Create a Threat Report

This article assumes you are already logged in your CheckLight account.

A Threat Report displays centralized threat information about one or more endpoints.

Instructions

To create a Threat Report:

  1. Go to the Reports section.

2. Click on the Download PDF button to download a PDF report or on the Download CSV report to download a report in .csv format.


You may customize your report by:

  • modifying the time interval from the Calendar.

    To modify a time interval click on the predifined time intervals from the Calendar or select a Custom Range and click on the Apply button.
  • selecting specific endpoints from Filter Endpoints functionality.

    To select or deselect specific endpoints click on the Filter Endpoints drop-down and select the endpoints.
    The endpoints that will be included in the report will be highlighted in green.
  • Include or Exclude Endpoints, threats or timeline.

    To include or exclude endpoints threats or timeline from a report, check or uncheck the corresponding boxes.
    A checked box signifies that that element will be included in the report.