Exportovat (0) Tisk
Rozbalit vše
Tento obsah není k dispozici ve vašem jazyce, ale můžete využít tuto verzi v anglickém jazyce.

Prepare for monitoring and reporting in Microsoft Intune

Updated: November 21, 2014

Applies To: Microsoft Intune

Use this topic to learn the basics about using alerts and reports to monitor Microsoft Intune operations in your organization:

You can use alerts in multiple ways including:

  • View all recent alerts to obtain a broad picture of device health.

  • Use alerts to investigate specific issues that are occurring to members of specific device groups or specific workspaces, like Endpoint Protection in Microsoft Intune.

  • Use alert filters to view all alerts of a specific severity level, or alerts that are active or closed.

To ensure that the appropriate people are notified about alerts, you can set up rules to send email notifications about new alerts to specific recipients.

When working with alerts, it is important to understand the difference between alerts and alert types:


Alert Type

A predefined rule that monitors and responds to a specific system or software state. Microsoft Intune comes with a set of default alert types that you can customize.


A single alert, of any type, that displays when the requirements of the alert type are met. Multiple alerts can be generated from a single alert type.

Alert types are grouped into the following categories:


Category More information

Endpoint Protection

Informs you when computers have malware warnings, are not protected, or have malware that requires action. These alerts also notify you when malware was seen for the first time or was recently resolved.


Informs you when a service is stopped, disk space is too low, or disk fragmentation is high.


Informs you about configuration tasks that need to be performed (such as configuring automatic approvals for updates) and service announcements that display on the Notice Board on the System Overview page.


Informs you when a device is unable to apply one or more policy settings.

Remote Assistance

Informs you when a user on a managed computer has initiated a request for remote assistance


Informs you when client deployments have failed. Also contains a sub-category of Mobile Device Management, which informs you when mobile device issues occur, including Exchange connectivity.


Informs you when specific updates are waiting for approval, such as Security Updates or Critical Updates.

Use the following severity levels to help you determine which issues to investigate:


Critical (indicated by a red circular icon)

Indicates a serious problem you should Investigate as a top priority.

For example, a Critical alert can help you identify when one or more computers have active malicious software, or some security issue or a loss of function.

Warning (indicated by a yellow triangular icon)

Indicates a potential or current problem that is not yet serious and you might want to investigate before the underlying issue becomes critical.

For example, a Warning alert is generated if security updates are waiting to be deployed.

Informational (indicated by a white circular icon)

Indicates a typical operation has occurred or requires attention.

For example, an Informational alert is generated if product and classification settings must be configured for updates that you plan to deploy to computers.

The following properties are common to all alerts:


Property Description

Alert Level

Indicates the severity of the alert –Critical, Warning, or Informational.


Indicates whether the alert is active or closed.


This is the time that the alert was created.


Indicates the time when the alert was last modified. If an alert is closed, this will be the time that it was closed.

Repeat count

Indicates the number of times that the alert was raised.


Indicates the device or rule that generated the alert. You can click the name of the source to display more information.

For example, for a Security updates need to be approved alert, the source is Security update list. When you click Security update list, the list of security updates that have not yet been deployed is displayed.


This field displays the path of the specific object on the computer that caused the alert to be generated.

Microsoft Intune reports provide information about software, hardware, and software licenses in your organization. Reports can help you confirm current needs and forecast future spending. The Reports workspace gives you the tools to create and manage reports. For more information about reports, see Manage reports in Microsoft Intune.

Report types are listed in Microsoft Intune provides the following report types:


Report type Description

Update reports

Show the software updates that succeeded on computers in your organization, in addition to the updates that failed, are pending, or are needed. For more information on software updates, see Keep your computers up to date with software updates in Microsoft Intune.

Detected Software reports

Show software installed on computers in your organization and includes the software versions. You can filter the information that displays based on the software publisher and the software category. You can expand the updates in the list to show more detail (such as the computers on which it is installed) by clicking the directional arrow next to the list item.

When you retire computers or change their group memberships in Intune, it can take several minutes for these changes to be reflected in the detected software report. For the most accurate software inventory data, wait a few minutes after retiring computers or changing their group memberships before you run a detected software report that includes those computers.

Computer Inventory reports

Show information about managed computers in your organization. Use this report to plan hardware purchases and to understand more about the hardware needs of users in your organization. For more information on working with managed computers, see Set up and manage computers using Microsoft Intune.

Mobile Device Inventory reports

Show information about the mobile devices in your organization. You can filter the information that displays based on groups, whether the device is a jailbroken or rooted device, and by operating system.

License Purchase reports

Show the software titles for all licensed software in selected license groups, based on their licensing agreements. The available filters are:

  • All agreements shows all licensed software products that are managed by Intune.

  • Volume licensing agreements shows only VLSC software products.

  • Other software licensing agreements shows software products that are managed outside VLSC.

If software license information has not refreshed in more than 24 hours, it will refresh when you generate a license report.

A license report is not an exact calculation of software titles that are being used, or proof of compliance with agreements. The report is a tool to help you make licensing decisions for your organization. Intune might not detect some products that are able to have a Microsoft volume license.

License installation reports

Compare installed software on computers in your organization with your current license agreement coverage according to the Volume Licensing Service Center (VLSC). Filters include:

  • All agreements shows all licensed software products that are managed by Intune.

  • Volume licensing agreements shows only VLSC software products.

  • Other software licensing agreements shows software products that are managed outside VLSC.

Terms and Conditions reports

Show which users accepted your terms and conditions and which version they accepted. Export this report to keep an archive of acceptance.

Noncompliant Apps reports

Show information about the users who have apps installed that are on your lists of compliant and noncompliant apps. Use this report to find users and devices that are not in compliance with your company app policies.

Certificate Compliance reports

Shows which certificates have been issued to users and devices through the Network Device Enrollment Service. Use this report to find certificates that are issued, expired, and revoked.

Byl tento obsah pro vás užitečný?
(Zbývající počet znaků: 1500)
Děkujeme za váš názor.
© 2015 Microsoft