Understanding Control Manager 5 Report Templates

Predefined Control Manager 5 report templates demonstrate the look and feel of Control Manager reports, and illustrate the available report template elements. Trend Micro provides the following predefined report templates:

Template

Data View

Report Element

TM-Content Violation Detection Summary  

Content Violation Detection Over Time Summary

  • Content Violation Detection Grouped by Day (Line chart)  

  • Policy in Violation Count Grouped by Day (Line chart)

  • Sender Count Grouped by Day (Line chart)

  • Recipient Count Grouped by Day (Line chart)

Content Violation Policy Summary

  • Top 25 Policies in Violation (Bar chart)

  • Content Violation Policy Summary (Grid table)

Content Violation Sender Summary

  • Top 25 Senders (Bar chart)

  • Content Violation Sender Summary (Grid table)

Content Violation Action/Result Summary

  • Action Result Distribution (Pie chart)

TM-Managed Product Connection/Component Status  

Managed Product Status Information

  • Server/Appliance Connection Status (Pie chart)

  • Client Connection Status (Pie chart)

  • Server/Appliance Pattern File/Rule Update Status (Pie chart)

  • Client Pattern File/Rule Update Status (Pie chart)

  • Server/Appliance Scan Engine Update Status (Pie chart)

  • Client Scan Engine Update Status (Pie chart)

Pattern File/Rule Status Summary

  • Pattern File/Rule Summary for Servers/Appliances (Grid table)

  • Pattern File/Rule Summary for Clients (Grid table)

Scan Engine Status Summary

  • Scan Engine Summary for Servers/Appliances (Grid table)

  • Scan Engine Summary for Clients (Grid table)

TM-Overall Threat Summary  

Complete Network Security Risk Analysis Information

Complete Network Security Risk Analysis Summary (Grid table)

Network Protection Boundary Information

Network Protection Boundary Summary (Grid table)

Security Risk Entry Point Analysis Information

Security Risk Entry Point Analysis Information (Grid table)

Security Risk Destination Analysis Information

Security Risk Destination Analysis Information (Grid table)

Security Risk Source Analysis Information

Security Risk Source Analysis Information (Grid table)

TM-Spam Detection Summary

Spam Detection Over Time Summary  

  • Spam Detection Grouped by Day (Line chart)

  • Recipient Domain Count Grouped by Day (Line chart)

  • Recipient Count Grouped by Day (Line chart)

Overall Spam Violation Summary

  • Top 25 Recipient Domains (Bar chart)

  • Overall Spam Violation Summary (Grid table)

Spam Recipient Summary

  • Top 25 Spam Recipients (Bar chart)

  • Spam Recipient Summary (Grid table)

TM-Spyware/Grayware Detection Summary

Spyware/Grayware Detection Over Time Summary  

  • Spyware/Grayware Detection Grouped by Day (Line chart)

  • Unique Spyware/Grayware Count Grouped by Day (Line chart)

  • Spyware/Grayware Source Count Grouped by Day (Line chart)

  • Spyware/Grayware Destination Count Grouped by Day (Line chart)

Overall Spyware/Grayware Summary

  • Top 25 Spyware/Grayware (Bar chart)

  • Overall Spyware/Grayware Summary (Grid table)

Spyware/Grayware Source Summary

  • Top 25 Spyware/Grayware Sources (Bar chart)

  • Spyware/Grayware Source Summary (Grid table)

Spyware/Grayware Destination Summary

  • Top 25 Spyware/Grayware Destinations (Bar chart)

  • Spyware/Grayware Destination Summary (Grid table)

Spyware/Grayware Action/Result Summary

  • Action Result Distribution (Pie Chart)

  • Action Result Summary (Grid table)

TM-Suspicious Threat Detection Summary

Suspicious Threat Detection Over Time Summary

  • Suspicious Threat Detection Grouped by Day (Line chart)

  • Rule in Violation Count Grouped by Day (Line chart)

  • Sender Count Grouped by Day (Line chart)

  • Recipient Count Grouped by Day (Line chart)

  • Source IP Address Count Grouped by Day (Line chart)

  • Destination IP Address Count Grouped by Day (Line chart)

Suspicious Threat Sender Summary

  • Top 25 Senders (Bar chart)

  • Suspicious Threat Sender Summary (Grid table)

Suspicious Threat Riskiest Recipient Summary

  • Top 25 Recipients (Bar chart)

  • Suspicious Threat Riskiest Recipient Summary (Grid table)

Suspicious Threat Source Summary

  • Top 25 Source IP Addresses (Bar chart)

  • Suspicious Threat Source Summary (Grid table)

Suspicious Threat Riskiest Destination Summary

  • Top 25 Destination IP Addresses (Bar chart)

  • Suspicious Threat Riskiest Destination Summary (Grid table)

Suspicious Threat Protocol Detection Summary

  • Top 25 Protocol Names (Bar chart)

  • Suspicious Threat Protocol Detection Summary (Grid table)

Overall Suspicious Threat Summary

Overall Suspicious Threat Summary (Grid table)

TM-Virus/Malware Detection Summary

Virus/Malware Detection Over Time Summary

Provides the following information:

  • Virus/Malware Detection Grouped by Day (Line chart)

  • Unique Virus/Malware Count Grouped by Day (Line chart)

  • Infection Destination Count Grouped by Day (Line chart)

Overall Virus/Malware Summary

  • Top 25 Virus/Malware (Bar chart)

  • Overall Virus/Malware Summary (Grid table)

Virus/Malware Infection Source Summary

  • Top 25 Infection Sources (Bar chart)

  • Virus/Malware Infection Source Summary (Grid table)

Virus/Malware Infection Destination Summary

  • Top 25 Infection Destinations

  • Virus/Malware Infection Destination Summary (Grid table)

Virus/Malware Action/Result Summary

  • Action Result Summary (Pie chart)

  • Virus/Malware Action/Result Summary (Grid table)

 TM-Web Violation Detection Summary

Web Violation Detection Over Time Summary

  • Web Violation Detection Grouped by Day (Line chart)

  • Policy in Violation Count Grouped by Day (Line chart)

  • Client in Violation Count Grouped by Day (Line chart)

  • URL in Violation Count Grouped by Day (Line chart)

Overall Web Violation Summary

  • Top 25 Policies in Violation (Bar chart)

  • Overall Web Violation Summary (Grid table)

Web Violation Client IP Address Summary

  • Top 25 Clients in Violation (Bar chart)

  • Web Violation Client IP Address Summary (Grid table)

Web Violation URL Summary

  • Top 25 URLs in Violation (Bar chart)

  • Web Violation URL Summary (Grid table)

Web Violation Filter/Blocking Type Summary

  • Filter/Blocking Type Summary (Pie chart)

See also:

 

Adding Control Manager 5 report templates

Adding one-time reports

Adding scheduled reports