Creating a Report

STRE reports are created in the Create Report tab from a list of predefined templates. These reports can be ad-hoc single-use reports, frequently used reports, or recurring reports that automatically run on a schedule that you define when creating the report.

How to create a report

  1. Click on the report template that you want to use.

    The Setup page for the report is displayed.

  2. Configure the report settings, which are used to define the report domain devices, recipients, and schedule (for recurring reports), as well as additional information required for the report. Some settings are the same for all report templates, while others are specific to an individual template. You can reuse these settings when editing an existing report (Saved Reports tab).

    The following settings apply to all report templates:

    Setting Category

    Fields

    General

    Report name

    Domains

    • Select domain
    • Select device(s) - For some reports, you can select multiple devices or device groups.

    Email

    To Email Address: The recipients for notification emails

    Use a semicolon (;) to separate multiple email addresses

    Schedule

    • Repeats
    • Days of the week
    • Time 

    The following settings apply to specific report templates:

    Report Template

    Setting Category

    Settings

    Business Ownership Changes

     

    • Revisions: Displayed when you select a device
    • Dates: Displays when you select more than one device.

    Select Revision options (single device selected)

    • Start Revision
    • End Revision

    Select Dates (multiple devices selected)

    • Start Date
    • End Date

    Device Audit

    Audit

    Select CIS audit paragraphs for inclusion (e.g. CIS 1.3.1 password complexity), all selected by default.

    The options are grouped into sub-categories: Settings, password rules, authorization, services, user ID, high availability, dynamic updates, Wildfire and security profiles/

    Device credentials must be set up before running this report.

    Policy Analysis

    Policy Data

    Use the search icon to open the object browser.

    In the object browser, you select Source, Destination, and Service values from devices or zones in any available domain.

    • Source and Destination: Select one or more Devices to view the list of Available Objects to select. To remove a selected object, click it in the Selected list.
    • Service: Select one or more predefined applications from the list of Available Applications or enter a protocol and port separated by a colon (for example, tcp:80 or udp:21). To remove a service, click it in the Selected list.

    Data options:

    • Negate - Click to exclude rules that match the information entered in the query
    • Exclude Any - Click to exclude services/objects with "Any"

    Filter options:

    • Select Shadowing: Select a shadowing option for filtering rules.
    • Shadowed rules are rules that match the query, but will never actually handle any of the traffic included in the query as the traffic is handled by a rule or rules higher up in the rulebase.

      Since not all rules have a shadowing status in SecureTrack, some rules that match the traffic defined in rules that are higher up in the rulebase may be returned in the report output. Errors will be added to the STRE log file.

    • Select Action: Select a rule action for filtering rules: Accept, Drop or Any (both Accept and Drop)
    • Simulate NAT: Select to use NAT simulation when calculating the path
    • Last Installed Revision: Select to use the last installed policy in the simulation. If there is no installed policy, the last saved policy is used
    • Display Blocked Status: Select to display blocked traffic icons next to devices blocking the traffic
    • Show Broken Paths: Select to display all nodes even if the node cannot reach the destination, or if the source and destination are the same.

    Rule and Object Changes

    Revisions category displays when you select a device

    Select Revision options

    • Start Revision
    • End Revision

    Rule Analytics

    Rules

    Search - Auto-complete search field for rule values

    Security Best Practices

    Best Practices

    • Best Practices Type
    • Names - Best practice use cases
    • Values
    • Severities

    Security Violations

    Domains

    • Select Matrices
    • Custom Filters - options to exclude rules

    Shadowed Rules

    Domains

    Custom Filters - options to exclude rules

    Unified Security Compliance

    Domains

    Select Matrix

  3. Click Save Report or Run Report.

You can also create a report by editing an existing report's settings in the Saved Reports tab.