Clients Policies Report
The Clients Policies Report shows the mapping of clients with the policies applied to them on the CipherTrust Manager. You can download the report as a PDF or CSV document, as required. Refer to Downloading the Report.
Use the "Search by" box to search for records in the report by the Client Name or Policy Name column.
Viewing the Report
To view the Clients Policies Report:
Open the Transparent Encryption application.
In the left pane, click Reports. The Reports page is displayed.
Click the Clients Policies tab.
The report shows all or some of the following columns:
Column | Description |
---|---|
Client Name | Name of the client on the CipherTrust Manager. |
OS Type | Operating system running on the client - LINUX, WINDOWS, or UNKNOWN. For unregistered or manually added clients, UNKNOWN is displayed. |
Policy Name | Name of the applied policy. |
Policy Type | Type of the policy. The type can be: • Standard • Live Data Transformation • Cloud Object Storage • In-place Data Transformation |
Guard Enabled | Whether a GuardPoint is enabled. |
Downloading the Report
Download the report as a PDF or CSV document. Based on the displayed columns and applied filters, the downloaded report shows all or some of the columns listed in Viewing the Report.
To download the Clients Policies Report:
Open the Transparent Encryption application.
In the left pane, click Reports. The Reports page is displayed.
Click the Clients Profiles tab.
Download the report:
Click Download CSV to download the report as a CSV file. The file is named
cte_clients_policies_<TIMESTAMP>.csv
, for example, cte_clients_policies_2021-01-12T07_08_43Z.csv.Click Download PDF to download the report as a PDF file. The file is named
cte_clients_policies_<TIMESTAMP>.pdf
, for example, cte_clients_policies_2021-01-12T07_08_50Z.pdf.
The downloaded PDF document shows the Report Name as Clients Policies Report and time the report is Generated At.