Creating quick reports for endpoints
You can choose to create instant reports on managed endpoints starting from the Network page:
Go to the Network page.
Select the group you want from the left-side pane. All endpoints from the selected group are displayed in the table from the right side pane.
Optionally, you can filter the contents of the selected group only by managed endpoints.
Select the check boxes of computers you want to include in the report.
Click the
Report button at the upper side of the table and choose the report type from the menu.
For more information, refer to Computer and virtual machine reports.
Configure the report options.
For more information, refer to Creating reports.
Click Generate. The report is immediately displayed.
The time required for reports to be created may vary according to the number of selected endpoints.
Creating quick reports for virtual machines
You can choose to create instant reports on managed virtual machines starting from the Network page:
Go to the Network page.
Choose Virtual Machines from the views selector.
Select the container you want from the left-side pane.
All virtual machines from the selected container are displayed in the right-side pane table.
Filter the contents of the selected group only by managed virtual machines.
Select the check boxes corresponding to the virtual machines to be included in the report.
Click the
Report button at the upper side of the table and choose the report type from the menu.
Configure the report options.
For more information, refer to Creating reports.
Click Generate.
The report is immediately displayed.
The time required for reports to be created may vary depending on the number of selected virtual machines.
Creating quick reports for containers
You can choose to create instant reports on managed containers starting from the Network page:
Go to the Network page.
Select the container host you want from the left-side pane.
All containers from the selected container host are displayed in the right-side pane table.
Select the check boxes corresponding to the containers to be included in the report.
Click the
Report button at the upper side of the table and choose the report type from the menu.
Configure the report options.
For more information, refer to Creating reports.
Click Generate.
The report is immediately displayed.
The time required for reports to be created may vary depending on the number of selected containers.
Page Menu
- Bitdefender – GravityZone
- Threats Xplorer
- Deleting endpoints
- Using Recovery Manager for encrypted volumes
- Assigning policies
- Creating quick reports
- Running tasks
- Viewing and managing tasks
- Sorting, filtering and searching for endpoints
- Organizing endpoints into Groups
- Viewing endpoint details
- Checking the endpoints status
- Network inventory
- Endpoint types
- Add Mailbox
- Configure Email
- Whitelist Email
- Install security agents – use cases
- Bitdefender Endpoint Security Tools for Linux quick start guide
- AD Connect
- Install Security Server manually
- Install security agents – standard procedure
- Install Security Server through Control Center
- Allow file download blocked by Bitdefender
- Email Security Licensing & Provisioning
- Check my monthly subscription for Bitdefender Security for AWS
- Viewing notifications
- Notification types
- Notifications
- Printing reports
- Emailing reports
- Saving reports
- Taking report-based actions
- Configuring notification settings
- Deleting notifications
- Create reports
- Report types
- Reports
- Executive Summary
- Announcements
- Viewing and managing scheduled reports
- Best practices
- Operation
- Operation
- Configuration
- Reconfigure client
- Repair client
- Restart machine
- Features distribution
- Network discovery
- Container Protection
- Update client
- Security for Storage
- Uninstall client
- eXtended Detection and Response (XDR)
- Install
- Endpoint Risk Analytics (ERA)
- Patch tasks
- Sandbox Analyzer
- Exchange scan
- Security for Exchange
- Deleting policies
- Full Disk Encryption
- Scan
- Email Security
- Scan for IOC
- Risk scan
- Device Control
- Computer policies
- Patch Management
- Renaming policies
- Network Attack Defense
- Changing policy settings
- Content Control
- Configuring profiles
- Firewall
- Assigning policies
- Advanced Anti-Exploit
- Creating policies
- HyperDetect
- Troubleshooting
- Advanced Threat Control
- Patch tasks
- Antimalware
- Credentials Manager
- Introduction
- Best practices