The Reports page enables you to generate pre-defined and customized reports. The system provides pre-defined compliance reports based on the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX), Gramm-Leach-Bliley (GLBA), Payment Card Industry (PCI) Standard, and others. Additionally, information about devices and events is also available in the form of ready-made reports.
You can generate the reports in PDF, HTML, and XML formats. You can archive the reports for future reference. The reports can also be emailed to a specified email address.
To view generated reports, make sure you disable any pop-up blocker software in your web browser.
See these topics for more information:
- Predefined Reports
- Custom Wi-Fi Cloud Reports
- Analytics Report
- Schedule Wi-Fi Cloud Report Generation
- View Wi-Fi Cloud Report Schedules
- Manage Wi-Fi Cloud Report Archive
- Manage Look and Feel of Wi-Fi Cloud Reports
The predefined reports are categorized as follows:
Assessment reports are related to the wireless devices in the airspace and wireless vulnerability management.
- Airspace Risk Assessment — The Airspace Risk Assessment report provides visibility into your airspace in terms of the number and type of wireless devices in your environment, and records the presence of vulnerabilities and potential threats to your network.
- Wireless Vulnerability Assessment — The Wireless Vulnerability Assessment report is an assessment of the wireless security posture of your network. It lists the number and type of wireless devices detected in your environment, records the presence of vulnerabilities and threats they pose to your network. Vulnerabilities are classified in terms of their severity and urgency of response.
Compliance reports are related to wireless security vulnerabilities, federal agencies, and other regulatory agencies.
- DoD Directive 8100.2 Compliance Report — The sections of this report list the wireless vulnerabilities detected in your network and the severity of security risk caused by these vulnerabilities.
- GLBA Wireless Compliance Report — The Gramm-Leach Biley Act (GLBA) of 1999 mandates that financial institutions protect the security and confidentiality of the personally identifiable financial information of their customers. Periodic generation and archival of this GLBA report establishes that your organization has safeguards to prevent financial data leakage through wireless.
- HIPAA Wireless Compliance Report — The Health Insurance Portability and Accountability Act (HIPAA) of 1996 by the Department of Health and Human Services (DHHS) mandates that healthcare organizations must safeguard the privacy and security of patient health information transmitted electronically.
- MITS Wireless Compliance Report — The Management of Information Technology Security (MITS) is an operational security standard established by Treasury Board of Canada Secretariat. This standard (established in 2004) defines baseline security requirements that Canadian federal departments must fulfill to ensure the security of information and information technology (IT) assets under their control. MITS seeks to protect the confidentiality, integrity, and availability of information and IT assets.
- PCI DSS 3.1 Wireless Compliance Report — Payment Card Industry Data Security Standard (PCI DSS) Version 3.1 published in April 2015 defined recommended security controls for protecting cardholder data. PCI DSS was defined by a consortium of credit card companies, including VISA and MasterCard. The requirements of the PCI standard apply to all members, merchants, and service providers that store, process, and transmit cardholder data.
- PCI DSS 3.1 Wireless Compliance Internal Audit Report — PCI DSS 3.1 Wireless Compliance Report is relevant for only those VLANs that process or store credit card data; these VLANs are commonly known as cardholder data environment (CDE). Violations reported in the PCI DSS 3.1 Wireless Compliance Report are based on wireless security incidents that occur on a CDE network. Older versions of these PCI reports are deprecated (3.0, 2.0, 1.2, 1.1).
- SOX Wireless Compliance Report — The Sarbanes-Oxley (SOX) Act of 2002 was passed by the US Congress as a comprehensive legislation to reform the accounting practices, financial disclosures, and corporate governance of public companies. SOX applied to all companies that are publicly traded in the United States and regulated by the Security and Exchange Commission (SEC).
- Ad hoc Network Listing — The report lists the complete inventory of all ad hoc networks detected by the system.
- All Event Listing — The report lists all security, performance and system events detected by the system. Security events related to quarantine are not listed in the All Event Listing report.
- Detailed Performance Event Listing — The report lists all the performance events detected by the system.
- Detailed Security Event Listing — The report lists all the security events detected by the system.
- Encryption Vulnerability — The report provides information about vulnerabilities in encryption protocols such as WEP and WPA, and reports any attempts to exploit these vulnerabilities.
- Intrusion Prevention Summary — The report lists the quarantine and DoS prevention activities by the system in response to security threats.
- Security Scorecard Events — The report lists the events used to compute the security scorecard on the product dashboard. The security scorecard on the product dashboard is calculated based on the number of events that have the vulnerability flag checked and are not acknowledged.
- All Device Listing — Complete inventory of all APs, clients and sensors detected by the system is listed in this report. Information about APs, clients and sensors is further split into various sections based on device folders.
- Bring Your Own Device (BYOD) — This report provides information about smart phones and tablets accessing the enterprise network over wireless. It also provides information about soft APs and mobile Wi-Fi hotspots that may be operating in enterprise premises without authorization.
- Detailed AP Listing — Complete inventory of all APs detected is listed in this report. Information about APs is further split into various sections based on AP folders.
- Detailed Client Listing — Complete inventory of all clients detected by the product is listed in this report. Information about clients is further split into various sections based on client folders.
- Detailed Sensor Listing — Complete inventory of all sensors detected by the product is listed in this report.