Security Reports

⌘K

Zecurit’s Security Reports module provides in-depth visibility into the security posture of your managed endpoints. From antivirus health to encryption compliance, these reports help IT and security teams stay informed, audit readiness and quickly respond to vulnerabilities.

Below are the four essential security reports included in Zecurit:

1. Anti-Virus Report

This report provides a comprehensive overview of antivirus software installed across devices. It highlights whether protection is enabled, the current license state and the software version in use.

Use Case:

  • Identify devices without antivirus or with expired licenses
  • Ensure protection is enabled across all endpoints
  • Audit AV compliance by user, group, or device

Key Fields:

  • Device Name, Antivirus Name, Protection Status, License Status
  • Version, Manufacturer, AV Path, Logged on User
  • IP Address, FQDN, OS & Platform Details

2. BitLocker Report

Tracks the encryption status of all drives on BitLocker-enabled devices. Each drive is listed as a separate row, detailing protection and lock state.

Use Case:

  • Monitor data encryption compliance per device or group
  • Detect unencrypted or partially protected drives
  • Audit drive lock status and encryption methods

Key Fields:

  • Device Name, Drive Name, Protection Status, Encryption Status
  • Lock Status, Encryption Method, Drive Type
  • Logged on User, IP Address, OS, FQDN, Domain Info

3. TPM Availability Report

Shows Trusted Platform Module (TPM) presence and operational status. Crucial for assessing hardware-level security enablement across devices.

Use Case:

  • Verify TPM availability before deploying security policies
  • Audit hardware readiness for encryption solutions
  • Check activation and enablement of TPM modules

Key Fields:

  • Device Name, Manufacturer, TPM Version & Spec
  • Enable Status, Activation Status, Hardware Name
  • Logged on User, IP Address, OS, Domain Details

4. Windows Firewall Status Report

Summarizes the firewall status on each device, including domain, standard and public profiles. Also details software version and vendor.

Use Case:

  • Ensure firewall is enabled and running on all endpoints
  • Detect profile-specific configuration gaps
  • Audit firewall software version and consistency

Key Fields:

  • Device Name, Firewall Name, Protection Status, Version
  • Domain/Standard/Public Profile Status
  • Manufacturer, Path, Logged on User, OS, IP, FQDN

How can we help?