S
ECTION
3: S
ECURITY
R
EPORTS
U
NDERSTAND
THE
MOST
COMMON
AND
USEFUL
FEATURES
M86 S
ECURITY
E
VALUATION
G
UIDE
61
S
ECTION
3: S
ECURITY
R
EPORTS
Security reporting features are available if using an SWG with your Security
Reporter.
Understand the most common and useful features
This section of the Evaluation Guide supplies the evaluator information on
employing basic tools in the Security Reporter to generate security reports using
log feeds of an SWG appliance running software versions 9.2.x and higher. You
will learn how the flexibility of the security report views lets you display different
report types without switching to another panel, or readily access the Report
Wizard to modify the current report view. As with productivity reports, security
reports generated in the Security Reporter are easily customizable and can be
saved, exported, or scheduled to run on a regular basis.
Use security reports for a view of network activity
The four basic security report types—Blocked Viruses, Security Policy Violations,
Traffic Analysis, and Rule Transactions—are accessible via
Reports > Security
Reports
. Each report type provides a bar chart showing the top six security
offenders for the given report. This at-a-glance information lets you see which
areas of the network need to be safeguarded most:
Rule Transactions security report
The four security report types contain the following information:
•
Blocked Viruses
- Includes details for each instance of each blocked virus
detected from end user Internet/network activity.
•
Security Policy Violations
- Provides information on each instance in which
an end user breached a security policy.