Contents

Reports

With Discover you can generate predefined reports about your Wi-Fi networks.

Wi-Fi Cloud can generate reports about your Wi-Fi network device inventory, and WIPS security. You can also generate compliance reports based on the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX), Gramm-Leach-Bliley (GLBA), Payment Card Industry (PCI) Standard, and many others.

Reports can be generated in HTML and XLSX formats. You can generate reports immediately, schedule reports, and you can also archive the reports for future reference.

Schedule a Report

To schedule a report, click .

  • Report Format — You can select HTML or XLSX format.
  • Language — You can select English or Japanese.
  • Frequency — Select a One Time or Recurring report. Select the date and time for a one time report, or the schedule for a recurring report.
  • Report Data Range — Select a Fixed or Custom data range. Select the date and time range for your selection.
  • Archival Setting — Select Auto Delete to automatically delete reports that are older than the specified number of days. Select Never Delete to keep all generated reports.
  • Email — Type one or more email addresses that will receive the generated report. The email contains a link to the report and a zip file of the report data in JSON format. The report is available from the provided link for the specified period of time. If the link has expired, you can upload the report data attached to the message to view the report.

Click Schedule to schedule the report.

Generate a Report

To immediately generate a report, click .

  • Report Format — You can select HTML or XLSX format.
  • Report Data Range — Select a Fixed or Custom data range. Select the date and time range for your selection.
  • Archive Report — Select Auto Delete to automatically delete reports on the date you specify. Select Never Delete to keep all generated reports.

Click Generate to generate your report.

Report Types

You can select these report types:

  • Inventory Reports
  • WIPS Reports
  • Compliance Reports
  • Archived Reports
  • Scheduled Reports

Inventory Reports

  • Managed WiFi Device Inventory — This report provides a complete inventory of your managed Wi-Fi devices, including APs and WIPS sensors.

WIPS Reports

  • Airspace Risk Assessment — This report is the first step towards a wireless vulnerability assessment of your network and managing its wireless security posture. The report gives you visibility into your airspace, such as the number and type of wireless devices in your environment, and records the presence of vulnerabilities and potential threats to your network. After you identify your authorized Wi-Fi devices, the Wireless Manager can classify vulnerabilities and threats more accurately in the future, and recommend the most suitable remedial actions to improve your wireless security posture.
  • Wireless Vulnerability Assessment — This report is an assessment of the wireless security posture of your network. It lists the number and type of wireless devices detected in your environment, and records the presence of vulnerabilities and threats they pose to your network. Vulnerabilities are classified and ranked in terms of their severity and urgency of response.
  • Security Status — This report provides the list of alerts that contributed to the security status of your network during the selected reporting period.
  • Wireless Intrusion Prevention Summary — This report provides a summary of wireless intrusion prevention activities during the selected reporting period.
  • Access Point Listing — This report provides the list of detected access points and their classification at the time of report generation.
  • Detailed Client Listing — This report provides a complete inventory of all clients detected by the system. Information about clients is further split into various sections, based on client folders.
  • WIPS Alerts — This report provides a list of security events detected by the system. Security events related to quarantine and DoS prevention activities are not included in this report.

Compliance Reports

Compliance reports are related to wireless security vulnerabilities, federal agencies, and other regulatory agencies.

  • DoD Directive 8100.2 Compliance — The sections of this report list the wireless vulnerabilities detected in your network and the severity of security risk caused by these vulnerabilities.
  • GLBA Wireless Compliance — The Gramm-Leach Biley Act (GLBA) of 1999 mandates that financial institutions protect the security and confidentiality of the personally identifiable financial information of their customers. Periodic generation and archive of this GLBA report establishes that your organization has safeguards to prevent financial data leakage through wireless.
  • HIPAA Wireless Compliance — The Health Insurance Portability and Accountability Act (HIPAA) of 1996 by the Department of Health and Human Services (DHHS) mandates that healthcare organizations must safeguard the privacy and security of patient health information transmitted electronically.
  • MITS Wireless Compliance — The Management of Information Technology Security (MITS) is an operational security standard established by Treasury Board of Canada Secretariat. This standard (established in 2004) defines baseline security requirements that Canadian federal departments must fulfill to ensure the security of information and information technology (IT) assets under their control. MITS seeks to protect the confidentiality, integrity, and availability of information and IT assets.
  • PCI DSS Wireless Compliance — Payment Card Industry Data Security Standard (PCI DSS) defines recommended security controls for protecting cardholder data. PCI DSS was defined by a consortium of credit card companies, including VISA and MasterCard. The requirements of the PCI standard apply to all members, merchants, and service providers that store, process, and transmit cardholder data.
  • PCI DSS Wireless Compliance Internal Audit — PCI DSS Wireless Compliance Report is relevant for only those VLANs that process or store credit card data. These VLANs are commonly known as a cardholder data environment (CDE). Violations reported in the PCI DSS Wireless Compliance Report are based on wireless security incidents that occur on a CDE network.
  • SOX Wireless Compliance — The Sarbanes-Oxley (SOX) Act of 2002 was passed by the US Congress as a comprehensive legislation to reform the accounting practices, financial disclosures, and corporate governance of public companies. SOX applied to all companies that are publicly traded in the United States and regulated by the Security and Exchange Commission (SEC).

Archived Reports

You can archive reports so that you can view them later.

To view archived reports, select Reports, then select the Archived tab.

When the report archival quota of a user is reached, no more reports can be archived unless you delete older reports. Right-click an archived report and select Change Auto Delete Settings to define the date when an archived report should be deleted, or you can disable auto-deletion for a report.

Scheduled Reports

To view a list of scheduled reports, select Reports, then select the Scheduled tab.

Give Us Feedback  ●   Get Support  ●   All Product Documentation  ●   Technical Search