About the ATP Generated Reports Page
To access this page, select Monitor > Reports > ATP Generated Reports.
You can configure ATP threat assessment reports to be run on-demand or on scheduled intervals. While you cannot determine the information included in the report, you can narrow information to a selected timeframe. When the system generates a report, you and other designated recipients receive the report in PDF format through e-mail.
Tasks You Can Perform
You can perform the following tasks from this page:
- Download the report—Click on a report PDF name to download the report. The content of the generated report is shown in Table 2.
- Delete the report—Select a report and click the delete icon (trash can). An alert message asking for confirmation to delete your selection is displayed. Click Yes to delete the report.
Table 1 displays the fields on ATP Generated Reports page.
Field | Description |
---|---|
Report PDF Name | Name of the generated ATP report. Click on the report name to download the report. The details of the report is described in Table 2. |
Generated Time | Date and time of report creation. |
Description | Description of the generated report. |
Definition | Definition of the generated report. |
Generated By | User who generated the report. |
Recipients | User with whom the report is shared. |
Report Category |
Definition |
---|---|
Executive Summary |
An overview report data separated into following categories:
|
Malware |
The malware section contains the following information:
|
C&C Server and Malware Locations |
This section contains the following information:
|
Hosts |
This section contains the following information:.
|
Risky Files |
This section contains the following information:
|
Risky Domains, URLS, AND IPs |
This section contains the following information: top risky domains, URLs, and IP addresses detected by the number of times access was attempted. It also includes the top users who have attempted to access these risky domains, URLs, and IP addresses.
|
|
This section contains the list of actions taken on scanned emails. It also includes email attachments determined to be malware and users who are risky email senders.
|
Devices |
This section contains the following information:
|