On This Page
Report Settings
When creating or editing a report, you need to configure the report settings. These settings are used to define the report domain devices, recipients, and schedule (for recurring reports), as well as additional information required for the report. Some settings are the same for all report templates, while others are specific to an individual template. The report settings are initially configured when creating a report (Create Report tab), and you can reuse these settings when editing an existing report to make changes (Saved Reports tab).
Report settings are configured in the Setup page for the report.
The following settings apply to all report templates:
Setting Category |
Fields |
---|---|
General |
Report name |
Domains |
|
|
To Email Address: The recipients for notification emails Use a semicolon (;) to separate multiple email addresses |
Schedule |
|
The following settings apply to specific report templates:
Report Template |
Setting Category |
Settings |
---|---|---|
Business Ownership Changes
|
|
Select Revision options (single device selected)
Select Dates (multiple devices selected)
|
Device Audit |
Audit |
Select CIS audit paragraphs for inclusion (e.g. CIS 1.3.1 password complexity), all selected by default. The options are grouped into sub-categories: Settings, password rules, authorization, services, user ID, high availability, dynamic updates, Wildfire and security profiles/ Device credentials must be set up before running this report. |
Policy Analysis |
Policy Data |
Data options:
Filter options:
Shadowed rules are rules that match the query, but will never actually handle any of the traffic included in the query as the traffic is handled by a rule or rules higher up in the rulebase. Since not all rules have a shadowing status in SecureTrack, some rules that match the traffic defined in rules that are higher up in the rulebase may be returned in the report output. Errors will be added to the STRE log file.
|
Rule Analytics |
Rules |
Search - Autocomplete search field for rule values |
Rule and Object Changes |
Revisions category displays when you select a device |
Select Revision options
|
Security Best Practices |
Best Practices |
|
Security Violations |
Domains |
|
Shadowed Rules |
Domains |
|
Unified Security Compliance |
Domains |
Select Matrix |