지금 지원 담당자와 채팅
지원 담당자와 채팅

Defender 6.3.1 - Administration Guide

Getting started Managing Defender objects in Active Directory Configuring security tokens Securing VPN access Securing Web sites Securing Windows-based computers Defender Management Portal (Web interface) Securing PAM-enabled services Delegating Defender roles, tasks, and functions Automating administrative tasks Administrative templates Integration with Active Roles Push Notifications Appendices
Appendix A: Enabling diagnostic logging Appendix B: Troubleshooting common authentication issues Appendix C: Troubleshooting DIGIPASS token issues Appendix D: Defender classes and attributes in Active Directory Appendix E: Defender Event Log messages Appendix F: Defender Client SDK Appendix G: Defender Web Service API

Generating a report

To generate a Defender report, you need to configure its settings and schedule its generation. You can schedule a report to generate on a recurring basis or only once.

To use Defender reports, the user account with which you sign in to the Defender Management Portal must have an appropriate portal role assigned. For more information, see Portal roles.

To generate a report

  1. Sign in to the Defender Management Portal.

    For more information, see Opening the portal.

  2. Click the Defender reports option.
  3. In the left pane, click the Report Scheduler tab.
  4. In the right pane, from the Select a report list, select the report you want to schedule and generate.
  5. In the Report settings area, configure settings for your report.

    For more information about available settings, click the report name below.

  6. After configuring the report settings, click the Schedule button, and then type the report description and configure the generation schedule. For more information, see Report scheduling settings.
  7. When you are finished with Report scheduling settings, click Save.

    After scheduling your report, you can click the Preview button to display the report you have just created.

Audit trail

The Audit trail report provides information about all user authentication requests processed by a specific Defender Security Server over a specified period of time.

 

Table 19:

Audit trail report settings

Setting

Description

Select a report type

Select the type of report you want to generate. Basically, this option allows you to specify the type of the Defender Security Server log files from which you want to collect data for your report.

You can select one of the following:

  • Audit report  This report is generated using the log files whose names have the DSSAudit prefix.
  • Accounting Report  This report is generated using the log files whose names have the DSSAcct prefix.

Defender Security Server

Select the Defender Security Server whose data you want to use for generating the report.

Reporting period

Specify the time period for which you want to generate the report.

Select date and time formats

Select this check box to choose the format for displaying times and dates in the report. After selecting this check box, use the following options:

  • Time format  Select the format for displaying times in the report.
  • Date format  Select the format for displaying dates in the report.
  • Time zone  Select the time zone for which you want to generate the report.

Authentication requests

The Authentication requests report provides a summary of authentication requests processed by a specific Defender Security Server, for either a single user or all users, over a specified period of time.

 

Table 20:

Authentication requests report settings

Setting

Description

Defender Security Server

Select the Defender Security Server whose data you want to use for generating the report.

Access Node

Select the Access Node for which you want to generate the report.

Include source address and
Access Node

Select this check box to include the source address and Access Node details in the report. Otherwise, leave this check box cleared.

Include users whose name
begins with

Type the initial characters of the user names for which you want to generate the report. Leave this text box blank to generate the report for all users.

Include users in Active Directory group

Type the complete name of the Active Directory group for which members you want to generate the report. Alternatively, click the magnifying glass icon to search for and select the Active Directory group. Leave this text box blank to generate the report for users in all groups.

Reporting period

Specify the time period for which you want to generate the report.

Select date and time formats

Select this check box to choose the format for displaying times and dates in the report. After selecting this check box, use the following options:

  • Time format  Select the format for displaying times in the report.
  • Date format  Select the format for displaying dates in the report.
  • Time zone  Select the time zone for which you want to generate the report.

Authentication activity

The Authentication activity report provides the success and failure statistics for authentication requests processed by a specific Defender Security Server, over a specific period of time.

 

Table 21:

Authentication activity report settings

Setting

Description

Defender Security Server

Select the Defender Security Server whose data you want to use for generating the report.

Access Node

Select the Access Node for which you want to generate the report.

Reporting period

Specify the time period for which you want to generate the report.

Select date and time formats

Select this check box to choose the format for displaying times and dates in the report. After selecting this check box, use the following options:

  • Time format  Select the format for displaying times in the report.
  • Date format  Select the format for displaying dates in the report.
  • Time zone  Select the time zone for which you want to generate the report.
관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택