Built-in Reports
In addition to pulling data from live endpoints, Action1 enables you to automate some of your administration and management routines. For example, you can generate reports, or monitor specific events and get notified about them as soon as they occur. Navigate to Real-Time Reports & Alerts / Built-in Reports to see a list of reports Action1 provides out of the box.
IT Asset Management reports
Software Inventory:
- Installed Software
- Cloud Storage Apps
- Instant Messengers
- Web Browsers
- MS Outlook Versions
- Windows Drivers
Hardware Inventory:
- Hardware Summary
- Processors
- HW Manufacturers
- Physical Memory
- Motherboards
- Firmware
- Installed Printers
- Disk Drives
- SCSI Controllers
- Monitors
- Sound Devices
Managed Endpoints
Patch Management reports
- Weekly Update Summary
- Daily Update Summary
- Missing Third-Party & Windows Updates
- Missing Windows Critical Updates
- Missing Windows Updates
- Windows Installed Updates
- Reboot Required
- Windows Hotfixes
- Windows Update History
- Windows Update Statistic
- MOVEit Vulnerability Status
Endpoint Security reports
Users and Groups:
- Local User Accounts
- Local Groups
- Group Membership
- Logon Statistics
- Logged On Users
- Profiles by User
- Profiles by Computer
USB Devices:
- USB Disk Usage
- SD Card Usage
Network:
- Open Network Shares
- Open Hidden Shares
Antivirus Status
Endpoint Configuration reports
General:
- OS Information
- OS Install Dates
- Boot Configurations
- Environment Varibales
- Windows Event Logs
- Computer AD Domains
- Computer Time Zone
- Local Time
- Applied GPO (RSoP)
Network Connections:
- To TCP/IP Addresses
- To Internet Domains
Network Settings:
- Routing Tables
- Network Adapters
Remote Task Manager:
- Running Processes
- Startup Programs
- Windows Services
- Process/Memory Stats
Disk and Partitions:
- Logical Disks
- Disks w/o BitLocker
- Disk Volumes
- Low Disk Space
- Disk Partitions
- NTFS Disk Quotas
- Bitlocker Key
Vulnerability Management reports
Vulnerability Management reports
- Vulnerability Summary
- All Critical Vulnerabilities
- Known Exploited Vulnerabilities
- Documented Compensating Controls
See next:
- Reports on software inventory
- Reports on hardware inventory
- Reports on endpoint security & configuration
- Reports on vulnerability management