Reporting Guide - NetIQ

3y ago
29 Views
2 Downloads
442.23 KB
40 Pages
Last View : 19d ago
Last Download : 3m ago
Upload by : Kaden Thurman
Transcription

Reporting GuideNetIQ Reporting CenterApril 2012

Legal NoticeTHIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THETERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT. EXCEPT AS EXPRESSLY SET FORTH IN SUCH LICENSEAGREEMENT OR NON-DISCLOSURE AGREEMENT, NETIQ CORPORATION PROVIDES THIS DOCUMENT AND THE SOFTWAREDESCRIBED IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOTLIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SOME STATES DO NOTALLOW DISCLAIMERS OF EXPRESS OR IMPLIED WARRANTIES IN CERTAIN TRANSACTIONS; THEREFORE, THIS STATEMENT MAY NOTAPPLY TO YOU.This document and the software described in this document may not be lent, sold, or given away without the prior writtenpermission of NetIQ Corporation, except as otherwise permitted by law. Except as expressly set forth in such licenseagreement or non-disclosure agreement, no part of this document or the software described in this document may bereproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise,without the prior written consent of NetIQ Corporation. Some companies, names, and data in this document are used forillustration purposes and may not represent real companies, individuals, or data.This document could include technical inaccuracies or typographical errors. Changes are periodically made to theinformation herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may makeimprovements in or changes to the software described in this document at any time. 2012 NetIQ Corporation and its affiliates. All Rights Reserved.U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf of the U.S.Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R.227.7202-4 (for Department of Defense (DOD) acquisitions) and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions),the government’s rights in the software and documentation, including its rights to use, modify, reproduce, release, perform,display or disclose the software or documentation, will be subject in all respects to the commercial license rights andrestrictions provided in the license agreement.Check Point, FireWall-1, VPN-1, Provider-1, and SiteManager-1 are trademarks or registered trademarks of Check PointSoftware Technologies Ltd.ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logodesign, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator,Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group PolicySuite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager,PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt,and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the USA. All other companyand product names mentioned are used only for identification purposes and may be trademarks or registered trademarks oftheir respective companies.For purposes of clarity, any module, adapter or other similar material ("Module") is licensed under the terms and conditionsof the End User License Agreement for the applicable version of the NetIQ product or software to which it relates orinteroperates with, and by accessing, copying or using a Module you agree to be bound by such terms. If you do not agree tothe terms of the End User License Agreement you are not authorized to use, access or copy a Module and you must destroy allcopies of the Module and contact NetIQ for further instructions.This product claims FIPS compliance by use of one or more of the Microsoft cryptographic components listed below. Thesecomponents were certified by Microsoft and obtained FIPS certificates via the CMVP.893 Windows Vista Enhanced Cryptographic Provider (RSAENH)894 Windows Vista Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)989 Windows XP Enhanced Cryptographic Provider (RSAENH)990 Windows XP Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)997 Microsoft Windows XP Kernel Mode Cryptographic Module (FIPS.SYS)1000 Microsoft Windows Vista Kernel Mode Security Support Provider Interface (ksecdd.sys)1001 Microsoft Windows Vista Cryptographic Primitives Library (bcrypt.dll)1002 Windows Vista Enhanced Cryptographic Provider (RSAENH)1003 Windows Vista Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)1006 Windows Server 2008 Code Integrity (ci.dll)1007 Microsoft Windows Server 2008 Kernel Mode Security Support Provider Interface (ksecdd.sys)1008 Microsoft Windows Server 2008

1009 Windows Server 2008 Enhanced DSS and Diffie-Hellman Cryptographic Provider (DSSENH)1010 Windows Server 2008 Enhanced Cryptographic Provider1012 Windows Server 2003 Enhanced Cryptographic Provider (RSAENH)This product may also claim FIPS compliance by use of one or more of the Open SSL cryptographic components listed below.These components were certified by the Open Source Software Institute and obtained the FIPS certificates as indicated.918 - OpenSSL FIPS Object Module v1.1.2 - 02/29/2008 140-2 L11051 - OpenSSL FIPS Object Module v 1.2 - 11/17/2008 140-2 L11111 - OpenSSL FIPS Runtime Module v 1.2 - 4/03/2009 140-2 L1Note: Windows FIPS algorithms used in this product may have only been tested when the FIPSmode bit was set. While themodules have valid certificates at the time of this product release, it is the user's responsibility to validate the current modulestatus.EXCEPT AS MAY BE EXPLICITLY SET FORTH IN THE APPLICABLE END USER LICENSE AGREEMENT,NOTHING HEREIN SHALL CONSTITUTE A WARRANTY AND ALL EXPRESS OR IMPLIED CONDITIONS,REPRESENTATIONS, AND WARRANTIES INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTYOR CONDITION OF FITNESS FOR A PARTICULAR PURPOSE ARE HEREBY EXCLUDED TO THE EXTENTALLOWED BY APPLICABLE LAW AND ARE EXPRESSLY DISCLAIMED BY NETIQ, ITS SUPPLIERS ANDLICENSORS.

ContentsAbout this Book and the Library.viiAbout NetIQ Corporation .ixChapter 1Introduction1Chapter 2Installing Reporting Center5What is Reporting Center? .1How Reporting Center Works.2Console.2Configuration Database .3Web Service .3Reporting Services Data Extension.3System Requirements.5Planning Your Installation.6Account Requirements.6Installation Prerequisites .7The Order of Your Installation .7Configuration Database Considerations .7Reporting Services Data Extension Considerations.8Upgrading Reporting Center.8Upgrade Considerations .8Configuring SQL Server Reporting Services .8Configuring Report Deployment in SSRS .9Configuring Email in SSRS .9Chapter 3Getting Started11Starting Reporting Center . 11Navigating Reporting Center. 11Navigation Pane.12Results Pane.12Tasks Pane.12Using the Reporting Center Console .12Managing Data Source Connections .12What’s Next?.13Contentsv

Chapter 4Working with Reporting Center Reports15Chapter 5Configuring Reporting Center Security21Appendix ATroubleshooting25Appendix BFIPS Solutions29Understanding Reports .15Setting Report Contexts.15Setting Report Properties . 16Chart Limitations. 17Exporting Report Definitions . 18Using Dashboard Reports . 18Dashboard Presentation.18Shared Contexts . 18Deploying Reports .19SSRS Limitations .19Deploying a Report to SSRS .20Understanding Reporting Center Security . 21Understanding Users and User Groups .22Understanding Permission Sets .22Assigning Security to Objects .23Tips for Planning Your Security Model .24Applying Security .24General Web Service and Logon Issues .25Reporting Center Web Service Unavailable .26No Data Found In a Report.27Installation and Configuration Issues .29SSRS Report Manager Issue .30viReporting Guide

About this Book and the LibraryThe Reporting Guide provides conceptual information about the NetIQ Reporting Center (ReportingCenter) product. This book defines terminology and includes implementation scenarios.Intended AudienceThis book provides information for individuals responsible for understanding reporting concepts andimplementing an effective reporting environment. It also provides information about creating anddistributing meaningful reports.Other Information in the LibraryThe library provides the following information resources:HelpProvides context-sensitive information and step-by-step guidance for common tasks, as well asdescriptions of each window.Release NotesProvides information about enhancements to Reporting Center since the last release, and listsany known issues for this release.About this Book and the Libraryvii

ConventionsThe library uses consistent conventions to help you identify items throughout the documentation. Thefollowing table summarizes these conventions.ConventionBoldUse Window and menu items Technical terms, when introducedItalics Book and CD-ROM titles Variable names and values Emphasized wordsFixed Font File and folder names Commands and code examples Text you must type Text (output) displayed in the command-line interfaceBrackets, such as [value] Optional parameters of a commandBraces, such as {value} Required parameters of a commandLogical OR, such asvalue1 value2 Exclusive parameters. Choose one parameter.viii Reporting Guide

About NetIQ CorporationNetIQ, an Attachmate business, is a global leader in systems and security management. With more than12,000 customers in over 60 countries, NetIQ solutions maximize technology investments and enable ITprocess improvements to achieve measurable cost savings. The company’s portfolio includes awardwinning management products for IT Process Automation, Systems Management, Security Management,Configuration Audit and Control, Enterprise Administration, and Unified CommunicationsManagement. For more information, please visit www.netiq.com.Contacting Sales SupportFor questions about products, pricing, and capabilities, please contact your local partner. If you cannotcontact your partner, please contact our Sales Support team.Worldwide:www.netiq.com/about netiq/officelocations.aspUnited States and Canada: 888-323-6768Email:info@netiq.comWeb Site:www.netiq.comContacting Technical SupportFor specific product issues, please contact our Technical Support spNorth and South America:1-713-418-5555Europe, Middle East, and Africa: 353 (0) 91-782 677Email:support@netiq.comWeb Site:www.netiq.com/supportContacting Documentation SupportOur goal is to provide documentation that meets your needs. If you have suggestions for improvements,please email Documentation-Feedback@netiq.com. We value your input and look forward to hearingfrom you.Contacting the Online User CommunityQmunity, the NetIQ online community, is a collaborative network connecting you to your peers andNetIQ experts. By providing more immediate information, useful links to helpful resources, and access toNetIQ experts, Qmunity helps ensure you are mastering the knowledge you need to realize the fullpotential of IT investments upon which you rely. For more information, please visit http://community.netiq.com.About NetIQ Corporationix

xReporting Guide

Chapter 1IntroductionBusinesses today have an increasing need to produce easy-to-read, well-designed reports that reflectactivity and events in their computing environments. NetIQ Reporting Center provides customers withthe ability to create these reports that deliver the latest information about their businesses. For example,you can create reports that display the number of events in a managed domain during a specified timeperiod. You can then use the same report to create multiple reports that display other time periods forevents in that managed domain.You can also use Reporting Center to create reports for security events, such as tracking the number ofusers that your business has provisioned or deprovisioned during a specific time period. You can easilycustomize almost every aspect of the look and feel of the charts and tables in your reports.What is Reporting Center?Reporting Center is a reporting framework that allows you to extract data from the databases of otherNetIQ products and present the information as charts and tables in customizable reports.Reporting Center transforms the data into useful reports about the computing infrastructure thatsupports your business. You can use these reports to: Track the performance of your servers Uncover trends across your network Track security events Track provisioning activity for users and groups Make forecasts about resources and performanceReporting Center uses Microsoft SQL Server and SQL Server Reporting Services (SSRS) to deliverup-to-the-minute enterprise analysis reports.Chapter 1 Introduction1

How Reporting Center WorksReporting Center comprises a number of components that work together to retrieve data from sourceNetIQ databases and produce effective reports. You customize and configure these reports in theReporting Center Console and then deploy the reports to SSRS for distribution. You can distributeReporting Center components across multiple computers or install them all-in-one.The following diagram provides an overview of the Reporting Center architecture.The Reporting Center Console connects to the Reporting Center Web Service, which allows you toperform queries on the source databases. You can install the Console on multiple computers. The WebService retrieves data from the source databases and returns it to the Console, where you can configureand run report

918 - OpenSSL FIPS Object Module v1.1.2 - 02/29/2008 140-2 L1 1051 - OpenSSL FIPS Object Module v 1.2 - 11/17/2008 140-2 L1 1111 - OpenSSL FIPS Runtime Module v 1.2 - 4/03/2009 140-2 L1 Note: Windows FIPS algorithms used in this product may have only been tested when the FIPSmode bit was set. While the

Related Documents:

the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance . the NetIQ Partner Network design, NetIQ Patch Manager, NetIQ Risk and Compliance Center, NetIQ Secure Configuration Manager, NetIQ Security Administration Suite, NetIQ Security Analyzer, NetIQ S

NetIQ Communities, the NetIQ online community, is a collaborative network connecting you to your peers and NetIQ experts. By provid ing more immediate information, us eful links to helpful resources, . Advanced Authentication Server is connected to a Directory that can be an Active Directory Domain Services, NetIQ eDirectory, Active Directory .

United States and Canada: 888-323-6768 Email: info@netiq.com Web Site: www.netiq.com . AppManager diagnoses problems with the routing, connections, and performance of Voice over IP (VoIP) telephone calls on your network. . Chapter 8, "Working with NetIQ AppManager," on page 129.

Qmunity, the NetIQ online community, is a collaborative network connecting you to your peers and NetIQ experts. By providing more immediate informatio n, useful links to helpful resources, and access to NetIQ experts, Qmunity helps ensure you are mastering the knowledge you need to realize the full potential of IT investments upon which you rely.

piece of text (such as in email footers), use the following verbiage: CyberRes is a Micro Focus line of business. Website Email 10 CyberRes Brand Guidelines. . Voltage SecureMail NetIQ Secure Configuration Manager NetIQ Data Access Governance Fortify WebInspect Voltage Structured Data Manger NetIQ Sentinel Fortify NetIQ

Legal Notice NetIQ Corporation ("NetIQ") makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular

Cisco IP phones NetIQ has tested AppManager for IP Phone Quality with Cisco IP phone models 7910, 7940, 7960, and 7970, using Cisco CallManager versions 3.3(4), 4.0, and 4.1.

NetIQ Privileged Account Manager delivers a robust and scalable architecture, intuitive management console, and reusable script and command libraries that enable administrators to reduce management overhead and infrastructure costs in your environment. Privileged Account Manager helps an organization protect critical assets and maintain compliance