Authentication violations
The Authentication violations report provides a summary for each authentication violation reported by a specific Defender Security Server over a period of time.
Table 22:
Authentication requests report settings
Defender Security Server |
Select the Defender Security Server whose data you want to use for generating the report. |
Access Node |
Select the Access Node for which you want to generate the report. |
Include users whose name begins with |
Type the initial characters of the user names for which you want to generate the report. Leave this text box blank to generate the report for all users. |
Include users in Active Directory group |
Type the complete name of the Active Directory group for which members you want to generate the report. Alternatively, click the magnifying glass icon to search for and select the Active Directory group. Leave this text box blank to generate the report for users in all groups. |
Reporting period |
Specify the time period for which you want to generate the report. |
Select date and time formats |
Select this check box to choose the format for displaying times and dates in the report. After selecting this check box, use the following options:
- Time format Select the format for displaying times in the report.
- Date format Select the format for displaying dates in the report.
- Time zone Select the time zone for which you want to generate the report.
|
Defender Security Server configuration
The Defender Security Server configuration report displays information about the configuration of the Defender Security Servers deployed in your environment.
Use the Defender Security Server list to select the Defender Security Server for which you want to generate the report.
License information
The License information report displays information about all currently installed Defender licenses. This report does not have any configurable settings.
Proxied users
The Proxied users report provides either a list of proxied users and their logon times or a filtered view of the Defender Security Server audit log, showing details of proxied packets.
Table 23:
Proxied users report settings
Select a report type |
Select the type of report you want to generate.
You can select one of the following:
- Proxied users Provides a ist of proxied users and their logon times.
- Proxied packets Provides a filtered view of the Defender Security Server audit log, showing details of proxied packets.
|
Defender Security Server |
Select the Defender Security Server whose data you want to use for generating the report. |
Include users whose name begins with |
Type the initial characters of the user names for which you want to generate the report. Leave this text box blank to generate the report for all users. |
Reporting period |
Specify the time period for which you want to generate the report. |
Select date and time formats |
Select this check box to choose the format for displaying times and dates in the report. After selecting this check box, use the following options:
- Time format Select the format for displaying times in the report.
- Date format Select the format for displaying dates in the report.
- Time zone Select the time zone for which you want to generate the report.
|