PAM360 allows you to create custom reports derived from four predefined reports - Password Inventory, Password Compliance, Password Expiry, and Password Integrity - as well as two audit reports: Resource Audit and User Audit. You can customize these reports by specifying criteria to generate reports tailored to your specific needs.
Custom reports offer more targeted information compared to the general data provided by canned reports. You can extract detailed insights from the database by customizing the predefined reports to match your specific requirements.
Suppose you want to generate a report from the Password Inventory Report showing resources owned by user - John from the 'Network Administration' department, you can create a custom report by defining the condition as follows:
This allows you to filter out specific information, giving you control over the output based on your needs.
Consider a scenario where you need to generate a list of sensitive passwords for resource types like Windows, Windows Domain, and Cisco, owned by a specific administrator, John. You also want to know the sharing permissions for these passwords. The following conditions must be met:
1. Identify sensitive accounts:
2. These accounts must be owned by John.
The criteria expression to achieve this would be - ((Resource Type starts with Windows AND Account Name is 'administrator') OR (Resource Type contains Cisco AND Account Name is 'root')) AND the Owner is John
By leveraging the power of custom reports, you can meet many of your auditing requirements with ease. Following is just one use case:
Continuously assessing the vulnerability concerning password access is one of the important auditing requirements. When an administrator, who had active access to the privileged passwords leaves the organization, it is imperative to assess the vulnerability. This requires taking a list of all the passwords that were accessed by the particular user during a specified time period and then initiating steps to change the passwords.
Taking a report on all the password management operations performed by the particular administrator during a specified time period could serve as an 'Exit Audit Report'. Custom reports help you generate a report to achieve this precisely. All that you need to do is to get the report out of the 'Resource Audit'.
This custom report will generate a report listing all password management activities performed by the departing user during the specified period, helping you quickly identify and mitigate any potential vulnerabilities.
By leveraging custom reports from the 'Resource Audit' and 'User Audit', you can meet most of your organization's auditing and compliance requirements efficiently.