+ All Categories
Home > Documents > Categories Administrative Security Categories 57 Hidden Categories 2

Categories Administrative Security Categories 57 Hidden Categories 2

Date post: 12-Sep-2021
Category:
Upload: others
View: 3 times
Download: 0 times
Share this document with a friend
52
Categories Administrative Security Categories 57 Alerts Hidden Categories 2 Asset Intelligence Total 59 Client Push Client Status Total Reports 541 Compliance and Settings Management Device Management Driver Management Endpoint Protection Hardware - CD-ROM Hardware - Disk Hardware - General Hardware - Memory Hardware - Modem Hardware - Network Adapter Hardware - Processor Hardware - SCSI Hardware - Sound Card Hardware - Video Card Migration Network Network Access Protection Operating System Out Of Band Management Power Management Replication Traffic Site - Client Information Site - Discovery and Inventory Information Site - General Site - Server Information Software - Companies and Products Software - Files Software Distribution - Application Monitoring Software Distribution - Collections Software Distribution - Content Software Distribution - Package and Program Deployment Software Distribution - Package and Program Deployment Status Software Metering Software Updates - A Compliance Software Updates - B Deployment Management Software Updates - C Deployment States Software Updates - D Scan Software Updates - E Troubleshooting State Migration Status Messages Status Messages - Audit
Transcript
Page 1: Categories Administrative Security Categories 57 Hidden Categories 2

Categories

Administrative Security Categories 57

Alerts Hidden Categories 2

Asset Intelligence Total 59

Client Push

Client Status Total Reports 541

Compliance and Settings Management

Device Management

Driver Management

Endpoint Protection

Hardware - CD-ROM

Hardware - Disk

Hardware - General

Hardware - Memory

Hardware - Modem

Hardware - Network Adapter

Hardware - Processor

Hardware - SCSI

Hardware - Sound Card

Hardware - Video Card

Migration

Network

Network Access Protection

Operating System

Out Of Band Management

Power Management

Replication Traffic

Site - Client Information

Site - Discovery and Inventory Information

Site - General

Site - Server Information

Software - Companies and Products

Software - Files

Software Distribution - Application Monitoring

Software Distribution - Collections

Software Distribution - Content

Software Distribution - Package and Program Deployment

Software Distribution - Package and Program Deployment Status

Software Metering

Software Updates - A Compliance

Software Updates - B Deployment Management

Software Updates - C Deployment States

Software Updates - D Scan

Software Updates - E Troubleshooting

State Migration

Status Messages

Status Messages - Audit

Page 2: Categories Administrative Security Categories 57 Hidden Categories 2

Task Sequence - Deployment Status

Task Sequence - Deployments

Task Sequence - Progress

Task Sequence - References

Upgrade Assessment

Upgrade Assessment - Windows 7

User - Device Affinity

User Data and Profiles Health

Users

Virtual Applications

Wake On LAN

Page 3: Categories Administrative Security Categories 57 Hidden Categories 2

Details

1. Administrative Security

Administration activity log

This report shows the log of administrative changes made for administrative users, security roles, security

Administrative users security assignments

This report shows administrative users, their associated security roles, and the security scopes associated with

Objects secured by a single security scope

This report shows objects that are secured by the selected security scope and that are assigned to only to this

security scope. Because this report does not display objects that are assigned to two or more security scopes, it

Security for a specific or multiple Configuration Manager objects

This report shows securable objects, the security scopes associated with the objects, and which administrative

Security roles summary

This report shows security roles and which Configuration Manager administrative users are associated with each

Security scopes summary

This report shows security scopes and which Configuration Manager administrative users and security groups

2. Alerts

Alert scorecard

This report displays a summary of all postponed alerts that were generated between the specified start and

Alerts Generated Most Often

This report displays a summary of those alerts that were generated most often from today back to the specified

3. Asset Intelligence

Hardware 01A - Summary of computers in a specific collection

This reports provides an asset manager summary view of a collection of computers.

Hardware 03A - Primary computer users

This report lists users and the count of computers on which they are the primary user.

Hardware 03B - Computers for a specific primary console user

List all computers for which a specified user is the primary console user.

Hardware 04A - Computers with multiple users (shared)

Lists computers that do not seem to have a primary user because no one user has a % console login time

Hardware 05A - Console users on a specific computer

The report displays all of the console users on a specific computer.

Hardware 06A - Computers for which console users could not be determined

This report helps administrators identify systems that need to have security logging turned on.

Page 4: Categories Administrative Security Categories 57 Hidden Categories 2

Hardware 07A - USB devices by manufacturer

This report groups the USB devices by their manufacturer.

Hardware 07B - USB devices by manufacturer and description

This report groups the USB devices by their manufacturer and description.

Hardware 07C - Computers with a specific USB device

Displays all the computers with a given USB device.

Hardware 07D - USB devices on a specific computer

This report lists all the USB devices on a specific computer.

Hardware 08A - Hardware that is not ready for a software upgrade

This report shows hardware that does not meet the minimum hardware requirements.

Hardware 09A - Search for computers

This reports provides an asset manager summary of computers matching keyword filters on computer name,

ConfigMgr site, domain, top console user, operating system, manufacturer, or model.

Hardware 10A - Computers in a specified collection that have changed during a specified timeframe

Displays a list of computers in a specified collection where a hardware class has changed during a specified

Hardware 10B - Changes on a specified computer within a specified timeframe

Displays the classes that have changed on a specified computer within a specified timeframe. (Change Type

License 01A - Microsoft Volume License ledger for Microsoft license statements

Displays an inventory of all Microsoft software titles that are available from the Microsoft Volume Licensing

License 01B - Microsoft Volume License ledger item by sales channel

This report identifies sales channel for inventoried Microsoft Volume License software. Channel Code

License 01C - Computers with a specific Microsoft Volume License ledger item and sales channel

This report identifies which computers have a specific item from the Microsoft Volume license ledger. Channel

License 01D - Microsoft Volume License ledger products on a specific computer

This report identifies all Microsoft Volume license ledger items on a specific computer. Channel Code

License 02A - Count of licenses nearing expiration by time ranges

The products listed here are those which have their licenses managed by the Software Licensing Service.

Accuracy of install quantities and license information may vary given complex dependencies and limitations. Do

License 02B - Computers with licenses nearing expiration

This report will show the specific computers that are nearing expiration. License Status

License 02C - License information on a specific computer

The products listed here are those which have their licenses managed by the Software Licensing Service. License

License 03A - Count of licenses by license status

The products listed here are those which have their licenses managed by the Software Licensing Service. License

License 03B - Computers with a specific license status

The products listed here are those which have their licenses managed by the Software Licensing Service. License

License 04A - Count of products managed by software licensing

The products listed here are those which have their licenses managed by the Software Licensing Service.

Accuracy of install quantities and license information may vary given complex dependencies and limitations. Do

License 04B - Computers with a specific product managed by Software Licensing Service

The products listed here are those which have their licenses managed by the Software Licensing Service.

Accuracy of install quantities and license information may vary given complex dependencies and limitations. Do

License 05A - Computers providing Key Management Service

Lists computers acting as Key Management Servers. Accuracy of install quantities and license information may

vary given complex dependencies and limitations. Do not rely solely on these reports for determining your

License 06A - Processor counts for per-processor licensed products

Page 5: Categories Administrative Security Categories 57 Hidden Categories 2

This report provides the number of processors on computers using Microsoft products that support per-

processor licensing. Accuracy of install quantities and license information may vary given complex dependencies

License 06B - Computers with a specific product that supports per-processor licensing

This report provides a list of computers where a specific Microsoft product that supports per-processor licensing

is installed. Accuracy of install quantities and license information may vary given complex dependencies and

License 14A - Microsoft Volume Licensing reconciliation report

This report provides reconciliation on software licenses purchased through Microsoft Volume License

Agreement and the actual inventory count. Accuracy of install quantities and license information may vary given

License 14B - List of Microsoft software inventory not found in MVLS

This report displays Microsoft software titles in use that are not found in the Microsoft Volume License

Agreement. Accuracy of install quantities and license information may vary given complex dependencies and

License 15A - General license reconciliation report

This report provides reconciliation on general software licenses purchased and the actual inventory count.

Accuracy of install quantities and license information may vary given complex dependencies and limitations. Do

License 15B - General license reconciliation report by computer

This report lists computers which installed the licensed product with a specific version.

Software 01A - Summary of installed software in a specific collection

This report provides a summary of installed software ordered by the number of instances found from inventory.

Software 02A - Product families for a specific collection

This report lists the product families and the count of software in the family for a specific collection.

Software 02B - Product categories for a specific product family

This report lists the product categories in a specific product family and the count of software within the

category. This report is linked to Software 02C - Software in a specific product family and category.

Software 02C - Software in a specific product family and category

This report lists all software that is in the specified product family and category. This report is linked to Software

Software 02D - Computers with specific software installed

This report lists all computers with specific software installed. This report is linked to Software 02E - Installed

Software 02E - Installed software on a specific computer

This report lists all software installed on a specific computer.

Software 03A - Uncategorized software

This report lists the software that is either categorized as unknown or has no categorization.

Software 04A - Software configured to automatically run on computers

Displays a list of software configured to automatically run on computers.

Software 04B - Computers with specific software configured to automatically run

Displays all computers with specific software configured to automatically run.

Software 04C - Software configured to automatically run on a specific computer

Displays installed software configured to automatically run on a specific computer.

Software 05A - Browser Helper Objects

This report displays the Browser Helper Objects installed on computers in a specific collection.

Software 05B - Computers with a specific Browser Helper Object

Displays all of the computers with a specific Browser Helper Object.

Software 05C - Browser Helper Objects on a specific computer

Displays all Browser Helper Objects on the specific computer.

Software 06A - Search for installed software

This report provides a summary of installed software ordered by the number of instances based on search

Software 06B - Software by product name

This report provides a summary of installed software ordered by the number of instances based on selected

Page 6: Categories Administrative Security Categories 57 Hidden Categories 2

Software 07A - Recently used executable programs by the count of computers

This report displays executable programs that have been used recently with a count of computers on which they

have been used. The Software Metering client must be enabled for this site to view this report.

Software 07B - Computers that recently used a specified executable program

This report displays the computers on which a specified executable program has recently been used when you

Software 07C - Recently used executable programs on a specified computer

This report displays executables that have been used recently on a specified computer when you enable the

Software 08A - Recently used executable programs by the count of users

This report displays executable programs that have been used recently with a count of users that have most

recently used them when you enable the software metering client setting.

Software 08B - Users that recently used a specified executable program

This report displays the users that have most recently used a specified executable program when you enable the

Software 08C - Recently used executable programs by a specified user

This report displays executable programs that have been used recently by a specified user when you enable the

Software 09A - Infrequently used software

This report displays software titles that have not been used during a specified period of time. You can specify a

value that will represent the number of days that have elapsed since the last use (e.g. if you enter 90 days, you

will see software that was not used in the past 90 days or more). You can also leave the Days not used field

Software 09B - Computers with infrequently used software installed

This report displays computers which have software installed that has not been used for a specified period of

time. The specified period of time is based on the value specified in the 'Software 09A - Infrequently used

Software 10A - Software titles with specific multiple custom labels defined

This report allows you to view software titles based on matching of all selected custom label criteria. Up to

three custom labels can be selected to refine a software title search.

Software 10B - Computers with a specific custom-labeled software title installed

This report shows all computers in this collection, that have the specified custom-labeled software title

Software 11A - Software titles with a specific custom label defined

This report allows you to view software titles based on matching of at least one of the selected custom label

Software 12A - Software titles without a custom label

This report displays all software titles that do not have a custom label defined.

Software 14A - Search for software identification tag enabled software

This report provides the count of installed software with a software identification tag enabled.

Software 14B - Computers with specific software identification tag enabled software installed

This report lists all computers that have installed software with a specific software identification tag enabled.

Software 14C - Installed software identification tag enabled software on a specific computer

This report lists all installed software with a specific software identification tag enabled on a specific computer.

4. Client Push

Client push installation status details

This report provides a detailed status of the client push installation process for all sites. For additional client

installation status information, see reports under "Site - Client Information".

Client push installation status details for a specified site

This report provides a detailed status of the client push installation process for a specified site. For additional

client installation status information, see reports under "Site - Client Information".

Client push installation status summary

This report provides a summary view of the client push installation process for all sites. For additional client

installation status information, see reports under "Site - Client Information".

Client push installation status summary for a specified site

Page 7: Categories Administrative Security Categories 57 Hidden Categories 2

This report provides a summary view of the client push installation process for a specified site. For additional

client installation status information, see reports under "Site - Client Information".

5. Client Status

Client remediation details

This report provides client remediation details for a given collection.

Client remediation summary

This report provides remediation summary for a given collection.

Client status history

This report provides a historical view of the overall client status in the environment.

Client status summary

This report shows the client check results of active clients for a given collection.

Client time to request policy

This report shows the percentage of clients which have requested policy at least once in the last 30 days. Each

day represents a percentage of total clients which have requested policy since the first day in the cycle. This is

useful for determining the time it would take to distribute a policy update to your client population. Client

Clients with failed client check details

This report displays details about clients that client check failed for a specified collection.

Inactive clients details

This report provides a detailed list of inactive clients for a given collection.

6. Compliance and Settings Management

Compliance history of a configuration baseline

Displays the history of the changes in compliance of a configuration baseline for the specified date range.

Compliance history of a configuration item

Displays the history of the changes in compliance of a configuration item for the specified date range.

Details of compliant rules of configuration items in a configuration baseline for an asset

Displays information about the rules that were evaluated as compliant for a specified configuration item for a

Details of conflicting rules of configuration items in a configuration baseline for an asset

Displays information about rules in a configuration item that has been deployed to a specified user or device

that conflict with other rules contained in the same, or another deployed configuration item.

Details of errors of configuration items in a configuration baseline for an asset

Displays information about errors generated by a specified configuration item for a specified device or user.

Details of non-compliant rules of configuration items in a configuration baseline for an asset

Displays information about rules that were evaluated as noncompliant for a specified configuration item, for a

Details of remediated rules of configuration items in a configuration baseline for an asset

Displays information about rules that were remediated by a specified configuration item for a specified device

List of assets by compliance state for a configuration baseline

Lists the devices or users in a specified compliance state following the evaluation of a specified configuration

List of assets by compliance state for a configuration item in a configuration baseline

Lists the devices or users in a specified compliance state following the evaluation of a specified configuration

List of rules conflicting with a specified rule for an asset

Displays a list of rules that conflict with a specified rule for a configuration item deployed to a specified device.

List of unknown assets for a configuration baseline

Displays a list of devices or users that have not yet reported any compliance data for a specified configuration

List of unknown assets for a configuration item

Displays a list of devices or users that have not yet reported any compliance data for a specified configuration

Rules and errors summary of configuration items in a configuration baseline for an asset

Displays a summary of the compliance state of rules and any setting errors for a specified configuration item

Page 8: Categories Administrative Security Categories 57 Hidden Categories 2

Summary compliance by configuration baseline

Displays a summary of the overall compliance of deployed configuration baselines in the hierarchy.

Summary compliance by configuration items for a configuration baseline

Displays a summary of the compliance of configuration items in a specified configuration baseline.

Summary compliance by configuration policies

Displays a summary of the compliance of configuration policies.

Summary compliance of a configuration baseline for a collection

Displays a summary of the overall compliance of a specified configuration baseline deployed to a specified

7. Device Management

All mobile device clients

This reports displays all mobile devices clients. Mobile devices that are discovered by the Exchange Server

Certificate issues on mobile devices that are managed by the Configuration Manager client for Windows CE and

This report contains detailed information about certificate issues on mobile devices that are managed by the

Client deployment failure for mobile devices that are managed by the Configuration Manager client for

This report contains detailed information about deployment failure for mobile devices that are managed by the

Client deployment status details for mobile devices that are managed by the Configuration Manager client for

This report contains summary information for the status of mobile devices that are managed by the

Client deployment success for mobile devices that are managed by the Configuration Manager client for

This report contains detailed information about deployment success for mobile devices that are managed by the

Communication issues on mobile devices that are managed by the Configuration Manager client for Windows

This report contains detailed information about communication issues on mobile devices that are managed by

Compliance status for the mobile devices that are managed by the Exchange Server connector

This report displays a summary of the compliance status with the Default Exchange ActiveSync mailbox policy

for the mobile devices that are managed by the Exchange Server connector.

Count of mobile devices by display configurations

This report displays the number of mobile devices by display settings.

Count of mobile devices by operating system

This report displays the number of mobile devices by operating system.

Count of mobile devices by program memory

This report displays the number of mobile devices by program memory.

Count of mobile devices by storage memory configurations

This report displays the number of mobile devices by storage memory configurations.

Health information for mobile devices that are managed by the Configuration Manager client for Windows CE

This report contains detailed health information for mobile devices that are managed by the Configuration

Health summary for mobile devices that are managed by the Configuration Manager client for Windows CE

This report contains health summary information for mobile devices that are managed by the Configuration

Inactive mobile devices that are managed by the Exchange Server connector

This report displays the mobile devices that are managed by the Exchange Server connector and have not

List of Devices enrolled per user in Windows Intune

This reports lists all devices a user has enrolled in the Windows Intune Subscription.

Local client issues on mobile devices that are managed by the Configuration Manager client for Windows CE

This report contains detailed information about local client issues on mobile devices that are managed by the

Mobile device client information

This report displays information about the mobile devices that have the Configuration Manager client installed.

You can use this report to verify which mobile devices can successfully communicate with a management point.

Mobile device compliance details for the Exchange Server connector

This report displays the mobile device compliance details for a Default Exchange ActiveSync mailbox policy that

Page 9: Categories Administrative Security Categories 57 Hidden Categories 2

Mobile devices by operating system

This report displays the mobile devices by operating system.

Mobile devices that are unmanaged because they enrolled but failed to assign to a site

This report displays the mobile devices that completed enrollment with Configuration Manager and have a

certificate, but failed to complete site assignment. This scenario can occur when the mobile devices have not

contacted a management point that is enabled for mobile devices, or there was a failure after they contacted

Mobile devices with a specific amount of free program memory

This report displays all mobile devices with the specified amount of free program memory.

Mobile devices with a specific amount of free removable storage memory

This report displays all mobile devices with the specified amount of free removable memory.

Mobile devices with certificate renewal issues

This report displays the enrolled mobile devices that failed to renew their certificate. If the certificate is not

renewed before the expiry period, the mobile devices will be unmanaged.

Mobile devices with low free program memory (less than specified KB free)

This report displays the mobile devices for which the program memory is lower than a specified size in KB.

Mobile devices with low free removable storage memory (less than specified KB free)

This report displays the mobile devices for which the removable storage memory is lower than a specified size in

Number of devices enrolled per user in Windows Intune

This report displays users enabled for the Windows Intune subscription and the total number of devices enrolled

Pending wipe request for mobile devices

This report displays the wipe requests that are pending for mobile devices.

Recently enrolled and assigned mobile devices

This report displays mobile devices that recently enrolled with Configuration Manager and successfully assigned

Recently wiped mobile devices

This report shows the list of mobile devices that were recently successfully wiped.

Settings summary for mobile devices that are managed by the Exchange Server connector

This report displays the number of mobile devices that apply the settings for each Default Exchange ActiveSync

mailbox policy that is managed by the Exchange Server connector.

Windows RT Sideloading Keys Detailed Status

This report shows detailed status information for a selected Windows RT sideloading key.

Windows RT Sideloading Keys Summary

This report shows the status of Windows RT sideloading keys.

8. Driver Management

All drivers

This report shows all drivers.

All drivers for a specific platform

This report shows all drivers for a specific platform.

All drivers in a specific boot image

This report shows all drivers in a specific boot image.

All Drivers in a specific category

This report shows all drivers in a specific category.

All Drivers in a specific Package

This report shows all drivers in a specific package.

Categories for a specific driver

This report shows categories for a specific driver.

Computers that failed to install drivers for a specific collection

This report shows computers that failed to install drivers for a specific collection.

Page 10: Categories Administrative Security Categories 57 Hidden Categories 2

Driver catalog matching report for a specific collection

This report shows driver catalog matching report for a specific collection.

Driver catalog matching report for a specific computer

This report shows driver catalog matching report for a specific computer.

Driver catalog matching report for a specific device on a specific computer

This report shows driver catalog matching report for a specific device on a specific computer.

Driver catalog matching report for computers in a specific collection with a specific device

This report shows driver catalog matching report for computers in a specific collection with a specific device.

Drivers that failed to install on a specific computer

This report shows drivers that failed to install on a specific computer.

Supported platforms for a specific Driver

This report shows supported platforms for a specific driver.

9.Endpoint Protection

Antimalware Activity Report

This report shows an overview of antimalware activity.

Antimalware overall status and history

Antimalware Overall Status and History

Computer Malware Details

This report shows details about a particular computer and the list of malware found on it.

Dashboard

Endpoint Protection dashboard 28/11/2012 13

Infected Computers

This report shows a list of computers with a particular threat detected.

Top Users By Threats

This report shows the list of users with the most number of detected threats.

User Threat List

This report shows the list of threats found under a particular user account.

10. Endpoint Protection - Hidden

Antimalware Activity By Action

This report shows antimalware activity broken down by cleaning action.

Computer Endpoint Protection status

Computer Endpoint Protection status

Computer Infection Status Summary

This report shows a summary of remediation activity for a particular collection.

Computer Malware Details

This report shows details about a particular computer and the list of malware found on it.

Computer Malware List

This report shows a list of threats found on a particular computer.

Malware Details

This report shows details about a particular threat and the computers it has been found on.

Top Malware By Computers

This report shows the list of the most frequently found malware.

Top Malware By Severity

This report shows the list of the most severe malware

User Threat List

This report shows the list of threats found under a particular user account.

11. Hardware - CD-ROM

Page 11: Categories Administrative Security Categories 57 Hidden Categories 2

CD-ROM information for a specific computer

Displays information about the CD-ROM drives on a single computer.

Computers for a specific CD-ROM manufacturer

Displays a list of computers that have a CD-ROM drive made by a specified manufacturer.

Count CD-ROM drives per manufacturer

Displays the number of CD-ROM drives inventoried per manufacturer.

History - CD-ROM history for a specific computer

Displays the inventory history for CD-ROM drives on a single computer.

12. Hardware - Disk

Computers with a specific hard disk size

Displays a list of computers that have hard disks of a specified capacity. Use the "Values" button to see a list of

all hard disk sizes currently being reported by your computers.

Computers with low free disk space (less than specified % free)

Displays a list of computers and disks where the disks are low on space. The amount of free space to check for is

Computers with low free disk space (less than specified MB free)

Displays a list of computers and disks where the disks are low on space. The amount of free space to check for is

Count physical disk configurations

Displays the number of hard disks inventoried by disk capacity.

Disk information for a specific computer - Logical disks

Displays summary information about the logical disks on a single computer.

Disk information for a specific computer - Partitions

Displays summary information about the disk partitions on a single computer.

Disk information for a specific computer - Physical disks

Displays summary information about the physical disks on a single computer.

History - Logical disk space history for a specific computer

Displays the inventory history for logical disk drives on a single computer.

13. Hardware - General

Computer information for a specific computer

Displays summary information for a single computer.

Computers in a specific workgroup or domain

Displays a list of computers in a single resource domain or workgroup.

Inventory classes assigned to a specific collection

Display the inventory classes which are assigned to a specific collection.

Inventory classes enabled on a specific computer

Display inventory classes which are enabled on a specific computer.

14. Hardware - Memory

Computers where physical memory has changed

Displays a list of computers where the amount of RAM has changed since the last inventory cycle.

Computers with a specific amount of memory

Displays a list of computers that have a specified amount of RAM (Total Physical Memory rounded to the

Computers with low memory (less than or equal to specified MB)

Displays a list of computers that are low on memory. The amount of memory to check for is specified in MB.

Count memory configurations

Displays the number of computers inventoried by amount of RAM.

Memory information for a specific computer

Displays summary information about the memory on a single computer.

15. Hardware - Modem

Page 12: Categories Administrative Security Categories 57 Hidden Categories 2

Computers for a specific modem manufacturer

Displays a list of computers that have a modem made by a specified manufacturer.

Count modems by manufacturer

Displays the number of modems inventoried per manufacturer.

Modem information for a specific computer

Displays summary information about the modem on a single computer.

16. Hardware - Network Adapter

Computers with a specific network adapter

Displays a list of computers that have a specified network adapter.

Count network adapters by type

Displays the number of inventoried network adapters cards of each type.

Network adapter information for a specific computer

Displays summary information about the network adapters on a single computer.

17. Hardware - Processor

Computers for a specific processor speed

Displays a list of computers that have a processor of a specified speed.

Computers with fast processors (greater than or equal to a specified clock speed)

Displays a list of computers that have processors that run at or faster than a specified clock speed.

Computers with slow processors (less than or equal to a specified clock speed)

Displays a list of computers that have processors that run at or slower than a specified clock speed.

Count processor speeds

Displays the number of computers inventoried by processor speed.

Processor information for a specific computer

Displays summary information about the processors on a single computer.

18. Hardware - SCSI

Computers with a specific SCSI card type

Displays a list of computers that have a specified SCSI card.

Count SCSI card types

Displays the number of inventoried SCSI cards by card type.

SCSI card information for a specific computer

Displays summary information about the SCSI cards on a single computer.

19. Hardware - Sound Card

Computers with a specific sound card

Displays a list of computers that have a specified sound card.

Count sound cards

Displays the number of computers inventoried by sound card type.

Sound card information for a specific computer

Displays summary information about the sound cards on a single computer.

20. Hardware - Video Card

Computers with a specific video card

Displays a list of computers that have a specified video card.

Count video cards by type

Displays a list of all of the video cards installed on your computers along with the number of each type of video

Video card information for a specific computer

Displays summary information about the video cards on a single computer.

21. Migration

Clients in Exclusion List

Page 13: Categories Administrative Security Categories 57 Hidden Categories 2

This report shows clients excluded from migration.

Dependency on a Configuration Manager 2007 collection

This report shows the objects that depend on a Configuration Manager 2007 collection.

Migration Job properties

This report shows the contents of the migration job.

Migration jobs

This report shows the list of migration jobs.

Objects that failed to migrate

This report shows the list of objects that failed to migrate during the last attempt to migrate them.

22. Network

Count IP addresses by subnet

Displays the number of IP addresses inventoried per IP subnet.

IP - All subnets by subnet mask

Displays a list of IP subnets and subnet masks.

IP - Computers in a specific subnet

Displays a list of computers and IP information for a single IP subnet.

IP - Information for a specific computer

Displays summary information about IP on a single computer.

IP - Information for a specific IP address

Displays summary information about a single IP address.

MAC - Computers for a specific MAC address

Displays the computer name and IP address corresponding to a single MAC address.

23. Network Access Protection

Comparison of software updates installed by software update deployments and NAP remediation

The report provides a comparison summary of software updates installed by software update deployments and

Frequency a computer has been in remediation within a specified period

This report displays how often a computer has been remediated within a specified period.

List of computers that installed a specific software update through remediation during a specified period

This reports lists the computers that installed a specific software update through remediation during a specific

List of computers that would be non-compliant based on selected software updates

This reports lists each computer that would be non-compliant based on selected software updates.

List of computers where NAP service could not be detected

This report displays a list of computers where NAP service could not be detected.

List of NAP-eligible computers

This report displays a list of computers where NAP agent is off or state is unknown.

List of Network Access Protection policies

This report lists Network Access Protection policies with their effective dates.

List of non-compliant computers in remediation from last polling interval

This report displays the list of non-compliant computers in remediation with their last known evaluation times.

List of non-compliant computers in remediation within a specified period

This report displays the list of non-compliant computers in remediation within a specified time period.

List of remediation failures for specified time period

This report lists the remediation failures for a specified number of days.

List of software updates installed through remediation

This report lists the software updates installed through remediation for a selected period.

Summary of non-compliant computers in remediation from last polling interval

This report shows a summary of non-compliant computers in remediation from last polling interval.

Page 14: Categories Administrative Security Categories 57 Hidden Categories 2

Summary of non-compliant computers in remediation within a specified period

This report lists a summary of non-compliant computers in remediation within a specified time period.

24. Operating System

Computer operating system version history

Displays the inventory history for the operating system on a single computer.

Computers with a specific operating system

Displays computers with a specific operating system.

Computers with a specific operating system and service pack

Displays computers with a specific operating system and service pack.

Count operating system versions

Displays the number of computers inventoried by operating system.

Count operating systems and service packs

Displays the number of computers inventoried by operating system and service pack combinations.

Services - Computers running a specific service

Displays a list of computers running a specified service.

Services - Computers running Remote Access Server

Displays a list of computers running Remote Access Server.

Services - Services information for a specific computer

Displays summary information about the services on a single computer.

Windows Server computers

Displays a list of computers running Windows Server operating systems.

25. Out Of Band Management

Computers with out of band management controllers

Displays a list of computers that have out of band management controllers.

Out of band management console activity

Displays a list of status messages identifying out of band management console activity.

Status of client out of band management provisioning

Displays a list of computers that have been provisioned for out of band management.

26. Power Management

Power Management - Computer Activity

Displays a graph showing monitor, computer and user activity for a specified collection over a specified time

Power Management - Computer Activity by Computer

Displays a graph showing monitor, computer and user activity for a specified computer on a specified date.

Power Management - Computer Activity Details

Displays a list of the sleep and wake capabilities of computers in the specified collection for a specified date and

Power Management - Computer Details

Displays detailed information about the power capabilities, power settings and power plans applied to a

Power Management - Computer Not Reporting Details

Displays a list of computers not reporting any power activity for a specified date and time.

Power Management - Computers Excluded

Displays a list of computers excluded from the power plan.

Power Management - Computers with Multiple Power Plans

Displays a list of computers with conflicting power settings.

Power Management - Energy Consumption

Displays the total monthly energy consumption (in kWh) for a specified collection over a specified time period.

Power Management - Energy Consumption by Day

Displays the total energy consumption (in kWh) for the last 31 days for a specified collection.

Page 15: Categories Administrative Security Categories 57 Hidden Categories 2

Power Management - Energy Cost

Displays the total monthly energy consumption cost for a specified collection over a specified time period.

Power Management - Energy Cost by Day

Displays the total energy consumption cost for a specified collection over the past 31 days.

Power Management - Environmental Impact

Displays a graph showing carbon dioxide (CO2) emissions generated by a specified collection over a specified

Power Management - Environmental Impact by Day

Displays a graph showing CO2 emissions generated by a specified collection over the past 31 days.

Power Management - Insomnia Computer Details

Displays detailed information about computers that did not sleep or hibernate within a specified time period.

Power Management - Insomnia Report

Displays a list of common causes that prevented computers from sleeping or hibernating and the number of

Power Management - Power Capabilities

Displays the power management capabilities of computers in the specified collection.

Power Management - Power Settings

Displays an aggregated list of power settings used by computers in a specified collection.

Power Management - Power Settings Details

Displays further information about computers selected in the power settings report.

27. Replication Traffic

Global Data Replication Traffic Per Link (line chart)

This report displays total global data replication traffic on a specific link for a specified number of days.

Global Data Replication Traffic Per Link (pie chart)

This report displays total global data replication traffic on a specific link for a specified number of days.

Hierarchy Replication Traffic By Link

This report displays total replication traffic for each link in the hierarchy for a specified number of days.

Hierarchy Top Ten Replication Group’s Traffic Per Link (pie chart)

This report displays the replication traffic for the top ten replication groups across the entire hierarchy identified

Link Replication Traffic

This report displays total replication traffic for all data for a specified number of days.

Replication group traffic per link

This report displays the replication group network traffic over a specific database replication link for a specified

Site Data Replication Traffic Per Link (line chart)

This report displays total site data replication traffic on a specific link for a specified number of days.

Site Data Replication Traffic Per Link (pie chart)

This report displays total site data replication traffic on a specific link for a specified number of days.

Total Hierarchy Replication Traffic (line chart)

This report displays hierarchy aggregate global and site data replication for each direction of every link for a

Total Hierarchy Replication Traffic (pie chart)

This report displays hierarchy aggregate global and site data replication for each direction of every link for a

28. Site - Client Information

Client Assignment Detailed Status Report

This report contains detailed information on client assignment status.

Client Assignment Failure Details

This report contains detailed information on client assignment failures.

Client Assignment Status Details

This report contains overview information on client assignment status.

Client Assignment Success Details

Page 16: Categories Administrative Security Categories 57 Hidden Categories 2

This report contains detailed information on successfully assigned clients.

Client Deployment Failure Report

This report contains detailed information for clients that have failed to deploy.

Client Deployment Status Details

This report contains summary information for the status of client installations.

Client Deployment Success Report

This report contains detailed information for clients that have successfully deployed.

Clients incapable of HTTPS communication

This report displays detailed information about each client in site that has run the HTTPS Communication

Readiness Tool and reported to be incapable of communicating over HTTPS.

Computers assigned but not installed for a particular site

Displays a list of computers that have been assigned to a particular site but are not reporting to that site.

Computers with a specific Configuration Manager client version

Displays a list of computers running a single specified version of the Configuration Manager client software.

Count of clients and protocol used for communication

This report displays summary information about the clients and the protocol used (HTTP/HTTPS) for

Count of clients assigned and installed for each site

This report displays the number of computers assigned and installed for each site. Clients with a network

location associated to multiple sites are only counted as installed if they are reporting to that site.

Count of clients capable of HTTPS communication

This report displays detailed information about each client in site that have run the HTTPS Communication

Readiness Tool and reported to be either capable or incapable of communicating over HTTPS.

Count of clients for each site

This report displays the number of Configuration Manager clients installed by site code.

Count of Configuration Manager clients by client versions

This report displays the number of computers discovered by Configuration Manager client version. (Client type

Problem details reported to the fallback status point for a specified collection

This report displays detailed information for issues reported by clients in a specified collection if they have been

Problem details reported to the fallback status point for a specified site

This report displays detailed information about issues reported by clients in a specified site if they have been

Summary of problems reported to the fallback status point

This report displays information about all the issues reported by clients if they have been assigned a fallback

Summary of problems reported to the fallback status point for a specific collection

This report displays summary information for issues reported by clients in a specified collection if they have

29. Site - Discovery and Inventory Information

Clients that have not reported recently (in a specified number of days)

Displays a list of clients that have not reported discovery data, hardware inventory, or software inventory in a

specified number of days. An empty column indicates that a client has not reported any data of that type. A

Computers discovered by a specific site

Displays a list of all computers discovered by a specific site and the date of the most recent discovery.

Computers discovered recently by discovery method

Displays a list of computers that have been discovered within the specified number of days and lists the agents

that discovered them. A computer may appear more than once in the list if it has been discovered by multiple

Computers not discovered recently (in a specified number of days)

Displays a list of computers that have not been discovered recently, and displays the number of days since they

Computers not inventoried recently (in a specified number of days)

Displays a list of computers that have not been inventoried recently, and displays the last times they were

Page 17: Categories Administrative Security Categories 57 Hidden Categories 2

Computers that might share the same Cinfiguration Manager Unique Identifier

Displays a list of computers that have changed their names. A change in name is a possible symptom that a

computer shares a Configuration Manager Unique Identifier with another computer. 28/11/2012 13

Computers that might share the same Configuration Manager unique identifier

Displays a list of computers that have changed their names. A change in name is a possible symptom that a

computer shares a Configuration Manager Unique Identifier with another computer.

Computers with duplicate MAC addresses

Displays computers that share MAC addresses between them.

Count computers in resource domains or workgroups

Displays the number of computers in each resource domain or workgroup.

Discovery information for a specific computer

Displays a list of the agents and sites that discovered a specific computer.

Inventory dates for a specific computer

Displays the date and time inventory was last run on a single computer.

30. Site - General

Computers in a specific site

Displays a list of Configuration Manager client computers in a specific site.

Site status for the hierarchy

Displays the list of sites in the hierarchy with site version and site status information.

31. Site - Server Information

Site system roles and site system servers for a specific site

Displays a list of system servers and their site system roles for a single site.

32. Software - Companies and Products

All inventoried products for a specific software company

Displays a list of the inventoried software products and versions manufactured by a single specified company.

All software companies

Displays a list of all companies manufacturing inventoried software.

All Windows 8 Applications

This report provides a summary of installed Windows 8 applications ordered by the number of instance based

on search criteria for the application name, architecture, or publisher

Computers with a specific product

Displays a list of the computers that a single specified product is inventoried on, as well as the versions of that

Computers with a specific product name and version

Displays a list of the computers that a single specified version of a product is inventoried on.

Computers with specific software registered in Add Remove Programs

Displays a summary of all computers with specific software registered in Add Remove Programs.

Count all inventoried products and versions

Displays a list of the inventoried software products and versions, and the number of computers each is installed

Count inventoried products and versions for a specific product

Displays a list of the inventoried versions of a single specified product, and the number of computers each is

Count of all instances of software registered with Add or Remove Programs

Displays a summary of all instances of software installed and registered with Add or Remove Programs on

Count of instances of specific software registered with Add or Remove Programs

Displays a count of instances for specific software packages installed and registered in Add or Remove

Installations of specified Windows 8 Application

This report lists all computers with specific Windows 8 application

Products on a specific computer

Page 18: Categories Administrative Security Categories 57 Hidden Categories 2

Displays a summary of the inventoried software products and their manufacturers on a single specified

Software registered in Add Remove Programs on a specific computer

Displays a summary of the software installed on a specific computer that is registered in Add Remove Programs.

Windows 8 Applications installed to the specified user

This report lists all Windows 8 applications installed to the specified user

33. Software - Files

All inventoried files for a specific product

Display a summary of the files inventoried that are associated with a single specified software product.

All inventoried files on a specific computer

Display a summary of all the files inventoried on a single specified computer.

Compare software inventory on two computers

This report will show the differences between the software inventory reported for two selected computers.

Only the discrepancies are shown; if the same file appears on both computers it will not be listed.

Computers with a specific file

Displays a list of the computers where a specified file name appears in the software inventory, as well as

information about inventoried files. A computer may appear more than once in the list if it contains more than

Count computers with a specific file name

Displays the number of computers that a single specified file is inventoried on.

34. Software Distribution - Application Monitoring

All application deployments (advanced)

Displays summary information for all application deployments.

All application deployments (basic)

Displays summary information for all application deployments.

Application Compliance

This report shows compliance information for the selected application within the selected collection. This is an

application level report and may not reflect certain kinds of deployment specific errors, such as deployment

conflicts. Total here represents the total number of machines and users where we're tried to detect the

Application Deployments Per Asset

This report shows applications deployed to the specified device or user.

Application Infrastructure Errors

This report shows application infrastructure errors. These can include internal infrastructure errors as well as

Application Usage Detailed Status

Displays the usage details of the installed applications.

Application Usage Summary Status

Displays the usage summary of the installed applications.

Task Sequence Deployments Containing Application

This report shows task sequence deployments that install a particular application.

User Requests for Android Application

Displays the users who requested to view an Android application

35. Software Distribution - Application Monitoring - Hidden

Application deployment detailed status

Displays detailed status information for a deployment.

Application deployment statistics

Displays statistics about a selected deployment using live data.

Application deployment status

Displays the status details of a deployment.

Application Deployment Type Compliance

Page 19: Categories Administrative Security Categories 57 Hidden Categories 2

This report shows compliance information for deployment types of the selected application within the selected

Application Deployment Type Compliance Details

This report shows asset details compliance information for the selected application deployment type within the

Application Deployment Type Compliance Status

This report shows compliance status information for the selected application deployment type within the

Application Global Expression Details

This report shows setting information for application global expressions.

Application Infrastructure Errors Details

This report shows detailed information for application infrastructure errors. These can include internal

infrastructure errors as well as errors as a result of invalid requirement rules.

Application requirements not met - Dependencies

Displays the dependencies for a given application deployment that have not successfully installed.

Application requirements not met - Details

Displays detailed information about applications that failed to install because their installation requirements

Results For Related Deployment Types

This report shows the status of related dependency and supersedence deployment types for a particular

machine and user. If User is not specified this report shows results for deployment types targeted to the device.

36. Software Distribution - Collections

All collections

This report displays all the collections in the hierarchy.

All resources in a specific collection

This report displays all the resources in a specific collection.

Maintenance windows available to a specified client

This reports lists all maintenance windows that are applicable to the specified client.

37. Software Distribution - Content

All active content distributions

Displays all distributions points on which content is currently being installed or removed.

All content

Displays all applications and packages at a site.

All content on a specific distribution point

Displays all content currently installed on a specified distribution point.

All distribution points

This report displays information about the distribution points for each site.

All status messages for a specific package on a specific distribution point

This report shows all status messages for a specific package on a specific distribution point.

Application content distribution status

This report contains information about the distribution status for application content.

Applications targeted to distribution point group

This report contains information about applications that target a specfic distribution point group.

Applications that are out of synchronization on a specified distribution point group

This report lists the applications for which associated content files have not been updated with the latest

Distribution point group

This reports shows information about a specified distribution point group.

Distribution status of specified package

Displays the distribution status for specified package content on each distribution point.

Packages targeted to distribution point group

This report contains information about packages that target a specific distribution point group.

Page 20: Categories Administrative Security Categories 57 Hidden Categories 2

Packages that are out of synchronization on a specified distribution point group

This report lists the packages for which associated content files have not been updated with the latest version

38. Software Distribution - Package and Program Deployment

All deployments for a specified package and program

Displays all of the deployments of a specified package and program.

All package and program deployments

Displays all of the package and program deployments at this site.

All package and program deployments to a specified collection

Displays all of the package and program deployments to a specified collection.

All package and program deployments to a specified computer

Displays all of the package and program deployments that apply to a specified computer.

All package and program deployments to a specified user

Displays all of the package and program deployments to a specified user.

39. Software Distribution - Package and Program Deployment Status

All system resource package and program deployments with status

Displays all of the package and program deployments for the site along with a summary of the status of each

All system resources for a specified package and program deployment in a specified state

Displays a list of all resources that are in a specific state for a specific package and program deployment. For

example, you can see which resources have successfully run a program being deployed. (Client type

Chart - Hourly package and program deployment completion status

Displays the percentage of targeted computers that have successfully installed the package for every hour since

the package and program deployment was created. It can be used to track the average time for a package and

Package and program deployment status messages for a specified client and deployment

Displays the status messages reported for a particular computer and package and program deployment.

Status of a specified package and program deployment

Displays the status summary of all resources that have been targeted by a package and program deployment.

The summary is in two parts. Acceptance status summarizes how many resources have received, rejected, or not

yet received the package and program deployment. Delivery status will summarize the resources that have run

40. Software Metering

All software metering rules applied to this site

The content in this report is filtered based on RBAC integrated Security. Displays a list of all software metering

Computers that have a metered program installed but have not run the program since a specified date

The content in this report is filtered based on RBAC integrated Security. This report shows all computers that

have a specified metered software program installed as reported by software inventory, but have not run the

Computers that have run a specific metered software program

The content in this report is filtered based on RBAC integrated Security. Displays a list of computers that have

run programs matching the selected software metering rule within the specified month and year.

Concurrent usage for all metered software programs

The content in this report is filtered based on RBAC integrated Security. Displays the maximum number of users

who concurrently ran each metered software program during the specified month and year.

Concurrent usage trend analysis of a specific metered software program

The content in this report is filtered based on RBAC integrated Security. Displays the maximum number of users

who concurrently ran the selected metered software program during each month for the past year.

Install base for all metered software programs

The content in this report is filtered based on RBAC integrated Security. This report shows the number of

computers that have metered software programs installed as reported by software inventory. This report

Software metering summarization progress

Page 21: Categories Administrative Security Categories 57 Hidden Categories 2

The content in this report is filtered based on RBAC integrated Security. This report shows the time at which the

most recently summarized metering data was processed on the site server. Only metering data processed

Time of day usage summary for a specific metered software program

The content in this report is filtered based on RBAC integrated Security. This report will show the average

number of usages of a particular program for the past 90 days, broken down by hour and day.

Total usage for all metered software programs

The content in this report is filtered based on RBAC integrated Security. Displays the number of users who ran

programs matching each software metering rule locally or using Terminal Services within the specified month

Total usage for all metered software programs on Windows Terminal Servers

The content in this report is filtered based on RBAC integrated Security. Displays the number of users who ran

programs matching each software metering rule using Terminal Services within the specified month and year.

Total usage trend analysis for a specific metered software program

The content in this report is filtered based on RBAC integrated Security. Displays the number of users who ran

programs matching the selected software metering rule locally or using Terminal Services during each month for

Total usage trend analysis for a specific metered software program on Windows Terminal Servers

The content in this report is filtered based on RBAC integrated Security. Displays the number of users who ran

programs matching the selected software metering rule using Terminal Services during each month for the past

Users that have run a specific metered software program

The content in this report is filtered based on RBAC integrated Security. Displays a list of users who have run

programs matching the selected software metering rule within the specified month and year.

41. Software Updates - A Compliance

Compliance 1 - Overall compliance

This report returns the overall compliance data for a software update group.

Compliance 2 - Specific software update

This report returns the compliance data for a specified software update.

Compliance 3 - Update group (per update)

This report returns the compliance data for software updates defined in a software update group.

Compliance 4 - Updates by vendor month year

This report returns the compliance data for software updates released by a vendor during a specific month and

year. To limit the amount of information returned, you can specify the software update class and product.

Compliance 5 - Specific computer

This report returns the software update compliance data for a specific computer. To limit the amount of

information returned, you can specify the vendor and software update classification.

Compliance 6 - Specific software update states (secondary)

This report returns the count and percentage of computers in each compliance state for the specified software

update. For best results, start with 'Compliance 2 - Specific software update' and then drill into this report to

Compliance 7 - Computers in a specific compliance state for an update group (secondary)

This report returns all computers in a collection that have a specific overall compliance state against a software

update group. For best results, start with 'Compliance 1 - Overall Compliance' to return the count of computers

in each of the compliance states and then drill into this report to return the computers in the selected

Compliance 8 - Computers in a specific compliance state for an update (secondary)

This report returns all computers in a collection that have a specific compliance state for a software update. For

best results, start with 'Compliance 2 - Specific software update'. Next drill into 'Compliance 6 - Specific software

update states (secondary)' to return the count of computers in each compliance state, and then drill into this

42. Software Updates - B Deployment Management

Management 1 - Deployments of an update group

This report returns all deployments that contain all of the software updates defined in a specified software

Page 22: Categories Administrative Security Categories 57 Hidden Categories 2

Management 2 - Updates required but not deployed

This report returns all vendor-specific software updates that have been detected as required on clients but that

have not been deployed to a specific collection. To limit the amount of information returned, you can specify the

Management 3 - Updates in a deployment

This report returns the software updates that are contained in a specific deployment.

Management 4 - Deployments that target a collection

This report returns all software update deployments that target a specific collection.

Management 5 - Deployments that target a computer

This report returns all software update deployments that target a specific computer.

Management 6 - Deployments that contain a specific update

This report returns all deployments that contain a specific software update and the associated target collection

Management 7 - Updates in a deployment missing content

This report returns the software updates in a specified deployment that do not have all of the associated

content retrieved, preventing clients from installing the update and achieving 100% compliance for the

Management 8 - Computers missing content (secondary)

This report returns all computers that require a specific software update contained in a specific deployment that

is not provisioned on a distribution point. For best results, start with 'Management 7 - Updates in a deployment

missing content' to return all software updates in the deployment that have not been provisioned, and then drill

43. Software Updates - C Deployment States

States 1 - Enforcement states for a deployment

This report returns the enforcement states for a specific software update deployment, which is typically the

second phase of a deployment assessment. For the overall progress of software update installation, use this

States 2 - Evaluation states for a deployment

This report returns the evaluation state for a specific software update deployment, which is typically the first

phase of a deployment assessment. For the overall progress of software update installation, use this report in

States 3 - States for a deployment and computer

This report returns the states for all software updates in the specified deployment for a specified computer.

States 4 - Computers in a specific state for a deployment (secondary)

This report returns all computers in a specific state for a software update deployment. For best results, start

with 'States 1 - Enforcement states for a deployment' or 'States 2 - Evaluation states for a deployment' to

States 5 - States for an update in a deployment (secondary)

This report returns a summary of states for a specific software update targeted by a specific deployment. For

best results, start with 'Management 3 - Updates in a deployment' to return the software updates contained in a

States 6 - Computers in a specific enforcement state for an update (secondary)

This report returns all computers in a specific enforcement state for a specific software update. For best results,

start with 'Management 3 - Updates in a deployment' to return the software updates contained in a specific

deployment, drill into 'States 5 - States for an update in a deployment (secondary)' to return the states for the

States 7 - Error status messages for a computer (secondary)

This report returns all status messages for a given Update or Deployment on a particular Computer for a given

44. Software Updates - D Scan

Scan 1 - Last scan states by collection

This report returns the count of computers for a specific collection in each compliance scan state returned by

Scan 2 - Last scan states by site

This report returns the count of computers assigned to a specific site in each compliance scan state returned by

Scan 3 - Clients of a collection reporting a specific state (secondary)

This report returns all computers for a specific collection and returned a specific compliance scan state during

Scan 4 - Clients of a site reporting a specific state (secondary)

Page 23: Categories Administrative Security Categories 57 Hidden Categories 2

This report returns all computers assigned to a specific site and returned a specific compliance scan state during

45. Software Updates - E Troubleshooting

Troubleshooting 1 - Scan errors

This report returns the scan errors at the site and a count of computers that are experiencing each error.

Troubleshooting 2 - Deployment errors

This report returns the deployment errors at the site and a count of computers that are experiencing each error.

Troubleshooting 3 - Computers failing with a specific scan error (secondary)

This report returns a list of the computers on which scan is failing because of a specific error.

Troubleshooting 4 - Computers failing with a specific deployment error (secondary)

This report returns a list of the computers on which the deployment of update is failing because of a specific

46. State Migration

State migration information for a specific source computer

This report shows state migration information for a specific source computer.

State migration information for a specific state migration point

This report shows state migration information for a specific state migration point.

State migration points for a specific site

This report shows state migration points for a specific site.

47. Status Messages

All messages for a specific message ID

Displays a list of messages with a single message ID.

Clients reporting errors in the last 12 hours for a specific site

Displays a list of computers and components reporting errors in the last 12 hours, and the number of errors

Component messages for the last 12 hours

Displays a list of component messages for the last 12 hours for a specific site code, computer, and component.

Component messages for the last hour

Displays a list of the status messages created in the last hour by a specified component on a specified computer

Component messages for the last hour (for a specific site computer and component)

Displays a list of the status messages created in the last hour by a specified component on a specified computer

Count component messages for the last hour for a specific site

Displays the number of status messages by component and severity reported in the last hour at a single

Count errors in the last 12 hours

Displays the number of server component error status messages in the last 12 hours.

Fatal errors (by component)

Displays a list of computers reporting fatal errors by component.

Fatal errors (by computer name)

Displays a list of computers reporting fatal errors by computer name.

Last 1000 messages for a specific computer (Errors and Warnings)

Displays a summary of the last 1000 error and warning component status messages for a single specified

Last 1000 messages for a specific computer (Errors Warnings and Information)

Displays a summary of the last 1000 error, warning, and informational component status messages for a single

Last 1000 messages for a specific computer (Errors)

Displays a summary of the last 1000 error server component status messages for a single specified computer.

Last 1000 messages for a specific server component

Displays a summary of the most recent 1000 status messages for a single specified server component.

48. Status Messages - Audit

All audit messages for a specific user

Page 24: Categories Administrative Security Categories 57 Hidden Categories 2

Displays a summary of all audit status messages for a single user. Audit messages describe actions taken in the

Configuration Manager Console that add, modify, or delete objects in ConfigMgr. NOTE

Remote Control - All computers remote controlled by a specific user

Displays a summary of status messages indicating remote control of client computers by a single specified user.

Remote Control - All remote control information

Displays a summary of status messages indicating remote control of client computers.

49. Task Sequence - Deployment Status

All system resources for a task sequence deployment in a specific state

This report displays a list of the destination computers for the specified task sequence deployment that is in

All system resources for a task sequence deployment that is in a specific state and that is available to unknown

This report displays a list of the destination computers for the specified task sequence deployment that is in the

Count of system resources that have task sequence deployments assigned but not yet run

This report displays the number of destination computers that have accepted task sequence deployments but

History of a task sequence deployment on a computer

This report displays the status of each step of the specified task sequence deployment on the specified

destination computer. If no record is returned, the task sequence has not started on the computer.

List of computers that exceeded a specific length of time to run a task sequence deployment

This report displays the list of destination computers that exceeded the specified length of time to run a task

sequence. The length of time, in hours, is specified by this report.

List of computers that exceeded a specific length of time to run a task sequence deployment.

This report displays the list of destination computers that exceeded the specified length of time to run a task

sequence. The length of time, in hours, is specified by this report. 28/11/2012 13

Run time for a specific task sequence deployment on a specific destination computer

This report displays the total amount of time that it took to successfully complete the specified task sequence

Run time for each step of a task sequence deployment on a specific destination computer

This report displays the time that it took to complete each step of the specified task sequence deployment on

Status of a specific task sequence deployment for a specific computer

This report shows the status summary of a specific task sequence deployment on a specific computer.

Status of a task sequence deployment on an unknown destination computer

This report displays the status of the specified task sequence deployment on the specified unknown destination

Status of a task sequence deployment on an unknown destination computer.

This report displays the status of the specified task sequence deployment on the specified unknown destination

Status summary of a specific task sequence deployment

This report shows the status summary of all resources that have been targeted by a deployment.

Status summary of a specific task sequence deployment available to unknown computers

This report shows the status summary of all resources that have been targeted by an deployment that is

50. Task Sequence - Deployments

All system resources currently in a specific group or phase of a specific task sequence deployment

This report shows the list of computers that are currently running in a specific group/phase of the specified task

All system resources where a task sequence deployment failed within a specific group or phase

This report shows the list of computers that failed within a specific group/phase of the specified task sequence

All Task Sequence Deployments

This report displays details of all task sequence deployments initiated from this site.

All task sequence deployments available to unknown computers

This report displays details of all the task sequence deployments that are initiated from this site and that are

Count of failures in each phase or group of a specific task sequence

This report displays the number of failures in each phase or group of the specified task sequence.

Page 25: Categories Administrative Security Categories 57 Hidden Categories 2

Count of failures in each phase or group of a specific task sequence deployment

This report displays the number of failures in each phase or group of the specified task sequence deployment.

Deployment status of all task sequence deployments

This report displays the overall progress of all task sequence deployments.

Progress of a running task sequence

This report displays the progress of the specified task sequence.

Progress of a running task sequence deployment

This report displays the progress of the specified task sequence deployment.

Progress of all deployments for a specific task sequence

This report displays the progress of all deployments for the specified task sequence.

Summary report for a task sequence deployment

This report displays the summary information for the specified task sequence deployment.

51. Task Sequence - Progress

Chart - Weekly progress of a task sequence

This report displays the weekly progress of the task sequence starting from the day when it was first deployed.

Progress of a task sequence

This report displays the progress of the specified task sequence.

Progress of all task sequences

This report displays the progress of all task sequences.

Progress of task sequences for operating system deployments

This report shows the progress of all task sequences that deploy operating systems.

Status of all unknown computers

This report displays a list of the computers that were unknown at the time they ran a task sequence deployment

52. Task Sequence - References

Content referenced by a specific task sequence

This report displays content referenced by the specified task sequence.

53. Upgrade Assessment

Application status for a specific computer

This report displays the compatibility of applications that are installed on a computer for a specified operating

Application status for computers in a specific collection

This report displays the overall status for computers in a collection to let you assess them for upgrade to a

specified operating system based on the applications on each computer. Use this report to determine which

Application status summary

This report displays a summary of the application status for a specified operating system. Use this report to

determine application compatibility before you deploy an operating system.

Computers with a specific application installed

This report displays computers with a specific application installed.

Computers with a specific hardware device

This report displays computers that have a specific hardware device.

Hardware device status for a specific computer

This report displays the compatibility status of hardware devices for a specified operating system that are found

Hardware device status for computers in a specific collection

This report displays the overall status for hardware devices for a specified operating system for computers in a

specific collection. Use this report to determine hardware compatibility before you deploy an operating system.

Hardware device status summary

This report displays a summary of hardware device status for a specified operating system. Use this report to

determine hardware device compatibility before you deploy an operating system.

Page 26: Categories Administrative Security Categories 57 Hidden Categories 2

Operating system hardware requirements

This report displays the minimum and recommended hardware criteria for operating systems.

Operating system requirement status for computers in a specific collection

This report displays the status of operating system requirements for the selected operating system for

computers in a specific collection. Use this report to determine if a computer meets the specified operating

Upgrade assessment summary

This report displays the upgrade assessment summary. Use this report to assess the overall status for upgrade

54. Upgrade Assessment - Windows 7

Computers that do not meet the recommended system requirements for Windows 7

Computers which do not meet the Windows 7 minimum hardware requirements for memory, processor speed

Computers that meet the recommended system requirements for Windows 7

Computers which meet the Windows 7 minimum hardware requirements for memory, processor speed and free

Hardware summary for all systems in a collection

This report shows the operating system, memory, hard drive free space and processor speed for each system in

the specified collection, and whether or not each component meets the minimum requirements for upgrading to

55. User - Device Affinity

Pending User Device Affinity Associations By Collection

This report shows all pending User Device Affinity assignments based on usage data, for members of a

User Device Affinity Associations Per Collection

This report shows all User Device Associations for the selected collection, and groups the results by collection

56. User Data and Profiles Health

Folder Redirection Health Report - Details

This report shows the details of health state for folder redirection per each of the redirected folders for a given

Roaming User Profiles Health Report - Details

This report shows the details of health state for roaming user profile for a given user.

User Data and Profiles Health Report - Details

This report shows the details of either error or warning for folder redirection or roaming user profile when

User Data and Profiles Health Report - Summary

This report shows the summary of health states for folder redirection and roaming user profiles.

57. Users

Computers for a specific user name

Displays a list of computers used by a single user.

Count users by domain

Displays the number of users in each domain.

Users in a specific domain

Displays a list of users and their computers in a single user domain.

58. Virtual Applications

App-V Virtual Environment Results

Displays information about a selected virtual environment that is in a specified state for a selected collection.

App-V Virtual Environment Results For Asset

Displays information about a selected virtual environment for a specified asset and any deployment types for

App-V Virtual Environment Status

Displays compliance information for a selected virtual environment for a selected collection. Use the retained

column to discover assets where a previously configured virtual environment is no longer applicable, but has

Computers with a specific virtual application

Summary of computers which have the specified App-V application shortcut as created using the Application

Computers with a specific virtual application package

Page 27: Categories Administrative Security Categories 57 Hidden Categories 2

Summary of computers which have the specified App-V application package.

Count of all instances of virtual application packages

Display a count of detected App-V application packages.

Count of all instances of virtual applications

Display a count of detected App-V applications.

59. Wake On LAN

All computers targeted for Wake On LAN activity

All computers that have been targeted for Wake On LAN activity.

All objects pending wake-up activity

Objects that are scheduled for wakeup.

All sites that are enabled for Wake On LAN

List of all sites in the hierarchy that are enabled for Wake On LAN.

Errors received while sending wake-up packets for a defined period

Errors received while sending wake-up packets to computers for a defined period.

History of Wake On LAN activity

Shows a history of the wakeup activity that has occurred since a certain period.

Wake-Up Proxy Deployment State Details

Displays information about the deployment status of Wake-Up Proxy for each device in a specified collection

Wake-Up Proxy Deployment State Summary

Displays a summary of the deployment status of Wake-Up Proxy in a specified collection

Page 28: Categories Administrative Security Categories 57 Hidden Categories 2

NO

6

4

62

Page 29: Categories Administrative Security Categories 57 Hidden Categories 2
Page 30: Categories Administrative Security Categories 57 Hidden Categories 2
Page 31: Categories Administrative Security Categories 57 Hidden Categories 2

4

Page 32: Categories Administrative Security Categories 57 Hidden Categories 2

7

17

Page 33: Categories Administrative Security Categories 57 Hidden Categories 2

32

Page 34: Categories Administrative Security Categories 57 Hidden Categories 2

13

Page 35: Categories Administrative Security Categories 57 Hidden Categories 2

7

9

4

Page 36: Categories Administrative Security Categories 57 Hidden Categories 2

8

4

5

3

Page 37: Categories Administrative Security Categories 57 Hidden Categories 2

3

5

3

6

3

5

Page 38: Categories Administrative Security Categories 57 Hidden Categories 2

6

13

Page 39: Categories Administrative Security Categories 57 Hidden Categories 2

9

3

18

Page 40: Categories Administrative Security Categories 57 Hidden Categories 2

10

19

Page 41: Categories Administrative Security Categories 57 Hidden Categories 2

11

Page 42: Categories Administrative Security Categories 57 Hidden Categories 2

2

1

14

Page 43: Categories Administrative Security Categories 57 Hidden Categories 2

5

9

11

Page 44: Categories Administrative Security Categories 57 Hidden Categories 2

3

12

Page 45: Categories Administrative Security Categories 57 Hidden Categories 2

5

5

13

Page 46: Categories Administrative Security Categories 57 Hidden Categories 2

8

8

Page 47: Categories Administrative Security Categories 57 Hidden Categories 2

7

4

Page 48: Categories Administrative Security Categories 57 Hidden Categories 2

4

3

13

3

Page 49: Categories Administrative Security Categories 57 Hidden Categories 2

13

11

Page 50: Categories Administrative Security Categories 57 Hidden Categories 2

5

1

11

Page 51: Categories Administrative Security Categories 57 Hidden Categories 2

3

2

4

3

7

Page 52: Categories Administrative Security Categories 57 Hidden Categories 2

7


Recommended