Documentation Center

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Community
  • |
  • Support Portal
  • Home
  • Administration
  • Reporting

Asset & RMM Reports

Contact Us

If you have questions or want help, please Submit a Request.

Updated at Jan 27, 2026
By Kali Patrick

Table of Contents

Report Descriptions Applied Policy Asset Activity Audit Asset Aging Asset Audit Asset Override Summary (Customer) Executive Summary Managed Anti-Virus Summary Missing Patches By KB RMM Summary By Customer Splashtop Billable Usage Summary Software Inventory Vulnerable Systems Suggested Review Schedule Daily or Weekly Review (Operational Health & Security) Monthly or Quarterly Review (Strategic Trends & Capacity)

Related Docs

  • About the Reports Tab/Page
  • Customer Reports
  • The Report Builders
  • Ticket Reports

This document introduces the reports available for the Assets & RMM features in Syncro. 

You can use these reports to monitor the health, security, and lifecycle of your managed assets while validating policy compliance across your customer base. These tools also provide the visual data needed to demonstrate service value to clients and identify opportunities for hardware refreshes or security upgrades.

Note: You can access these reports from the Reports tab, or from Admin > Syncro Administration - Reports.

Report Descriptions

Applied Policy

Target Audience: Technical Leader, Technician

Purpose: This report provides a central view of all assets currently being governed by a specific RMM policy, which allows you to audit and verify that your desired settings are correctly applying across your customer base.

Generate the Report: 

  1. Click the Reports tab.
  2. In the RMM section, click Applied Policy Report.
  3. If desired: 
    • Start typing the name of a Customer Organization and select one.
    • At the far right, click Saved Search to select a Saved Asset Search.
  4. Select a policy from the Policy Names dropdown menu.
  5. Click Run Report.

Interpret the Report: 

  • As a Technical Leader, you should use this report to validate your security and maintenance strategy for customer devices. You can select a critical policy, such as a "Server Security Baseline" or "Workstation Patching Policy," and quickly see every asset that is currently using it. Reviewing this list helps ensure compliance across your entire customer base. For example, if you see a server missing from your "Server Security Baseline" report, it means that the asset is not inheriting the correct security rules, which is a major risk you need to address immediately.
  • Technicians can use this report to quickly confirm the operational settings on an asset before beginning work. If a customer reports an issue, you can run this report against the policy you believe should be in place to verify the asset is receiving the correct remote control, monitoring, or scripting configuration. This prevents wasted time troubleshooting issues that are being caused by incorrect or missing policy assignments. The ability to filter by a specific policy allows you to focus on the exact configurations you are auditing or managing.

About the Data:

  • An asset is included in the report if the selected policy is part of the asset's "Effective Policy" resulting from Policy Inheritance.
  • The report includes assets even if some elements of the selected policy are overridden by a policy applied lower down the inheritance tree.
  • If you leave the Customer Name field blank, the report will search across all assets regardless of the customer Organization they belong to.
  • You can export the entire list of assets to a CSV file for auditing or sharing compliance data outside of Syncro.

Next Steps: Select a key RMM policy and run the report to identify any assets that should be using that policy but are not, then adjust the policy inheritance structure or manually assign the correct policy to the missing assets.


Asset Activity Audit

Target Audience: Technical Leader, Technician

Purpose: This report provides a detailed, chronological log of significant actions, system events, and changes that have occurred on your managed assets, offering a transparent record for security, compliance, and troubleshooting purposes.

Generate the Report: 

  1. Click the Reports tab.
  2. In the RMM section, click Asset Activity Audit.
  3. Enter Search Activity Text.
  4. If desired:
    • Start typing the name of a Customer Organization and select one.
    • Enter an Asset Name or ID.
    • Select one or more Activity Types using the dropdown menu.
    • Change the Period from Month to Date (the default) to another timeframe.
    • Change the Asset Status from Active Assets to All or Archived.
  5. Click Run Report.

Tip: The activities listed in this report are the same ones included in the Recent Activity section of an Asset's Details Page:

Snippet: Asset Activities

  • Antivirus Activity - Bitdefender: When a threat is detected on a managed asset by Bitdefender Antivirus.
  • Antivirus Activity - Emsisoft: When a threat is detected on a managed asset by Emsisoft Antivirus.
  • Antivirus Activity - Webroot: When a threat is detected on a managed asset by Webroot Antivirus.
  • Antivirus Activity - Windows Defender: When a threat is detected on a managed asset by Windows Defender.
  • Archived Asset: When a managed asset is archived. 
  • Asset Rename: When a managed asset is renamed.
  • Background Tool Session Started: When a user starts a background tool session on a managed asset.
  • Broadcast Message: When a broadcast message is sent to a managed asset.
  • Effective Policy Changed: When the effective policy of a managed asset has changed from its last known policy.
  • Patch Management: When a patch management process fails to run on a managed asset.
  • Process and Service Monitoring: When a process or service running on a managed asset triggers an alert.
  • RMM Alert: When a Syncro RMM alert is generated for a managed asset.
  • RMM Automation: Whenever an automated remediation is run on a managed asset.
  • Re-enabled Archived Asset: When an asset that was set as archived has been re-enabled and is now an active asset.
  • Reboot Scheduled: When a reboot of the managed asset has been scheduled.
  • Remote Session Started: When a remote session is initiated on the asset.
  • Software - Installed: When a software application is installed on a managed asset.
  • Software - Uninstalled: Whenever a software application running on a managed asset has been uninstalled.
  • Software - Updated: Whenever a software application running on a managed asset has been updated.
  • Wake on LAN: When the asset is woken from a low power state over the network.
  • Warranty Expiration: When the asset’s warranty has expired.
  • Windows Update: Displays recent Windows Update activity, including the number of Windows Updates recently applied.

Interpret the Report: 

  • As a Technical Leader, you should use this report to maintain a comprehensive security and compliance record. By filtering the activity for specific system events, such as when Remote Access was initiated or when a device was taken Offline, you can quickly audit activity and investigate potential security incidents or unauthorized access. This chronological view of asset history is essential for demonstrating due diligence to clients or internal stakeholders regarding the management and security of their endpoints. It also serves as a high-level overview of which assets are receiving the most active management.
  • Technicians can use this report as a valuable diagnostic tool for troubleshooting intermittent or recent problems on an asset. If a device has started failing after a specific time, you can review the log to see if any key RMM actions, such as a Script Run or Policy Change, occurred right before the issue began. This allows you to quickly pinpoint the specific action that might have introduced the fault, reducing mean time to repair. You can filter the report down to a single asset to review all recorded events for that device within the selected date range.

About the Data:

  • Asset data is included only if it was logged by the RMM Agent or triggered by an action taken by a Syncro User.
  • Activity logs are retained indefinitely, but the maximum date range you can query in one instance is 31 days.
  • Data cannot be exported directly from the report grid; however, you can copy the data into a spreadsheet for offline record keeping.

Next Steps: If you're investigating a security concern or a reported asset failure, run the report for the affected asset and date range to quickly identify and review the sequence of events that led up to the incident.


Asset Aging

Target Audience: Business Leader, Technical Leader

Purpose: This report tracks the installation age of all managed assets, providing key intelligence for budgeting, hardware refresh planning, and identifying assets that are reaching or have exceeded their recommended lifecycle.

Generate the Report: 

  1. Click the Reports tab.
  2. In the RMM section, click Asset Aging Report.
  3. If desired, start typing the name of a Customer Organization and select one.
  4. Click Run Report.

Tips: 

  • Click any hyperlinked device name to navigate to its Asset Details Page. 
  • Click the hyperlinked Quantity number to see the Assets table pre-filtered to show only those assets.

Interpret the Report: 

  • Business Leaders should use this report for strategic planning and sales opportunities. Easily identify which clients have a large number of aging assets (e.g., computers over four or five years old) and use this data to proactively propose hardware refresh cycles and sell new equipment or managed services contracts. High numbers of older assets often correlate with increased support issues and slower performance, which justifies the business case for replacement. By tracking the percentage of assets in the older age categories, you can monitor your customer base's overall hardware health and plan future capital expenditures.
  • Technical Leaders can use this report as a predictive maintenance tool. Assets that are nearing end-of-life are more likely to fail, leading to costly and unplanned downtime. By identifying these older assets, you can prioritize them for replacement or apply more stringent monitoring policies to mitigate the risk of failure. This proactive approach helps maintain high service quality for your clients. You can run the report on a per-client basis to build a targeted hardware replacement proposal before a catastrophic failure occurs.

About the Data:

  • The age of an asset is calculated based on its Created Date in Syncro, not the physical purchase date of the hardware.
  • Assets are grouped into predetermined aging brackets (e.g., 0-1 year, 1-3 years, 3+ years) for easy comparison and trend analysis.
  • The report is a point-in-time snapshot and does not provide historical aging trends.

Next Steps: Review the assets in the oldest aging brackets and create a targeted outreach campaign to the corresponding clients to propose a hardware refresh or upgrade plan.


Asset Audit

Target Audience: Technical Leader, Technician, Business Leader

Purpose: This report provides a detailed, granular inventory of your managed assets including their specifications, status, and various associated metadata, enabling comprehensive resource management and client environment documentation.

Generate the Report:

  1. Click the Reports tab.
  2. In the RMM section, click Asset Audit.
  3. If desired:
    • Start typing the name of a Customer Organization and select one.
    • Select an Asset Type using the dropdown menu.
    • Change the Asset Status from Active Assets to All or Archived.
    • At the far right, click Saved Search to select a Saved Asset Search.
  4. Click Run Report.

Tip: In the upper right corner you'll see a Customize button, which you can use to customize the report to include or exclude specific data columns (e.g., Processor Type, Custom Fields) before generating the output.

Interpret the Report: 

  • Technical Leaders and Technicians can use this report as the foundation for almost any technical planning or troubleshooting task. Quickly generate a list of all devices, filtering by criteria such as operating system, amount of RAM, or physical location, to plan mass maintenance tasks, like a Windows version upgrade or a memory expansion project. When troubleshooting, having a single-pane-of-glass view of an asset's specifications helps to quickly rule out hardware or configuration incompatibilities as the source of a problem. A regular review ensures the inventory data is accurate and up-to-date for every customer.
  • For Business Leaders, this report provides a quantifiable view of the hardware and software your company is currently supporting for your customers. By reviewing the volume and type of assets under management, you can calculate the total scope of your services and ensure your pricing models accurately reflect the density and complexity of the environments you maintain. You can also use this report to confirm that all deployed assets are correctly tied to a managed services contract and are being billed appropriately.

About the Data:

  • The report collects and displays all technical specifications and metadata fields recorded on the Asset's Details Page.
  • The data displayed is the last reported information from the RMM Agent and reflects the device's status as of its most recent check-in.
  • If an asset has not checked in within the last 24 hours, its data may be stale, but the asset will still be included in the report.
  • You can export the full, filtered report to PDF or spreadsheet format, which is useful for creating client-facing documentation or importing into third-party tools, respectively.

Next Steps: Filter the report by a specific operating system version and identify all assets that require immediate patching or migration to ensure they meet your current security standards.


Asset Override Summary

Target Audience: Technical Leader

Purpose: This report identifies all assets with manually overridden RMM policy settings, allowing you to audit deviations from your standardized configurations. An example would be an override of Low Hard Drive Space applied at the Asset level.

Generate the Report:

  1. Click the Reports tab.
  2. In the RMM section, click Asset Override Summary.
  3. Start typing the name of a Customer Organization and select one.
  4. Click Run Report.

Interpret the Report: Technical Leaders should use this report to maintain configuration consistency and security across all customer environments. When a policy setting is overridden at the individual asset level, that device is no longer fully compliant with the larger, systemic policy you have designed. Overrides, while sometimes necessary for unique assets, can create security gaps or inconsistencies that lead to unexpected issues. You should regularly review this list to ensure that every override is intentional, documented, and justified. A growing number of overrides may indicate that your base policies need to be redesigned to accommodate more typical variations in your client environments. 

This report allows you to quickly isolate the non-standard devices. For example, if your standard policy disables a specific Windows service, but one asset has that service enabled via an override, this report will highlight the asset and the specific policy element that is different. This level of detail enables you to either remove the unnecessary override, or formally document why the device requires an exception, ensuring long-term manageability and compliance.

About the Data:

  • An asset appears on this report only if a specific setting within the applied RMM Policy has been explicitly configured on the Asset's Details Page, overriding the inherited value.
  • The report lists the asset, the policy being overridden, and the specific setting that has the custom value.
  • An asset is NOT included if its effective policy is different due to policy inheritance rules; it is only included if a manual, asset-level change was made.
  • You can filter the report by Customer Organization to focus on the policy exceptions within a single client environment.
  • There is no option to remove overrides directly from this report; you must navigate to the specific asset to reverse the changes.

Next Steps: Review the listed assets and overrides to determine if the deviation is still required, then remove any unnecessary overrides to return the asset to its fully standardized, policy-driven configuration.


(Customer) Executive Summary

Target Audience: Business Leader, Technical Leader

Purpose: Use this report to show your clients exactly how you protect their business. The Executive Summary provides a clear, visual look at their IT health and the work you do to maintain it. 

By reviewing key metrics like the Health Score and Protection Effectiveness, you gain insight into the overall stability and security of the client’s infrastructure. Trends over time in areas such as device coverage and operating system compliance show whether the client's environment is improving or requires attention.

You can choose to highlight specific successes, such as the volume of RMM alerts that were automatically remediated, which directly quantifies the time and money you saved them. Analyzing the Top 5 issues gives you talking points for QBRs (Quarterly Business Reviews) and helps you transition discussions from basic support to strategic technology planning and necessary upgrades.

Note: This is a pre-built report that serves as an example of an Executive Summary report. You can build your own version using the Report Builders.

Generate the Report:

  1. Click the Reports tab.
  2. In the RMM section, click Asset Override Summary.
  3. Start typing the name of a Customer Organization and select one.
  4. If desired, change the Period from Month to Date (the default) to another timeframe.
  5. Click Run Report.

Tip: Click the “Additional text to include on the report” link to display a visual editor where you can supply your own text. This text will appear as the first page (after the cover sheet) on your PDF export of the report.

Interpret the Report: The report acts as a high-level performance scorecard that translates technical activities into a clear narrative of business value. By aggregating ticketing data and RMM alerts, you can demonstrate the breadth of your impact on an organization’s infrastructure. This overview moves the conversation away from individual incidents and toward broader operational trends, providing the objective evidence needed to validate the stability and security provided by your managed services.

For Business Leaders, these insights are vital for proving service value and justifying strategic recommendations. The report highlights recurring technical patterns, such as patch compliance levels or common issues, which helps you identify areas where aging hardware or outdated software may be hindering client productivity. Presenting this data allows you to transition from a reactive service provider to a proactive business partner by using historical performance to guide future infrastructure investments.

About the Data:

  • The report aggregates data for a single Organization, reflecting performance metrics and asset information for the selected month.
  • The data displayed within the report is built using customizable blocks (Visual, Text, and List) which pull from specific metrics, allowing you to control the exact information presented to the client.
  • Only devices actively being monitored by RMM at the time of report generation are included in the asset counts and performance calculations.
  • When scheduled for automatic delivery, the report generates and sends the PDF on the 4th day of the month, using data from the previous calendar month.
  • The report uses specialized Ticket View filters to ensure that ticket metrics only include relevant data, such as excluding internal or project-related tickets.

Next Steps: Use this report to initiate strategic conversations with your clients about technology roadmaps and budget planning, demonstrating that their monthly service fee translates into tangible security and efficiency. After generating the report, schedule a follow-up meeting to review the findings and recommend specific upgrades or policy changes based on device health and age.


Managed Anti-Virus Summary

Target Audience: Technical Leader, Technician

Purpose: This report provides a centralized view of your managed antivirus deployment and security status. Use it to verify that all client assets are fully covered, up-to-date, and secured against active threats.

Generate the Report:

  1. Click the Reports tab.
  2. In the RMM section, click Managed Anti-Virus Summary.

Tip: Hover over the question marks for explanations of each column.

Interpret the Report: This report displays the number of AV licenses in use (for Emsisoft Anti-Malware, Bitdefender, and Webroot) at the top, and which AV is installed on which asset, and timestamp of the last sync. 

About the Data:

  • This report includes data from devices across all Organizations you manage.
  • The report only shows data for devices where the Syncro-managed anti-virus solution is installed and actively reporting its status.
  • The data is generated based on the current, real-time status as reported by the anti-virus engine, reflecting the last known scan and threat status.

Next Steps: Review the report to create immediate action items for your team to investigate and resolve any outstanding security risks. Use the list of devices not syncing to check device connectivity or re-deploy the anti-virus software to restore full coverage.


Missing Patches By KB

Target Audience: Technical Leader, Technician

Purpose: This report provides a consolidated, reverse-lookup view of your patch management landscape by showing which specific Windows Updates (identified by their KB number) are missing across your client base. It helps you determine which critical vulnerabilities are still exposed, and which devices need immediate patching. The Missing Patches By KB Report helps you focus on the patches themselves rather than individual assets, which is critical during zero-day or high-priority security events.

Generate the Report:

  1. Click the Reports tab.
  2. In the RMM section, click Missing Patches by KB.
  3. If desired:
    • Start typing the name of a Customer Organization and select one.
    • Check the “Ignore Stale Assets” box and enter a numeric value for "Stale Age in Days. This helps you filter out devices that are offline, decommissioned, no longer actively managed, or have not communicated with Syncro within the specified number of days. For example, If you check the box and enter 30, the report will exclude assets that have not "checked in" (that is, synced with Syncro) in 30 days or longer.
    • Check the “Include Globally-Blocked KBs” box. 
  4. Click Run Report.

Tips:

  • Click a hyperlinked KB number to view it on Microsoft's website.
  • Click a hyperlinked number in the “Count of Assets Missing” column to view the Assets & RMM table with only these assets displayed.
  • Click Install to install a specific patch on the assets missing it. For offline assets, Syncro will install them the next time they sync.

Interpret the Report: Quickly see a list of all uninstalled Knowledge Base (KB) articles and, most importantly, the total count of managed devices that are missing each one. This global view instantly tells you which patches represent the highest risk exposure across your entire fleet, allowing you to prioritize the most widespread and critical security gaps. Select a specific KB number to drill down to the exact list of vulnerable assets and take immediate action.

About the Data:

  • This report aggregates data from all managed devices across all customer Organizations, providing a single list of all missing patches.
  • The report includes only patches with an installation status of "Missing," which means their approval status in a Windows Update Policy is set to either Manual or Defer.
  • Patches that have been explicitly set to “Reject” in a Windows Update Policy are not included in this report. 
  • The report reflects the most current patch status as reported by the RMM agent on the asset, based on its most recent check-in.

Next Steps: Use the report to identify a specific, high-priority KB number and then install that patch across all listed missing assets directly from the report interface. After installation, re-run the report to confirm the missing patch count has been reduced to zero.


RMM Summary By Customer

Target Audience: Business Leader, Technical Leader

Purpose: This report gives you a high-level, client-by-client view of your managed service delivery, allowing you to quickly assess the health and coverage status of all your customers in one place. It helps you determine the overall performance and service health of each client Organization, and whether any of them require immediate attention.

Generate the Report:

  1. Click the Reports tab.
  2. In the RMM section, click RMM Summary by Customer.
  3. Start typing the name of a Customer Organization and select one.
  4. If desired, change the Period from Month to Date (the default) to another timeframe.
  5. Click Run Report.

Tip: Click the “Additional text to include on the report” link to display a visual editor where you can supply your own text. This text will appear as the first page (after the cover sheet) on your PDF export of the report.

Interpret the Report: You'll see a break down of customer issues by type, issues by computer, viruses blocked, OS types, percentage of machines completely patched, and installed updates.

  • Business Leaders can use this report to quickly identify clients who are generating the most alerts, which signals where your service delivery may be struggling or where potential up-sell opportunities exist. The Organization-level metrics give you a tangible measure of the stability of their environment. This insight is crucial for maintaining profitable contracts and anticipating client dissatisfaction before it escalates. 
  • Technical Leaders can use this report to get a prioritized list of organizations that require intervention. This allows you to allocate your technical resources efficiently to address the clients with the highest volume of open alerts or the most critical security vulnerabilities.

About the Data:

  • All data is calculated based on the assets actively reporting to the RMM system for the respective Organization.
  • The report uses the end date of the selected date range to determine the current status of all metrics for each Organization.

Next Steps: Prioritize a list of the top three Organizations with the highest number of issues by computer and schedule a deep-dive review to stabilize their environments and reduce service overhead. Use the report data to initiate a conversation with the client about strategic IT improvements.


Splashtop Billable Usage Summary

Target Audience: Biller, Business Leader

Purpose: This report details the total usage of premium Splashtop add-ons currently active on your account for billing purposes, ensuring you accurately charge your clients. Use this report to track and manage the costs associated with providing remote access to your clients' End Users, specifically for the Splashtop Work From Home service or any billed Splashtop SOS use. 

Generate the Report:

  1. Click the Reports tab.
  2. In the RMM section, click Splashtop Billable Usage Summary.
  3. If desired, change the billing period from Current (the default) to Next Period.
  4. Click Run Report.

Interpret the Report: By viewing this data, you can directly compare a client’s actual usage against their contracted service level, which is essential for accurate recurring billing. This enables Billers to efficiently pull the necessary counts to create or verify recurring line items, and helps Business Leaders confirm that revenue is being captured for every premium service delivered.

About the Data:

  • The report consolidates billable usage across two separate Splashtop features: Splashtop SOS sessions initiated by technicians and End User Remote Access.
  • End User Remote Access Total Usage is counted based on the number of End Users who have the remote access feature enabled.
  • Only End Users or Technicians that are specifically enabled for the billable features are included in the counts.

Next Steps: Use the billable counts in this report to generate or update the "Remote Access - Contact Counter" or other relevant line items on your clients' recurring invoices to ensure you are capturing all revenue for premium remote access services.


Software Inventory

Target Audience: Technical Leader, Technician

Purpose: This report is your primary tool for asset management and compliance regarding software installations. It gives you a comprehensive, centralized view of installed software across your managed endpoints, enabling you to enforce standardization, manage licensing, and identify unauthorized applications. It helps you understand what software is currently installed on client devices, and whether there are any unauthorized or outdated applications you need to remove.

Generate the Report:

  1. Click the Reports tab.
  2. In the RMM section, click Software Inventory.
  3. Start typing the name of a Customer Organization and select one.
  4. Click Run Report.

Tip: Click any hyperlinked number in the Installs Count column to see the Assets table pre-filtered to show only those assets.

Interpret the Report: Technical Leaders should check for the presence of specific, potentially unauthorized applications for an Organization. Identify outdated versions of critical software to help you plan necessary upgrades and mitigate vulnerability risks. Technicians can use this report to verify license compliance during audits or to confirm that required line-of-business applications have been correctly deployed.

About the Data:

  • The data displayed in this report is sourced from the RMM agent, which scans the installed programs list on each Windows device during its regular check-ins.
  • Changes to the software inventory are only reflected in the report after the respective RMM agent has performed its scheduled inventory scan and reported the update to the Syncro platform.
  • The report does not track usage metrics (e.g., how frequently a program is opened) but only the presence of the installed file and its metadata.

Next Steps: Identify any unauthorized or non-standard applications and then use the RMM tools to uninstall them from the respective assets. Create a list of all devices running outdated versions of key software to schedule necessary updates.


Vulnerable Systems

Target Audience: Technical Leader, Technician

Purpose: This report provides a prioritized list of managed assets with specific security issues, allowing you to focus remediation efforts on the most at-risk devices across your client base. It helps you identify which systems pose the greatest security risk right now, and the specific steps needed to secure them.

Generate the Report:

  1. Click the Reports tab.
  2. In the RMM section, click Vulnerable Systems.
  3. If desired:
    • Start typing the name of a Customer Organization and select one.
    • Check the “Ignore New Patches” box to ignore patches less than a week old.
    • Check the “Ignore Stale Assets” box and enter a numeric value for "Stale Age (in Days). This helps you filter out devices that are offline, decommissioned, no longer actively managed, or have not communicated with Syncro within the specified number of days. For example, If you check the box and enter 30, the report will exclude assets that have not "checked in" (that is, synced with Syncro) in 30 days or longer.
    • Check the “Include Globally-Blocked KBs” box. 
    • Select one or more patch Categories using the dropdown menu.
    • Select a Saved Asset Search using the dropdown menu.
  4. Click Run Report.

Tips: 

  • Click any hyperlinked Asset Name to navigate to its Asset Details Page. 
  • Click a hyperlinked KB number to view it on Microsoft's website.
  • Click Install to install a specific patch on the assets missing it. For offline assets, Syncro will install them the next time they sync. If you check the boxes next to multiple assets, you can then click the Install Selected button in the far upper right corner to bulk install.

Interpret the Report: Technical Leaders should use this report to efficiently prioritize remediation tasks, focusing first on devices with the highest risk. The report explicitly details the missing patches on vulnerable machines contributing to the risk. Technicians can use the report as a highly actionable list, detailing the most vulnerable assets and can take steps to install the missing patches to improve security posture.

About the Data:

  • This report includes any RMM-monitored device that currently fails one or more critical security checks, such as anti-virus status or patching compliance.
  • Data reflects the current status of each asset based on its most recent successful RMM check-in.
  • Devices with RMM agents that have not checked in within the configured reporting window are not included, as their status is considered unknown.

Next Steps: Address the top five most at-risk systems by installing the patches listed for each asset.


Suggested Review Schedule

Based on the content of each report, here is a suggested breakdown of which reports are best suited for immediate operational auditing versus long-term strategic analysis:

Daily or Weekly Review (Operational Health & Security)

  • Asset Activity Audit: Review daily to investigate security incidents, unauthorized remote access, or recent system failures.
  • Vulnerable Systems: Check weekly to prioritize remediation for the most at-risk devices and install critical missing patches.
  • Managed Anti-Virus Summary: Review weekly to ensure all antivirus agents are syncing and endpoints are fully protected.
  • Missing Patches By KB: Audit weekly to identify widespread security gaps and deploy high-priority updates across your entire fleet.
  • Applied Policy & Asset Override Summary: Review weekly to ensure assets are inheriting the correct security rules and to remove unnecessary manual overrides.

Monthly or Quarterly Review (Strategic Trends & Capacity)

  • Splashtop Billable Usage Summary: Review monthly before billing cycles to ensure all premium remote access seats are accurately invoiced.
  • RMM Summary By Customer: Analyze monthly to identify high-risk clients and allocate technical resources to stabilize "loud" environments.
  • (Customer) Executive Summary: Generate monthly to demonstrate service value to clients and provide talking points for business reviews.
  • Asset Aging: Review quarterly to build hardware refresh proposals and identify budgeting needs for aging equipment.
  • Asset Audit & Software Inventory: Audit quarterly to maintain an accurate hardware inventory and ensure software license compliance.

Was this document helpful?

Yes
No
Give feedback about this document

The integrated platform for running a profitable MSP business

Syncro All-in-one MSP Software Facebook Syncro All-in-one MSP Software Twitter Syncro All-in-one MSP Software LinkedIn Syncro All-in-one MSP Software YouTube Syncro All-in-one MSP Software Reddit
  • Compliance
  • Privacy Policy
  • Website Terms
  • Service Terms
Knowledge Base Software powered by Helpjuice

© 2017-2026 Servably, Inc. All rights reserved.

Expand