A SERVICE OF

logo

ZENworks® ESM 3.5 Administrator’s Manual 39
Adherence Reports
Adherence Reports provide compliance information regarding the distribution of security policies
to managed users. A score of 100% adherence indicates that all managed users have "checked in"
and received the current policy.
Endpoint Check-In Adherence
This report gives a summary of the days since check-in by enterprise endpoints, and the age of
their current policy, these numbers are averaged to summarize the report. This report requires no
variables be entered. The report will display the users by name, which policies have been assigned
to them, the days since their last check-in, and the age of their policy.
Endpoint Client Versions
Shows the most recently reported version of the client on each endpoint. Set the date parameters
to generate this report.
Endpoints that Never Checked-In
Lists the user accounts that have registered with the Management Service but have never checked
with the Distribution Service for a policy update. Select one or more groups to generate the report.
Note:
These may be Management Console users that don't have a Security Client installed in their names.
Group Policy Non-Compliance
Shows groups where some users do not have the correct policy. Selections can be made for one or
more groups to generate the report.
Endpoint State History by Machine
This report gives the most recent status (in a given date-range) of ESM-protected endpoints,
grouped by machine name. It displays the logged-on user name, current policy, ESM client
version, and network location. This report requires a range of dates to be entered. The
administrator can drill-down by double-clicking on any entry to see a complete list of status
reports for a particular machine.
Policy Assignment
This report shows which users/groups (accounts) have received the specified policy. Select the
desired policy from the list and click View to run the report.
Endpoint State History by User
This report gives the most recent status (in a given date-range) of ESM-protected endpoints,
grouped by user name. It displays the machine name, current policy, ESM client version, and
network location. This report requires a range of dates to be entered. The administrator can drill-
down by double-clicking on any entry to see a complete list of status reports for a particular user.