Zecurit provides a rich collection of pre-built reports designed to offer quick, actionable insights into your device inventory, software, security posture, licensing, user activity, and enrollment status. These reports are automatically generated and updated based on demand and scheduled scans, enabling administrators to stay informed and proactive.
This page provides an overview of all available reports, grouped by category, along with common use cases.
Security Reports
These reports help assess your organization’s endpoint security posture and highlight risks related to device protection and compliance.
| Report | Use Case |
|---|---|
| Antivirus Status Overview | Identify devices without antivirus, outdated definitions, or disabled protection. Critical for ensuring endpoint security across the organization. |
| BitLocker Details | Monitor disk encryption status across all devices to maintain data protection compliance (e.g., GDPR, HIPAA). |
| Windows Firewall Status Report | Detect devices where the Windows Firewall is disabled, helping you reduce the attack surface. |
| TPM Availability Report | List devices with or without Trusted Platform Module (TPM), essential for enabling encryption and secure boot features. |
Hardware Reports
These reports offer insights into hardware distribution, resource usage, and aging infrastructure.
| Report | Use Case |
|---|---|
| Devices Organized By Type | View devices grouped as desktops, laptops, servers, etc., useful for inventory audits. |
| Devices Classified By Disk Usage | Identify systems running low on disk space to proactively manage storage needs. |
| Devices Segmented By Age | Monitor the lifecycle and aging of devices to plan for timely replacements. |
| Devices Categorized By Manufacturer | Understand hardware vendor distribution to standardize purchases or assess vendor performance. |
| Devices Sorted By Memory Usage | Spot under-provisioned or over-utilized systems by analyzing RAM usage. |
| Devices Grouped By OS | View operating system spread across your network (e.g., Windows 10 vs 11), useful for OS migration planning. |
Software Reports
These reports help in software compliance, audit readiness, and reducing exposure to unauthorized applications.
| Report | Use Case |
|---|---|
| Prohibited Software Report | Detect installations of blacklisted applications like torrent clients or unauthorized remote access tools. |
| Device Compliance With Specific Software | Check whether required software (e.g., antivirus, VPN client) is installed on all relevant devices. |
| Software Grouped By Manufacturer | Understand software vendor dependency and simplify license negotiations. |
| Recently Installed Software | Monitor new or suspicious installations, useful for threat hunting and change control. |
| User Specific Software Report | View the list of software used by specific users — ideal for license optimization and audit trails. |
License Reports
These reports provide an overview of software license usage, compliance, financial impact, and vendor efficiency.
| Report | Use Case |
|---|---|
| Expired License Impact Report | Identify software that is running on expired licenses and its impact on compliance. |
| Financial Analysis Report | Analyze license costs, enabling IT to assess ROI and reduce overspending. |
| License Compliance Report | Detect overuse or underuse of licenses and ensure alignment with procurement. |
| License Inventory Report | Maintain an up-to-date list of all purchased and installed licenses. |
| License Renewal And Expiry Report | Track upcoming renewals to avoid compliance risks or service interruptions. |
| License Utilization Report | Evaluate how many licenses are actively used to optimize procurement and avoid shelfware. |
| Software License Key Management Report | Keep track of all software keys to simplify reinstallation and audits. |
| Vendor Performance Report | Review software reliability, usage, and compliance by vendor to evaluate partnerships. |
Certificate Reports
These reports track SSL, code-signing, and other digital certificates to avoid security gaps and expired certs.
| Report | Use Case |
|---|---|
| Certificate By Key Size | Identify certificates with weak keys (e.g., <2048 bits) that pose security risks. |
| Certificate Grouped By Issuer | Understand certificate authority distribution across your systems. |
| Certificate With Weak Algorithm | Detect certificates using deprecated algorithms (e.g., SHA-1) and replace them. |
| Certificates Used For Code Signing | Monitor critical code-signing certificates used for internal software or agents. |
| Expired Certificate | Quickly locate and replace expired certs to prevent system/application failures. |
| Self-Signed Certificate | List systems using self-signed certs, often considered a compliance risk. |
| Soon-To-Expire Certificate | Take action before critical certificates expire and disrupt services. |
User Logon Reports
These reports help you track user activity across domain and non-domain systems, supporting security and audit needs.
| Report | Use Case |
|---|---|
| Computer With No User Logon | Detect unused or dormant devices that can be decommissioned or investigated. |
| Currently Logged On Computers | Get a real-time view of active user sessions for operational monitoring. |
| Currently Logged On User | Track where a specific user is logged in — useful for investigations or IT support. |
| Domain Controller With Reported Users | View which domain controllers users are authenticating against. |
| User Logon History | Audit login activity of individual users over time for anomaly detection. |
| User Logon History By Computers | See how many users accessed a specific system and when. |
| User Logon History On Domain Controller | Identify user activity on specific domain controllers for load balancing and security. |
Enrollment Reports
These reports give visibility into how devices were added to Zecurit and highlight agent health and coverage gaps.
| Report | Use Case |
|---|---|
| Devices By Enrollment Method | Analyze which onboarding methods (e.g., manual, domain, Azure) are being used. |
| Devices Not Contacted Report | Identify devices that haven’t checked in recently — may be offline or decommissioned. |
| Devices With Outdated Agent Versions | Spot endpoints running old versions of the Zecurit Agent for update planning. |
| Inactive Or Retired Devices | Track devices that are no longer active but still exist in inventory. |
| Recently Enrolled Devices | Audit new device additions to validate compliance and proper configuration. |
Best Practices
- Schedule frequent reviews of Security and License reports for compliance.
- Automate delivery of reports via the Scheduled Reports section.
- Export reports in CSV or PDF for audits, reviews, or management updates.
- Use filters within each report for focused analysis (e.g., per group, OS, or department).