Database Reference
In-Depth Information
Generating reports to monitor control status
You can monitor control status using the detail reports described as follows:
A Control Detail Extract report provides information about controls configured in
GRCC. For each control, the data includes name, description and comments, type
(Access or Transaction), priority, the users who created and most recently updated
the control, the dates on which they did so, and status (active or inactive), as well
as the number of pending incidents it has generated. The report also lists tag values
assigned to the control, its participants, and related controls. Finally, it displays the
processing logic of the control and, for an access control, any conditions defined for
it and entitlements that belong to it.
The Incident Summary Extract report lists incidents generated by access and
transaction controls. For each incident, the report provides the name of the control
that generated it, its status, its type (access or transaction), its priority, the datasource
in which it exists, values of tags associated with it, dates on which it was created and
most recently updated, and on which its control was last run, the users to whom
it is assigned and who most recently updated its status, and comments configured
for it. The report also provides an Incident attribute among those selected (during
configuration of the control that generated the incident) to characterize the
suspect transaction.
The Incident by Control Summary Extract report lists access and transaction
controls that have generated pending incidents—those at the Assigned or
Remediate status. For each control, the report shows the control name, type
(access or transaction), and priority, the datasource to which it applies, values of
tags associated with it, dates on which it was most recently run and most recently
updated, participants assigned to it, comments configured for it, and the number
of pending incidents it has generated.
The Transaction Incident Details Extract report lists incidents generated by
transaction controls. For each incident, it provides not only the information that
would be included in the Incident Summary Extract report, but also the values for
all attributes selected to characterize suspect transactions. Because these attributes
are chosen during configuration of the control, they vary from one control to another,
so each run of the report must focus on a single control. You can select this control as
you run the report.
 
Search WWH ::




Custom Search