Application Resilience report
The Application Resilience report shows your Windows devices with an activated Application Resilience policy.
Depending on which of the applications you've activated in your Application Resilience policies, you can view information about their status in this report.
By default, the report includes status-related columns for Microsoft BitLocker Drive Encryption and Microsoft SCCM only. To view information about any other resilient applications A third party application that is actively monitored by the Secure Endpoint Agent. This feature is available only when the Application Resilience policy is activated on a Windows device. Depending on the configuration of this policy, the agent may be able to repair the application if it's non-compliant, or reinstall it if it's missing., you can add additional columns to the report.
On the Reports page, you can access this report from Absolute view or the Application category. You can also access it from the Application Resilience widget on the Dashboard.

The Application Resilience report applies only to devices running a supported version of the Windows operating system. In addition, the Application Resilience policy needs to be activated on each device.

By default, the following filters are used to generate this report:
Agent status is Active and
Platform type is Windows

The information collected from each device is organized in the following default columns:
- Device name, which includes the device's device name The name assigned to the device in the operating system. For Chromebooks, device name is not applicable and therefore shows as "Chrome" in the Secure Endpoint Console. and serial number The identification number assigned to the device by the device manufacturer. For Windows devices, this value may correspond to the serial number of the BIOS, the motherboard, or the chassis, depending on the manufacturer.
- Last App Resilience scan The date and time the Application Resilience (RAR) component of the Secure Endpoint Agent last ran a status check on the device.
- Username Username of the user who was logged in to the device when an agent connection occurred. If no user was logged in during the most recent agent connection, the last detected username shows. If you are viewing a report and want to see if a user was logged in during the most recent connection, add the Current Username column to the report. If no user was logged in at the time of the connection, "No Data" or two em dashes (— —) show in the column.
-
The following columns for the BitLocker and SCCM applications:
-
Status: the detected status of the application
Possible values are:
- Compliant: the application's agent or client is functioning correctly on the device
- Not compliant: the application's agent or client is not functioning correctly on the device
-
Pending scan results: the Application Resilience policy is activated in the device's policy group, but status information is not available for one of the following reasons:
-
Application Resilience is not supported on the device
The Application Resilience report includes a Status column for each application that the feature supports. Therefore, depending on which applications you have configured using Application Resilience, some Status columns may not be applicable.
- The initial scan of the application is currently in progress
-
The device has not connected to the Absolute Monitoring Center since the policy was activated or since the status check was run on the device because:
- The scheduled connection has not occurred yet (may take up to 24 hours)
- The device is powered off
- The device has no network connectivity
-
- Not activated: the Application Resilience policy for the application is not activated.
- Error: an unexpected error occurred while the status check was running on the device. Status information was not uploaded.
- No Data: Application Resilience of this application is not supported because it is not included in the product licenses assigned to the device.
-
Status details: additional details about the detected status of the application
For Compliant statuses, No Data typically shows in the Status details column. However, if the Secure Endpoint Agent recently performed a repair or reinstall of the application, and it is now Compliant, the details of that status change show in the column.
For Not compliant statuses, the column shows details about the specific components of the application that were checked. If one of the Repair options is enabled, the column shows details about the repairs that were attempted. Troubleshooting non-compliant devices
To view status information about other applications, add the application's columns to the report.
-

In addition to Status and Status details, you can view additional Application Resilience-related information in the report. Click > Edit Columns and add one or more of the following columns associated with a resilient application A third party application that is actively monitored by the Secure Endpoint Agent. This feature is available only when the Application Resilience policy is activated on a Windows device. Depending on the configuration of this policy, the agent may be able to repair the application if it's non-compliant, or reinstall it if it's missing.:
To see if any WinMagic SecureDoc clients were repaired during the most recent status check, add the WinMagic SecureDoc > Repair Status column to the report. If desired, you can then save your changes by creating a new report. |

By default, the report data is sorted by Identifier, in ascending order. You can change the sort order by clicking a column heading.

Depending on the Absolute licenses associated with your account, and your user role, you may be able to perform some or all of the following tasks on the Application Resilience report:
- Open and view the report
- Adjust the columns on the report
- Add or remove filters
- Export the report
- Email the report on a set schedule
- Favorite the report
- Save changes to report filters and columns to create a custom view or a new report

Depending on the Absolute licenses associated with your account, and your user role, you may be able to perform some or all of the following tasks on the devices in this report:
- Search for and view individual devices in the report
- View the location of your devices
-
Request any of the following actions on one or more devices: