Active Directory, Microsoft 365, and Exchange management and reporting
Hybrid AD, cloud, and file auditing; security; and compliance
Identity security with adaptive MFA, SSPR, and SSO
Reporting, auditing, and monitoring for hybrid Exchange and Skype
Active Directory, Microsoft 365, and Exchange backup and recovery
Hybrid AD, cloud, and file auditing; security; and compliance
SharePoint reporting and auditing
Microsoft 365 security
Cloud security monitoring and analytics
File auditing, data leak prevention, and data risk assessment
File security and storage analysis
Automated patching across multiple OSs and over 850+ third-party apps
Simplified third-party patch deployment via ConfigMgr and Intune
Seamless mobile device management from onboarding to retirement
Remote troubleshooting with integrated chat, voice, and video
Automated OS image creation and seamless role-based deployment
Prioritization-focused enterprise vulnerability management
App control and endpoint privilege management software
Data theft prevention with strict peripheral device control
Browser security with isolation, lockdown, and activity tracking
Sensitive data protection and compliance for endpoint devices
Full-stack observability with AIOps and digital experience monitoring
AI-powered, all-in-one SaaS platform for observability and digital experience monitoring
Digital experience, application performance, and infrastructure monitoring
All-in-one vendor risk assessment tool to ensure domain security
Network, server, and storage performance monitoring
Bandwidth monitoring and traffic analysis
Network change and configuration management
Firewall rule, configuration, and log management
IP address and switch port management
Centralized IT alert management
Status pages for real-time status and incident communication
A cloud-native identity platform for workforce IAM
Full-stack service management for enterprises
IT asset management with an integrated CMDB
Unified endpoint management and security
Comprehensive mobile device management
Enterprise remote access
Automated multi-OS patch management
Full-stack monitoring for IT admins, DevOps, and SREs
Status pages for real-time status and incident communication
Cloud cost management for modern software teams
SaaS management platform to maximize ROI
Centralized IT alert management
Secure your IT infrastructure and prove compliance from the cloud
AI-powered unified analytics platform to correlate all IT data
An all-in-one DNS management service to keep your business online
Low-code application development platform
Remote support software
Collaborative project management
Agile project management
All-in-one collaboration tool for unified communication
Secure email hosting solution for businesses
All-in-one video conferencing solution for remote business meetings
All-in-one AR remote assistance software solution for remote collaboration.
Unified network monitoring and endpoint management for MSPs
Unified Active Directory management and reporting solution for MSPs
Unified SIEM solution for MSSPs
Log management and advanced threat intelligence for MSSPs
Complete privileged access security for enterprises
Privileged password management
Full-stack service management for MSPs
WAAS reports details you on the central manager you have created and the devices associated with it. You can access WAAS reports using Reports . Select WAAS Dashboard from the Reports tab. You can view the reports based on hourly, daily, weekly, monthly along with custom reports.
The Accelerator Group gives you the list of WAAS Accelerator Engines grouped together for easy identification purposes. You can also view their reduction percentage, Status, and a brief description about the group.
You can also view the top 10 WAE's by compression percentage as a pie chart. The report displays WAN, LAN and compressed Traffic along with the reduction percentage.
The WAE devices List displays all the devices listed in the WAN Accelerator Engine. The top ten devices are listed first. you can locate the devices using the simple search option by indicating the name, IP address, Status, Location or MAC address of the device. By clicking on the device name you can view the WAE Reports.
You can view these reports by clicking on any of the devices in the WAE device list. The WAE reports page gives you detailed statistics of every device associated with a specific Central Manager. This Report Details you on:
Application Reduction: The amount of compression each mapped application has gone through. By Clicking on the application name you can view reports indicating bandwidth reduction by location, bandwidth optimization trend and pass through summary trend of the specific Application.
Bandwidth Reduction by Location: This details on the WAN, LAN, and amount of traffic compression for each application along with the increase in bandwidth capacity due to compression.
Pass Through Summary Trend: Denotes the unoptimized traffic that passes through the WAE. You can view graph based on peer traffic, intermediate traffic,overload traffic and policy applied.
Lists the conversations that passed through the selected WAE device and their corresponding statistics. Using this you can view the Source, destination of the conversation, their respective ports, type of policy applied, and the duration of each conversation. You can also view the type of policy applied, the initial amount of traffic and compressed traffic in bytes along with the compression ratio.