PAM360 Reports

Reports in PAM360 are a crucial component in ensuring the security, compliance, and efficiency of password and privileged access management within an enterprise. These reports provide IT administrators and security teams with comprehensive insights into various activities, including password inventory, policy compliance, user activity, and more, aiding in better decision-making and risk mitigation. The reporting capabilities within PAM360 are designed to provide essential data through tables and graphs, making it easier for administrators to analyze information and maintain a robust security posture.

PAM360 offers pre-configured reports, categorized into different types, along with the flexibility to create custom reports to suit specific needs. These reports cover all aspects of privileged access management, ensuring that organizations can stay compliant, detect vulnerabilities, and maintain transparency.

1. Importance of Reports in PAM360 Application

2. Report Categories in PAM360

Including robust reporting features within PAM360 helps organizations enforce security policies, maintain operational transparency, and meet compliance requirements. The wide range of available pre-configured, custom, and query reports ensures that all aspects of privileged access management, from password security to user activity monitoring, are covered, making PAM360 an essential tool for maintaining a secure and efficient IT environment. The report categories available in the PAM360 application are:
pam360-reports

  1. Password Reports - These reports offer insights into password inventory, password expiry, and policy compliance, helping administrators manage passwords efficiently and securely.
  2. User Reports - Track user activity and access behavior, providing a detailed view of user-specific actions, which is crucial for monitoring privileged access.
  3. General Reports - Provide a high-level overview of password activities, allowing continuous monitoring of privileged access and system events.
  4. Compliance Reports- Ensure adherence to regulatory requirements by tracking compliance with internal and external policies like GDPR, PCI DSS, ISO/IEC 27001, etc.
  5. Custom Reports - Allow administrators to generate tailored reports using various filters and parameters to meet specific organizational needs.
  6. Certificates Reports - Monitor the status of digital certificates, helping organizations stay ahead of certificate expiration and renewal processes.
  7. SSH Keys Reports - Provide insights into SSH key usage, helping administrators manage and audit SSH keys for secure access.
  8. Query Reports - These flexible reports allow users to run custom SQL queries on the PAM360 database for more granular and specific data reporting.

Click on the respective report categories to learn more about them in detail.

3. Scheduling Report Generation

All PAM360 reports can be generated at a periodic interval or specific period based on the organization's requirements. This can be attained using the Schedule Report option provided by PAM360. The generated scheduled reports can be sent via email with the desired format to the required recipients.

To create a schedule for any PAM360 report, follow the below steps:

  1. Navigate to the desired report in the Reports tab and click Schedule Report available under the name of the report.
  2. In the pop-up form that opens, select the required schedule from the provided terms - Days / Monthly / Once / Never.
  3. Next, enter the date / time at which the schedule has to commence.
  4. Choose the format in which the report has to be mailed to the recipients, PDF or XLS or Both.
  5. Select the recipients to whom the report should be mailed to, from the given options. You can also enter the list of email IDs to which the report has to be emailed.
  6. Click Schedule to confirm the schedule task.
    reports3

The scheduled tasks will be listed under the User Created Schedules section in Admin >> Manage >> Schedule Tasks. Whenever a schedule gets executed, the result of the scheduled task will be audited and can be viewed from the Task Audit section.

To terminate an existing schedule, simply follow the below steps:

  1. Click Schedule Report available under the name of report for which the schedule has to be terminated.
  2. In the dialog box that opens, select the option Never and click Schedule to terminate a schedule.




Top