Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Scheduling, Generating, Previewing, and Sharing Security Reports

 

You can schedule report generation, generate reports, preview reports as PDF, and share the reports through e-mail.

To perform these actions on a report definition:

  1. Select Reports > Report Definitions > Security.

    The Security Report Definitions page appears.

  2. Select or right-click the report definition on which you want to perform an action and click More.

    A list of actions that you can perform on the report definition is displayed.

  3. Select the appropriate action from the list:

Editing Report Generation Schedule

You can edit the report generation schedule of the selected report definition from the Security Report Definitions page:

  1. Select the report definition for which you want to edit the report generation schedule.
  2. Click More > Edit Schedule. Alternatively, right-click on the selected report definition and select Edit Schedule.

    The Edit Report Schedule page appears.

  3. Specify whether you want to generate the report at the current time or schedule it for a later date and time:
    • Run now—Select this option to schedule the report generation at the current time.

    • Schedule at a later time—Select this option to schedule the report generation for a later date and time in MM/DD/YYYY and HH:MM:SS formats.

  4. Click OK to save your changes.

    You are returned to the Security Report Definitions page on which a confirmation message, indicating that the report generation schedule is updated successfully, appears.

Generating Reports

You can generate a report at the current time, with either saved settings or custom settings. You can select Saved Settings to generate a report based on the values specified in the report definition for the selected report or select Custom Settings to modify the values for the Number of Top Logs and the Time Span settings, and generate a report based on the modified values.

Note

The modified values are applicable only for the report that is being generated and are not saved in the report definition.

To generate a report:

  1. From the Security Report Definitions page, select the report definition based on which you want to generate the report.
  2. Click Run Now on the Security Report Definitions page. Alternatively, click More > Run Now or right-click on the report definition and click Run Now.

    The Run Report page appears.

  3. Do one of the following:
    • Select Saved Settings to generate a report based on the values already specified in the report definition.

    • Select Custom Settings to modify the values for the Number of Top Logs and Time Span settings, and generate a report based on the modified values.

    Note

    The values that you modify are applicable only for the report that is being generated and are not saved in the report definition.

  4. Click OK to save your changes.

    The Run Report page appears indicating the progress of the report generation. After the report is generated, the Download PDF Report link appears on the Run Report page.

  5. Click Download PDF Report.

    Follow your browser instructions to view or save the report in PDF.

Previewing Reports in PDF

You can preview and download the selected report in PDF:

  1. Select the report definition based on which you want to generate the PDF of the report.
  2. Click More > Preview as PDF. Alternatively, right-click on the report definition and select Preview as PDF.

    The Preview as PDF page appears.

  3. Click Download PDF Report to view the report in PDF. or click Cancel to cancel previewing the report.

    The Security Report Definitions page appears.

Sharing Reports through E-mail

You can share the generated report through e-mail:

  1. Select the report definition based on which the report is to be generated and shared through e-mail.
  2. Click More > Send Report. Alternatively, right-click on the report definition and select Send Report.

    The Edit Recipients page appears:

    • Recipients—Enter or select one or more e-mail addresses of users to whom you want to send the report.

      By default, you can search by first name and select registered users. You can also enter external e-mail addresses.

    • Subject—Enter the subject line for the e-mail. The maximum length is 2048 characters.

    • Comments—Enter the text to be included in the body of the e-mail.

      The maximum length allowed is 2048 characters.

  3. Click OK to save your changes.

    The Security Report Definitions page appears.