Category filter

Hexnode UEM Built-in Reports: Centralized Auditing and Automation Guide

Hexnode UEM’s Built-in Reports provide real-time and historical telemetry across the entire device fleet. This engine aggregates data from enrolled endpoints to generate actionable audits for compliance, inventory, and security. It supports multi-format exports (PDF/CSV) and automated scheduling for recurring IT governance.

1. The Hexnode Reporting Taxonomy (Data Scopes)

To facilitate precise auditing, the Hexnode Reporting Engine organizes telemetry into specific functional domains. Use this table to identify the primary source for your data needs:

Report Category Technical Focus Core Security Value
Device Real-time hardware/OS telemetry, including enrollment & activity status. Foundational asset management and lifecycle auditing.
User Identity-to-device mapping and user-source (Entra ID/AD/Okta) verification. Zero-Trust identity anchoring and user-centric auditing.
Compliance Evaluation of device health against passcode, encryption, restriction rules and other conditions specified in the compliance policy. Rapid isolation of non-compliant endpoints for remediation.
Location GPS coordinates, historical location tracking, and geofencing status. Physical asset security and field-force visibility.
Usage Insights Network data consumption auditing (Mobile vs. Wi-Fi) and app usage trends for mobile platforms. Cost control and identification of data-heavy applications.
Application report Global application inventory, popular app trends, and KSP feedback. Software license compliance and Shadow IT detection.
Patch and Update Monitoring the status of OS updates. Critical vulnerability management and cyber-hygiene.
Audit A detailed forensic log of every administrative portal event. Internal accountability and security incident forensics.
Action Real-time status tracking (Success/Fail) of remote actions. Troubleshooting the execution of high-stakes remote tasks.
Policy Detailed deployment and association status for policies. Verifying the enforcement of specific security restrictions.
Local Account Inventory of all local user accounts. Detecting unauthorized account creation or privilege escalation.

All available built-in reports under Reports tab on Hexnode UEM console.

2. Navigating the Data Flow (Logic-Based Auditing)

Hexnode reports follow a Select ➔ Filter ➔ Export architecture:

  • Select: Navigate to Reports > Built-in Reports and choose one of the categories listed above.
  • Filter: Apply Granular Filters (e.g., Ownership == Corporate) to resolve high-complexity queries.
  • Export: Generate on-demand files in PDF (formatted for reporting) or CSV (formatted for data manipulation/SIEM ingestion).

3. Automated Governance (Scheduling Logic)

To maintain constant compliance without manual intervention, utilize the Scheduler Service.

  • Configuration: Within any report, click Schedule Report.
  • Frequency: Define a Daily, Weekly, or Monthly delivery cadence.
  • Action: Hexnode automatically generates the report and dispatches it via email to specified technicians.

4. Ensuring Data Accuracy

  1. Sync Dependency: Report data reflects the state of the device during its last successful check-in. If a device is offline, metrics like Location or App Version are cached from the previous sync.
  2. Administrative Scope: Reports are subject to Technician Role Scopes. A technician can only generate reports for devices within their assigned “Domain” or “User Group.”
  3. Policy Prerequisites: Advanced reports (e.g., Data usage) require the corresponding policy to be associated with the device to populate data.
Reports