498
Generating reports
Analysis reports
Generating and viewing an analysis report
Once an analysis report is generated, you can either print it or save it in a PDF format. Once saved, you
can email the report to interested parties using a native email program that can automatically send,
such as sendmail on UNIX or some other public-domain Windows application.
Note:
If you choose a date range for your report that is too broad, it may create a report that is too
large, which generates a warning message. If this happens, select a narrower report date range.
Prerequisites
None.
To generate and view an analysis report
1
In the SGMI, on the Reports menu, click
Analysis
.
2
In the Analysis Reports dialog box, do the following:
■
Under Reports, select the report category to generate.
■
In the PDF paper type drop-down list, select the paper size for your report.
■
To select a date, in the Date text box, click the Calendar button.
■
In the Start drop-down lists, select the hour and minutes to begin the report.
■
Select AM or PM.
■
In the Duration drop-down lists, select the time in seconds, minutes, or hours for which you
would like to run the report. You can also use the time slider bar to set the time duration.
3
To generate a report, click
Generate Report
.
Generating a report evokes Adobe Acrobat Reader.
After you generate a report, you can view, save, or print it.
4
Click
Close
.
Related information
For further information related to this topic, see the following:
■
■
“Printing and saving analysis reports”
■
“Analysis report descriptions”
Printing and saving analysis reports
You can print or save the analysis reports to keep a history of security gateway performance, or to
share analysis data with colleagues.
Prerequisites
Complete the following task before you begin these procedures:
■
“Generating and viewing an analysis report”
Print and save analysis reports
Analysis reports generate a PDF-formatted document in the paper size you selected. You can easily
print or save a report.
To print an analysis report
◆
From the report you generated, in the File menu, select
.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...