Thanks Jason for the reply.
I’m using the following query that gets details of baseline actions.
I came across another thread that asks something similar “not reported” servers: Patch action servers are having not reported status
(name of computer of it | “n/a”, name of parent group of action of it | “n/a”, id of action of it as string | “n/a”, name of action of it | “n/a”, ((if cve id list of source fixlet of action of it = “” then “n/a” else cve id list of source fixlet of action of it) | “n/a”), status of it as string | “n/a”, preceding text of last " " of (start time of it as string) | “n/a”, preceding text of last " " of (end time of it as string) | “n/a”) of (results whose (status of it as string != “”) of top level bes actions whose (top level flag of it AND (name of it as lowercase contains “LINUX” as lowercase OR (name of it as lowercase contains “WINTEL” as lowercase)) AND (name of issuer of it = (“abc@xyz.corp”) AND time issued of it > (now - 1 * day))))