Other queries

Run these queries to generate reports, or modify them to generate custom reports.

Query.. Displays...
Endpoint Security: Top Infected Users in the Last 7 Days The list of top infected users in the last seven days.
Endpoint Security: Primary Vectors of Attack in the Last 7 Days The list of Primary Vectors of Attack in the last seven days.
Endpoint Security: Top Threats in the Last 48 Hours The list of top threats in the last 48 hours.
Endpoint Security: Threats Detected in the Last 24 Hours The number of threat events generated in the last 24 hours.
Endpoint Security: Threats Detected in the Last 7 Days The number of threat events generated in the last seven days.
Endpoint Security: Summary of Threats Detected in the Last 24 Hours The summary of threats detected in the last 24 hours.
Endpoint Security: Summary of Threats Detected in the Last 7 Days The summary of threats detected in the last seven days.
Endpoint Security: Currently Enabled Technology The list of technology that are currently enabled on each managed system.
Endpoint Security: Policy Compliance by Computer Name Two lists of computers which do and do not have the latest policy applied.
Endpoint Security: Policy Compliance by Policy Name A Boolean pie chart showing that policies have and have not been updated on the client system.
Endpoint Security: Self Protection Compliance Status The list of self-protection compliance status report.
Endpoint Security Platform: Hotfixes Installed The list of hotfixes installed for the software.
Endpoint Security: Installation Status Report The stacked bar chart of multiple modules and their installation status.