Understanding Static Templates

Control Manager added 91 pre-generated report templates divided into seven categories: Executive Summary, Gateway, Mail Server, Server, Desktop, Network Products, Data Loss Prevention and Data Discovery.​

Note:

In Control Manager 3.5, spyware/grayware were no longer considered viruses. This change affects the virus count in all original virus-related reports.

It may take a few seconds to generate a report, depending on its contents. As soon as Control Manager finishes generating a report, the screen refreshes and the View link adjacent to the report becomes available.

Use the Report Category list on the Control Manager screen to peruse the six categories of reports listed below:

Table 1. Executive Summary Reports and Report Types

Executive Summary Reports

Report Types

Spyware/Grayware Detection Reports

  • Spyware/Grayware detected

  • Most commonly detected Spyware/Grayware (10, 25, 50, 100)

  • Detected Spyware/Grayware list for all entities

Virus Detection Reports

  • Viruses detected

  • Most commonly detected viruses (10, 25, 50, 100)

  • Virus infection list for all entities

Comparative Reports

  • Spyware/Grayware, grouped by (Day, Week, Month)

  • Viruses, grouped by (Day, Week, Month)

  • Damage cleanups, grouped by (Day, Week, Month)

  • Spam, grouped by (Day, Week, Month)

Vulnerability Reports

  • Machine risk level assessment

  • Vulnerability assessment

  • Most commonly cleaned infections (10, 25, 50, 100)

  • Worst damage potential vulnerabilities (10, 25, 50, 100)

  • Vulnerabilities ranked by risk level

Table 2. Gateway Product Reports and Report Types

Gateway Product Reports

Report Types

Spyware/Grayware Detection Reports

  • Spyware/Grayware detected

  • Most commonly detected Spyware/Grayware (10, 25, 50, 100)

Virus Detection Reports

  • Viruses detected

  • Most commonly detected viruses (10, 25, 50, 100)

Comparative Reports

  • Spyware/Grayware, grouped by (Day, Week, Month)

  • Spam, grouped by (Day, Week, Month)

  • Viruses, grouped by (Day, Week, Month)

Deployment Rate Reports

  • Detailed summary

  • Basic summary

  • Detailed failure rate summary

  • OPS deployment rate for IMSS

Table 3. Mail Server Product Reports and Report Types

Mail Server Product Reports

Report Types

Spyware/Grayware Detection Reports

  • Spyware/Grayware detected

  • Most commonly detected Spyware/Grayware (10, 25, 50, 100)

Virus Detection Reports

  • Viruses detected

  • Top senders of infected email (10, 25, 50, 100)

  • Most commonly detected viruses (10, 25, 50, 100)

Comparative Reports

  • Spyware/Grayware, grouped by (Day, Week, Month)

  • Viruses, grouped by (Day, Week, Month)

Deployment Rate Reports

  • Detailed summary

  • Basic summary

  • Detailed failure rate summary

Table 4. Server Based Product Reports and Report Types

Server Based Product Reports

Report Types

Spyware/Grayware Detection Reports

  • Spyware/Grayware detected

  • Most commonly detected Spyware/Grayware (10, 25, 50, 100)

Virus Detection Reports

  • Viruses detected

  • Most commonly detected viruses (10, 25, 50, 100)

Comparative Reports

  • Spyware/Grayware, grouped by (Day, Week, Month)

  • Viruses, grouped by (Day, Week, Month)

Deployment Rate Reports

  • Detailed summary

  • Basic summary

  • Detailed failure rate summary

Table 5. Desktop Product Reports and Report Types

Desktop Product Reports

Report Types

Spyware/Grayware Detection Reports

The data in this report type contains both computer and mobile device detections.

  • Spyware/Grayware detected

  • Most commonly detected Spyware/Grayware (10,25,50,100)

Virus Detection Reports

The data in this report type contains both computer and mobile device detections.

  • Viruses detected

  • Most commonly detected viruses (10,25,50,100)

OfficeScan Client Information Reports

  • Detailed summary

  • Basic summary

OfficeScan Product Registration Report

Registration status

Comparative Reports

The data in this report type contains both computer and mobile device detections.

  • Spyware/Grayware, grouped by (Day, Week, Month)

  • Viruses, grouped by (Day, Week, Month)

OfficeScan Server Deployment Reports

  • Detailed summary

  • Basic summary

  • Detailed failure rates summary

OfficeScan Damage Cleanup Services Reports

  • Detailed summary

  • Most commonly cleaned infections (10, 25, 50, 100)

Table 6. Network Product Reports and Report Types

Network Product Reports

Report Types

Network VirusWall Reports

  • Policy violation report, grouped by (Day, Week, Month)

  • Most commonly detected violative clients (10, 25, 50, 100)

  • Service violation report, grouped by (Day, Week, Month)

Trend Micro Total Discovery Appliance Reports

  • Incident summary report, grouped by (Day, Week, Month)

  • High risk clients (10, 25, 50, 100)

  • Summary of known and unknown risks report

Table 7. Data Loss Prevention Reports and Report Types

Data Loss Prevention Reports

Report Types

Top DLP Incident Sources

  • Incidents by sender (10, 20, 30, 40, 50)

  • Incidents by host name (10, 20, 30, 40, 50)

  • Incidents by recipient (10, 20, 30, 40, 50)

  • Incidents by source IP address (10, 20, 30, 40, 50)

  • Incidents by URL (10, 20, 30, 40, 50)

  • Incidents by User (10, 20, 30, 40, 50)

  • Top template matches (10, 20, 30, 40, 50)

  • Incident distribution by channel

  • Incident trend, grouped by (Day, Week, Month)

  • Incidents by channel, grouped by (Day, Week, Month)

Significant Incident Increase

  • Significant incident increase (%) by channel (10, 20, 30, 40, 50)

  • Significant incident increase by channel (10, 20, 30, 40, 50)

  • Significant incident increase (%) by sender (10, 20, 30, 40, 50)

  • Significant incident increase by sender (10, 20, 30, 40, 50)

  • Significant incident increase (%) by hostname (10, 20, 30, 40, 50)

  • Significant incident increase by hostname (10, 20, 30, 40, 50)

  • Significant incident increase (%) by user (10, 20, 30, 40, 50)

  • Significant incident increase by user (10, 20, 30, 40, 50)

  • Significant incident increase (%) by source IP address (10, 20, 30, 40, 50)

  • Significant incident increase by source IP address (10, 20, 30, 40, 50)

  • Significant incident increase (%) by template (10, 20, 30, 40, 50)

  • Significant incident increase by template (10, 20, 30, 40, 50)

Table 8. Data Discovery Reports and Report Types

Data Discovery Reports

Report Types

Top Data Discovery Detection Sources

  • Top endpoints with sensitive files (3, 5, 10)

  • Top Data Discovery template matches (3, 5, 10)

  • Top sensitive file policy detections (3, 5, 10)

  • Top sensitive files (3, 5, 10)