Sample Reports

Document created by RSA Information Design and Development on Jun 13, 2017Last modified by RSA Information Design and Development on Jun 13, 2017
Version 2Show Document
  • View in full screen mode

This section provides sample reports using the following report templates:

  • All Users
  • Users with Tokens
  • Authentication Activity
  • System Log

Sample All Users Report

The All Users report provides information about users in your deployment. You can filter results based on input values such as custom user attributes, security domain, or group.

For example, you can generate a report to list all users in a specific department, if the department is defined as a custom user attribute.

In this example, Departments is a custom user attribute with Human Resources, Finance and IT as pre-defined values.

Suppose you want to generate a report that lists all users in the Human Resources department along with their User ID, Last Name, Email, and Lockout Status. On the Add a New Report page, select Departments and Human Resources in the Custom User Attribute field. Enter the search string as Human Resources. Include the following columns under Show in Report:

The following figure shows the report output. The column headers highlighted in red are the same as those defined in the Add Report page.

Sample Users with Tokens Report

The Users with Tokens report provides a list of users who are assigned tokens. You can narrow the search using input parameter values such as customer user attributes.

For example, suppose you want to generate a report that lists the User ID, First Name, Last Name of users in the Human Resources department, and the lockout status of each account. Specify the output columns and input parameters as shown in the following figure.

The following figure shows the report output. The column headers highlighted in red are the same as those defined in the Add New Report page.

Sample Authentication Activity Report

The Authentication Activity report helps you track the following types of authentication activities:

  • Security and Operations Console login
  • Users with tokens
  • Agents on the server

For example, suppose you want to generate an authentication activity report that lists the user ID, date and time of authentication, result of the attempt, and type of activity that took place across multiple identity sources. Specify the output columns and input parameter values as shown in the following figure.

The following figure shows the report output. The column headers highlighted in red are same as those defined in the Add New Report page.

Sample System Log Report

The System Log report lists log entries from the system log.You can narrow the search to a specific time period using input parameter values.

For example, suppose you want to generate a report that lists the Result, Activity Result Key, Date and Time and Description of events in the system log for the last one week. Specify the output columns and input parameters as shown in the following figure.

The following figure shows the report output. The column headers highlighted in red are same as those defined in the Add New Report page.

 

 

 

 


Attachments

    Outcomes