Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • CYRISMA MSP Dashboard
  • Home
  • User Manual
  • Report Builder

Report Builder

Learn how to effectively create professional reports with the use of a report builder tool.

Written by Noah Garland

Updated at November 15th, 2024

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • CYRISMA Partner Portal Access
  • Glossary
  • API Documents
  • CYRISMA Change Log
  • Support Ticket SLA
  • Billing Questions
+ More

Table of Contents

Report Builder Guide Selecting the Type of Report Report Type Breakdown 1. Data Report 2. Vulnerability Report 3. Secure Baseline Report 4. Dark Web Report 5. Cyber Risk Assessment Report Generated Reports

Report Builder Guide

The Report Builder feature in CYRISMA allows users to generate detailed reports based on different scan types and criteria. Users can select from multiple report types, customize the content, and review previously generated reports.

Selecting the Type of Report

On the Report Builder page, you can choose from the following report types:

  1. Data
  2. Vulnerability
  3. Secure Baseline
  4. Dark Web
  5. Cyber Risk Assessment

Each report type provides unique configuration options based on the selected type.

 


Report Type Breakdown

1. Data Report

  • Select Report Date: Choose the date on which the data scan was completed.
  • Select Scan Name: Select the specific scan name from that date to build the report.
  • Type of Report: Options include:
    • Executive Summary: High-level overview.
    • Full Detail: Comprehensive report with detailed findings.

2. Vulnerability Report

  • Generate Report By:
    • Scan Name: Generates a report based on a specific scan date and name.
      • Select Report Date: Choose the scan date.
      • Select Scan Name: Select the specific scan name.
      • Type of Report: Executive Summary or Full Detail.
    • Duration: Generates a report based on vulnerability data over a selected time range.
      • Options: 30, 60, 90, 180, or 365 days.
      • Report Description: This option provides an Internal Authenticated Vulnerability report based on vulnerabilities detected over the selected time period.

3. Secure Baseline Report

  • Select Report Date: Choose the date of the baseline scan.
  • Select Scan Name: Select the specific baseline scan name from the date chosen.
  • Type of Report: Options are Executive Summary or Full Detail.

4. Dark Web Report

  • Type of Report: Choose between:
    • Executive Summary: Summary of findings on the dark web.
    • Full Detail: Detailed insights on the dark web results.

5. Cyber Risk Assessment Report

  • Criteria Selection: Choose specific criteria to generate an overall health assessment report:
    • External Vulnerability
    • External Web Application
    • Internal Authenticated Vulnerability
    • Data Sensitivity (plus Monetization)
    • Secure Baseline
    • Dark Web

Generated Reports

After configuring and generating a report, it will appear in the Generated Reports section. For each generated report, there are three actions available:

  1. Download Report: Download the report in PDF or another format.
  2. Email Report: Send the report via email to designated recipients.
  3. Delete Report: Remove the report from the list.

Note: Reports generated from Compliance Assessments will also appear in this section, making it a centralized area for all report outputs.

 


document generator analytical tool report report builder scan reports

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • CYRISMA Setup Guide: Integrating with PSA Platforms
  • Autotask PSA Integration Guide
  • How to setup a Dark Web Monitor

Partners
pax8
CDW
Stellar Cyber
RedSky Alliance

Request A Demo
Platform
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
Resources
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
Contact Us
Address: 510 Clinton Square, Rochester, New York, USA, 14604

Email: info@cyrisma.com

Phone: 1-585-620-2496

Easiest To Do Business With Summer 2023
Category Leader Channel Program
Capterra
Software Advice

Terms of Use          Privacy Policy

Copyright © 2024 – Data Spotlite, Inc All rights reserved.
Expand