Configure Report Definitions
Use the available fields to build a report that runs at set intervals and automatically sends the PDF report to the e-mail addresses you specify.
In addition to creating your own report definition, you can use the included, predefined, read-only, on-demand reports. The included reports are named as follows:
-
Threat Assessment Last Day
-
Threat Assessment Last Week
-
Threat Assessment Last Month
To run a predefined, read-only, on-demand report, select the check box for the report in the list view and click the Run Now button at the top of the list view page.
To configure a custom report definition:
- Navigate to Reports > Report Definitions.
- Click the plus icon (+) on the top right of the page. The Report Definition window is displayed.
-
Complete the configuration according to the guidelines provided below:
Table 1: Report Definition Fields Field
Description
Name
Enter a name for the report. This is a unique string that must begin with an alphanumeric character and can include dashes, spaces, and underscores; 63-character maximum.
Description
Give the report a detailed description that all administrators can recognize.
Date Range Options
Configure a recurring schedule for running a report. The options are: Last Day (daily), Last Week (once weekly), and Last Month (once monthly). Based on your selection, you will configure more a specific time period in the next field.
Generate Report Every
Use the downward arrow in the entry field for adding multiple days. Use the X to remove a day.
If you selected Last Day in the previous field, choose multiple days of the week for running a report. For example, every day (add all days manually Sunday through Saturday) or only add Monday, Wednesday, and Friday for an every other day report.
If you selected Last Week, choose one day of the week for running a weekly report.
If you selected Last Month, choose whether to run a report on the first day of the month or the last day of the month.
e-mail Recipients
Once a report is generated, you can have it sent to one or more e-mail addresses. The e-mail addresses available for receiving reports come from the Administrator > Users list.
Once the report is created, you can send it to an e-mail address on-demand by selecting the check box for the report in the list view and clicking the Send button at the top of the page. A new window appears, and you can select an e-mail address and click OK. You will see a confirmation message indicating that the reports will be sent to the specified e-mail addresses.
You can send threat assessment reports only to recipients in the Users list. If you include any addresses that are not in this list, the reports will not be sent, and those addresses will be logged as unauthorized recipients. The system logs for any attempts to send reports to unauthorized recipients, giving you greater visibility and control.
Once a report is generated, it is listed as a downloadable PDF file in the Reports > Generated Reports page for viewing anytime.
- Click OK to save the report definition.