Clients Policies Report
The Clients Policies Report shows the mapping of clients with the policies applied to them on the CipherTrust Manager. You can download the report as a PDF or CSV document, as required. Refer to Downloading the Report.
Use the "Search by" box to search for records in the report by Client Name, Policy Name, or Domain. When searching for records by domain names, specify the complete and exact domain name including case-sensitivity. For example, searching for "test", "test-domain", and "Test-Domain" will return different search results.
Viewing the Report
To view the Clients Policies Report:
Open the Transparent Encryption application.
In the left pane, click Reports. The Reports page is displayed.
Click the Clients Policies tab.
The report shows all or some of the following columns:
Column | Description |
---|---|
Domain | Name of the CipherTrust Manager domain to which the record belongs. If the Domain Sharing Data toggle is turned ON, the report displays all the domains where the resource is shared. |
Client Name | Name of the client on the CipherTrust Manager. Click the up/down arrow icon to sort the report list by client name. |
Policy Name | Name of the applied policy. Click the up/down arrow icon to sort the report list by policy name. |
Policy Description | Description of the applied policy. |
Transformation Policy | Displays whether the listed policy is a transformation policy or not. |
Client Type | Type of the client: • FS: CTE client • CSI: CTE for Kubernetes client • CTE-U: CTE UserSpace client |
OS Type | Operating system running on the client - AIX, LINUX, WINDOWS, UNKNOWN, FREEBSD.UNKNOWN is displayed for unregistered or manually added clients. FREEBSD is supported by CTE UserSpace. |
Policy Type | Type of the policy. The type can be: • Standard • Live Data Transformation • Cloud Object Storage • In-place Data Transformation • CSI |
Guard Enabled | Whether a GuardPoint is enabled. |
Learn Mode | Whether Learn Mode is enabled on the policy. |
Last Update | Displays the most recent time of policy update. Click the up/down arrow icon to sort the report list based on the time of last update. |
Downloading the Report
Download the report as a PDF or CSV document. Based on the displayed columns and applied filters, the downloaded report shows all or some of the columns listed in Viewing the Report.
Reports provide an easy and quick method to answer queries such as:
How many clients are registered with the CipherTrust Manager?
What is the health status of clients?
How many keys are used for protecting data?
What keys and policies are linked?
How many GuardPoints are applied on a client?
What key is used to protect a specific GuardPoint?
What CTE resources belong to a specific CipherTrust Manager domain?
Use the Domain Sharing Data toggle button to include/exclude information about CTE resources shared across domains.
Dashboard
The dashboard on the Reports page shows the following information:
TOTAL CLIENTS: Shows the total count of registered and unregistered clients on the CipherTrust Manager.
CTE LICENSES USED: Shows the count of consumed CipherTrust Transparent Encryption licenses out of available licenses.
CTE-U LICENSES USED: Shows the count of consumed CipherTrust Transparent Encryption for UserSpace licenses out of available licenses.
K8S LICENSES USED: Shows the count of consumed CipherTrust Transparent Encryption for Kubernetes licenses out of available licenses.
TOTAL GUARDPOINTS: Shows the total count of GuardPoints configured on the registered and unregistered clients on the CipherTrust Manager.
ACTIVE GUARDPOINTS: Shows the count of active GuardPoints on the CipherTrust Manager.
INACTIVE GUARDPOINTS: Shows the count of inactive GuardPoints on the CipherTrust Manager.
Download Formats
View the latest CTE reports and download them as PDF and CSV documents on your local machines. The PDF and CSV formats present reports in easy-to-understand tabular forms.
Important Note on CSV Reports
If the names of CTE resources include special characters like equals (=
), plus (+
), minus (-
), at (@
), tab (0x09
), and carriage return (0x0D
), the resources are renamed in the downloaded CSV reports by applying the following rules:
Every cell is wrapped in double quotes
Every cell is prepended with a single quote
Every double quote is escaped using an additional double quote
For example, a resource named =A+B'" ;,=C+D
is renamed as "'=A+B'"" ;,=C+D"
in the downloaded CSV report.
To download the Clients Policies Report:
Open the Transparent Encryption application.
In the left pane, click Reports. The Reports page is displayed.
Click the Clients Profiles tab.
Download the report:
Click Download CSV to download the report as a CSV file. The file is named
cte_clients_policies_<TIMESTAMP>.csv
, for example, cte_clients_policies_2021-01-12T07_08_43Z.csv.Click Download PDF to download the report as a PDF file. The file is named
cte_clients_policies_<TIMESTAMP>.pdf
, for example, cte_clients_policies_2021-01-12T07_08_50Z.pdf.Note
Exclude at least two columns to download the report in the PDF format. Use the gear icon () to select which fields should appear in the report.
The downloaded PDF document shows the Report Name as Clients Policies Report and time the report is Generated At.