Skip to main content

Check out Interactive Visual Stories to gain hands-on experience with the SSE product features. Click here

Skyhigh Security

Map Classic Report Templates to new Reports

This topic describes how to create reports previously provided as Classic Report Templates. New Reports are created directly from the Services Overview or Users Overview pages, where you can edit the page to your requirements and then create a report based on what you see in the user interface. 

For each report, use the instructions to sort for the results, then click Create Report to Run Now or Schedule a Report. If you need to use a Group by parameter, select the Schedule option. 

NOTE: If a table column is not visible in your tenant, click Actions > Edit Table Columns to add it. 

Classic Report Template How to Create this Report
Services by Risk Score On the Services Overview page, click the Risk column to sort from high to low.
Services by Upload Data On the Services Overview page, click the Upload Data column to sort from high to low. 
Services by Inbound Data Traffic On the Services Overview page, click the Inbound Data column to sort from high to low. 
Services by Outbound Data Traffic On the Services Overview page, click the Outbound Data column to sort from high to low. 
Services by Allowed Percentage On the Services Overview page, click the Allowed | Denied Requests column to sort from high to low. 
Services by Access Count On the Services Overview page, click the Requests column to sort from high to low. 
Services by Denied Percentage On the Services Overview page, click the Allowed | Denied Requests column to sort from high to low.  
Services by Total Traffic Volume On the Services Overview page, click Actions > Edit Table to add the Total Data column. Click the Total Data column to sort from high to low.  
Services with Breaches in the Last Year On the Services Overview page, search for Breach Identified for Service - Registry Attribute, and add one of the following attribute values: Less than a month, 1 to 3 months, or 3 months to a year. Then select the time range for your report. 
New Services On the Services Overview page, select the Filter Status = New
CSP Data Between Dates On the Services Overview page, click Actions > Edit Table to add the Service Last Used column. Click the Service Last Used column to sort by descending order.
Number of Services by Category On the Services Overview page, click the Category column to sort Category names alphabetically. 
Top Users by Access Count

On the Users Overview page, click the Requests column to sort from high to low. 

Select Create Report > Schedule, and select Group by > Service Name. Then select All Services

Top Users by Total Traffic Volume

On the Users Overview page, click Actions > Edit Table to add the Total Data column. Click the Total Data column to sort from high to low. 

Select Create Report > Schedule, and select Group by > Service Name. Then select All Services

Users Exposed to Vulnerable Services

On the Users Overview page, search for Vulnerability Exploit Type - Registry Attribute, and add all of the attribute values: Cloudbleed, DROWN, Freak/Logjam, Heartbleed, and POODLE.

Select Create Report > Schedule, and select Group by > Service Name. Then select All Services

Data Exfiltration Report

On the Users Overview page, click the Upload Data column.

Select Create Report > Schedule, and select Group by > Service Name. Then select All Services

 

  • Was this article helpful?