Pre-built Reports

⌘K

Zecurit provides a rich collection of pre-built reports designed to offer quick, actionable insights into your device inventory, software, security posture, licensing, user activity, and enrollment status. These reports are automatically generated and updated based on demand and scheduled scans, enabling administrators to stay informed and proactive.

This page provides an overview of all available reports, grouped by category, along with common use cases.

Security Reports

These reports help assess your organization’s endpoint security posture and highlight risks related to device protection and compliance.

ReportUse Case
Antivirus Status OverviewIdentify devices without antivirus, outdated definitions, or disabled protection. Critical for ensuring endpoint security across the organization.
BitLocker DetailsMonitor disk encryption status across all devices to maintain data protection compliance (e.g., GDPR, HIPAA).
Windows Firewall Status ReportDetect devices where the Windows Firewall is disabled, helping you reduce the attack surface.
TPM Availability ReportList devices with or without Trusted Platform Module (TPM), essential for enabling encryption and secure boot features.

Hardware Reports

These reports offer insights into hardware distribution, resource usage, and aging infrastructure.

ReportUse Case
Devices Organized By TypeView devices grouped as desktops, laptops, servers, etc., useful for inventory audits.
Devices Classified By Disk UsageIdentify systems running low on disk space to proactively manage storage needs.
Devices Segmented By AgeMonitor the lifecycle and aging of devices to plan for timely replacements.
Devices Categorized By ManufacturerUnderstand hardware vendor distribution to standardize purchases or assess vendor performance.
Devices Sorted By Memory UsageSpot under-provisioned or over-utilized systems by analyzing RAM usage.
Devices Grouped By OSView operating system spread across your network (e.g., Windows 10 vs 11), useful for OS migration planning.

Software Reports

These reports help in software compliance, audit readiness, and reducing exposure to unauthorized applications.

ReportUse Case
Prohibited Software ReportDetect installations of blacklisted applications like torrent clients or unauthorized remote access tools.
Device Compliance With Specific SoftwareCheck whether required software (e.g., antivirus, VPN client) is installed on all relevant devices.
Software Grouped By ManufacturerUnderstand software vendor dependency and simplify license negotiations.
Recently Installed SoftwareMonitor new or suspicious installations, useful for threat hunting and change control.
User Specific Software ReportView the list of software used by specific users — ideal for license optimization and audit trails.

License Reports

These reports provide an overview of software license usage, compliance, financial impact, and vendor efficiency.

ReportUse Case
Expired License Impact ReportIdentify software that is running on expired licenses and its impact on compliance.
Financial Analysis ReportAnalyze license costs, enabling IT to assess ROI and reduce overspending.
License Compliance ReportDetect overuse or underuse of licenses and ensure alignment with procurement.
License Inventory ReportMaintain an up-to-date list of all purchased and installed licenses.
License Renewal And Expiry ReportTrack upcoming renewals to avoid compliance risks or service interruptions.
License Utilization ReportEvaluate how many licenses are actively used to optimize procurement and avoid shelfware.
Software License Key Management ReportKeep track of all software keys to simplify reinstallation and audits.
Vendor Performance ReportReview software reliability, usage, and compliance by vendor to evaluate partnerships.

Certificate Reports

These reports track SSL, code-signing, and other digital certificates to avoid security gaps and expired certs.

ReportUse Case
Certificate By Key SizeIdentify certificates with weak keys (e.g., <2048 bits) that pose security risks.
Certificate Grouped By IssuerUnderstand certificate authority distribution across your systems.
Certificate With Weak AlgorithmDetect certificates using deprecated algorithms (e.g., SHA-1) and replace them.
Certificates Used For Code SigningMonitor critical code-signing certificates used for internal software or agents.
Expired CertificateQuickly locate and replace expired certs to prevent system/application failures.
Self-Signed CertificateList systems using self-signed certs, often considered a compliance risk.
Soon-To-Expire CertificateTake action before critical certificates expire and disrupt services.

User Logon Reports

These reports help you track user activity across domain and non-domain systems, supporting security and audit needs.

ReportUse Case
Computer With No User LogonDetect unused or dormant devices that can be decommissioned or investigated.
Currently Logged On ComputersGet a real-time view of active user sessions for operational monitoring.
Currently Logged On UserTrack where a specific user is logged in — useful for investigations or IT support.
Domain Controller With Reported UsersView which domain controllers users are authenticating against.
User Logon HistoryAudit login activity of individual users over time for anomaly detection.
User Logon History By ComputersSee how many users accessed a specific system and when.
User Logon History On Domain ControllerIdentify user activity on specific domain controllers for load balancing and security.

Enrollment Reports

These reports give visibility into how devices were added to Zecurit and highlight agent health and coverage gaps.

ReportUse Case
Devices By Enrollment MethodAnalyze which onboarding methods (e.g., manual, domain, Azure) are being used.
Devices Not Contacted ReportIdentify devices that haven’t checked in recently — may be offline or decommissioned.
Devices With Outdated Agent VersionsSpot endpoints running old versions of the Zecurit Agent for update planning.
Inactive Or Retired DevicesTrack devices that are no longer active but still exist in inventory.
Recently Enrolled DevicesAudit new device additions to validate compliance and proper configuration.

Best Practices

  • Schedule frequent reviews of Security and License reports for compliance.
  • Automate delivery of reports via the Scheduled Reports section.
  • Export reports in CSV or PDF for audits, reviews, or management updates.
  • Use filters within each report for focused analysis (e.g., per group, OS, or department).

Articles

How can we help?