Creating and viewing encryption reports

24 June 2024

ID 195130

You can generate the following reports:

  • Report on encryption status of managed devices. This report provides details about the data encryption of various managed devices. For example, the report shows the number of devices to which the policy with configured encryption rules applies. Also, you can find out, for instance, how many devices need to be rebooted. The report also contains information about the encryption technology and algorithm for every device.
  • Report on encryption status of mass storage devices. This report contains similar information as the report on the encryption status of managed devices, but it provides data only for mass storage devices and removable drives.
  • Report on rights to access encrypted drives. This report shows which user accounts have access to encrypted drives.
  • Report on file encryption errors. This report contains information about errors that occurred when the data encryption or decryption tasks were run on devices.
  • Report on blockage of access to encrypted files. This report contains information about blocking application access to encrypted files. This report is helpful if an unauthorized user or application tries to access encrypted files or drives.

You can generate any report in the Monitoring & reportingReports section. Alternatively, in the OperationsData encryption and protection section, you can generate the following encryption reports:

  • Report on encryption status of mass storage devices
  • Report on rights to access encrypted drives
  • Report on file encryption errors

To generate an encryption report in the Data encryption and protection section:

  1. Make sure that you enabled the Show data encryption and protection option in the Interface options.
  2. In the main menu, go to OperationsData encryption and protection.
  3. Open the Encrypted drives section to generate the report on encryption status of mass storage devices or the report on rights to access encrypted drives.
  4. Click the name of the report that you want to generate.

The report generation starts.

See also:

Scenario: Configuring network protection

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.