Reports
a year ago

Reports

Reports provide access to logged information, and current information about the users, administrators, and system activity in a deployment. This information is useful for troubleshooting, auditing security issues, and demonstrating compliance with various policies.

You create a report using one of the supplied templates. Each template allows you to choose the types of information being reported and the parameters to apply in order to refine that information. For example, you can use the All Users template to create a report that generates a list of all the users in your deployment by first and last name who are enabled for risk-based authentication.

After you have created and saved a report, an administrator can run the report manually at any time. For instructions, see Run a Report Job. You can also schedule the report to run automatically on a given day and time. For instructions, see Schedule a Recurring Report Job.

You can view the report output in the Security Console, or download the report as a CSV, XML, or HTML file.

RSA Authentication Manager inserts a blank (space) character before any CSV file report field that starts with an equals to (=), plus (+), minus (-), or at (@) character. This prevents spreadsheet programs, such as Microsoft Excel, from interpreting the data as a formula.

Reports Permitted for Each Administrative Role

Administrative permissions determine which reports each administrator can run. Each predefined administrative role has default reporting permissions.The following table lists the default permissions for the predefined administrative roles, and the reports that each role has permission to run. You can modify a predefined role if you want it to have broader scope.

Note:  Administrators who do not have view permissions for security domains have limited reporting capabilities. RSA recommends that you allow administrators to view security domains.

Administrator Role

Report Name

Help Desk Admin

User Admin

Agent Admin

Security Domain Admin

Super Admin

Administrator Activity

 

 

 

 

X

Administrators of a Security Domain

 

X

X

X

X

Administrators with a Specified Role

 

 

 

X

X

Administrators with Fixed Passcode

 

X

X

X

X

Agents not updated by auto-registration more than a given number of days

 

X

X

X

X

Agents with Unassigned IP Address

 

X

X

X

X

All User Groups

 

X

X

X

X

All Users

 

X

X

X

X

Authentication Activity

 

 

 

 

X

Distributed Token Requests

 

 

 

 

X

Expired User Accounts

 

X

X

X

X

Imported Users and Tokens Reports

 

X

X

X

X

List all RADIUS clients

 

 

 

X

X

List All Authentication Agent Records 

X

X

X

X

List All Installed Agents 

X

X

X

X

List all RSA Agent with assigned RADIUS client/RADIUS server

 

X

X

X

X

List all RSA Agents with assigned RADIUS profile

 

X

X

X

X

List all User Alias

 

X

X

X

X

List all Users with assigned RADIUS profile

 

X

X

X

X

Object Lifecycle Activity (Non User/User Group)

 

 

 

 

X

Risk-Based Authentication (RBA) Activity

 

 

 

 

X

Risk-Based Authentication (RBA) Users

 

X

X

X

X

Software Token

 

X

X

X

X

System Log Report

 

 

 

 

X

Token Expiration Report

 

X

X

X

X

User and User Group Lifecycle Activity

 

 

 

 

X

User and User Groups Missing from Identity Source

 

X

X

X

X

Users Enabled for On-Demand Authentication

 

X

X

X

X

Users Enabled for On-Demand Authentication Who Have Never Logged In

 

X

X

X

X

Users never logged in with token

 

X

X

X

X

Users with days since last login using specific token

 

X

X

X

X

Users with Disabled Accounts

 

X

X

X

X

Users with Tokens

 

X

X

X

X

Users with tokens set to online emergency access tokencode

 

X

X

X

X