Create a Threat Report
This article assumes you are already logged in your CheckLight account.
A Threat Report displays centralized threat information about one or more endpoints.
Instructions
To create a Threat Report:
- Go to the Reports section.
2. Click on the Download PDF button to download a PDF report or on the Download CSV report to download a report in .csv format.
You may customize your report by:
- modifying the time interval from the Calendar.
To modify a time interval click on the predifined time intervals from the Calendar or select a Custom Range and click on the Apply button.- selecting specific endpoints from Filter Endpoints functionality.
To select or deselect specific endpoints click on the Filter Endpoints drop-down and select the endpoints.
The endpoints that will be included in the report will be highlighted in green.- Include or Exclude Endpoints, threats or timeline.
To include or exclude endpoints threats or timeline from a report, check or uncheck the corresponding boxes.
A checked box signifies that that element will be included in the report.