S
ECTION
3: S
ECURITY
R
EPORTS
T
WO
METHODS
FOR
SCHEDULING
SECURITY
REPORTS
M86 S
ECURITY
E
VALUATION
G
UIDE
77
•
All URLs
- Check this checkbox to export all URLs
•
Top
- Specify the number of top URLs to be exported
Step C: Include the users or group in the Users frame
In the Users frame, select one of the accordions and indicate criteria to include in
the report to be generated:
•
By User Group
- If selecting this option, choose the User Group for your report
query results.
•
By Specific User
- If selecting this option, enter the end user name—using the
‘%’ wildcard to return multiple usernames—and then click
Preview Users
to
display query results in the list box below.
•
By IP
- If selecting this option, enter the end user IP address for filtering your
results—using the ‘%’ wildcard to return multiple IP addresses—and then click
Preview Users
to display query results in the list box below.
For a Traffic Analysis or Rule Transactions report, you can narrow your search
result by including filters:
1. Click
>> Filters
at the bottom right of the panel to display the filter results
panel.
2. Choose a filter type from an available accordion (Policies, Rules, Action,
Content Type) and indicate criteria to use in the filter:
• Select one or more records from the Available list box and click
add >
to
move the record(s) to the Assigned list box.
• Click the “Assign All” checkbox to select all records and grey-out the
panel.
3. Click
<< Back
to return to the Security Report Wizard panel.
Step D: Complete information in the Email Settings frame
In the Email Settings frame:
1. Enter at least one
address and then click
Add
to include the email
address in the list box below.
2. Specify the
Delivery method
for the email address: “To” (default), “Bcc”, or
“Cc”.
3. Type in the
Subject
for the email message.
4. If you wish, enter text to be included in the
Body
of the message.
5. Specify the
Output type
for the email: “E-Mail As Attachment” or “E-Mail As
Link”.