Reports41 minutes to read
The information on the entire password management process in your enterprise is presented in the form of comprehensive reports in PAM360. The status and summaries of the different activities such as password inventory, policy compliance, password expiry, user activity etc. are provided in the form of tables and graphs, which assist the IT administrators in making well-informed decisions on password management. PAM360 provides about fourteen canned reports classified under four types. In addition, there is provision to create custom reports. The following types of reports are available in PAM360:
1. Canned ReportsPAM360 provides four types of canned reports: 1.1 Password ReportsAll details related to device properties such as hardware properties, firmware details, audit details of the devices, etc., are presented using Password reports. To access Password reports:
1.2 User Reports1.3 General Reports1.4 Compliance Reports![]()
1.5 Scheduling Report GenerationAll reports can be scheduled to be generated at periodic intervals. The reports thus generated can be sent via email to required recipients. To create a schedule for any report:
The result of the scheduled task created here are audited and can be viewed from the Task Audit section. 1.6 Steps to Terminate an Existing Schedule
2. Custom ReportsYou can create customized reports out of the four canned reports (Password Inventory, Password Compliance, Password Expiry and Password Integrity) and two audit reports (Resource Audit and User Audit). You can specify certain criteria and create customized reports as per your needs. The custom reports have been designed to bring out specific information from the PAM360 database as per your needs. The canned reports provide a snapshot of details in general. On the other hand, you can create a custom report out of this canned report to get specific details.
Example: 1 For instance, let us take the case of creating a custom report out of Password Inventory Report. Assume that you want to get a report on the resources owned by 'User A' in 'Network Administration' department. You can create a custom report from the 'Password Inventory Report' by specifying the criteria as Resources from 'Department' 'Network Administration' AND 'Owner' name as 'User A'. The real power of the custom reports lies in the fact that you can specify criteria expression and cull out information catering to your more specific needs. Example: 2 Assume that your need is to take a list of all the sensitive passwords belonging to the resource types Windows and Windows Domain, Linux and Cisco, owned by a particular administrator - say John. Also, you want to get details on the share permissions for those passwords - with whom the passwords have been shared. Here, the following are the conditions:
So, the criteria will be as follows: To identify the 'administrator' accounts on Windows/Windows Domain, the criteria is
To identify the 'root' accounts on Linux, the criteria is
To identify the 'enable' accounts on Cisco devices, the criteria is
To identify the resources owned by john
Now, you need to specify the criteria expression to combine the above factors:((C1 and C2) or (C3 and C4) or (C5 and C6)) and C7 That means, you want to identify the resources/accounts complying to any and all the criteria listed above and finally match the ownership. 2.1 Steps to Create Custom Reports
2.2 Custom Reports - Use CaseBy leveraging the power of the custom reports, you can meet many of your auditing requirements with ease. Following is just one use case: Exit Audit ReportContinuously assessing the vulnerability with respect to password access is one of the important auditing requirements. When an administrator, who had active access to the privileged passwords leaves the organization, it is imperative to assess the vulnerability. This requires taking a list of all the passwords that were accessed by the particular user during a specified time period and then initiate steps to change the passwords. Taking a report on all the password management operations performed by the particular administrator during a specified time period, could serve as 'Exit Audit Report'. Custom reports help you generate a report to achieve this precisely. All that you need to do is to get the report out of the 'Resource Audit'.
The resultant report will provide you list of password management operations performed by the particular administrator during the time range specified. Custom Reports out of 'Resource Audit' and 'User Audit' would prove highly useful as you would be able to meet most of your auditing requirements by properly leveraging them. The resultant report will provide you list of password management operations performed by the particular administrator during the time range specified. | ||||||||||||||||||