Figure 117 access report – Raritan Computer CC-SG User Manual

Page 136

Advertising
background image

122 C

OMMAND

C

ENTER

S

ECURE

G

ATEWAY

A

DMINISTRATOR

G

UIDE

3. You can limit the data that the report will contain by entering additional parameters in the

Message, Device name, Port name, Username, and User IP address fields.

• If you want to limit the report by the message text associated with an activity, type the text in

the Message field.

• If you want to limit the report to a particular device, type the device name in the Device

name field.

• If you want to limit the report to a particular port, type the port name in the Port name field.
• If you want to limit the report to a particular user’s activities, type the user’s username in the

Username field.

• If you want to limit the report to a particular IP address’s activities, type the user’s IP address

in the User IP address field.

4. Click OK to run the report. The report is generated, displaying data about access that

occurred during the designated time period that also complies with any additional parameters
specified.

Figure 117 Access Report

• Click Next or Previous to navigate through the pages of the report.
• Click Manage Report Data… to save or print the report. Click Save to save the records that

are displayed in the current report page to a CSV file or click Save All to save all records.
Click Print to print the records that are displayed in the current report page or Print All to
print all records. Click Close to close the window.

• Click Clear to clear the log files used in the report.
• Click Close to close the report.

Advertising