The Endpoint Encryption Security Violations Report widget shows the security violations assessed by the following reports:
Endpoint Encryption Consecutive Unsuccessful Device Logon
Endpoint Encryption Policy Tampering
Endpoint Encryption Log Integrity
Generating a report gathers all security violations currently logged by PolicyServer. Once generated, click the number on the Reports column to view generated reports for that violation.
Header |
Description |
---|---|
Violation report type |
The available report types for various violations. |
Action |
Click Generate to create a new report. |
Reports |
The total number of generated reports for that violation. Click the number to view available reports. |
The following table explains the Endpoint Encryption Consecutive Unsuccessful Device Logon report. Use it to understand when the logon attempt occurred, the affected Endpoint Encryption device, and how many times the user attempted to log on to the Endpoint Encryption device.
Entry |
Example |
Description |
---|---|---|
Event Timestamp |
07/02/2012 01:56 pm |
When the event occurred. |
Device Name |
TREND-4136D2DB3 |
The computer name used by the Endpoint Encryption device. |
Attempts |
5 |
The number of times that a user attempted to log on to the Endpoint Encryption device. |
The following table explains the Endpoint Encryption Policy Tampering report. Use it to understand how to read the report details.
Header |
Example |
Description |
---|---|---|
Event Timestamp |
07/02/2012 01:56 pm |
When the event occurred. |
Event |
Policy Value Integrity Check Failed |
The logged event including the authentication method. |
The following table explains the Endpoint Encryption Log Integrity report. Use it to understand how to read the report details.
Header |
Example |
Description |
---|---|---|
Event Timestamp |
07/02/2012 01:56 pm |
When the event occurred. |
Event |
Audit Log Record Missing |
The logged event including the authentication method. |