Sample Reports

Document created by RSA Information Design and Development on Jun 13, 2017Last modified by RSA Information Design and Development on Feb 12, 2018
Version 3Show Document
  • View in full screen mode

This section provides sample reports using the following report templates:

  • All Users
  • Users with Tokens
  • Authentication Activity
  • List All Authentication Agent Records
  • List All Installed Agents
  • System Log

Sample All Users Report

The All Users report provides information about users in your deployment. You can filter results based on input values such as custom user attributes, security domain, or group.

For example, you can generate a report to list all users in a specific department, if the department is defined as a custom user attribute.

In this example, Departments is a custom user attribute with Human Resources, Finance and IT as predefined values.

Suppose you want to generate a report that lists all users in the Human Resources department along with their User ID, Last Name, Email, and Lockout Status. On the Add a New Report page, select Departments and Human Resources in the Custom User Attribute field. Enter the search string as Human Resources. Include the following columns under Show in Report:

The following figure shows the report output. The column headers highlighted in red are the same as those defined in the Add Report page.

Sample Users with Tokens Report

The Users with Tokens report provides a list of users who are assigned tokens. You can narrow the search using input parameter values such as customer user attributes.

For example, suppose you want to generate a report that lists the User ID, First Name, Last Name of users in the Human Resources department, and the lockout status of each account. Specify the output columns and input parameters as shown in the following figure.

The following figure shows the report output. The column headers highlighted in red are the same as those defined in the Add New Report page.

Sample Authentication Activity Report

The Authentication Activity report helps you track the following types of authentication activities:

  • Security and Operations Console login
  • Users with tokens
  • Agents on the server

For example, suppose you want to generate an authentication activity report that lists the user ID, date and time of authentication, result of the attempt, and type of activity that took place across multiple identity sources. Specify the output columns and input parameter values as shown in the following figure.

The following figure shows the report output. The column headers highlighted in red are same as those defined in the Add New Report page.

Sample List All Authentication Agent Records Report

The List All Authentication Agent Records report provides information on the authentication agents that have been added to Authentication Manager. For example, you can view the user groups and security domains assigned to each agent, how many times each authentication agent is installed in your deployment, and whether each agent is enabled or disabled.

The following figure shows the report output. Each authentication agent in the report has one agent record in Authentication Manager. However, the Installed Agent Count column displays 0 for the RADIUS Server agent that is not installed in the Authentication Manager deployment, and 2 for a Standard Agent in the Application_Admin user group because that agent is deployed in two locations. All of the agents are enabled.

Sample List All Installed Agents Report

The List All Installed Agents report provides the following details for each installed authentication agent in your deployment that has corresponding record in Authentication Manager:

  • Version number
  • Platform
  • Hostname and IP address that was last used. The IP address is obtained from the machine on which the agent is installed or from proxy-related HTTP headers, such as X-Forwarded-For (XFF), if your deployment uses an HTTP proxy or a load balancer.
  • Time and date of the last authentication
  • Security domain
  • Name of the corresponding authentication agent record in Authentication Manager.

In the following example, the Software Identifier column is selected for the report. Some newer authentication agents provide a unique identifier for each installed agent. An agent might have one record in Authentication Manager, but the agent can be installed on multiple machines with a unique identifier for each installation.

Only some agents provide the information in the Version, Component, and Platform columns. All agents can provide information about their security domain and the last authentication.

In the following output, the first row displays dashes for information that an older authentication agent cannot provide. RSA Authentication Agent 8.0 for PAM provides the information. If the PAM agent does not send the requested information, then the field displays "Unknown" for that installed agent.

Sample System Log Report

The System Log report lists log entries from the system log. You can narrow the search to a specific time period using input parameter values.

For example, suppose you want to generate a report that lists the Result, Activity Result Key, Date and Time and Description of events in the system log for the last one week. Specify the output columns and input parameters as shown in the following figure.

The following figure shows the report output. The column headers highlighted in red are same as those defined in the Add New Report page.

 

 

 

 


Attachments

    Outcomes