Business Ownership Change Report

Overview

Business Ownership change reports are scheduled reports that contain information on changes made to access control for a specified network segment, within a specified span of time. These reports can be valuable for administrators who are responsible for, or own, those network segments.

The reported changes include enabling or blocking traffic. The report can be configured to include incoming traffic, outgoing traffic, or both types of traffic.

For Check Point devices, the Business Ownership change report includes only access control changes installed (not merely saved) during the specified time frame.

SecureTrack generates the report in both HTML and PDF formats.

This TOS Aurora feature does not support IPv6.

What Can I do Here?

Create a Business Ownership Change Report

  1. Click New Report.

    New business ownership report

    The report configuration wizard has three parts.

    Report 3 steps

  2. General Criteria:

    business ownership report general

    1. You can change the Title. By default, the report name is the Report Type with the current date.

    2. In a Multi-Domain environment, select the Domains that contain the devices on which you want to run the report.

    3. Select Devices for the report.

      • If you selected one domain, you can limit the report to include specific devices in the domain.

      • If you selected more than one domain, then Any is selected for Devices, and all devices in the selected domains are included in the report.

    4. Click Next.

  3. Specific Criteria:

    Advanced Change report specific

    1. Configure as required:

      • Monitored Network for the report: You can use the precise case-sensitive name of a Network Object defined on a monitored device or in SecureTrack Network Zones, or explicitly define a network address.
      • Monitored Traffic: Report changes that affect one or both of the following:
        • Outbound traffic from the network
        • Inbound traffic into the network
    2. Click Next.

  4. Output:

    1. Configure the fields:

      Parameter

      Description

      Send on Event

      Select the events to trigger this report. You can use the <shift> key to select more than one event.

      Select one of the following, to decide whether to always run the report after the event, even when there are no changes:

      • Only when the policy was modified: Only if there are changes to be reported on, relative to the previous revision.
      • Even if the policy was not modified: If there are no changes, the report will state that there were no changes. For example, if an administrator first saves a Check Point policy, and then installs the policy on a gateway a few minutes later, the second event has not modified the policy.

      Delivery

      The report can be delivered in any of the following three ways:

      • Send report by email: The report is generated for each of the selected Recipients and emailed to them. The emailed report's formatting (embedded HTML, MHT attachment or PDF attachment) is globally configurable for all users.
      • Export report: This option is available only to SecureTrackAdministrators, and only when enabled in the Reports page.A report is generated according to the owner's configured preferences and permissions, and exported according to the configuration in the Reports page. To be notified when a report is generated, select Email me when exported.
      • Save report in Repository: The report is saved and users can later view it by selecting the Reports Repository tab (in Report view). Select Email a link to have a link to the report sent to recipients when a report is generated, provided the recipient's email is configured.

      Periodic Scheduling

      Defines a recurring schedule for report generation. The report can be generated on a daily, weekly, or monthly basis.Reporting Period controls how far back the report will span from the time of generation.

      Recipients

      Recipients: The SecureTrack users who receive the report (or a link or notification). When a SecureTrackUser creates a report, only that User is a recipient. When a SecureTrack Administrator creates a report, multiple recipients can be defined. These Recipients are SecureTrack Administrators or Users whose email addresses have been configured in SecureTrack. Other email addresses can be defined, separated by semicolons ( ; ) in the Additional Email Recipients text box.

      Note: In a Multi-Domain environment, administrators (Super and Multi-Domain) can only add users who have permissions for the current Global or Domain context.SecureTrack does not send the report if a specified recipient does not have permission for a device or Domain included in the report configuration when the report is generated.

      Additional Email Recipients

      Enter additional email recipient addresses. Separate the addresses with a semicolon (;).

      Email Subject

      You can click the field buttons to add the fields to the subject line of the email notifications.

      • Report Fields: You can include the name of the report and the time that the report was generated.
      • Revision Fields: When the report is configured to Send on Event, you can include the name of the device, the revision number, the action that triggered the notification, the name of the administrator who did the action, and the ticket ID associated with the change in the new revision.

      Advance Settings

      Privacy

      • Hide administrator details: The report does not include the names of users that made changes to policies or the name of the report creator.

      Display Settings

      • Show textual configuration (Cisco only) (when ticket ID recognition is configured): If selected, the rule Name and Comment fields are removed from the report results. Only the ticket ID is included. This is useful if ticket comments contain confidential information that should not be sent to report recipients, such as administrator details.

      Object definitions

      • Groups and members: The report includes the definitions of group objects and their member objects. This is useful for recipients that do not have SecureTrack access. SecureTrack users can click group objects in the report to see the definitions.
      • Non-group objects: The report includes definitions of non-group objects.

    2. Click Save.

      The saved report appears in the Business Ownership Reports list from which you can Run (Run), Edit (edit domain), or Delete (Delete) it.

      business ownership report list

Generate Report Results

This procedure is not applicable to PCI DSS Reports.

  1. Select Business Ownership.

    A list of configured reports, available for the connected user, appears. Each line in the table displays basic information for one report: the report's title, type, relevant devices, recipients, and scheduling.

    general reports

  2. Click Run for the report,.

  3. Configure the following.

    report period

    • Report Period: The time period for the report.

      • Preset: Select a preset period from the list.

      • Custom: Complete the fields that determine the custom period.

    • Output options: Determines the report display and how it should be saved:

      • Display the result in the browser: View the result now, as either HTML or a PDF.

      • Save report in repository and email me a link: You can review report results, which are saved in the repository, at any time using the link in an email message.

  4. Click Run Report.

    The report is generated.

How Do I Get Here?

SecureTrack > Reports > Business Ownership