![]() |
![]() |
![]() |
![]() |
Reporting > Lesson 12: Investigative Reports
|
![]() |
See Investigative reports reference for more information about what can be displayed in investigative reports.
|
1.
|
On the Main > Reporting > Investigative Reports page, open the Search for drop-down list and select one of the following options.
|
![]() |
To identify a user by name, select User. (User Service must be installed.)
|
1.
|
On the Reporting > Investigative Reports page, expand the Internet Use by list and select Risk Class.
|
2.
|
In the resulting summary report, click Security Risk to display a list of drill-down options.
|
3.
|
Select by User from the list of options to generate a new report showing each users activity in all categories assigned to the Security Risk class.
|
4.
|
Click a user name or IP address, then select by URL Hostname. A new report is generated, showing the Security Risk URLs requested by the selected client.
|
1.
|
![]() |
by Category
|
![]() |
and Display 10 Results
|
3.
|
Click the Display Results button.
|
1.
|
3.
|
Click Modify Report in the toolbar at the top of the content pane.
|
4.
|
Use the controls in this dialog box to remove the Time column, and add Action as a column, between Date and URL Hostname.
|
5.
|
Click Submit to close the dialog box and update the report.
|
6.
|
Click Summary, in the upper right corner of the content pane.
|
2.
|
Click Favorite Reports at the top of the content pane.
|
4.
|
Click Add to save the report as a Favorite.
|
5.
|
Select the added report in the list, and then click Schedule to run the report on a repeating cycle.
|
7.
|
Click Next after all entries are complete to display a confirmation screen showing your selections.
|
8.
|
Click Save to save the scheduled report job and display a list of all scheduled reports.
|
![]() |
![]() |
![]() |
![]() |
Reporting > Lesson 12: Investigative Reports
|