The Protected Endpoints report shows protected and unprotected endpoints and their last backup state. The report reveals whether endpoint backups meet established RPO requirements and helps you identify endpoints that run without proper backup protection — either due to missing or outdated backups.
You can apply the following data filters to limit the list of endpoints in the report scope:
▪Client — limit the list of endpoints by client.
▪Group — limit the list of endpoints by group in which the endpoints are included.
▪Computer Type — limit the list of endpoints by computer type.
▪Location — limit the list of endpoints by location.
▪Domain — limit the list of endpoints by domain to which endpoints belong.
▪Endpoint Name — limit the list of endpoints by computer name.
▪Last Backup State — limit the list of endpoints by the latest backup status (Success, Warning, Failed, Unknown, Running).
▪Last Backup — limit the list of endpoints by the date when the last backup session was performed.
▪Restore Points — limit the list of endpoints by the number of available restore points.
▪First Backup — limit the list of endpoints by the date when the first backup session was performed.
▪Endpoint Status — limit the list of endpoints by protection status (Protected, Unprotected).
To learn how to use data filters in LabTech, see Using Report Manager.
The report includes the following report components:
▪Protected Endpoints diagram shows the share of protected and unprotected endpoints.
An endpoint is considered protected if there is at least one backup restore point within the required RPO interval (as specified with the Last Backup filter parameter).
▪Protected Endpoints Last Backup State diagram shows the completion status of the latest backup sessions.
▪Protected Endpoints table provides a list of endpoints protected with backups.
The table includes a separate entry for each endpoint and details the last backup state, endpoint name, its domain and location, date and time of the first and last backup session, number of restore points created for the endpoint.
▪Unprotected Endpoints table shows the list of endpoints that do not have backups.
For each unprotected endpoint, the table details the location, endpoint name and domain.