The Periodic Summary Report is found in the Admin Notification section within the Settings tab. It is an automatically generated report that can be sent on a monthly, 30 day, weekly, or daily interval. For more information on how to set up the report, click here

If your report does not contain values, or you do not feel like you have the options to configure some of the block reasons specified, please make sure to upgrade to the latest version or reach out to us at support@enzoic.com.


This report is a great way to give admins a powerful tool that provides valuable insights into data trends over time. While the report is fairly straightforward, this article is designed to provide additional context and clarification around each of the items listed. 


The report features 4 main sections:



Statistics for All Monitored User Accounts


This section of the report outlines the total number of users that currently have compromised passwords, compromised credentials, are sharing a password, have a password set to never expire, have no password set, or are considered stale (no login within the last 6 months). These stats are the current total statistics for your domain and are NOT influenced on the timeframe you have chosen.

Password Change Activity


Total Password Change Checks: How many monitored users attempted a password change based on the time specified.

Total Password Changes Blocked: Of those users that attempted a password change, how many of their passwords were rejected. 

The next listed items go in-depth into why a password attempt was blocked. With the exception of the Custom Dictionary, all of the following items are from the policy settings within the Monitoring Policies section of the console. 

Please note: This report lists every policy setting, even if it is not enabled within your console. If you do not have a certain setting enabled, it will still show up in the report, but will simply have a zero next to it. For more information on each of the policy settings, click here. None of these options take into account any windows Group or Fine Grained Password policies.

  • Exact Match with Compromised Password: The password the user is attempting to use was found in a data breach or cracking dictionary.

  • Fuzzy Match with Compromised Password: The password the user was attempting was normalized and then found to be used in a data breach or cracking dictionary. 

  • New Password too Similar to Previous Password: The password the user was attempting was too similar to their last password. 

  • Password Found in Custom Dictionary: A user attempted to use a word in the custom dictionary. 

  • Root Password Compromised: A user attempted to use a weak or compromised word that is surrounded by numbers and special characters (IE: 123@Password456!). Root password detection strips away the numbers and special characters and evaluates the core word. 

  • Password Contained User Email: A user attempted to use a password that contained their email. 

  • Password Contained Login Name: A user attempted to change their password to something that contains their NT login. 

  • Password Length Less than the Minimum Required Characters:  A user attempted to change their password to something that contains less than the minimum required characters specified by your Enzoic policy. 

  • Password Length Exceeded the Maximum Allowed Characters: A user attempted to change their password to something that contains more than the maximum allowed characters specified by your Enzoic policy. 
  • Password Missing At Least One Lowercase Character: A user attempted to change their password to something that does not contain at least one lowercase character. 
  • Password Missing At Least One Uppercase Character: A user attempted to change their password to something that does not contain at least one uppercase character.
  • Password Missing At Least One Symbol: A user attempted to change their password to something that does not contain at least symbol/special character.
  • Password Missing At Least One Number: A user attempted to change their password to something that does not contain at least number.

  • Credentials Compromised: A user attempted to change their password to something that hit on the credential combination of their username and password together. 



Continuous Password Protection Activity 


In addition to checking password attempts as they come through, Enzoic also reviews each password it has cached on a daily basis to see if any new breaches have compromised users' passwords.


Users selected for continuous monitoring: This is the total number of users that are currently being monitored under a policy with Continuous Monitoring (either password or credential) enabled. 

Total Checks: This is the total number of times Enzoic has checked the cached passwords

Total Detections: This is the total number of compromises Enzoic has found from the users it’s monitoring. 

The rest of the report lists the same policy settings as the top but refers to compromises found in daily checks, rather than password attempts. 



Users with Compromised Passwords for <time period>


This section of the report lists out users that were found to be compromise, the date they were detected as such, as well as their current remediation status. It will only show users compromised based on the timeframe you have specified to receive your report. For example, if you selected a daily report, this report will only contain compromised users for the last 24 hours. In the event there are too many compromised users to display, the report will state that you should head to the local Enzoic Console and look at the monitored, or compromised user report.