Skip to content Skip to main navigation Skip to footer

Reports

  • Adobe (6 Articles)

    This category of reports will display details about Adobe licensing within your Configuration Manager environment.

  • Applications and Packages (4 Articles)

    This category of reports will provide you with information about which Configuration Manager applications and packages were deployed to Configuration Manager clients. This information is useful in order to understand how and when an application and package was deployed to a computer. Once this category of reports is installed, you can also create a collection with all of the computers that have a particular application or program. More details

  • Computer (14 Articles)

    In this category of reports you will find handy information about your computers. This category includes reports that will tell you what user is logged on to what computer and the, “All-in-One Computer View,” report. This report shows you the main details about a computer all in one spot. Everything from hardware details to what software updates are missing to what software is installed.

  • Computer Details (1 Article)

    This category contains one report. The Computer Details report is designed to mimic the beloved old Configuration Manager 2007 ASP Computer Details report in which you could access all computer-specific reports from one place.

  • Configuration Manager Site (17 Articles)

    This category of dashboards and reports will provide you with more details about your Configuration Manager environment. Many of the dashboards and reports in this category are designed to allow a Configuration Manager Administrator to review the health and status of the Configuration Manager environment without having to access the console. These dashboards and reports can be emailed to an Administrator at scheduled times.

  • Dashboard (21 Articles)

    Similar to the Configuration Manager Site category of reports, this category of dashboards and reports will provide you with more details about your Configuration Manager environment. Many of the dashboards and reports are designed to allow the Configuration Manager Administrator to review the health and status of the Configuration Manager environment without having to access the console. Additionally, Administrators can email these dashboards or reports at scheduled times.

  • Endpoint Protection (9 Articles)

    Please note that these Endpoint Protection (EP) reports (formally known as the System Center Endpoint Protection reports) are only intended for use with Configuration Manager 2012 (CM12) or later versions of Configuration Manager (CMCB).

    Several of our clients told us that they would like to see the information collected by EP in an easy-to-read dashboard, so this category of reports goes one step further by giving you the ability to drill through from the dashboard to more detailed reports.

    Many standards such as the Sarbanes-Oxley Act (SOX), Payment Card Industry Data Security Standard (PCI DSS) or the Health Insurance Portability and Accountability Act (HIPAA) require that anti-virus software be installed and up-to-date. These EP reports provide you with the ability to quickly and reliably determine the EP anti-virus status for computers within your environment.

    One of the interesting facts that we learned while creating these reports was that, unlike many other anti-virus software products available on the market, EP uses three different items (Anti-Virus Signature Version, Engine Version, and Client Version) to detect the latest malware. If you have never heard of Client Version (sometimes called Platform Version), you are not alone. Many people are unaware that they need to update the Client Version on all PCs. Client Version is important because it enables up-to-date detection of malware on PCs.

    These reports are meant to quickly help IT administrators and security teams understand their EP status.

  • ER Base Report (1 Article)

    This category contains a report that will provide error results for ER-Computer and ER-User programs. Once this category of reports is installed, you can also create a collection with all of the computers that have a particular application or program. More details

  • Local Accounts and Groups (9 Articles)

    This category of reports provides details about local accounts on each computer as well as the membership of each local security group. This is particularly useful when performing a security audit of all computers within your Configuration Manager environment.

    Once this category of reports is installed, you can also create a collection with all of the computers that have a specific local account or are members of a particular group. This is useful if you want to use Configuration Manager to remove or change an account or group. Please see Creating Configuration Manager Collections for more details.

    Note: Due to the size of data on a Domain Controller, it will not be inventoried and, therefore, it will NOT report any data within these reports. However, Domain Controllers will be inventoried by the Configuration Manager Active Directory (AD) discovery tasks.

  • Mapped Drives (10 Articles)

    This category of reports provides details about user-mapped network drives. This information is useful when you need to audit who has connected to which network shares. Once this category of reports is installed, you can also create a collection with all of the computers that have a particular mapped drive. More details

  • Mapped Printers (5 Articles)

    This category of dashboards and reports is useful if you need to update the printer driver for a particular printer model. Once this category of reports is installed, you can also create a collection with all of the computers that have, for example, local HP printers installed on them. More details

  • Microsoft Office (11 Articles)

    This category of dashboards and reports provides you with important details about the different versions and applications of Microsoft Office in your environment. This includes Microsoft Office 365 and Microsoft Office Add-ins. These reports also remove duplicate entries to ensure that you have the most accurate count information about your Microsoft Office licenses.

  • Mobile Device (3 Articles)

    This category of dashboards and reports will help you understand what mobile operating systems (OS) exist within your environment. By providing you with a list of all mobile devices you can ensure that only supported devices and OS are connecting to your environment.

  • Monitor - MIR (32 Articles)

    All of the reports and dashboards within this category are from the original Monitor Information Reporting (MIR) Enhansoft product.

  • Network Interface Controllers (6 Articles)

    This category of dashboards and reports will show you how many network interface controllers (NIC) are installed on each computer. This is useful information to have particularly when identifying computers with two or more NIC. In this case, these computers may be connected to two different networks, for example, wired and wireless.

  • Proxy (9 Articles)

    This category of reports is useful if you need to update or troubleshoot proxy setting issues. Once this category of reports is installed, you can also create a collection with all of the computers that have a particular proxy setting. More details

  • Roles and Features (5 Articles)

    These dashboards focus on the roles and features installed on Windows Server computers. This information is useful to know in order to help you inventory or secure each role and feature. For example, with this dashboard, you can identify all servers with Web Servers (IIS) installed. Once located, these servers can be secured.

  • Security (13 Articles)

    This new category of dashboards and reports provides you with information about security-related settings which do not fall under our Endpoint Protection or Software Updates categories.

  • Services (6 Articles)

    Once this category of dashboards and reports is installed, you can see what services are installed on each computer and what user account is used to run each service. This information is useful to know before making any updates to services. You can be proactive by seeing what services on which servers will be affected prior to deleting a service account or changing its password.

    In addition, you can create a collection, once this category of reports is installed, of all the computers that have, for example, local firewall services not started. More details

  • Share (8 Articles)

    Performing a manual audit of all network shares is a time-consuming project, but it may be required in order to become compliant with the Sarbanes-Oxley Act (SOX), Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA) or other standards.

    This category of reports allows for an accurate and efficient review of all shares (shared folders, shared printers, etc.). Knowing this information is helpful in tracking down rogue shares that may not be properly configured or shouldn’t exist in the first place. Routinely reviewing these reports will help reduce risk because administrators can now be more proactive in changing or removing shares as needed.

    To assist in auditing shares, these reports are designed to display the most over-looked areas (workstations) first and progress down to shares (administrative) that are more tightly controlled. Administrative shares may be removed through a filter, where appropriate, in order to restrict the details to a specific system role (workstation or server).

    Once this category of reports is installed, you can also create a collection of all the computers that have a particular share name or share type, for example, installed on them. More details

  • Software Inventory (42 Articles)

    This category of dashboards and reports will provide you with details about your software inventory in order for you to understand it better.

  • Software Updates (21 Articles)

    Not only is it a good business practice to ensure that software updates are applied to each computer, but many standards such as the Sarbanes-Oxley Act (SOX), Payment Card Industry Data Security Standard (PCI DSS), and the Health Insurance Portability and Accountability Act (HIPAA) require that software updates be installed and up-to-date. The following software update reports provide you with the ability to quickly and reliably determine the software update status of computers within your environment.

  • SQL Server (5 Articles)

    This category of reports will provide you with details about SQL Server versions and databases.

    This is useful in order to know what SQL Server databases exist on what computers. For more details on how SQL Server database compatibility affects SQL Server performance, please see our blog post, Does SQL Server Database Compatibility Level Matter?

    Once this category of reports is installed, you can also create a collection of all the computers that have SQL Server, for example, installed on them. More details

  • System Enclosure (8 Articles)

    There are 24 different System Enclosure WMI classes, but unfortunately, there isn’t a built-in SCCM report that will help you figure out the number of desktops, laptops, servers or virtual machines (VMs) in your environment. What if you need to know how may tower servers are running in the datacenter? What if you are moving away from desktops to laptops? If you are, how will you know the number of desktops left in your environment? This series of dashboards and reports will help you understand the system enclosure attributes of your computers.

    Once this category of reports is installed, you can also create a collection with all of the computers that have a particular application or program. More details

  • User Programs (4 Articles)

    This category of reports will help you update or troubleshoot user-installed programs.

    User Account Control (UAC) will prevent non-administrators from installing software in C:\Program Files and C:\Windows. In Windows Vista and above, however, users can install applications with a properly setup MSI file. The application’s MSI file setup installs a virtual copy of C:\Program Files called C:\Programdata. This allows applications such as GoToMeeting, Chrome, Firefox, etc., to be installed by the user without the IT Department’s knowledge.

    Native Configuration Manager tools will not be able to inventory these items, so that is why this category of reports was created. Configuration Manager Administrators can now review security issues involving user-installed software and act where appropriate.

    Once this category of reports is installed, you can also create a collection of all the computers that have a particular user program. More details

  • Volumes (12 Articles)

    This category of reports will help to ensure that adequate disk space exists for each volume. Once this category of reports is installed, you can also create a collection of all the computers that have a particular volume setting. More details

There are no articles.