Clients Keys Report
The Clients Keys Report shows the keys used for protecting GuardPoints on the CTE clients available on the CipherTrust Data Security Platform Service. You can download the report as a PDF or CSV document, as required. Refer to Downloading the Report.
Use the "Search by" box to search for records in the report by Client Name or Key Name.
Viewing the Report
To view the Clients Keys Report:
-
Open the Transparent Encryption application.
-
In the left pane, click Reports. The Reports page is displayed.
-
Click the Clients Keys tab.
The report shows all or some of the following columns:
Column | Description |
---|---|
Client Name | Name of the client on the CipherTrust Data Security Platform Service. |
Description | Description of the client. |
Key Name | Name of the key. |
Downloading the Report
Download the report as a PDF or CSV document. Based on the displayed columns and applied filters, the downloaded report shows all or some of the columns listed in Viewing the Report.
Reports provide an easy and quick method to answer queries such as:
-
How many clients are registered with the CipherTrust Data Security Platform Service?
-
What is the health status of clients?
-
How many keys are used for protecting data?
-
What keys and policies are linked?
-
How many GuardPoints are applied on a client?
-
What key is used to protect a specific GuardPoint?
Dashboard
The dashboard on the Reports page shows the following information:
-
TOTAL CLIENTS: Shows the total count of registered and unregistered clients on the CipherTrust Data Security Platform Service.
-
TOTAL GUARDPOINTS: Shows the total count of GuardPoints configured on the registered and unregistered clients on the CipherTrust Data Security Platform Service.
-
ACTIVE GUARDPOINTS: Shows the count of active GuardPoints on the CipherTrust Data Security Platform Service.
-
INACTIVE GUARDPOINTS: Shows the count of inactive GuardPoints on the CipherTrust Data Security Platform Service.
Download Formats
View the latest CTE reports and download them as PDF and CSV documents on your local machines. The PDF and CSV formats present reports in easy-to-understand tabular forms.
Important Note on CSV Reports
If the names of CTE resources include special characters like equals (=
), plus (+
), minus (-
), at (@
), tab (0x09
), and carriage return (0x0D
), the resources are renamed in the downloaded CSV reports by applying the following rules:
-
Every cell is wrapped in double quotes
-
Every cell is prepended with a single quote
-
Every double quote is escaped using an additional double quote
For example, a resource named =A+B'" ;,=C+D
is renamed as "'=A+B'"" ;,=C+D"
in the downloaded CSV report.
To download the report:
-
Open the Transparent Encryption application.
-
In the left pane, click Reports. The Reports page is displayed.
-
Click the Clients Keys tab.
-
Download the report:
-
Click Download CSV to download the report as a CSV file. The file is named
cte_client_keys_<TIMESTAMP>.csv
, For example, cte_client_keys_2021-01-12T06_56_30Z.csv. -
Click Download PDF to download the report as a PDF file. The file is named
cte_client_keys_<TIMESTAMP>.pdf
, for example, cte_client_keys_2021-01-12T06_56_30Z.pdf.
-
The downloaded PDF document shows the Report Name as Clients Keys Report and time the report is Generated At.