpoint Encryption Reports window will display this message: Click here to download the results as a CSV file. 4. Click the underlined here text. 5. Select the Open button if you wish to view the contents of the file. If you are using MS Office the default should be Excel. 6. Alternatively, you can select Save to save it to a specified location. The data is now ready to use. The Machines by Group Report The Machines by Group report lists the details of specified Endpoint Encryption machines by Endpoint Encryption group name, e.g. machine id, network name and network name. Creating the Report Configuration Before running this report, you must first create a Report Configuration. The Report Configuration allows you to specify the criteria for the report, e.g. machines within a group or machine names. 1. Click on Start Programs McAfee Endpoint Encryption Manager Endpoint Encryption Reporting to start the application. 2. Logon using the administration logon. The Endpoint Encryption Reports window will appear. 3. Right-click on the Machines by Group Report option in the left hand pane. 4. Select the Create Report Configuration option. The Report Configuration wizard will start. 29
How to Create and Run Reports 5. Enter a name for the report and a meaningful description and click Next. 6. The next screen asks you to specify a set of machine groups and/or individual machines, or, you can generate a report for all machine groups. Choose one of the following options before proceeding to the next step: Specify a set of machine groups and/or individual machines 1. Click the Next button. 2. Choose the Add button to load the Select Machine or Groups window. 3. Select a machine group from the left hand pane or an individual machine(s) from the right hand pane. 4. Click Ok when you have selected your machines. Generate report over all machine groups This option will report on all machine groups. Note: the results of this report are dependent on whether or not you set a machine name filter at the next stage. The next screen allows you to specify a filter for the machine name. The filter allows you to create a report based on specific machine names, e.g. your machines may contain a job type that determines who uses them, e.g. Sales, Management, Technical. As an example, if you enter manage* (using the * wildcard) into the Filter dialog box, the report will list all machines that have management in the name. Alternatively, if you leave it blank, the report will list all machines as specified in the Select Machine or Groups stage earlier. The final screen requires you to select the format the report will be rendered in, e.g. a comma separated values file, a simple table or an XML formatted table. Select the renderer and click Finish to complete the creation of the Configuration. Figure 28 - The report renderer options 30
How to Create and Run Reports Generating the Machines by Group Report Now that you have created your report configuration, the report is ready to run. 1. Expand the Machines by Group Report option in the left hand pane of the Endpoint Encryption Reports screen. 2. Right-click on the configuration report name. A pop-up menu will appear. Alternatively, click the button on the toolbar. 3. Select the Generate Report option. 4. Enter a name for the report when prompted and click Ok. After a few moments the report name will appear underneath the Configuration Report. 5. To view the report, double click on it, or, right-click for the pop-up menu options. The report will appear in the right hand pane of Endpoint Encryption Reports window. Note: If you chose the Comma Separated Values renderer, you will be presented with a file to download. This file can be imported to the application of your choice. The Machines by Group Report The Machines by Group report lists machine groups and their various machine names, Endpoint Encryption IDs and network names. A machine group is created by the Endpoint Encryption Administrator and typically contains a set of machines that have something in common, for example, an organisation may want to group machines by department, e.g. Sales, Support; or machines may be grouped by location, e.g. city or country name. See the Endpoint Encryption for PC Administration Guide for further information on creating groups. The report also displays a result code and result description: a result code of 00000000 with a corresponding description of SUCCESS indicates the machine has been reported on successfully. For a full set of codes and errors, please refer to the Endpoint Encryption for PC Administration Guide. The XML format of this report displays a graphical version of the data: you can chose from a column view, a line graph or a pie chart by selecting the respective button on the report. The final section of this chapter contains example reports with test data. 31
How to Create and Run Reports Figure 29 - Machines by Group Name - Simple Format TIP: You can view a line graph or a pie chart version of the report by selecting the respective button. You can also sort the results of your report by clicking on any of the column headings. Exporting/Opening the Comma Separated Value File The Reporting tool allows you to create a Comma Separated Value file (data.csv) from your report configuration. This file can be opened in Excel or saved to a specified location and imported into the application of your choice. 1. Follow the steps in the Creating the Report Configuration section. Make sure, in the final step, you select the Comma Separated Value file option. 2. Follow the steps in Generating the Machines by Group Report. 3. To view the report, double click on it, or, right-click for the pop-up menu options. The right hand pane of Endpoint Encryption Reports window will display this message: Click here to download the results as a CSV file. 4. Click the underlined here text. 5. Select the Open button if you wish to view the contents of the file. If you are using MS Office the default should be Excel. 6. Alternatively, you can select Save to save it to a specified location. The data is now ready to use. 32
Scheduling a Report Run Scheduling a Report Run The scheduling option of the Endpoint Encryption Reporting Tool allows you to stipulate the date and time for a report run. A report can be set to run automatically at any time without user intervention. The scheduler also allows you to specify how often the report will run, e.g. daily, weekly, monthly. Scheduling a Report Run 1. Right-click on the report you wish to run and select the button. Alternatively, select the report name and click the on the toolbar. 2. Right-click on the report you wish to run and select the button. Alternatively, select the report name and click the on the toolbar. Figure 30 - The Report Scheduler output options 3. Specify the name of the report: Use date and time of generation for output name The Use date and time of generation for report name will name the report with the default date and time format, e.g. 05/07/2007 16:11:53. Specify the output name Clicking this radio button will enable the Output name dialog box allowing you to enter a particular name for the report. The Append date and time option will add the date and time to your report name. Click Ok to proceed. The Report Schedule Properties window will appear. CAUTION: Leave the Run and the Start In fields as you find them. The information in the Run box is the command line that will runs the report. The Start In box is not relevant to running reports. 33
Scheduling a Report Run Figure 31 - The Report Schedule Properties 4. Ignore the Run and Start In options. See screen above. 5. Enter the Windows login (Windows username), in the Run as field. Note: This must be the Windows username of the administrator who will run the report. 6. Click the Set Password button and enter the password of the person who will run the report. 7. Select the Run only if logged on option if you require this report to run only when the Windows user name (specified in the previous step) is logged on. 8. The Enabled (scheduled task runs at specified time) option is checked as the default. Deselecting this option will stop the job running at the specified times. 9. Click on the Schedule tab. This will load the Schedule properties. 10. Click on the New button. This will enable the scheduler properties and allow you to set the date, time and frequency, etc. 34
Scheduling a Report Run Figure 32 Report Schedule: Daily Properties 11. Click on the Schedule Task drop-down menu. 12. Choose the frequency of the report run: Daily: Allows you to specify the daily run properties. See figure above. Weekly: The Weekly option allows you to specify all, or, a selection of days to run the report. Monthly: Allows you to specify the run day of the month as well as which months of the year. Once: The Once option allows you to set the job to run once at a specified time. At System Startup: Allows you to specify the report to run when the system starts up. At Logon: Allows you to specify the report to run when you logon. When Idle: Allows you to specify the report to run when the computer is idle. Each time you configure an option in the Report Schedule Properties, the field in the top part of the screen updates to reflect the changes. 35
Scheduling a Report Run Figure 33 - Report Schedule: Weekly Properties 13. If you need to be more specific with your timings, then click the Advanced button. This will load the Advanced Schedule Options screen. Figure 34 - The Advanced Schedule Options 14. Choose your required Start Date and the End Date; the drop-down arrow button will load the calendar. 15. The Repeat Task section of this window allows you to specify how often a report will run. You can also set the time for the report to stop running. Click Ok when you have set your parameters. 16. The Settings tab allows you to specify some further settings for the report run: Scheduled Task Complete: This section allows you to set the report run to delete automatically - if it is configured to run one time only. You can also make the report stop after a specified amount of time 36
Scheduling a Report Run Idle Time: This option allows you to set the report to run after a specified amount of computer idle time. Power Management: This option allows you to determine whether a report will run if the computer is running on batteries. When you are happy with the properties you have set, click Ok. The report schedule is now ready to run based on the criteria you have set and the time(s) specified. CAUTION: If the scheduled report runs while you are logged into the Endpoint Encryption Reporting Tool, then you must exit from the application and log back in to view the report. Scheduled reports will still run if you are logged out of the application. They can be viewed when you log back in. Viewing and Editing a Report Run Follow these steps if you wish to view or edit the report runs you have created. 1. Click on the icon the toolbar. This will load the Scheduled Reports window. 2. Select the scheduled job you wish to edit or view. 3. Click the Schedule button. This will load the Schedule Properties window and allow you to view and/or edit the report run properties. Note: The previous section can guide you through updating the details of the Schedule Properties window. 4. When you have viewed or updated your report run, click the Ok button. 5. If you wish to change the output parameters then click the Options button. This will load the Report Schedule Options screen allowing you to change the current settings. 6. You can view the report name, the format it is rendered in and a description by clicking on the Information button. 7. Click Ok to confirm Deleting a Report Run Follow these steps if you wish to delete the report runs you have created. 1. Click on the icon the toolbar. This will load the Scheduled Reports window. 37
Scheduling a Report Run 2. Select the scheduled job you wish delete. 3. Click the Remove button. 4. Click Close to exit the Scheduled Reports screen. 38
Further Reporting Options Further Reporting Options Creating Folders You can create folders within the report name hierarchy. This allows you the flexibility to keep your configurations and reports tidy. 1. Right-click on the report name, e.g. Users Admin Level Report and choose the button from the popup menu. Alternatively, select the report name and choose from the toolbar. 2. Enter the name of the folder and press the <return> key. 3. Right-click on the new folder to create a report configuration or a sub folder. Editing a Report Configuration 1. Right-click on the report configuration name and choose the button from the popup menu. Alternatively, select the report name and choose the toolbar. from Renaming a Report Configuration 1. Right-click on the report configuration name and choose the button from the popup menu. Alternatively, select the report name and choose the toolbar. from Deleting a Report Configuration 1. Right-click on the report configuration name and choose the button from the popup menu. Alternatively, select the report name and choose the toolbar. Confirm Yes or No to delete the report configuration. from Viewing a Report 1. Right-click on the report name and choose the button from the popup menu. Alternatively, select the report name and choose from the toolbar. Renaming a Report 1. Right-click on the report name and choose the button from the popup menu. Alternatively, select the report name and choose from the toolbar. 39
Further Reporting Options Deleting a Report 1. Right-click on the report name and choose the button from the popup menu. Alternatively, select the report name and choose Confirm Yes or No to delete the report configuration. from the toolbar. 40