Generating On-Demand Reports

If you want to run a report and display the information on your screen while you're in the management console, then follow this procedure to generate an on-demand report.

Note: Limited Admins can run On Demand Reports for the sites that have access to.

To generate an on-demand report:

  1. Log in to the management console.
  1. Click the Reports tab.
  1. From the Sites drop-down menu, select the site for which you want to generate the report.

  1. From the Report drop-down menu, select the report you want to generate.

The following table describes all the reporting options.

DATA FIELD

REPORT 

DESCRIPTION

CHART TYPES

TIME PERIODS

Agent Version Spread

Shows which version of the Webroot Secure Anywhere agent each Endpoint device is using.

Bar, Column, Pie

N/A

All Threats Seen

Locates detected threats. This report lists threats by file name, along with when and where SecureAnywhere detected them.

Spreadsheet

Use the Date Picker from the Period drop-down menu to select a date range anywhere from the last seven days to the last 90 days. Additionally, you can create a custom date range.

All Undetermined Software Seen

Locates files classified as Undetermined, which displays legitimate, but also exhibits questionable behavior, typically executable files, that cannot be classified as either safe or as malware.

Spreadsheet

Use the Date Picker from the Period drop-down menu to select a date range anywhere from the last seven days to the last 90 days. Additionally, you can create a custom date range.

Attention Required

Provides a list of all Endpoint devices that have been determined as secure, and a list of those that require attention.

Bar, Column, Pie

N/A

Device Activations

Provides a list of all Endpoint devices that have been activated during the time period that you selected.

Area, Area Spline, Bar, Column, Line, Spline

24h, 1 day, 2 days, 3 days, 7 days, 14 days, 30 days, 60 days,
 90 days

Device Type

Provides a list of the number of Endpoint devices that are PCs or Macs.

Bar, Column, Pie

N/A

Devices Needing Attention

Displays a list of devices that have the status of Needs Attention.

List

24h, 1 day, 2 days, 3 days, 7 days, 14 days, 30 days, 60 days,
 90 days

Devices With Threats Seen On Last Scan

Displays threats by endpoint location. From the report, you can change the endpoint's policy, run a scan, create an override for a file, or restore a file from quarantine.

Spreadsheet

Use the Date Picker from the Period drop-down menu to select a date range anywhere from the last seven days to the last 90 days. Additionally, you can create a custom date range.

Devices With Undetermined Software On Last Scan

Locates devices with files classified as Undetermined, which displays legitimate, but also exhibits questionable behavior, typically executable files, that cannot be classified as either safe or as malware.

Spreadsheet

Use the Date Picker from the Period drop-down menu to select a date range anywhere from the last seven days to the last 90 days. Additionally, you can create a custom date range.

Endpoint Status

Shows the number of clean Endpoint devices, and the number of infected Endpoint devices on your sites.

Bar, Column, Pie

N/A

Expired Status

Shows the number of Endpoint devices that are Active, and the number of Endpoint devices that have an Expired state.

Bar, Column, Pie

N/A

Firewall Status

Shows which of your Endpoint Devices have the Firewall option:

  • Disabled
  • Enabled
  • Unsupported

Bar, Column, Pie

N/A

Identity Shield Status

Shows how many of your Endpoint Devices have the Identity Shield option:

  • Disabled
  • Enabled

Bar, Column, Pie

N/A

Infrared Status

Shows which of your Endpoint devices have the Enable Webroot Infrared option:

  • Disabled
  • Enabled
  • Unsupported

Bar, Column, Pie

N/A

Installation Status

Shows which of your Endpoint devices have the Webroot Secure Anywhere product installed and which ones have had the product uninstalled.

Bar, Column, Pie

N/A

Managed by Policy

Shows how many of your Endpoint devices are being managed by a policy you have created and how many are in an unmanaged state.

Bar, Column, Pie

N/A

Offline Shield Status

Shows how many of your Endpoint devices have the Offline Shield option:

  • Disabled
  • Enabled
  • Unsupported

Bar, Column, Pie

N/A

Operating System Firewall Status

Shows which of your Endpoint devices have an operating system Firewall option:

  • Disabled
  • Enabled
  • Unsupported

Bar, Column, Pie

N/A

Operating System Language

Shows which Operating system language your Endpoint devices are using.

Bar, Column, Pie

N/A

Operating System Platform

Shows which Operating system platform, from 32 bit, 64 bit, or Unknown, that your Endpoint devices are using.

Bar, Column, Pie

N/A

Phishing Shield Status

Shows how many of your Endpoint devices have the Phishing Shield option:

  • Disabled
  • Enabled

Bar, Column, Pie

N/A

Primary Browser

Shows the Primary Web Browser used by each of your Endpoint devices.

Bar, Column, Pie

N/A

Realtime Shield Status

Shows how many of your Endpoint devices have the Realtime Shield option:

  • Disabled
  • Enabled

Bar, Column, Pie

N/A

Remediation Status

Shows how many of your Endpoint devices have the Remediation status:

  • Disabled
  • Enabled

To disable the Remediation status, the Automatically quarantine previously blocked files option, must be turned off.

Bar, Column, Pie

N/A

Report Summary

Provides a number of overall counts that effectively summarize site or deployment information:

  • Number of active devices
  • Number of available seats Endpoints currently needing attention
  • Endpoints which encountered threats (Last ‘n’ days)
  • Total Threats seen (Last ‘n’ days)
  • Number of Endpoints Seen (Last ‘n’ days)
  • Number of Endpoints Not Seen (Last ‘n’ days)
  • Number of Endpoints Seen (All Time)

Bar, Column, Pie

N/A

Rootkit Shield Status

Shows how many of your Endpoint devices have the Rootkit Shield option:

  • Disabled
  • Enabled
  • Unsupported

Bar, Column, Pie

N/A

Scheduled Scans Status

Shows how many of your Endpoint devices have a Scheduled Scan:

  • Disabled
  • Enabled

Bar, Column, Pie

N/A

Silent Mode

Shows how many of your Endpoint devices have the Silent Audit option:

  • Disabled
  • Enabled
  • Unsupported

Bar, Column, Pie

N/A

Threat Detection History

Shows the history over your selected time period, of all threats that have been detected on your Endpoint devices.

Area, Area Spline, Bar, Column, Line, Spline

24h, 1 day, 2 days, 3 days, 7 days, 14 days, 30 days, 60 days, 90 days

USB Shield Status

Shows how many of your Endpoint devices have the USB Shield option:

  • Disabled
  • Enabled
  • Unsupported

Bar, Column, Pie

N/A

Virtual Machine

Shows how many of your Endpoint devices have been classified as Virtual Machines (VMs).

Bar, Column, Pie

N/A

Web Threat Shield Blocked URL History

Displays a history of the URLs that have been blocked by Webroot’s Web Threat Shield.

Spreadsheet

Use the Date Picker from the Period drop-down menu to select a date range anywhere from the last seven days to the last 90 days. Additionally, you can create a custom date range.

Web Threat Shield Blocked URLs

Displays a list of of the URLs that have been blocked by Webroot’s Web Threat Shield.

Spreadsheet

Use the Date Picker from the Period drop-down menu to select a date range anywhere from the last seven days to the last 90 days. Additionally, you can create a custom date range.

Web Threat Shield Status

Shows how many of your Endpoint devices have the Web Threat Shield option:

  • Disabled
  • Enabled

Bar, Column, Pie

N/A

  1. If the report allows you to select a period during which the report should be generated, from the Period drop-down menu, select one of the following periods:
    • Last 24 hours
    • 2 days
    • 3 days
    • 14 days
    • 30 days - This is the default.
    • 60 days
    • 90 days

  1. If the report allows you to use the Date Picker function, from the Period drop-down menu, select one of the following date ranges and click the Apply button:

  1. When you're done, click the Submit button.

The system displays the report in the console in a graphic format.

  1. To display information about the report, click on any of the segments.

  1. In the left panel, click on any site to display additional information about a particular site.

The system displays additional information about that site.

  1. Click on any of the names in the Hostename column to display additional and more specific information about that hostname. Use the scrollbar on the right to view all of the information.

  1. When you're done, you can click the Left arrow to return to the previous view.