5.1 Understanding Report Results

When you run a security check or policy template, the resulting report provides a snapshot of each endpoint’s condition at the time you ran the check or template. The results include discovered configuration violations and a risk score for each selected endpoint for each applicable security check run. Secure Configuration Manager calculates the risk score based on two factors: the threat level of the discovered violations and the importance of the asset to the company. For more information about endpoint importance, see Section 2.5.2, Assigning Importance to Endpoints. For more information about scoring, see Section 6.3, Understanding Risk Scoring.

NOTE:When you assign importance levels to all endpoints, the weighted report results help you identify which computers have the most serious exposures and need remedial attention first.

You can view and print the report results. Secure Configuration Manager places the completed report in the Completed jobs queue. You can use the printed reports for presenting compliance status results or as a remediation checklist. When you view a completed report, the Report Viewer opens in the Report Summary view. This view gives you a thorough overview of the report, providing you with important information such as the endpoints with the highest risk scores, and the most frequently violated security checks.

Once you have completed security check and policy template runs, you can use the available evaluation tools to assess compliance trends and report asset compliance to auditors and management. You can also use the delta report function to identify changes in your environment and determine which endpoints need to be updated.