Creating a Security Report
You can obtain security reports to keep yourself updated about asset security status. CFW will send security reports to you based on the time range and receiving method you configured.
This section describes how to create a security report.
Constraints
- Up to 10 security reports can be created for a CFW instance.
- A security report is retained for only three months. You are advised to periodically download security reports for audit.
- A custom security report cannot be modified. If you need to modify a custom security report, delete it and create a new one.
Creating a Security Report
- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project.
- In the navigation pane on the left, click
and choose . The Dashboard page will be displayed.
- (Optional) Switch to another firewall instance. Select a firewall from the drop-down list in the upper left corner of the page.
- In the navigation tree on the left, choose .
- Click Create Template. On the Create Template page, configure report parameters.
Table 1 Parameters of the security report template Parameter
Description
Report Name
Name of the custom security report
Report Type
- Daily
Statistical period: 00:00:00 to 24:00:00 every day
A report will be sent to the recipients the day after it is generated.
- Weekly
Statistical period: 00:00:00 on Monday to 24:00:00 on Sunday
A report will be sent to the recipients at the specified time after it is generated.
- Custom: Customize a time range.
Statistical Period: Configure a statistical period for your report.
A report will be sent to the specified recipients after it is generated.
Statistical Period
If Report Type is set to Custom, you need to set Statistical Period.
Report Schedule
When Report Type is set to Daily or Weekly, you need to set the report sending time. By default, the log report of the previous statistical period is sent.
NOTE:- To ensure correctness, the report sending time may be delayed.
- If Report Type is set to Custom, the report is automatically sent after being generated.
Recipient Group
Select a topic from the drop-down list to configure the endpoints for receiving the log report.
If there are no topics, click View Topic and perform the following steps to create a topic:- Create a topic. For details, see Creating a Topic.
- Add one or more subscriptions to the topic. You will need to provide a phone number, email address, function, platform application endpoint, DMS endpoint, or HTTP/HTTPS endpoint for receiving alarm notifications. For details, see Adding a Subscription.
- Confirm the subscription.
- Daily
- Click OK. A security report is created.
Follow-up Operations
For details about how to download and view security reports, see Viewing/Downloading a Security Report.
References
For details about how to enable, disable, modify, and delete security reports, see Managing Security Reports.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.