Reports

Syxsense reports are the result of decades of work with customers and therefore you won't need to edit them in most cases, as they show all the information you need and are compliant with all possible regulations.

The reports show information from the inventory, which is updated once a day in response to a device's request to a server. You can create Audit, Inventory, and Security reports, grouping different metrics. Audit reports reflect console activity, Inventory reports show the health of the devices, software, and entire environment, and Security reports show system vulnerabilities and other security issues. To select the required report during its creation, you can specify the report category in the drop-down list.

Syxsense also allows you to schedule the creation and sending of reports in the desired format (PDF, CSV, or any other) and set the frequency with which they are sent to a specific email.

Important Information

Reports can be run on-demand or scheduled to email automatically on a schedule.

Some reports include drill-down so you can zoom into the data.

Most columns in data sets are sortable.

Reports can be exported in various formats including PDF, XLS and CSV.

Check the actions taken by a particular userCheck the actions taken by a particular user

View a list of the most common Auditing Reports, showing who has been doing what within the Syxsense console.

Find out about the compliance status of your environmentFind out about the compliance status of your environment

View a list of the Dashboard Reports showing the most affected sites and a number of missing patches that must be deployed.

Check the risk assessment associated with the missing patchesCheck the risk assessment associated with the missing patches

View a list of the most common Patching Reports that are available within the console to run immediately or to schedule on a frequency desired by the user.

Discover the detected security vulnerabilitiesDiscover the detected security vulnerabilities

View a list of the most common Security Reports that show the most critical system vulnerabilities.

Check your devices stateCheck your devices state

View a list of the most common Inventory Reports that help you detect missing software and lack of free disk space.

Examine the results of the deployment tasksExamine the results of the deployment tasks

View a list of the Device Management Reports, showing the upgrade capabilities of Windows-based devices and the software installed to the endpoints.

Receive necessary reports to your email regularlyReceive necessary reports to your email regularly

Learn how to make Scheduled Reports. It is just as easy as scheduling a task.