67-3
User Guide for Cisco Security Manager 4.4
OL-28826-01
Chapter67 Managing Reports
Understanding Report Management
Extranet VPN Configuration Summaries—You can print, or generate a PDF file of, a summary
of the configuration of an Extranet VPN. This summary can include the preshared key used for the
connection. You can use this information to maintain a current record of connections between your
network and the networks of partners or service providers. For more information, see Viewing a
Summary of a VPN Topology’s Configuration, page 24-59.
Policy Object Usage report—This report shows you where a policy object is used, including
instances where it is referred to by a policy or another policy object. You can use this information
to help determine whether a proposed change to the object will provide the desired effect in all cases
where it is used. The information is also helpful if you want to delete an object, because you cannot
delete an object that is actively being used by a policy or another policy object. For more
information, see Generating Object Usage Reports, page 6-14.
Policy Object Override report—This report shows you all of the device-level overrides currently
defined for a policy object, if the object is defined so that overrides are allowed. You can also create
and delete overrides from this report. For more information, see Creating or Editing Object
Overrides for Multiple Devices At A Time, page6-19 and Policy Object Overrides Window,
page 6-20.
Device Manager reports—Security Manager includes read-only versions of individual device
managers, such as the Adaptive Security Device Manager (ASDM), for most supported devices. You
can start these device managers directly from Security Manager’s Configuration Manager
application and use any type of report available in those device managers. These reports are for a
single device, and can augment the reports available through Report Manager. They can also provide
status information for devices that are not directly supported by Event Viewer or Report Manager.
For more information, see Starting Device Managers, page 69-4.
Preparing Devices for Report Manager Reporting
Before you can view reports about a device in Report Manager, you must configure the device to send
events to Security Manager and configure Security Manager to monitor the device. Report Manager can
provide reports only for devices you are monitoring in Event Viewer, so the device configuration for
reporting is identical to the configuration for event monitoring.
Step 1 Configure the devices to send events to Security Manager. You can use Report Manager with the
following types of devices:
ASA 8.0 and higher—For the detailed configuration steps, see Configuring ASA and FWSM
Devices for Event Management, page 66-25.
IPS 6.1 and higher—For the detailed configuration steps, see Configuring IPS Devices for Event
Management, page 66-26.
Step 2 Ensure that the devices are selected for event management as described in Selecting Devices to Monitor,
page 66-31.
Step 3 Ensure that the Event Manager service is enabled as described in Starting, Stopping, and Configuring
the Event Manager Service, page 66-27.