Outsmarting the Backlog: Bridging the NVD Gap with VulnCheck NVD++

This Wednesday | 11 AM EDT / 5 PM CEST

Getting Started

Endpoints

Patch Management

Vulnerability Management

Software Deployment & IT Assets

Automation & Remote Desktop

Real-Time Reports & Alerts

Account Access & Management

SSO Authentication

Security Concerns

Need Help?

Action1 5 Documentation 5 Built-in Reports

Built-in Reports

 

In addition to pulling data from live endpoints, Action1 enables you to automate some of your administration and management routines. For example, you can generate reports, or monitor specific events and get notified about them as soon as they occur. Navigate to Real-Time Reports & Alerts / Built-in Reports to see a list of reports Action1 provides out of the box.

IT Asset Management reports

Software Inventory:

  • Installed Software
  • Cloud Storage Apps
  • Instant Messengers
  • Web Browsers
  • MS Outlook Versions
  • Windows Drivers

Hardware Inventory:

  • Hardware Summary
  • Processors
  • HW Manufacturers
  • Physical Memory
  • Motherboards
  • Firmware
  • Installed Printers
  • Disk Drives
  • SCSI Controllers
  • Monitors
  • Sound Devices

Managed Endpoints

Patch Management reports

  • Weekly Update Summary
  • Daily Update Summary
  • Missing Third-Party & Windows Updates
  • Missing Windows Critical Updates
  • Missing Windows Updates
  • Windows Installed Updates
  • Reboot Required
  • Windows Hotfixes
  • Windows Update History
  • Windows Update Statistic
  • MOVEit Vulnerability Status

Endpoint Security reports

Users and Groups:

  • Local User Accounts
  • Local Groups
  • Group Membership
  • Logon Statistics
  • Logged On Users
  • Profiles by User
  • Profiles by Computer

USB Devices:

  • USB Disk Usage
  • SD Card Usage

Network:

  • Open Network Shares
  • Open Hidden Shares

Antivirus Status

Endpoint Configuration reports

General:

  • OS Information
  • OS Install Dates
  • Boot Configurations
  • Environment Varibales
  • Windows Event Logs
  • Computer AD Domains
  • Computer Time Zone
  • Local Time
  • Applied GPO (RSoP)

Network Connections:

  • To TCP/IP Addresses
  • To Internet Domains

Network Settings:

  • Routing Tables
  • Network Adapters

Remote Task Manager:

  • Running Processes
  • Startup Programs
  • Windows Services
  • Process/Memory Stats

Disk and Partitions:

  • Logical Disks
  • Disks w/o BitLocker
  • Disk Volumes
  • Low Disk Space
  • Disk Partitions
  • NTFS Disk Quotas
  • Bitlocker Key

Vulnerability Management reports

Vulnerability Management reports

  • Vulnerability Summary
  • All Critical Vulnerabilities
  • Known Exploited Vulnerabilities
  • Documented Compensating Controls