Creating and running a report

You can see reports on-demand. You can also run scheduled reports outside of their scheduled times. For more information on running scheduled reports, see Scheduled reports.

  1. Click Reports in the navigation pane. Ensure you are on the Reports tab. Click the List An icon of a list or Grid A icon of a table icons to change your view.

  2. Use the Site list to choose which Site to run the report for. You can also run reports for All Sites.

  3. On the Reports page, click the three dots beside any report type to view options:

    • View Report allows you to open the report for the chosen Site.

    • Pin allows you to pin the report to the top of the page.

  4. Choose a Report to view, or use the Search bar to find a specific report type. Depending on the report type, you may have one or more of the following tasks and controls available for the report:

    • Choose a Site from the list to view data for.

    • Click on chart data to show details for that subset of data. Some charts provide further levels to show more information.

    • When applicable, choose a duration for the data from the menu.

    • When applicable, click the Filter icon to choose filters for the data in your report.

  5. Depending on the report type and available data, you may have access to some of the following functions in the Actions column:

    • Add this File to Allow list specifies the file as an allowed file in the following reports:

      • All Threats Detected

      • All Undetermined Software Detected

      • Evasion Shield – All Scripts Detected

    • Add this File to Block list specifies the file as a blocked file in the following reports:

      • All Undetermined Software Detected

    • Restore this File from Quarantine removes the file from quarantine and restores it to its original location.

    • Initiate Cleanup on this Device starts a scan immediately and quarantines any malicious files.

    • Create Override creates an Override for the URL.

    • The following options are available for the Web Threat Shield - Blocked URLs report type:

      • In the Domain(s) box, enter a comma-separated list of domains you want to create a rule for. The protocol (such as https or www) is not needed. For example, you can specify domain.com. Wildcards are supported (*.domain.com).

      • Select Scope (MSP view only) to specify if the rule should apply to all Sites that are configured to include global settings or just the selected Site.

      • Select Policy (MSP view only) to associate this rule with a Policy and specify the Policy. If you do not specify a Policy, the Override will be associated with the Site.

      • Select Block/Allow to specify if the domain should be blocked or allowed.

      • When Block Malicious URLs is selected, malicious URLs (such as domains with known malware) are blocked regardless of a rule.