![background image](http://html1.mh-extra.com/html/m86-security/700/700_evaluation-manual_3137620076.webp)
S
ECTION
3: S
ECURITY
R
EPORTS
C
APTURE
THE
SECURITY
REPORT
IN
FORMAT
70
M86 S
ECURITY
E
VALUATION
G
UIDE
Security Report format
The generated Security Report PDF file includes the following information:
Sample PDF for Rule Transaction Security Report, page 1
The header of the generated report includes the date range, report type, and
criteria details.
The footer of the report includes the date and time the report was generated (M/D/
YY, HH:MM AM/PM), administrator login ID (Generated by), Filter information, and
Page number and page range.
The body of the first page of the report includes a bar chart showing the top six
graphs with count indicators, and the report name.
The body of pages following the first page of the report includes the report name
and list of records with the corresponding Item Count for each record. For break
type reports, the Total displays at the end of each section.
For non-break type Rule Transaction reports, Policy and Action column data
precede Item Count column data.
At the end of the report, the Grand Total displays for all records. For Rule Transac-
tion reports, the total Count displays beneath the Grand Total.