HP Identity Driven Manager Software Series User Manual
Page 36
2-20
Getting Started
Using IDM Reports
By default, all user history is reset and all session history is deleted by the predefined
IDM Session Cleanup policy on the first day of each month at midnight. However,
the IDM Session Cleanup policy can be modified to fit your needs.
The following IDM reports are available:
Table 2-5.
IDM Reports
Report
Contents
Configuration
Detailed information for every Domain, RADIUS server, Access Policy Group,
and, optionally, user that the IDM agent has learned or that have been
defined in IDM. Domain information includes the most recent deployment
date and number of assigned users and RADIUS servers.
• The RADIUS server section includes the server name, whether the server
is currently active, number of successful and failed logins since midnight
of the current day, and number of Domains defined on the server (similar
to that shown on the RADIUS Server Properties window).
• The Access Policy Group section includes the Access Policy Group
name, number of Domains to which the Access Policy Group is assigned,
and number of users assigned to the Access Policy Group.
• The Users section shows the Domain and Access Policy Group to which
the user is assigned, username, date and time of last login, and input,
output, and total bytes used during the reporting period.
To collect report data, ensure the Identity Management Preferences are set
to enable user session accounting.
Endpoint
Integrity
Whether a computer used to login is in compliance with corporate standards
monitored by a third-party endpoint integrity solution. If the RADIUS server
used to authenticate the user has a endpoint integrity solution, the computer
where the user logged in may be checked for integrity criteria such as up-
to-date anti-virus software and an authorized operating system. This report
is especially helpful in identifying computers that require anti-virus,
operating system, or other software installations/updates.
IDM Statistics
Total hourly and daily logins and bandwidth usage during the reporting
period. This report is especially helpful in identifying access profiles that
require bandwidth adjustment and hardware components that require
maintenance.