Standard Reports

CyberCNS has extensive reporting for every need. Standard Reports is the section that will generate Microsoft Office-compatible PPT, DOCX, XLXS, and PDF reports. These reports are available at the company level based on the latest scan performed.

  • If the data within the XLSX file exceeds 50,000 rows, it will be automatically downloaded as a ZIP file. Upon extracting this ZIP file, a CSV file can be found.

  • The rationale behind selecting a CSV file format lies in its ability to handle sizable datasets effectively. Opting for a CSV file averts situations where computers might become unresponsive when trying to open a large XLSX file with multiple sheets.

Standard Reports

  • Standard Reports formats such as PowerPoint(ppt), Word(docx), Excel(xlsx), and PDF can be generated and downloaded. The report will have data based on the latest scan. Based on the information captured, measures to mitigate risks can be determined.

  • Click on date here select From Date and To Date as required.

  • Select the From Date and To Date and download the report to clear the date click on the clear filter.

  • Active Directory Reports: The Active Directory assessment goes through the local Active Directory environment and reports details about Users, Computers, Group Policy Objects (GPOs), and Organisational Units (OUs) information. The Details like Login failures, No Logins in the last 30 days, empty groups, etc are important security aspects. The reports are organized with a table of contents to help locate the specific findings of interest and problem areas are conveniently interpreted to make it easy to pinpoint problems to be remediated.

  • Asset Reports: For every scan, this report provides detailed information about each of the individual assets discovered by CyberCNS. The report is ideal for documenting the settings and configurations at the individual assets level. Additional individual reports like Application Baseline, System information, etc make the information available in a categorized manner.

  • Compliance Reports: This section includes reports based on the latest scan about compliance with different compliance controls like CIS, HIPAA, PCI DSS, NIST-800-53, NIST-800-171, ISO 27002, CyberEssentials, Essential Eight, etc. These reports also include recommended actions to help get compliant.

  • External Scan Reports: This report will help you with security holes and warnings, informational items that can help make better network security decisions. CyberCNS allows full or partial NMAP Scan which checks defined ports and reports which are open and the vulnerabilities attached to them. This is a MUST report for some of the standard security compliances.

  • Vulnerability Reports These reports include detailed information about the Vulnerabilities and informational findings based on the latest scan. It includes detailed CVSS Scores to help prioritize the risks to be mitigated.

Report Filters

  • In Standard Reports, filtering of the reports can be done by using Filter Keys such as Tags, OS, and Discovered Protocols.

Tags Report Filter

  • In the search filter, select the Filter key required and select any one of the listed operations for search.

  • There are two operations available under Tags, those are equals(=), not equals(!=), contains(:), and does not contain(!:).

  • When you choose the Tag filter as equals(=) and add a value searching for, apply the required tag to get the corresponding results.

  • Select the tag and click on enter in the search option. The report will be accessible based on the applied filter.

  • E.g. Below is the report which displays the Tags for the applied filter.

  • In case you choose the Tags filter as not equals (!=), enter the required data.

  • Select the tag and click on enter in the search option. The report will be accessible based on the applied filter.

  • E.g. Below is the report that displays the Tags for the applied filter.

  • In case you choose the Tags filter as contains(:), you can enter the required Tag.

  • Select the tag and click on enter in the search option. The report will be accessible based on the applied filter.

  • E.g. Below is the report which displays the Tags for the applied filter.

  • In case you choose the Tags filter as doesNotcontains(!:) you can enter the required Tag.

  • Select the tag and click on enter in the search option. The report will be accessible based on the applied filter.

  • E.g.Below is the report which displays the Tags for the applied filter.

OS Report Filter

  • In the search filter, select the OS Filter to get the OS data reports.

  • There are two operations available under OS, those are equals(=), not equals(!=), contains(:) and does not contain(!:).

  • When you choose the OS filter as equals(=), apply the required OS.

  • Enter the OS which is required and click on enter in the search option. The report will be accessible based on the filter.

  • E.g. Below is the report which displays the OS for the applied filter.

  • In case you choose the OS filter as notEquals(!=), you can enter the required Tag.

  • Enter the OS which is required and click on enter in the search option. The report will be accessible based on the filter.

  • E.g. Below is the report which displays the OS for the applied filter.

  • In case you choose the OS filter as contains(:), enter the required data.

  • Enter the OS which is required and click on enter in the search option. The report will be accessible based on the filter.

  • E.g. Below is the report which displays the OS for the applied filter.

  • In case you choose the OS filter as does not contain (!:), enter the required data.

  • Enter the OS which is required and click on enter in the search option. The report will be accessible based on the filter.

  • E.g. Below is the report which displays the OS for the applied filter.

Discovered Protocols Report Filter

  • In the search filter, select the Discovered Protocols Filter to get the Discovered Protocols data reports.

  • There are two operations available under Discovered Protocols, those are equals(=), not equals(!=), contains(:), and does not contain(!:).

  • In case you choose the Discovered Protocols filter as equals(=), enter the required data.

  • Enter the Discovered Protocols which is required and click on enter in the search option. The report will be accessible based on the filter.

  • E.g. Below is the report which displays the Discovered Protocols for the applied filter.

  • In case you choose the Discovered Protocols filter as notEquals(!=), enter the required data.

  • Enter the Discovered Protocols which is required and click on enter in the search option. The report will be accessible based on the filter.

  • E.g. Below is the report which displays the Discovered Protocols for the applied filter.

  • In this case, choose the Discovered Protocols filter as contains(:), and enter the required data.

  • Enter the Discovered Protocols which is required and click on enter in the search option. The report will be accessible based on the filter.

  • E.g. Below is the report which displays the Discovered Protocols for the applied filter.

  • In case you choose the Discovered Protocols filter as doesNotcontains(!:), enter the required data.

  • Enter the Discovered Protocols which is required and click on enter in the search option. The report will be accessible based on the filter.

  • E.g. Below is the report that displays the Discovered Protocols for the applied filter.

In case, When a report takes more than a minute to download due to a larger amount of data to be processed, that report can be downloaded in Standard Report Jobs when everwhenever the report is generated.

  • In Standard Reports, download Active Directory Computers.

  • If it takes a while for the report to download, it is queued and needs to be checked in Standard Report Jobs.

  • Under the Action column, these are options available Details, Terminate, Retry, and Download Report.

  • At the moment, Standard report jobs that have been successfully or partially completed allow those generated reports be downloaded using the available download report option.

Schedulers

Only Standard Report Generation action is available at the company level in Schedulers.

  • Schedulers here help to schedule Standard Report Generation reports based on the last vulnerability scan. It requires email integration to be configured so the reports are sent via email.

  • When Standard Report Generation is selected, the ‘All’ reports option for generating all the reports can be selected. Any of the particular reports or multiple reports or all reports can be chosen here.

  • Next is to select the report type (All, pptx, xlsx, pdf, and docx).

  • Enter the Password in case a generated report zip file is to be encrypted.

  • Select the frequency at which the scheduler is to be set.

  • Enter an Email Address to get a notification on the successful completion of the Standard Report generation scheduled task. Please add multiple email addresses if required by clicking on + and click on Save.

  • Make sure to have Email /SFTP /CyberCNS SES Email Integration in place prior to this action to receive email successfully.

  • We have added the ability to add report filters for Scheduled Reports. Filters in schedulers are available along with exclude filtering.

  • In the depicted below image, one can add the report filters if required and click on Save.

  • There is an option to Edit and Delete the Scheduler using the Action column. Any scheduled reports can be edited and deleted if needed.

  • It is possible to download the Full data or the Filtered data of the standard reports by clicking on the () download option, where the data will be downloaded in xlsx format.

  • The status of the report schedulers is now part of the jobs, It explains why an email is not sent or some reports did not get generated.

Global Level

  • In Standard Reports, to download any report, select report type as either DOCX, PDF or PPT, or Xlsx as required.

  • If it takes a while for the report to download, it is queued and needs to be checked in Standard Report Jobs.

  • In Standard Report Jobs, Click on the Action button and download the report.

  • Under the Action, get the details of the report. Download the report, terminate the report that is in the queue, and if the report fails, use the retry option.

  • To view the details of the report jobs click on Details.

  • The Report Job status is shown with the details of the Report Name, Report Type, Status, and Reason.

AD Overview - Global Report

  • The AD Overview Global display information about the Active Directory Summary across all companies.

The DOCX report displays the information on Company Name, Domain Name, and Active Directory summary details.

Agents Report - Global

  • The Agent report and Window Assets display information about the Agent across all companies.

The PDF, DOC, and Xlsx report displays the information on Company Name, Probes, and Lightweight Agent Count and SNMP Credentials.

ComplianceSummary Report - Global

  • The ComplianceSummary Report displays information about compliance across all companies.

The PPT report displays the information of all the companies for CIS Compliance, CIS_8.0 Compliance, Consolidated Compliance, Cyberessentials Compliance, Essentials Eight Compliance, GDPR IV Compliance, HIPAA Compliance, ISO 27002 Compliance, NIST 800 171 Compliance, NIST 800 53 Compliance, PCI DSS Compliance.

Executive Summary Report - Global

  • The Executive Summary display information about the Asset Summary, Vulnerability Summary, and Active Directory Summary across all companies.

The DOCX report displays the information on the Company Name, number of Assets Discovered under Asset Summary, number of Vulnerable Assets under Vulnerability Summary, and Active Directory Summary.

Remediation Summary - Global

  • The Remediation Summary display information about the Applications to be remediated to the latest version across all companies.

The Xlsx report displays the information on Company Name, Application Name, Companies, Company Name, Assets, and Recommended Version.

Window Assets - Global

  • The Window Assets display information about the Agent across all companies.

The Xlsx report displays the information on Company Name, Asset Name, Host Name, IP, CPU core, MAC Address, Status, Architecture, Manufacturer, Failed Logins, Discovered Time, etc.

  • This completes the documentation of Standard Reports.