
GFI EndPointSecurity 3 Achieving Results | 37
3.3 Monitoring network activity from a central location
Agents generate activity logs that are stored in an SQL Server database. GFI EndPointSecurity keeps
an audit trail of these logs and provides the information in a set of dashboard views. GFI
EndPointSecurity's extensive dashboard views enable you to monitor network activity in real-time,
allowing the administrator to take immediate action when a security risk is detected. Configure GFI
EndPointSecurity to periodically (daily/weekly/monthly) generate and send reports to IT and
management staff for a full analysis view of endpoint security statuses.
1. Analyze network-wide activity
The sub-tabs provided under the Status and Activity tabs enable you to monitor network activity
from a central location. These tabs provide you with risk assessment, statistics, statuses, activity
logs and deployment information using charts and tables. Refer to the following sections for
information about:
Analyzing risk assessment details
Analyzing statistics
Analyzing status information
Analyzing agent deployment details
Analyzing activity logs.
2. Generate reports based on activity logs generated by agents on the network
GFI EndPointSecurity contains an extensive list of reports that can be used as they are, or even
modified to further suit your reporting requirements. The ReportPack contains both technical
reports for IT staff as well as executive reports for management purposes. Refer to the following
sections for information about:
Using GFI EndPointSecurity ReportPack
Generating digest reports.
3. Maintain the database backend
GFI EndPointSecurity stores event logs in an SQL Server database. In a large network with a lot of
activity, the size of the database can grow exponentially and read/write performance between
GFI EndPointSecurity and the database may degrade. It is recommended to configure log retention
settings to automatically delete old or unwanted events or even create a new database when the
current one reaches a specific size. Refer to the following sections for information about:
Maintaining the database backend
Using an existing SQL Server instance.
Komentarze do niniejszej Instrukcji