Create Application User Usage Report Definitions
The application user usage report provides an overview of the business risks in relation to applications and user behavior, such as abnormalities that can lead to data loss, bandwidth hogging, time-consuming applications, and personal applications that can increase business risks.
Before You Begin
Read the Reports Overview topic.
Review the Reports main page for an understanding of your current data set. See Report Definitions Main Page Fields for field descriptions.
- Select Monitor > Reports > Report Definitions.
- Click Create, and select Application User Usage Report.
-
Complete the configuration according to the guidelines provided in the Table 1.
Table 1: Application User Usage Report Definition Settings Settings
Guidelines
General Information
Report Name
Enter a unique string for the report name containing maximum 64 alphanumeric characters.
The name can contain dashes.
Description
Enter a description containing maximum 900 characters for the report.
Content
Time Span
Specify the duration for which the report is generated.
You can select a time span of the last 3 to 24 hours or a custom time span. When you select the custom option, you must specify the From and To date in the MM/DD/YYYY and HH:MM:SS format.
Number of Top Logs
Enter the number of top events to be displayed.
The valid range is 1 to 10, and the default value is 5.
Schedule
Report Schedule
Click Add Schedule.
Select the type of report schedule to use:
-
Run now—Select this option to schedule and publish the configuration at the current time.
-
Schedule at a later time–Select this option to schedule and publish the configuration at a later time.
Email Section
Email Recipients
Enable this option to send the report to specific recipients in an email.
-
Recipients—Enter or select the e‐mail addresses of the recipients. By default, you can search by first name and select registered users. You can also type in external email addresses.
-
Subject—Enter the subject for the e‐mail notification.
-
Comments—Enter the comments for the e‐mail notification.
Note:The reports are not sent if a specified recipient does not have permission for a device or domain included in the report configuration when the report is generated.
-
- Click OK to save the report definition.
A new threat analysis report definition with the defined configurations is created.