Skip to content

Risk Reports

Applications Risk Live Report

This report shows the composite risk score for each application along with the component scores that were used to calculate that composite score. Disabled application risk score components are not included on the report.

Summary reports include mainly charts, graphs and summary statistics that highlight status of different areas within IdentityIQ. These reports cannot be exported to the CSV format.

The Application Risk Live Report consists of the following sections:

All reports use a set of standard properties for basic information such as naming and descriptions, and for setting controls, such as scoping and requiring sign-off.

You must enter the following before running this report:

  • Name

For step by step instructions on creating or editing a report, see Working With Reports.

Report Options

The following criteria determines what information is included in this report. You can use any combination of options to build a report.

Note

Selecting NO options from a list indicates that ALL options in the list are included in the report.

Option Description
Applications Select the applications to include in the report. If no applications are specified, all applications are included.

Click the arrow to the right of the suggestion field to display a list of all applications, or enter a few letters in the field to display a list of applications that start with that letter string.
Owners The application owners to include in the report. Only applications associated with selected application owners are included in the report

Click the arrow to the right of the suggestion field to display a list of all owners, or enter a few letters in the field to display a list of owners that start with that letter string.

Identity Risk Live Report

This report shows the total risk score, and the component risk scores used to calculate it, for each Identity. It also shows the Identity's name, first name, and manager.

The summary section of this report shows a graph of the number of identities with risk scores in various score ranges. Total and component risk scores are all graphed in separate color-coded columns, and scores are subdivided into ranges of 200 points each.

The detailed results of this report can be exported to a CSV or PDF file.

The Identity Risk Live Report consists of the following sections:

All reports use a set of standard properties for basic information such as naming and descriptions, and for setting controls, such as scoping and requiring sign-off.

You must enter the following before running this report:

  • Name

For step by step instructions on creating or editing a report, see Working With Reports

Identity Attributes

The following criteria determines what information is included in this report. You can use any combination of options to build a report.

Note

Selecting NO options from a list indicates that ALL options in the list are included in the report.

Note

Use the Shift and Crtl keys to select multiple items from lists.

Option Description
First Name Input the first name of the identity you wish the report to include. For example, if you input "John" in the field, the report includes information on identities whose first name is John.
Last Name Input the last name of the identity you wish the report to include. For example, if you input "Smith" in the field, the report includes information on identities whose last name is Smith.
Display Name Input the display name of the identity you wish the report to include. For example, if you input "John_Smith" in the field, the report includes information on identities whose display name is John_Smith.
Email Input the email address of the identity you wish the report to include. For example, if you input "John@email.com" in the field, the report includes information on identities whose email address is name is John@email.com.
Managers The manager list to include in this report. Only users who report to the selected managers are included in the report.

Click the arrow to the right of the suggestion field to a list of all managers, or enter a few letters in the field to display a list of managers that start with that letter string.
Inactive Choose how the report handles inactive users. Select No selection to include both inactive and active users, True to include only inactive users, or False to not include inactive users.

Identity Extended Attributes

You can use the identity extended attributes that have been defined for your installation as criteria for this report. Because these are custom-defined attributes, the specific criteria options you have here will be specific to your own installation of IdentityIQ. Any identity extended attributes defined as searchable or as multi-valued are included as possible filters for the report.

Additional Identity Details

The following criteria determines what information is included in this report. You can use any combination of options to build a report.

Note

Selecting NO options from a list indicates that ALL options in the list are included in the report.

Note

Use the Shift and Crtl keys to select multiple items from lists.

Option Description
Applications Select the applications to include in the report. If no applications are specified, all applications are included.

Click the arrow to the right of the suggestion field to display a list of all applications, or enter a few letters in the field to display a list of applications that start with that letter string.
Capabilities Select the capabilities to include in the report.
Roles The roles to include in the report.

Click the arrow to the right of the field and select a role to create the inclusion list for this report.
Groups The groups or populations to include in the report.

Click the arrow to the right of the field and select a group to create the inclusion list for this report.
Last Refresh Date Select a date range to filter users based on when the user was last refreshed.
Last login Date Specify a login date range manually or click the calendar icon and select one using the calendar options.

Risky Accounts Report

This report lists identities with accounts which represent risk on applications (that is, cause a higher application risk score for the application), along with the issues that cause the accounts to be identified as risky.

Summary reports include mainly charts, graphs and summary statistics that highlight status of different areas within IdentityIQ. These reports cannot be exported to the CSV format.

The Risky Accounts Report consists of the following sections:

All reports use a set of standard properties for basic information such as naming and descriptions, and for setting controls, such as scoping and requiring sign-off.

You must enter the following before running this report:

  • Name

For step by step instructions on creating or editing a report, see Working With Reports.

Report Options

The following criteria determines what information is included in this report. You can use any combination of options to build a report.

Note

Selecting NO options from a list indicates that ALL options in the list are included in the report.

Option Description
Correlated Applications Select the applications to include in the report. If no applications are specified, all applications are included.

Click the arrow to the right of the suggestion field to display a list of all applications, or enter a few letters in the field to display a list of applications that start with that letter string.

Correlated Applications are applications that are to be compared with the authoritative application. Any identity that has an account on the correlated application but not on the authoritative application is considered uncorrelated.