Symantec Reporter 10.5.x Administrator's Guide: Revision - Wednesday, March 11, 2020
Symantec Reporter 10.5.x Administrator's Guide: Revision - Wednesday, March 11, 2020
Symantec Reporter 10.5.x Administrator's Guide: Revision - Wednesday, March 11, 2020
x
Administrator's Guide
Revision — Wednesday, March 11, 2020
Symantec Reporter Administrator Guide
Legal Notice
Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. The term
“Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit
www.broadcom.com.
Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability,
function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does
not assume any liability arising out of the application or use of this information, nor the application or use of any product
or circuit described herein, neither does it convey any license under its patent rights nor the rights of others.
2 of 132
Reporter 10.5.1.1
Table Of Contents
Table Of Contents 3
3 of 132
Symantec Reporter Administrator Guide
Virtual Appliances 27
Detailed Specifications 28
Manage Access 31
About Users 31
Admins 31
Standard User 31
About Roles 31
Add a Consent Banner 31
Procedure—Add a Consent Banner 32
How a User Logs in to Reporter with a Consent Banner 32
About Role-Based Access 34
Plan the Roles 35
LDAP Group-Based Option 35
Create a New Reporter User 36
Define a User or Group Role 38
Authenticate Users with SSL Mutual Authentication 39
Administrative Tasks 48
Recommended Tasks 48
Set Up Email for Admin Alerts and User Reports 48
Clone 48
Manage Databases 48
Purge for Disk Space 48
Manually Edit Configuration Files and Databases 48
Other Tasks 49
CLI Reference 49
Upgrade Reporter 50
4 of 132
Reporter 10.5.1.1
5 of 132
Symantec Reporter Administrator Guide
Reference: CLI 103
CLI Behavior and Command Changes 103
Reference: CLI 104
CLI Behavior and Command Changes 104
Reference: Ports and Protocols 105
Inbound Connections 105
Outbound Connections 105
Required IP Addresses and URLs 106
Reference: Log Fields 107
Reference: Web API Parameter Syntax 114
Common Parameters 114
End Point: /api/create 122
End Point: /api/status 123
End Point: /api/cancel 124
End Point: /api/download 124
End Point: /api/listDatabases 124
End Point: /api/listFields 124
Debugging 125
Relative Dates 126
Trend Reports 126
6 of 132
Reporter 10.5.1.1
7 of 132
Symantec Reporter Administrator Guide
Reporter licensing requires accessing MySymantec. Before licensing Reporter, make sure you have your MySymantec
credentials.
The license matches the total disk space (original specification). Check the current System Resources consumption
on the Admin link System Overview > System Diagnostics page.
n Reporter VA
Symantec offers three levels of licensing for virtual appliances (VAs) based on the total usable disk space available
on these virtual appliances:
o RP-V50
o RP-V100
o RP-V200
8 of 132
Reporter 10.5.1.1
Note: See "Reference: Ports and Protocols" on page 105 for a full list of required ports and
protocols.
If your network requires a proxy connection to the Internet, you must also use the proxy-settings CLI command to
specify that proxy.
To ensure license integrity, Reporter VA periodically communicates with the Symantec license portal to validate the issued
licenses. This requires continuous successful network connectivity with the Symantec network.
To allow for temporary WAN outages, this operation continues for 12 hours or until a successful license validation
occurs. After 12 hours of unsuccessful validation, the Reporter license state changes to invalid. Until this license issue is
resolved, you can continue to use all Reporter functionality except for new database and log source creation;
furthermore, Reporter halts the processing of all new data in existing databases.
n Obtain the license separately and place it on a server that Reporter can access.
9 of 132
Symantec Reporter Administrator Guide
License Troubleshooting
By default, web application information is included in the Reporter database. If this feature is not manually disabled and
Reporter is unable to download the current web application attributes from Symantec, log data will not be consumed and
log sources will remain in the "Initializing" state until either the application attributes are downloaded or this feature is
disabled.
10 of 132
Reporter 10.5.1.1
n Identify which users consume how much network bandwidth from web use.
11 of 132
Symantec Reporter Administrator Guide
B—The gateway ProxySG appliance records transactions and uploads access logs to a dedicated FTP server.
C—The Reporter device (appliance or VA), retrieves the data from the FTP server—the defined log source—and populates
the defined database. More than one log source can feed a database (for example, multiple locations). Reporter users
(admins and users with role-based access) generate and view reports.
Note: Reporter VA is not supported in closed networks. If you require more information,
see "About Reporter Licensing" on page 8.
12 of 132
Reporter 10.5.1.1
D—Based on trends viewed in the reports, admins adjust the web-use and security polices on the gateway Proxy
appliance.
n Processes raw log data received from ProxySG appliances and populates databases.
13 of 132
Symantec Reporter Administrator Guide
This topography is similar to the previous diagram except that for process B, the appliance upload client sends access logs
directly to the Reporter appliance over FTPS.
Related Information
Conceptual
n "About Log Processing" on the facing page
Configuration
n "Create a Database" on page 62
14 of 132
Reporter 10.5.1.1
n Page View Combiner (PVC)—This sub-component of the log reader attempts to provide more realistic user
browsing statistics by combining the initial request and its secondary referral requests as one page count. For
detailed information about the PVC, see "About the Page View Combiner" on page 22.
For optimal Reporter performance, configure your access logs to use the following filename format:
xxxxxxxxxxxxxxxNddddddddddd.log.gz
where:
n x represents any valid character that can be used in naming a log file (letters, digits, underscore, dash).
n d represents a decimal digit. This number, preceding the log file extension, determines the order in which the log
files are processed. The log file ordering is performed identically for FTP and local disk log sources. A date string
that represents the log line dates within the file is preferred. If you mix cloud files with on-premise files, use the
12-digit cloud date syntax described above.
n If this number does not provide a complete ordering on the set of log files, then the log-processing speed suffers
because of internal log table thrashing.
15 of 132
Symantec Reporter Administrator Guide
n A filename format of MMDDhhmmss is inadequate because the files process chronologically, except at year-end when
they temporarily process out-of-order because of the December (MM = 12) rollover into January (MM = 01) where
January files sort before December.
n A filename format of hhmmss is more problematic because log files are processed out-of-order whenever one day
rolls into the next.
n Given these constraints, to ensure the most efficient log file ordering, format this eleven-digit number as:
YYJJJhhmmss, where:
With this format Reporter can properly order log files through the year 2021.
n The default filename format used for log files on the ProxySG appliance has the following text and specifiers:
SG_%f_%c_%l%m%d%H%M%S.log.gz.
o .log.gz = extension
The suggested filename format for log files on the ProxySG appliance slightly alters the default and has the
following text and specifiers: SG_%f_%c_%l%m%d_%y%j%H%M%S.log.gz.
The value of this naming convention for log files is evident when processing large numbers of log files, spanning
multiple days and months. The value is less evident when log-file generation and processing occurs regularly (daily
16 of 132
Reporter 10.5.1.1
or more frequently) so that out-of-order files occur infrequently. However, when reprocessing large sets of log
files, the naming convention is essential.
If all log files were processed in chronological order, more than one hour-table would not be necessary in memory. It is
common for the log-processing process to encounter batches of log files that span multiple hours between them. If they
are processed out of chronological order, performance significantly improves by allowing the number of hour-tables to
grow, provided there is sufficient process memory. Conversely, during low memory conditions, reducing the number of
hour-tables prevents unnecessary memory starvation and subsequent disk operations (swapping files in and out of
memory).
Reporter orders log files based on a numeric field in the filename, when it is present. The default filenames created by the
ProxySG contain a Month/Day/Hour/Minute/Second timestamp immediately preceding the .log or .log.gz suffix; for
example: SG_Main_HQ-1_1102081500.log.gz. If the filename ends with .log or .log.gz, the log processor parses it for
any purely numeric sequence immediately preceding the required suffix. If one is found, it is then used to sequentially
order that batch of log files. You can significantly improve log processor performance by naming the log files with any
ordered numeric values that comply with this format. For example: anyfilenameprefix123.log or some-other-prefix-
84757.log.gz.
As a general guideline, Symantec recommends that databases contain a maximum of 30 days of log data. However, the
amount of log data (number of rows) has more impact than the number of days (age of data) in the data sets.
Reporter also allows the administrator to purge the database based on the number of log lines. Purge the log lines by
expiration, automatically (scheduled), or manually.
Log sources feed access log data into assigned Reporter databases. You can view the status of each log source.
On the Administration > General Settings page, select Reporter Settings > Data Settings > Log Sources. Reporter
displays each database in a table.
17 of 132
Symantec Reporter Administrator Guide
The Status column provides the current state of data processing, which might depend on the status of the log source(s).
Status Definition
Processing The assigned database is currently processing available log lines from the log source.
Loading Reporter is currently loading data from the specified log source.
Initializing
Reporter is currently downloading the web application attribute database file. This file is required to process
log data. If Reporter encounters a license issue or fails to connect to the Symantec subscription service,
Reporter cannot complete the download and the log processing cannot proceed until the issue is resolved.
See "About Offline Licensing and Log Processing" on the facing page
Warning: The attribute download can be disabled if Reporter log sources are stuck
in Initializing. See "Disable the Web Application Attribute" below.
Unloading Reporter received the Stop Log Source command from the Action drop-down list. When Reporter is able to
pause current log processing, it will begin to unload the source from the database.
Unloaded The log source is currently unloaded from the database. This status is required before you can edit
configuration properties. Furthermore, log processing cannot resume until you select Restart Log Source
(from the Action drop-down list).
18 of 132
Reporter 10.5.1.1
1. Enter enable
3. Enter stop-reporter
4. Enter y
intelligence_services = {
web_app_attr_download = "false"
} # intelligence_services
8. Enter start-reporter
9. Enter y
In a new installation, Reporter must obtain web application attributes from the Global Intelligence Network (GIN) over an
internet connection before it can begin processing log data. At every startup, you can see these messages in the system
event log: message a will show that Reporter is verifying that it has this additional data. Message b may periodically occur
if Reporter is unable to obtain the data. Once the web application data is obtained, it is stored locally for a period of time
until a refresh is required, as determined by the web application. Any time Reporter starts up, message c must show
before log processing can resume. If message b is not soon followed by message c, check for connectivity between
Reporter and the internet.
Note: Reporter dynamically obtains external data while processing log data. Reporter will
not process log data until the web application data is initialized successfully.
Offline licensing and log processing is supported on Reporter RP-S500 appliances. Offline licensing and log processing is
also available for Reporter VAs if you have purchased an offline license.
19 of 132
Symantec Reporter Administrator Guide
Note: To enable offline licensing and log processing, disable the Web Application Attribute
feature. See Considerations for Deploying a Reporter Appliance in a Closed Network for
additional information.
Reporter VAs require a stable internet connection in order to function properly and to validate the birth certificate and
serial number. See About Connectivity for Reporter Virtual Appliances for more information.
Note: If your firewall uses HTTPS certificate validation, you must exempt device-
services.es.bluecoat.com from validation or add the Certificate Authority chain to the
Certificate Authority list.
As Reporter databases process the data from the assigned log sources, you can view the current status.
On the Administration > General Settings page, select Reporter Settings > Data Settings > Databases. Reporter
displays each database in a table.
Status Definition
Corrupt The database is corrupt. This may temporarily occur when loading, unloading, restoring, or emptying a
database
20 of 132
Reporter 10.5.1.1
Status Definition
Expiring The database is loaded, but Reporter is currently expiring data. Therefore, log processing is not occurring
and some reports might not be available.
Loaded The database is ready to generate reports based on the configured log source(s).
Loading Reporter is currently loading from disk; log processing and report generation is not yet available.
Depending on the database size, the load time might require substantial time.
Processing The database is currently processing available log lines from the log source.
Unloaded Log processing and report generation are not possible from this database.
Unloading Reporter is currently unloading from disk; log processing and report generation are not available.
Depending on the database size, the unload time might require substantial time.
21 of 132
Symantec Reporter Administrator Guide
22 of 132
Reporter 10.5.1.1
n Reduce the number of database entries from the original log file, which improves report generation performance.
n More closely represent user browsing activity, because each object (requested by the first page from content
servers) is not counted as a separate entry.
B—The example.com server S1 sends additional requests to other servers in its farm for advertisements and video
content. It receives four data objects.
n example.com/main.html
n i.example.com/ads/sponsor1.gif
n example.com/news/story1.html
n example.com/news/video1
C—The gateway ProxySG appliance adds access log entries for all of these content elements.
D—The Reporter PVC combines the log lines into one page view and saves it in the database. The Reporter user
generates and views a report that contains one page-view entry for the original request to www.example.com.
It is possible that a web request that would normally be combined to represent one page view might be split into two
page views. This occurs when, as a result of internal processing, the log sources are halted or restarted, or the request is
recorded across two log files.
If this occurs, no data is lost, but the database contains two page views. Continuing with the example in the previous
illustration:
8:40:20 cnn.com/html
8:40:20 i.cnn.com/ads/sponsor1.gif
[------end of log file------------]
[----beginning of new log file----]
8:40:21 cnn.com/news/story1.html
8:40:21 cnn.com/news/video1.asf
The first two entries are shown as one page view; the second two as another within the database. However, they
represent a single page view that was requested by a user.
Requirements
PVC can happen only when the the following fields are present in the logs:
n cs-referer
n sc-status
n rs(Content-Type)
Symantec-recommended log formats contain these fields (see also "Reference: Log Fields" on page 107).
23 of 132
Symantec Reporter Administrator Guide
If these log fields are not present, no page-view combining can occur, and so report data represents each separate web
request.
Note: HTTPS logs do not contain the cs(Referer) field; therefore, the PVC process cannot
occur. The field is not included because it would expose personal user data (such as bank
account information).
Additional Reference
n See "Reference: Log Fields" on page 107.
24 of 132
Reporter 10.5.1.1
As Reporter processes each log line in each log file, it finds and adds up browse time for each client IP address. If Reporter
determines that a request is a page view, the transaction is assigned 30 seconds of browse time. However, if another
page view is discovered within 30 seconds in the page view combiner (PVC) cache time window (10 seconds by default),
Reporter subtracts the time of the previous page view from the next and counts the result. If the next page view occurs
more than 30 seconds after the previous page view, the previous page view remains at 30 seconds.
Reporter calculates browse time in real time during log processing. Furthermore, Reporter can subtract only the time
difference from the last page view if it still exists in the PVC cache. For example, if a Reporter administrator sets the
default browse time to 60 seconds per page and leaves the PVC cache time windows to 10, the 60-second value applies
by default unless another page view is found for the same client IP address and user agent within the 30-second PVC
window. Therefore, there may be pages with anywhere between zero and 30 seconds or 60 seconds of browse time.
Typically, the default browse time is set to 30 seconds by default, which means that all pages have a browse time from
zero to 30 seconds, but never longer.
For related information, see "About the Page View Combiner" on page 22.
Examples
Consider the following browse time examples.
Tip: These examples assumes the default values of 30 seconds for browse time with a
default PVC cache of 30 seconds or fewer. For example, if a user visits cnn.com and never
loads another page (does not click through the various articles links) for three hours, the
resulting browse time is 30 seconds.
Scenario 1
Employee A visits cnn.com for 40 seconds, visits yahoo.com for 20 seconds, and then leaves the browser on youtube.com
for 2 minutes but does not watch a video or click links on the site.
25 of 132
Symantec Reporter Administrator Guide
n Reporter calculates 30 seconds for cnn.com, 20 seconds for yahoo.com, and 30 seconds for youtube.com, for a total
browse time of 80 seconds.
n If, however, the same user browses videos on youtube.com every 29 seconds, the resulting browse time is 30
seconds for each video, resulting in a total browse time of 120 seconds.
Scenario 2
Employee A opens two different browsers—such as Internet Explorer and Firefox—at the same time and performs the
above scenario. The result is a doubling of the browse time.
Scenario 3
Employee A uses only one browser. By default, all page views are given the default browse time, which is 30 seconds. (This
value is configurable.) If Reporter processes another page view from the same client IP address on the same user agent
while the first page view is still in the PVC cache (which also has a30-second window by default), Reporter lowers the
browse time for the first page view to the time difference between the page views.
Scenario 4
Employee B visits images.google.com for 5 seconds and then clicks a picture, views it for 15 seconds, clicks the back
button, clicks a different picture, and views it for 45 seconds. Reporter records 5 seconds for images.google.com, then 15
seconds for the the first picture (plus whatever time it takes to click back and click on the second image), and then records
30 seconds for the last picture.
26 of 132
Reporter 10.5.1.1
n Reporter supports FTP, FTPS, and SCP file transfers. (Reporter 10.1 does not support FTPS and SCP.)
n Access logs are generally transferred and stored as files compressed to a ~6:1 ratio.
Databases
Access log files may be processed into one or more databases.
n A database is roughly twice the size of its compressed access-log files, or half the size of its raw access-log files.
n Locally stored access-log files may be processed into databases using Local Log Sources.
n Remotely stored access-log files may be processed directly into databases using FTP Log Sources.
n Reporter officially supports these FTP servers, although other servers may also work with Reporter:
o Linux: VSFTPD
Database Backups
n Customers may choose to create one or more backups of any of their databases.
n Each database backup mirrors the size of its database when the backup occurred.
RP-S500 Appliances
n 24 TB (9.7 TB available)
n RAID 10
n 262144 RAM
Virtual Appliances
Symantec Reporter 10.5.1.1 supports ESXi 6.0 and 6.5 servers with ESXi Essentials, Essentials Plus, Standard, Enterprise,
or Enterprise Plus licenses. (Versions 10.1 and 10.2 do not support ESXi 6.5.) Your environment and goals determine the
27 of 132
Symantec Reporter Administrator Guide
appropriate license. Reporter can operate with the Essentials license; however, if you employ multiple vSphere servers, a
higher-level license is likely required.
Note: For more information about licensing, including product behavior when a license is
not valid, see "About Reporter Licensing" on page 8.
Detailed Specifications
The following table provides detailed specifications for all current Reporter 10.x platforms.
n Virtual Appliance (V models)—Values in blue are limited by the terms of the license.
Drive Count 24 1 1 1
Drive Limit 24 1 1 1
CPU Count 40 8 16 32
CPU Virtual Core Limit 40 8 16 32
28 of 132
Reporter 10.5.1.1
Communication between Reporter and the Web Security Service requires an API key that you create in the WSS service
portal.
Topography
A—User Group A resides at the corporate location. The access method to route requests to the Web Security Service is
proxy forwarding.
29 of 132
Symantec Reporter Administrator Guide
C—User C is a mobile user who connects through the WSS agent or a registered mobile device.
D—The Reporter admin is at the corporate location. Depending on the deployment, the dedicated Reporter FTP server or
Reporter appliance itself receives logs from the Web Security Service over a secure (HTTPS) connection to the destination
directory that you specify.
Note: To retrieve logs from the Web Security Service, Reporter must have access to the
internet.
Additional Information
Upon the first successful communication with the cloud service, Reporter downloads all available log data. After that,
Reporter downloads only new log data.
Each access log contains a one-hour segment of data. Reporter saves log files in the destination directory with date-
formatted file names similar to:
cloud_###_##############.log.gz.
The second numerical portion of the sequence represents the following date/time information:
Year/Month/Day/Hour/Minute/Second
For example, 201911221300 means that the log file was collected by the Web Security Service service at 1:00 pm on
November 22, 2019.
Note: The cloud service prevents Reporter from downloading access logs that are less than
two hours old.
30 of 132
Reporter 10.5.1.1
Manage Access
Reporter classifies three types of users—two admins and users—who can access the web interface.
About Users
Admins
n Default Administrator—This is the Reporter administrator account that is created when Reporter is installed. The
default administrator has access to all Reporter functions, including administration options and all reports. This
user can be deleted by another administrator, but users cannot delete themselves, and the last administrator on
the system cannot be deleted.
n Administrator—The default administrator can create additional administrator users. Like the default
administrator, these administrators have access to all Reporter functions, including administration options and all
reports.
Standard User
A standard user who logs into Reporter has access to the report databases to which they are assigned. Standard users do
not have access to the Administration page, but they can change their Reporter access password and default email
address.
About Roles
Reporter allows you to create role-based access control. You can manually assign users to a role or integrate your LDAP
active directory.
31 of 132
Symantec Reporter Administrator Guide
2. In the Consent Banner field, select Display Banner to enable the feature.
3. Optional—To add an image to the banner, click Browse to find the image.
Note: PNG and JPG are the only supported banner image types. The system does not
support images larger than 100KB. All custom banner images are re-sized to no larger
than 500px by 100px. Re-sized images are scaled to a height of 500px or to a length
of 100px.
The system displays the text in the banner exactly as you format it in the text box.
4. Depending on the authentication method, the user logs in to Reporter in one of the following ways:
32 of 132
Reporter 10.5.1.1
n Common Access Card (CAC): The user is authenticated with the CAC certificate and the system displays the
home page.
33 of 132
Symantec Reporter Administrator Guide
A role is defined as access to database fields. Your Reporter deployment contains at least one database and likely has
multiple. Access logs from a gateway ProxySG appliance populate databases from which Reporter generates the reports.
The report data is defined by database fields. For example, the Content Type field indicates the type of media served in
the transaction. Therefore, you define a role by assigning which database fields are viewable.
To define roles, you must understand what database field provides what data type.
Suggested
Field Description
Role
Action Protocol communication action between client and server ( tcp_miss , tcp_hit ). IT
Cert Svr Domain The name of the entity that was authenticated. For example, www.example.com . IT
Certificate Error The type of error that caused a problem with a certificate or the server's use of the IT
certificate.
Cipher Strength The code for the number of bits used to encrypt web traffic (HTTPS). IT
Content Type The type of web media served; for example, PDF file. IT
Group The (enterprise-defined) group to which the user belongs; for example, Finance or HR, IT
Engineering .
Log Source The IP address of the ProxySG appliance that sent the log files. IT
Malware The name of any type of malware, spyware, or other malicious code encountered by IT
users
Method Limit set of browser methods, such as GET , POST , and HEAD . IT
Protocol The transport protocol used to deliver web content; for example, HTTP or RTSP. IT
Status Status response from server; for example: 200/success , 404/not found , 503/not IT
available .
34 of 132
Reporter 10.5.1.1
Suggested
Field Description
Role
User The user name (requires authenticated usernames in the access logs). HR
User Agent The application that requested the web content; for example, Mozilla Firefox or IT
QuickTime.
Example
jimmy.bond IT; Malware & Security Corporate No IT Security All Client IP, Malware, Cert fields
maya.santos HR; Site B HR Site B No HR San Jose User, Category, Verdict
Planning Form
DB
User Group/Department Location Admin Role Name Database
Fields
LDAP Group-Based Option
You have the option to integrate your existing LDAP active directory with Reporter, which allows you to assign Group
names to roles. See "About LDAP Integration" on page 42.
35 of 132
Symantec Reporter Administrator Guide
Tip: If you plan to employ role-based access, consider creating new standard users after
you define the roles. This is not required, however, as you can edit an existing user and
assign the role.
1. On the Administration > General Settings page, select Access Control > Local Users.
a. Enter the Username that the user enters to access Reporter. If you have a planning sheet with names, be
sure to enter them exactly as printed. Click Next to move to the next page: Set Password.
b. Enter a New Password, which is the access credential password for this user; repeat in the Validate
Password field. Again, if you are following a planning sheet, enter the password exactly as printed. If you are
creating the passwords, record them accurately. Click Next to move to the next page: Set Permissions.
n User—The user has limited access to Reporter. If you select this option, select the role(s) to which this
user belongs (if Reporter contains defined roles).
d. Click Done. The new user displays on the Local Users page.
Created users can now access Reporter when you give them the network address and their credentials.
1. On the Administration > General Settings page, select System Settings > Server Settings.
2. In the Web Server Settings > Session Timeout area, slide the time duration bar to set the session time limit.
36 of 132
Reporter 10.5.1.1
3. Click Save.
Related Steps
Reporter allows you to define roles based on users or groups (LDAP).
37 of 132
Symantec Reporter Administrator Guide
Tip: Defining user roles requires planning. Before creating roles, Symantec recommends
creating a list of roles within your enterprise and a list of users who requires access to
specific report data. See "About Role-Based Access" on page 34 for planning information.
1. From the Reporter Management Console (logged in with administrator credentials), select General Settings >
Reporter Settings > Access Control > Roles.
a. Name the role; the more specific the name, the easier it will be to assign your users to their correct roles.
Click Next to move to the next page of the wizard: Permissions.
c. By default, the role has access to all database fields. To limit the fields that reports in this role display, clear
the unnecessary field options (or select No Fields to clear all options, then select the required options).
38 of 132
Reporter 10.5.1.1
d. (Optional) To further limit report data, apply a filter to the role. For example, you want a role that is limited
to report data indicating which users experienced content filtering and policy denials.
e. Click Done. Reporter displays the new role on the Roles page.
Certificates and private keys can be stored in multiple locations. On the client, one such location is a Common Access
Card (CAC). However, a CAC card or reader is not required for SSL mutual authentication, you can install the certificates
on your browser and into Reporter's truststore.
3. The browser validates Reporter's certificate. This includes the following checks:
n The certificate must be issued by a CA listed in the browser’s Trusted Root Certificate store.
4. The browser confirms that the appliance has the certificate's private key by challenging the appliance to sign
random data. The browser validates the signature using the appliance's certificate.
39 of 132
Symantec Reporter Administrator Guide
5. If appliance authentication succeeds, the browser accesses the client certificate and private key using the installed
certificate or CAC. It then presents the certificate to the appliance.
6. The appliance validates the certificate that the browser presents. This includes the following checks:
n The appliance confirms that the browser has the certificate's private key by challenging the browser to sign
random data. The appliance validates the signature using the browser’s certificate.
8. (If applicable) The appliance presents a Consent banner. The user provides consent.
9. Once connected via SSL mutual authentication, Reporter verifies that the user specified in the certificate's subject is
found in the Reporter user database. If so, the appliance grants access to Reporter.
Prerequisites
Before using SSL mutual authentication, you must meet the following prerequisites:
n The browser must have an X.509 certificate installed that will pass Reporter's client authentication trust validation.
That is, the Certificate Authority (CA) chain for the certificate must first be installed into Reporter's client-
authentication truststore.
n The appliance certificate must be from a CA listed in the browser’s Trusted Root Certificate store. Install any missing
client certificates or custom root CA certificate into the browser. For browser installing instructions, refer to
http://wiki.cacert.org/FAQ/BrowserClients and select your browser of choice.
2. Import the root CA certificate(s) and any intermediate certificate(s) required to validate the client certificates into
Reporter's truststore.# configure
(config)# ssl
(config-ssl)# inline ca-certificate CA Certificate name
*** command will prompt for CA contents
(config-ssl)#
(config-ssl)# edit ccl client-authentication
(config-ccl-client-authentication)# add CA Certificate name>
3. Verify that the certificate was installed in the CA Certificate List (CCL) with the appropriate command:
40 of 132
Reporter 10.5.1.1
4. Optional—Make the client authentication method optional; client authentication is off by default.
5. Import the client-authentication certificate with its CA chain into the browser. This is the same CA chain you
installed in Step 1.
Note
n When SSL mutual authentication is enabled, all devices using Reporter as the host require X.509 certificates. For
example, to access file services and API's in a mandatory setting, a certificate is required.
n Browsers retain the certificate used. If you have more than one X. 509 certificate installed and you want to use a
different certificate, you must close and reopen your browser to change certificates.
n CAC users should remember that they are authenticated and signed in as long as their card is in the scanner. If
users log out of the system but do not remove their card, the system automatically logs them back in.
41 of 132
Symantec Reporter Administrator Guide
42 of 132
Reporter 10.5.1.1
n Any groups those groups are a member of and any groups those groups are a member of.
The nesting continues for as many layers of groups that exist. For example, the directory contains a group called
Engineering, which contains members Engineering A, Engineering B, and Engineering C, all of which are also groups
that contain members (users). With nested groups, a member of Engineering A is also a member of Engineering. When
nesting is enabled on Reporter, all members of Engineering A, Engineering B, and Engineering C have access to the
role assigned to Engineering. Reporter supports nested groups; when nesting is enabled and a group is assigned to a
role, users in all groups in the nest have access to the role. Enable nested group support when configuring access control.
43 of 132
Symantec Reporter Administrator Guide
Prerequisites
To configure these options, you must know:
n The IP address of the primary LDAP server (secondary optional, but recommended).
n Naming attributes.
n Base DN information.
Procedure
In Reporter on the Admin page.
1. Select General Settings > System Settings > External Servers > LDAP/Directory. Reporter displays the
Create new LDAP realm wizard.
n Novell eDirectory
n Other LDAP
3. Name the realm that contains the list of users who will have access to the roles. By default, Reporter allows
disconnected logins, which means that users are able to log in when Reporter cannot connect to its LDAP servers.
For the highest security level, clear the Allow Disconnected Login option. Click Next to move to the next wizard
screen: Set Servers.
44 of 132
Reporter 10.5.1.1
b. The default Port is 389. If you select Use SSL, which secures the connection from the Reporter server to
the LDAP server, the default port changes to 636. If you have configured your LDAP servers to use a
different port, enter it here.
c. (Optional) Enter Secondary Server information. Reporter attempts to connect this server should the
primary become unavailable.
n No Credentials Required—The LDAP server does not require a password for search access.
n Use Credentials—Selecting this option displays more fields. Enter the LDAP server User Name (FQDN)
and the password required for search access.
Click Next to move to the next wizard screen: Set Naming Attributes.
n If you selected Microsoft Active Directory or Novell eDirectory, Reporter populates the naming
attributes with default LDAP realm values. If your realm information differs, enter the correct attributes.
Otherwise, click Next to move to the next wizard screen: Set Base DNs.
n If you selected Other LDAP, you must enter the naming conventions that match your custom LDAP
configuration and then click Next to move to the next wizard screen: Set Base DNs.
7. Enter all User Base DNs and Group Base DNs that are searchable by Reporter.
45 of 132
Symantec Reporter Administrator Guide
Note: Reporter can search multiple trees, but you must add a new realm (base
DN) for each tree by clicking the plus icon. Each realm is searched in the order
shown on this dialog. If a tree contains multiple servers such that no individual
server contains all users, you should set the base DNs at a level in the tree that is
higher than where the servers diverge. You will need to add an additional base
DN for each unique partition in the tree. Reporter requires a base DN for each
partition that is not globally replicated.
n In this example, the first User Base DN is the default location for users in Active Directory for the
example.com company. The first Group Base DN, Builtin, is also the default for Active Directory.
n dc= represents LDAP naming in the directory. The DNS name example.com becomes dc=example,dc=com in
the LDAP naming convention. This is the format that Active Directory uses. Typically, Base DNs are not set at
a dc= level in the directory.
8. Testing the LDAP server connection is optional but recommended to verify functionality before entering into
production. Click Test LDAP Settings. If any errors occur, click Previous to return to the problematic setting
screen and correct the information.
46 of 132
Reporter 10.5.1.1
For more information about roles, including planning information, see "About Role-Based Access" on page 34.
Prerequisite
Configure Reporter to communicate with your LDAP servers. See "Connect to LDAP Server" on page 44.
Procedure
In Reporter on the Admin page.
1. On the Administration > General Settings page, select Access Control > LDAP Groups.
b. (Optional) Selecting Include nested groups allows all members in the group tree to have access to this
role; if this option is not selected, only members in the specified group have access to this role. For more
information about nested LDAP groups, see "About LDAP Integration" on page 42.
n Select LDAP Group and select the roles to which this group has access.
5. Click Done. The LDAP Groups page contains the new group.
47 of 132
Symantec Reporter Administrator Guide
Administrative Tasks
After completing the Reporter initial configuration process, consider completing other configuration tasks, depending on
your network and business requirements.
Recommended Tasks
Set Up Email for Admin Alerts and User Reports
Two Reporter functions require you to setup email communication with your SMTP server.
n Admin Receives Alerts—Receive alerts from Reporter when Warning or Critical thresholds are breached.
n User Emails Report—Reporter users can email reports to other relevant people in the company.
Clone
Migrate configuration and user accounts from Reporter 9.5.x to 10.5.1.1.x.
Manage Databases
After you create databases and manage begin generating and managing reports (filters, emailing, and so on), you might
find a need to modify existing configurations.
48 of 132
Reporter 10.5.1.1
Other Tasks
n "Upgrade Reporter" on the next page
n License Reporter
CLI Reference
Some tasks are only available through the Reporter CLI. See CLI Commands.
49 of 132
Symantec Reporter Administrator Guide
Upgrade Reporter
Can I downgrade Reporter to a previous version?
Because of continuous, incremental changes to database architecture for each new Reporter version, you cannot
downgrade the Reporter appliance or VA instance to a previous version.
Upgrade Information
Unless stated in this section, there are no known issues when you upgrade Reporter to a newer version. You are not
required to regenerate databases. Reports function as they did before.
Procedure
Before upgrading, do the following.
a. On the Administration > General Settings page, select Reporter Settings > Data Settings > Databases.
1. Log in to Mysmantec.
2. Select My Products.
3. Find the row that contains the serial number for your product and click the download icon: .
50 of 132
Reporter 10.5.1.1
a. Select General Settings > Reporter Settings > Data Settings > Databases.
b. In the row of the database to change, select Unload Database from the drop-down list in the Actions
column.
Review the Release Notes to understand if upgrading to a particular release impacts existing features.
n The report optimization process consumes additional memory and disk resources that can impact current
processes. Depending on the size of the database and the number of additional filter criteria, the report operation
process can consume significant resource. Always review your System Diagnostics (Administration > System
Overview > System Diagnostics) before optimizing a report.
n Depending on the size of the database, report optimization can sometimes take hours. The database could be
suspended during that time. However, only log processing and log expiration are affected and will not resume
until optimization is complete.
n Each additional report criteria will increase memory and disk usage.
n If a report has more than three unique database summary or filter columns, it cannot be optimized.
For example, a report summarized by user and filtered by user has a single column. It can be optimized. But, a
report summarized by site and user, and filtered by category and verdict, has 4 unique columns and cannot be
optimized.
51 of 132
Symantec Reporter Administrator Guide
n When you optimize a report, time columns are not counted toward the optimization limit.
For example, consider the following two-level summary report that has:
This report would only require a pair aggregation optimization on category and verdict. This is because time-based
columns and filter criteria are not included in the unique column list when searching for an aggregation to use
(because the entire database and its aggregations are already organized around per-hour and per-day time
periods).
n When you optimize a report, the data for the entire database is optimized, as is all future data for that filter criteria.
So, if you optimize a user report filtered by site and later create a site report filtered by user, the site report is
already optimized.
Optimize a Report
1. Review the "Report Optimization Can Impact Resources" on the previous page.
52 of 132
Reporter 10.5.1.1
53 of 132
Symantec Reporter Administrator Guide
Specify the primary and backup SMTP servers to which Reporter connects.
Prerequisites
To configure these options, you must know the following.
Procedure
1. On the Administration > General Settings page, select Reporter Settings > System Settings > External
Servers > Email.
54 of 132
Reporter 10.5.1.1
a. Enter the Primary SMTP Server IP address or hostname. To add a custom SMTP port, enter the IP address
followed by a colon and port number. For example: 198.51.100.24:587
b. Specify the From address used in emails, for example: SiteBReporter@mycompany.com. This email address
displays in From field of the sent email and must be a valid address. You can use an existing generic IT
address if you have one or add a new address to your email database.
c. If they are required by the server, enter the SMTP server access credentials.
2. Click Save.
55 of 132
Symantec Reporter Administrator Guide
Alerts
Administration > General Settings > Reporter Settings > System Settings > Alerts
Configure Reporter to send an alert email to specified recipients when report processing breaches a system resource
threshold setting. Reporter monitors the following resources:
n Disk Storage—The current amount of filled disk space (GBs) and total capacity on the system.
n Physical Memory—The current amount of GBs used by physical memory, the percent used, and total capacity of
the Reporter process.
Use this data to adjust system resources. For example, if the same system consistently sends disk space alert messages,
reconsider your Reporter sizing requirements.
Prerequisite
Configure Reporter to connect to one of your enterprise's SMTP (mail) servers. See "Connect Reporter to an Email Server"
on page 54.
Email Alerts
1. On the Administration > General Settings page, select Reporter Settings > System Settings > Alerts.
a. Enter the e-mail addresses of the alert recipients. Typically, this is an IT member who is responsible for
managing Reporter and/or network efficiency.
b. By default, Reporter sends notifications when either the Warning or Critical thresholds are breached. You
have the option to clear one or both (clear both prevents any notification).
c. (Optional, recommended) To verify that Reporter sends notifications to the correct addresses, click Test
56 of 132
Reporter 10.5.1.1
Alert Email.
d. After you verify that the recipients received the test message, click Save.
Alert Levels
Reporter purges based on disk storage critical limits. Set disk-usage critical limits in the Alert Levels section of General
Settings.
1. Select General Settings > Reporter Settings > System Settings > Alerts > Alert Levels.
2. With the slider control, set a Warning level. This setting sends an alert to administrators when disk usage reaches
the chosen limit.
3. With the slider control, set a Critical level. The Critical setting determines that Reporter initiates a purge when disk
usage is within 1% of the set limit.
4. Click Save.
Tip: You can restore purge settings back to default by clicking Reset followed by
clicking Save.
57 of 132
Symantec Reporter Administrator Guide
Tip: If you get the message that email is unavailable, contact the Reporter administrator to
set up the email server.
1. On the [Administration | Settings] > General Settings page, select Personal Settings > Email.
3. Click Save.
58 of 132
Reporter 10.5.1.1
Use a CLI command to define a specific NTP server. For example, your company has an internal designated NTP server
that provides the time for a regional location.
1. Use a terminal to access the Reporter CLI. Press 1 through SSH. Do not use the serial console.
-----------MENU----------
1) Command Line Reference
2) Setup
------------------------------
2. Enter enable.
4. Initiate a file view with the ntp edit command. Reporter launches a vi editor.
In the file, the following section provides the default NTP server connections.
59 of 132
Symantec Reporter Administrator Guide
The following information describes links on the Administration > System Overview > Reporter System Information
left-side menu. In same cases, you are able to perform executive actions.
System Overview
n Reporter Version—The current version of Reporter that is installed on the appliance or VA.
n SSL—By default,Reporter is accessed over a secure connection and this setting is enable.
n Operating System—The current operating system that is currently running on the Reporter system.
n Web Server Port—By default, the Reporter access URL requires port number 8082. For example:
https://192.168.0.1:8082.
The Licensing Information area provides the state and expiration date of the current license.
System Resources
This area displays how much system resource that Reporter is currently consuming. This includes physical memory. If the
Used levels consistently approach the Capacity levels, re-evaluate your sizing requirements.
Database Overview
This area provides a table of database and log processing statistics. The History links provide much more granular
information.
60 of 132
Reporter 10.5.1.1
n Active Users—Who is logged into this Reporter instance right now, including details such as access privilege
(admin or user) and log in time. If you do not recognize a user access, you have to option to select Actions
> Force User Logout and investigate.
n Active Reports—Provides all of the metrics for a given report that is active right now, including the log source and
database used to generate the report; the output type (such as PDF); the accessing user and their role; and the
current report state. You might need to perform a maintenance task that cannot wait for off-peak hours, which
might require the halt report Action. This information allows you notify the users.
61 of 132
Symantec Reporter Administrator Guide
Create a Database
After configuring the ProxySG appliance to upload access logs to an FTP server, you can create a Reporter database (and
associated log source) that processes those access logs.
n You can configure multiple ProxySG appliances to send access logs to single directory—whether to the root
directory or a subdirectory.
n No directories can be shared across multiple log sources, even if they are at the top level. This is especially
important when a subdirectory is part of a tree that is owned by a different log source that has the Process
Subdirectories option selected.
o If no log sources are processing subdirectories, the rule is that no single directory can be shared.
o If a subdirectory is checked by any log source, the rule is that no directories in the log source directory tree
can be shared.
n Never configure a log source to process subdirectories followed by moving the processed log files into a directory
that is under the top directory. This causes an endless log processing loop.
n If you configured the ProxySG appliance to upload access logs directly to the Reporter appliance, you will create a
Local Log Source. A single instance of this source can only process logs from a single directory; however, you can
configure the log source to process log files in any subdirectories under the configured top directory.
Procedure
Follow these steps to create a database that uses a ProxySG log source.
3. Select the General Settings tab and then Data Settings > Databases.
c. Select Include Advanced Options to configure advanced options in the next screen. Leave this box
unchecked to use the default settings. (See "Advanced Field Settings" on page 67 for custom field creation.)
Click Next.
62 of 132
Reporter 10.5.1.1
e. Determine whether to disable Page View Combining. By default, page view combining is enabled.
Deselect the option to disable page view combining. Show screen...
f.
Note: Disabling page view combining requires the system to use more storage
and processing power.
g. Set the Default check for new log files, or how often this database queries for yet-to-be processed
access logs. Show screen...
63 of 132
Symantec Reporter Administrator Guide
h.
Note: You can configure each Log Source to use this default at different times.
n FTP Server Source — If the ProxySG appliance is configured to upload access logs to a dedicated FTP
server.
64 of 132
Reporter 10.5.1.1
n Local File Source — If you configured the ProxySG appliance to upload access logs directly to the
Reporter appliance.
b. Click Next.
7. If you selected Local File Source proceed to Step 9; otherwise, continue to the next step.
c. Enter the FTP server access credentials (Hostname/IP, Port, Username, and Password).
d. Enter the Directory Path to the log files on the FTP server.
e. The default File Pattern value is an asterisk (*). For this initial task, Reporter processes all files with the .log
or .log.gz extensions and ignores all other extensions.
f. If the access log directories contain multiple sub-folders, select Process Subdirectories to ensure that all
content is processed.
g. (Optional) Edit the Number of Retry Attempts and Retry Interval settings.
h. (Optional) Click Show Matching Files to verify that the specified directory contains the correct files.
65 of 132
Symantec Reporter Administrator Guide
i. Click Next.
a. Enter the Directory Path to the log files on this Reporter appliance.
b. The default File Pattern value is an asterisk (*). For this initial task, Reporter processes all files with the .log
or .log.gz extensions (and ignores all other extensions).
c. If the access log directories contain multiple sub-folders, select Process Subdirectories to ensure that all
content is processed.
d. (Optional) Click Show Matching Files to verify that the specified directory contains the correct files.
e. Click Next.
10. (Optional) Specify how often to check this log source for new files. (This setting takes precedence over the schedule
in the Create new database wizard.)
o Use Database Default— Reporter uses the same setting as specified in the Create new database wizard.
o Custom Schedule—Specify check time that is different from the database default. For example, the
database checks once daily, but you would like this log source checked only once a week.
Click Next.
11. Specify a post-processing action, or what happens to the log files after Reporter adds the data to the database.
66 of 132
Reporter 10.5.1.1
o Rename: Append '.done' to the filename — Reporter appends .done to the existing .gz or .log suffix
and leaves the file on the server.
o Remove: Delete log file— Reporter deletes the log files from the FTP server directory.
o
Warning: Select Remove only if you are certain that you will never need to
process these logs again.
12. Specify how long data will remain in the database. Reporter purges data from the database at the specified dates
and times.
During the data purge, Reporter reclaims RAM. Symantec recommends that you schedule large-scale database
purging during non-production hours.
Tip: Reporter expires a database based on the amount of time since the last
processed log entry—not on when the database was created.
13. Click Next and then click Done. Reporter creates the new database with its associated log source.
Note: A custom log field cannot be removed from a database once added. Custom
database fields can be created in Admin mode in Reporter 10.3 and later. See Create a
Database.
67 of 132
Symantec Reporter Administrator Guide
n The PII removal process does not alter existing database backups or access log files. Those backups and files will still
contain the user's information..
n The removal operation cannot be undone. If you remove a user's information, you cannot restore it without
emptying the database and consuming the access logs again. Because you cannot restore the user information, be
careful to specify the correct user name(s).
n To ensure all PII is removed, you should also configure your ProxySG appliances to remove the user's data.
68 of 132
Reporter 10.5.1.1
n During the PII removal process, no new access log data is added to the database.
n Depending on the number of users and the database size, the removal operation can take some time. You might
want to remove PII during non-peak hours.
3. In the User Data Protection window, select one or more users. Click the user to select it. When the user is selected,
the user is moved to the Remove Data for Users field.
69 of 132
Symantec Reporter Administrator Guide
Enter the first few letters of a user name to move to that section of the list. For example, to find the user
williams06, type wi. You can also enter text directly into the Remove Data for Users field or copy text from the
clipboard.
70 of 132
Reporter 10.5.1.1
Empty Database
This feature allows you to empty the dmanatabase while retaining the user roles, schedules, and configurations. This
operation can be used to clear data from a corrupted database. After Empty is finished, the database must be loaded
before log sourcing can start again. The database status might change to corrupt during the empty operation. Empty can
be used to clear data from the corrupted database.
1. On the Administration > General Settings page, select Reporter Settings > Data Settings > Databases.
4. Click Yes when prompted to empty the database. A notification saying Database empty started will appear in
the database section.
5. In the Actions drop-down list, Load the appropriate database once the database has been emptied. The database
must be loaded for log sourcing to start.
Note: Administrators can verify if a database has been properly emptied on the
Administration > System Overview page. In the Database Overview section, the
Date Range should return with no data.
Expire Now
This feature allows you to purge the database based on the number of log lines. You can also perform this task on
demand as this task does not need to be scheduled. However, you can set a custom purge limit.
1. Select General Settings > Reporter Settings > Data Settings > Databases.
2. In the row of the database to change, select Expire Database from the drop-down list in the Actions column.
3. Set the amount of log lines to expire and click Expire Now.
71 of 132
Symantec Reporter Administrator Guide
1. Select General Settings > Reporter Settings > Data Settings > Databases.
2. In the row of the database to change, select Unload Database from the drop-down list in the Actions column.
3. The Status column changes from Loaded to Unloaded. (Depending on the size of the database, this process might
require several minutes to complete.)
4. To reload the database, repeat the procedure and select Load Database (if the database is currently unloading, this
option is not available).
Note: The default timezone setting is UTC. Modify the settings for your time zone if you
want database expiration to occur in local time.
Database
n Database name
n Log sources
1. Select General Settings > Reporter Settings > Data Settings > Databases.
2. In the row of the database to change, select the drop-down list in the Actions column.
n Set Log Sources — Add or delete the location of folders that feed log data into the database.
n Set Expiration — Change the expiration time frame of access log data.
5. Click Save.
Note: Clicking Reset reverts the parameters to their previously saved values.
72 of 132
Reporter 10.5.1.1
Log Source
n Description (name)
n Folder location
n Post-processing actions
Note: Changing log source options requires halting the log source processing.
1. Select General Settings > Reporter Settings > Data Settings > Log Sources.
2. You cannot change log source parameters while the log source is operating. In the row of the log source to change,
select the drop-down list in the Actions column.
Select Stop Log Source. Notice that the status column displays unloaded. If the log source is processing a log file
when you select Stop Log Source or unload its database, it immediately stops processing the current log file. If
you later reload the database or restart the log source, the log source locates the unfinished log file and completes
its processing first, then resumes normal operation.
3. Re-select the drop-down list in the Actions column and select an option to change.
n Set Location for Local/FTP File Source—Change the location of this specific log source.
n Set Processing Action—Change what happens to log files after Reporter processes them.
4. Click Save.
Note: Clicking Reset reverts the parameters to their previously saved values.
5. Select the drop-down list in the Actions column again and select Start Log Source. Reporter beings processing
logs from the new or additional locations.
73 of 132
Symantec Reporter Administrator Guide
Login Name is the default ProxySG appliance access log and Reporter setting. If the ProxySG username format differs
from the Reporter configuration, perform the following steps.
1. Select General Settings > Reporter Settings > Data Settings > Databases.
4. Click Save.
1. Select General Settings > Reporter Settings > Data Settings > Databases.
74 of 132
Reporter 10.5.1.1
a. From the Currency drop-down list, select the monetary value for your country.
b. Cost per MB field—Reporter uses this value to calculate the cost based on the amount of downloaded
content by each user.
c. Cost per Hour field—Reporter uses this value and estimated user browse time to calculate how money
each user cost the company.
4. Click Save.
1. Select General Settings > Reporter Settings > Data Settings > Databases.
75 of 132
Symantec Reporter Administrator Guide
4. Click Save.
Tip: Clearing an option removes the limit for that parameter; do so with caution and
understanding of resource impact.
76 of 132
Reporter 10.5.1.1
Warning: Modifying log fields is an advanced task. Symantec strongly recommends that
you have a thorough knowledge of Reporter databases and log fields. Mistakes made while
editing these files will render Reporter inoperable.
The order of these log field definitions is important to Reporter functionality, which is why the block of text must be
copied into the correct place in the list of fields. If your new log field is a non-counter column (string or IP), then you
should place it above the hits field. If it is a counter field (number), place it above the cost_bytes log field.
The following example creates a new string log field (bold code font), which must be placed above the hits log field.
Copy the text for the existing log field.
...
cs_method = {
label = "_shared.cs_method_fld"
…other existing data…
string_bag_field = "false"
}#cs_method
… other log fields…
cs_username= {
label = "custom_field"
… other copied data…
string_bag_field = "false"
}#cs_username
hits = {
Modify the copied data to create your custom log field. Change the label value to reflect the label(s) that display in the
Reporter user interface.
Tip: If a user changes the browser language, these new labels are not localized.
77 of 132
Symantec Reporter Administrator Guide
Change the first and last line of the configuration node to create a new handle for this log field—this handle is used when
editing the database configuration file (described in the next step). When creating a new handle, do not use spaces or
special characters. Leave the other data as is. When completed, the dbfields.cfg should look similar to the following for a
new string log field.
Original Custom
cs_method = { MyCustomDBField= {
} # cs_method } # MyCustomDBField
78 of 132
Reporter 10.5.1.1
Tip: See "Create a Database" on page 62. If you perform edits to an existing database, you
must rebuild the database to enact the changes.
Press 1.
3. Enter stop-reporter to halt the Reporter service. (This does not shut down the appliance.)
Reporter copies the current file to a restricted directory and launches a vi editor to access the copy.
3. After you complete the edits, close the vi editor. Reporter displays a dif of the changes—the original setting and
the revised—which allows you to verify the edits and syntaxes.
4. Enter configure commit <file_name>. Keep in mind that this saves only the edits; the changes do not take effect
until you restart the Reporter service.
Tip: If you want to back out the changes, enter configure discard <file_name>,
which reverts the file to its previous state.
79 of 132
Symantec Reporter Administrator Guide
Step 4—Locate the database file(s) that must use the new fields.
For the reports to contain the customized points of data, you must edit each database file in three places. First, locate the
file.
2. If you do not know which database you want to edit, you must open each one and read the header. To view a
database, enter the following command.
For example:
3. After you locate the correct file, proceed to Step 5a; if the file in view is not correct, enter configure discard
<file_name> and perform the previous step on the next candidate.
Step 5a—Add the new field to the list of fields for this database.
You must edit the database file in three places. The first edit is add the new field to the field list.
n In the database configuration file, locate the line containing fields = located just below the database = {
configuration node.
n Locate the log field that you used for your template and copy that section of the configuration file. The order of
these fields is important to Reporter functionality and you must put the new log field in the correct place.
n If your new log field in a non-counter column such as string or IP, paste the section above the hits field.
n Edit this portion to match the new database handle you created in dbfields.cfg.
...
MyCustomDBField = {
case_insensitve = "false"
} # MyCustomDBField
hits = {
case_insensitive = "false"
} # hits
...
80 of 132
Reporter 10.5.1.1
Step 5b—Add the new log field to the field order for this database.
The second edit amends the order in which Reporter process fields. Locate the line containing field_order = {. This is a
list of fields for the database. They are numbered beginning from 000. The order of these fields is important to Reporter
functionality, so you must add the new log field in the correct place:
n If the new log field is a non-counter column (string or IP), add it above the hits field in the list, which positions it as
the last non-counter field.
n If it is a counter column (number), add it above the cost_bytes field. This puts it as the last counter column. The
cost, url, and categories_text fields are calculated fields and must come last.
n You must renumber the fields to allow for the newly added field.
...
031 = "x_rs_certificate_hostname_category"
032 = "x_rs_connection_negotiated_cipher_strength"
033 = "MyCustomDBField"
034 = "hits"
035 = "page_views"
...
n Locate the line in the database configuration file that contains log = {. Below this are multiple groupings of
configuration data (processing, format, search_engines, and fields).
n Locate the fields = { contained in the log section. You must add a new field in this section.
n Locate the field that you used previously for your log field template (a previous example used cs_method).
n Copy that section of configuration information and paste it below as a new log field. The order is not critical in this
configuration.
n Change the handle of the new configuration node to the handle of the new log field.
n Edit the name of the log field. This is the same name of the column found in the logs obtained from the ProxySG
appliance. You must also edit the db_field value to be the handle of the new custom log field.
81 of 132
Symantec Reporter Administrator Guide
} # x_rs_certificate_negotiated_cipher_strength
MyCustomDBField = {
type = "flat"
index = "0"
name = "field_name"
db_field = "MyCustomDBField"
} # MyCustomDBField
day_of_week = {
type+ = "flat"
derived_from_1 = "date"
} day_of_week
...more existing log fields...
1. After you complete the edits, close the vi editor. Reporter displays a dif of the changes—the original setting and the
revised—which allows you to verify the edits and syntaxes.
2. To save the changes, enter configure commit <file_name>. Keep in mind that this saves only the edits; the
changes do not take effect until you restart the Reporter service.
Tip: If you want to back out the changes, enter configure discard <file_name>,
which reverts the file to its previous state.
Tip: After you restart the Reporter service (described in the following procedures), the
Reporter CLI displays lines as various processes start up. If any lines contain ERRO as part of
the code, a configuration error occurred. Review the files you edited and rectify the errors.
Furthermore, if you perform and commit edits and attempt to access the Reporter
Management Console but it is unresponsive, you likely committed erroneous syntax.
article.TECH241380.html
82 of 132
Reporter 10.5.1.1
Database Backup
Reporter allows administrators to back up databases. This operation can be done from the Manage Backups interface or
from the CLI command terminal. Administrators using Reporter 10.3 and later should use the Manage Backups feature
in the web UI. For versions prior to 10.3, see "About CLI Database Backup" on page 88.
n On upgrade to Reporter 10.5.x, all existing backups are moved into the db_backups directory.
n Each Reporter database backup is saved in subdirectory named with a Reporter database ID and timestamp. For
example: ae7729501cfd11eabc4cf5007a1a14df_1576521144. Do not change the name of the database backup. If
you change the name, Reporter will not recognize the backup.
n A larger Reporter appliance is recommended when storing multiple databases or large databases.
Manage Backups
1. On the Administration > General Settings page, select Reporter Settings > Data Settings > Databases
2. Click on the Actions arrow and select Manage Backups to access the interface.
83 of 132
Symantec Reporter Administrator Guide
Backup Types
This section is for additional information on the Manage Backup feature user interface. You can create or update two
kinds of backups:
n Stable — Created or updated from an unloaded database. The backup data is fully up-to-date from the time the
database was unloaded.
n Unstable — Created or updated from a loaded, actively processing database. The backup data is mostly up-to-date
but not completely.
To create or update a stable backup using the CLI you must stop Reporter completely (stop-reporter). To create or
update a stable backup using the web UI you can unload the specific database before creating or updating it.
Creating or updating unstable backups permits you to perform the backup while log data and reports are actively being
processed. When the unstable backup is completed you can unload the database to complete the backup—thereby
putting the database into a stable state—and then quickly reload the database. Database down time is thus kept to a
minimum.
Actions
n Restore: Restores an unloaded database to a previous state.
n Update: Updates the backup to reflect the current state of the database. Use Update to stabilize an unstable
backup, after you have unloaded the database.
The following instructions are for creating a new database backup using the Manage Backups feature. Remember that
when you create a backup of a loaded database it will be unstable until you unload it and then update it.
84 of 132
Reporter 10.5.1.1
Tip: Local time is used when creating a backup. This time can be changed in System
Settings > Preferences. See Set Report Date and Time Format.
Update a Backup
Use Update to update a backup to the current state of the selected database.
1. On the Administration > General Settings page, select Reporter Settings > Data Settings > Databases.
2. If you want a stable backup, click the Actions arrow and select Unload Database. Otherwise, go to the next step.
4. For the desired backup click the Actions arrow and select Update.
Caution: If you are updating a stable database it becomes unstable. To make it stable you
would need to unload the database, update the backup, and then reload the database to
make it stable.
Restore a Database
Use Restore to recover an unloaded database to a previously saved state. In Reporter 10.x an unloaded database is in
one of three states:
85 of 132
Symantec Reporter Administrator Guide
You may restore a stable database that is in any of these three states; however, restoring a Restored database from the
same backup would have no effect.
1. On the Administration > General Settings page, select Reporter Settings > Data Settings > Databases.
2. If the database is not already unloaded, click on the Actions arrow and select Unload Database.
4. For a stable database click the Actions arrow and select Restore.
5. When the Restore action has finished—a process that may take a long time for multiple-terabyte databases—click
the Actions arrow for the database and select Load Database.
6. If you go back to the Manage Backups interface you will see that the Last Action for the backup is now Restore.
Unless specified otherwise, all Reporter database backups are saved to the folder db_backups. You can view your saved
database backups using the following CLI command:
86 of 132
Reporter 10.5.1.1
# access-logs list-dirs
Export Backup
2. Use an FTP, FTPS, or SCP client to move the database backup to the new location.
Import Backup
2. Use an FTP, FTPS, or SCP client to move a database backup from a remote directory to the db_backups directory.
After you have imported the database backup to Reporter, you can manage it like any other Reporter database backup.
Delete a Backup
1. On the Administration > General Settings page, select Reporter Settings > Data Settings > Databases.
2. For the database whose backup(s) you want to delete click the Actions arrow and select Manage Backups.
3. In the Manage Backups interface, for the backup to delete click the Actions arrow and select Delete.
87 of 132
Symantec Reporter Administrator Guide
The following instructions are for creating a database backup using the CLI command terminal. Reporter can backup and
maintain multiple databases from the CLI command terminal. Reporter database backup should be performed while
Reporter is offline. If Reporter is online when the backup starts, the backup database will be marked as unstable. An
unstable database does not mean it is broken.
The following instructions is for creating a new database backup from the CLI command terminal. Reporter must be
stopped before creating a stable backup when using the command line. See CLI Commands for stop-reporter usage.
2. Type stop-reporter
3. To see the current list of databases for which you can create a backup, enter dbbackup list create
Warning: After the backup process begins do not attempt to interrupt it by pressing
Ctrl+C. As of Reporter 10.3, if you interrupt a backup it will enter the "busy" state but will
never complete. The only way to recover is to restart the appliance (not just Reporter). After
Reporter is back online, the backup will be in a Failed state, and you can either update or
delete it.
Follow these instructions to restore a database from backup. A database cannot be restored from the command line if
Reporter is online.
2. Type stop-reporter
3. To see the current list of backups that can be restored to databases, enter dbbackup list restore
88 of 132
Reporter 10.5.1.1
To free up disk space you can delete older backups. You cannot delete a backup if Reporter is online.
2. Type stop-reporter
3. To see the current list of database backups that can be deleted, enter dbbackup list delete
89 of 132
Symantec Reporter Administrator Guide
Tip: If you configure cloud log download on the Reporter appliance rather than using a
dedicated FTP server, a single instance of a Local File Source can process logs only from a
single directory on Reporter; however, you can configure the log source to process log files
in any subdirectories under the selected top directory.
Tip: To learn more, see "About Retrieving Logs From the WSS" on page 29.
2. Create a Reporter database that uses the cloud service log source.
Prerequisites
n Your enterprise must have a Web Security Service and you must have a password to access the Admin portal.
n The Reporter appliance must have access to the Internet to receive logs from the Web Security Service. If your
current Reporter deployment inhibits Internet access, consider installing another instance of Reporter at the
external network edge. Then automate or otherwise move the log files to the existing server.
2. In Service mode, select Account Maintenance > Account Provisioning > MDM/API Keys.
90 of 132
Reporter 10.5.1.1
b. Name the API and set the Password (record these, as they are required during the Reporter configuration).
c. Click Add.
1. Log in to Reporter and select Administration > General Settings > Reporter Settings > Data
Settings > Cloud Log Source.
91 of 132
Symantec Reporter Administrator Guide
a. Select Enabled.
n Periodic Download—Download log files according to a schedule. Set the Schedule of how often
Reporter checks for new logs from the cloud service.
The shortest increment is one hour, because all cloud log files contain one hour of data. By design, the
Web Security Service prevents Reporter from downloading logs that are less than two hours old.
Given that the minimum time chunk is one hour, you will need to allow some time for the data to
accumulate in the destination directory.
c. For Download logs dated beginning, select the age of the logs to download as soon as you click Save.
d. Select the Destination Directory, which is the folder on the Reporter appliance that stages the Web Security
Service access logs.
92 of 132
Reporter 10.5.1.1
e. Enter the Cloud API Username and Cloud API Password that you defined in the Web Security Service
portal.
f. Click Test Username and Password. If the test fails, check the API key in the Web Security Service portal
(Service mode Account Maintenance > API Keys). Also check the external connection.
g. Select Enable automatic deletion of cloud log files older than <X> days to limit the age of the
Web Security Service log files in the designated directory.
h. If you select the previous check box you can select Enable emergency deletion of cloud log files when
disk usage reaches "Critical" level, retaining at least <X> days to automatically delete as many
Web Security Service log files as needed to reduce disk usage to below the Critical level, while leaving the
number of specified days. Go to Administration > General Settings > Reporter Settings > System
Settings > Alerts to specify the Critical level.
3. Create a new database that points to this log source, or add this new log source to an existing database if you
want to achieve more unified reporting.
93 of 132
Symantec Reporter Administrator Guide
Support Languages
n Chinese (Simple and Traditional)
n English (UK)
n English (US)
n French
n Japanese
How Do I?
You must change the language before logging in (you can log out and change the language at any time). The list is located
on the bottom-right corner of the log in screen.
94 of 132
Reporter 10.5.1.1
1. On the Administration > General Settings page, select System Settings > Server Settings.
3. Click Save.
95 of 132
Symantec Reporter Administrator Guide
Change a Password
Logged-in Reporter users can change their access passwords.
Notes
n You are not allowed to change your password if you accessed Reporter using your LDAP access credentials. If you
are unsure about this, contact your network security IT representative.
n The initial Reporter admin has the ability to remove other admin users.
Procedure
1. On the [Administration | Settings ] > General Settings page, select Personal Settings > Change Password.
3. Click Save.
Also see: "Reset the Administrator Password" on the facing page and password-policy.
96 of 132
Reporter 10.5.1.1
Prerequisites
n Physical access to the appliance.
n Connection:
Procedure
1. After you gain access to the console, press Enter three times to active it.
3. Given that this appliance is already setup, the Network Settings values are already populated. Assuming that you
want to retain these settings, press Enter for each option.
Type new value to change the setting or ENTER to accept the current setting
Select Network Interface Controller (NIC) to use from available list:
1. NIC 0:0 (link) [Active]
2. NIC 1:0 (link)
3. NIC 1:1 (no link)
Use NIC [1]:
IP address [192.168.15.1]:
Netmask [255.255.255.0]:
Gateway [192.168.15.1]:
<snip>
Admin Account
Set admin user name [admin]:
97 of 132
Symantec Reporter Administrator Guide
Press Enter to accept the current name (admin) and define a new password twice.
Tip: When the CLI prompts you for the Enable mode password, enter the Admin password.
As of version 10.1.5, they are the same; you no longer are required to maintain two separate
passwords.
98 of 132
Reporter 10.5.1.1
Warning: Symantec considers accessing and editing configuration files an advanced task.
Only perform this if you are knowledgeable about Reporter. Changing these settings might
adversely affect your Reporter deployment.
You can safely view the configuration files without committing any changes. This can help you plan your changes and
verify with necessary personnel that such changes are necessary and safe for your environment. However, viewing the
configuration files requires you to stop the Reporter process. Symantec recommends that you perform any viewing or
editing tasks during non-productivity hours.
Tip: This topic provides a high-level procedure for editing configuration files. For the
specific procedure to customize databases, see "Create Custom Log Fields" on page 77.
99 of 132
Symantec Reporter Administrator Guide
Reporter displays the available configuration files and sub-directories. You can browse the lists. If you decide to edit
a configuration, proceed to the next step.
4. Enter stop-reporter. This halts the Reporter service (it does not shut down the appliance).
5. Initiate a file view with the edit-settings edit <file_name> command. For example:
Reporter launches a vi editor. Find the section to view modify. For example, you want to change the TLS settings.
protocols = {
http = {
ssl = {
ssl_v2 = "false"
ssl_v3 = "true"
tls_v1 = "true"
.
.
.
7. After you complete the edits, close the vi editor. Reporter displays a dif of the changes—the original setting and the
revised—which allows you to verify the edits and syntaxes.
8. Enter edit-settings commit <preferences.cfg>. Keep in mind that this saves only the edits; the changes do not
take effect until you restart the Reporter service.
Tip: If you are uncertain and want to back out the changes, enter edit-settings
discard, which reverts the file to its previous state.
10. After you complete all necessary edits, restart the Reporter service.
start-reporter
Tip: If you invoke the start-reporter command without committing changes to any
opened configuration file (edit mode), Reporter flushes those uncommitted changes
and does not make a backup copy.
100 of 132
Reporter 10.5.1.1
Troubleshoot
If the Reporter service fails to restart, the Reporter CLI displays the event log output from the start-up sequence. Lines
containing the ERRO code indicate what caused the startup failure and indicate which file(s) must be re-edited to allow a
successful start-up.
Review the files you edited and rectify the errors. Be advised that the Reporter Management Console remains
unresponsive if the service start-up fails.
101 of 132
Reporter Administration & Deployment Guide
Reference: CLI
Note: For Reporter 10.3 and later go to this page.
The Reporter CLI provides a set commands through a serial console that allows you to manage and change networking
settings (IP, Mask, Gateway, DNS), configure / change username / password, and generate SSL self-signed certificate.
--------------------MENU--------------------
1) Command Line Interface
2) Setup console
--------------------------------------------
Enter option:
Option 2 begins the guided setup, as described in Install Reporter on a Virtual Appliance.
licensing license 10.3 and later licensing replaced the license command.
shutdown shutdown 10.3 and later shutdown graceful is no longer available. shutdown will
graceful perform a graceful shutdown.
103 of 132
Symantec Reporter Administrator Guide
Reference: CLI
The Reporter CLI provides a set commands through a serial console that allows you to manage and change networking
settings (IP, Mask, Gateway, DNS), configure / change username / password, and generate SSL self-signed certificate.
--------------------MENU--------------------
1) Command Line Interface
2) Setup console
--------------------------------------------
Enter option:
Option 2 begins the guided setup, as described in Install Reporter on a Virtual Appliance.
licensing license 10.3 and later licensing replaced the license command.
shutdown shutdown 10.3 and later shutdown graceful is no longer available. shutdown will
graceful perform a graceful shutdown.
104 of 132
Reporter 10.5.1.1
Note: These are the default ports. Some ports can be changed and others not used,
depending on your deployment.
Inbound Connections
Service Port(s) Protocol Configurable Destination Description
FTPS 990 TCP Yes Local / accesslogs Secure access logs file
directory uploads/downloads/inspection
SCP 2024 TCP No Local / accesslogs Secure access log file uploads
directory
Outbound Connections
Service Port(s) Protocol Configurable Destination Description
105 of 132
Symantec Reporter Administrator Guide
106 of 132
Reporter 10.5.1.1
Reference: Log Fields
This section provides a reference table that lists the report field to log field association. Report fields are what comprise
various reports, based on the information contained in the access log. The contents of an access log are determined by
the log field names (which determine what data types are captured during the ProxySG appliance logging process). Some
log field names correlate to absolute data (such as URLs), others derive information from access log variables (such as
browsing duration). For creating and managing custom log fields, see Custom Log Fields.
n sc-status
n cs-uri-scheme
n rs(Content-Type)
n sc-filter-result or x-exception-id
n x-virus-id
For the page view combiner (PVC) to operate correctly, Reporter requires the following additional fields:
n cs(Referer) or x-cs(Referer)-uri
For the PVC to operate correctly for video reports, Reporter requires the following additional fields:
n cs-uri-scheme
n sc-status
107 of 132
Symantec Reporter Administrator Guide
n sc-filter-result or x-exception-id
n x-virus-id
n cs-method
n time-taken
n cs-uri-scheme
n s-session-id
To properly populate all default dashboard reports, Reporter requires the following fields in addition to those above:
n sc-filter-result or x-exception-id
n x-bluecoat-application-name
n x-bluecoat-application-operation
To populate all default video reports, Reporter requires the following fields:
n x-cache-info
n cs-auth-group or cs-auth-groups
n x-rs-streaming-content
The following table provides what log field provides data for what report field. iIalicized report field text indicates that the
resulting data is derived (sometimes combined with data from other fields).
Report Field
Report Field Name Log Field Name Log Field Name
Name
108 of 132
Reporter 10.5.1.1
Report Field
Report Field Name Log Field Name Log Field Name
Name
109 of 132
Symantec Reporter Administrator Guide
User Behavior Blocked Web Browsing per User sc-filter-result, cs-username, cs-bytes, sc-
bytes
Web Browsing per Day of Week date, cs-bytes, sc-bytes, time, time-taken
110 of 132
Reporter 10.5.1.1
111 of 132
Symantec Reporter Administrator Guide
Web Browsing per Web Application Name and x-bluecoat-application-name, c-ip, total-bytes,
Client IP cost-bytes, sc-bytes, cs-bytes, hits, page-
views, browse-time, cost-time, cache-bytes
Web Browsing per Web Application Name and User x-bluecoat-application-name, cs-username, total-
bytes, cost-bytes, sc-bytes, cs-bytes, hits,
page-views, browse-time, cost-time, cache-bytes
Flash Streaming Bandwidth Cost per Day date, page-views, browse-time, sc-bytes, rs-bytes,
total-bytes, cs-bytes, cache-bytes
112 of 132
Reporter 10.5.1.1
Video Page Detail cs-host, filename, c-ip, sc-bytes, cs-bytes, hits, page-
views, browse-time, cost-time, cache-bytes, total-bytes
113 of 132
Symantec Reporter Administrator Guide
Common Parameters
The following parameters are used by all HTTP endpoints (create, cancel, status, and download).
Parameter: username
Description
A user name that has permissions to log in to the Reporter user interface. As with the web interface, the web API enforces
access control based on identity and roles. The web API also supports both local users and LDAP users.
Example
username=bcrepuser
Parameter: password
Description
A password for a user account that has permissions to log in to the Reporter user interface.
Example
password=bluepass
Parameter: reportId
Description
The reportId that is contained in the response to the /webapi/create request. This parameter is required for all requests
except the /webapi/create request.
Example
reportId=14329
114 of 132
Reporter 10.5.1.1
Parameter: responseFormat
Description
The HTTP response type (not the output format of the report). Valid values are xml, html, and plain (default). The
response format applies to the create, cancel, and status endpoints, but not to download.
Example 1
Request:
responseFormat=plain
Response:
reportId:5111890
state:2
percent_done:97
user:user_admin
role:_admin
reportName:Date_Data_12
database:database_5a541ee0aa0e11debf01f18168b313eb
Example 2
Request:
responseFormat=xml
Response:
result
<reportId>327774</reportId>
<reportName>test adf asdf</reportName>
<state>2</state>
<percentDone>0</percentDone>
<user>user_9d2f2430aa0e11debf01f18168b313eb</user>
<role>role_866df230aa0e11debf01f18168b313eb</role>
<database>database_42587110aa0e11debf01f18168b313eb</database>
</result>
Parameter: database
Description
Example
database=secdb1
115 of 132
Symantec Reporter Administrator Guide
Parameter: role
Description
Example
role=repgenerator
Note: Reporter administrators can use a hidden role named: _admin. This role has access to
all fields and all databases and can be used as the role parameter, the same as a user-
defined role.
Parameter: format
Description
The output format of the generated report. Valid values are csv, pdf, or json.
Example
format=pdf
Parameter: label
Description
Example
label=bobreport
Parameter: summarizeBy
Description
List of database fields that provide summary information (similar to SQL GROUP BY). Reports can have up to three
summarizeBy fields. If there are no summarizeBy fields, the report is a Full Log Detail report.
Syntax
summarizeBy=<option>
116 of 132
Reporter 10.5.1.1
Examples
One-level report
summarizeBy=c_ip
Two-level report
summarizeBy=cs_username|c_ip
Three-level report
summarizeBy=cs_username|c_ip|cs_host
Two-level report with maximum of five and ten rows respectively for each level
summarizeBy=cs_username|cs_host&rows=5|10
Parameter: columns
Description
Examples
columns=hits
columns=hits|page_views
Parameter: rows
Description
Configures the number of rows that are returned for each level of the report. Up to three values can be configured (for
three-level summary reports). Values are pipe (|) separated.
Examples
rows=1000
rows=10|10|10
Parameter: sort
Description
Field name that Reporter uses to sort the data. Only one field is allowed.
Examples
sort=hits
117 of 132
Symantec Reporter Administrator Guide
Parameter: action
Description
Action to perform with the generated report. Valid actions are archive, email, and download. The email and archive
actions are the most simple to use. A single HTTP request to /webapi/create generates the report and performs the
specified action. The default action is archive. If this parameter is not set the default action, archive, will be performed.
Downloading a report is more complicated and requires a sequence of requests to generate the report, verify that the
report is complete, and download the result.
Reporter will save reports on a different device if you set the action as archive or download.
n Archive: Reporter saves the report to disk. The report can then be downloaded multiple times.
n Download: Reporter saves the report to system memory. The report can be downloaded only once. After the
report is downloaded, the report is deleted from the system memory.
Note: Reporter will remove a report from system memory if the report is not downloaded
within a certain amount of time.
Examples
action=email
Note: When the action=email, the emailTo parameter is required. The SMTP server on
Reporter must be configured already. See the subsequent emailXX parameters for other
options.
Parameter: emailTo
Description
This parameter is required if action=email. It specifies the primary recipient(s) of the report in RFC822 format.
Examples
emailTo=rptadmin@example.com
118 of 132
Reporter 10.5.1.1
Parameter: emailCC
Description
This parameter is available when action=email. It specifies the carbon copy (CC) recipient(s) of the report in RFC822
format.
Example
emailCC=ITwatchlist@example.com
Parameter: emailBCC
Description
This parameter is available when action=email. It specifies the blind carbon copy (BCC) recipient(s) of the report in
RFC822 format.
Examples
emailCC=ITwatchlist@example.com
Parameter: emailSubject
Description
This parameter is available only when action=email. It specifies the text to be included in the email subject line.
Example
emailSubject=Monday+web+use+reports
Note: To be properly processed by command shells, use either plus signs (+) instead of
spaces or enclose the string in double-quotes (").
Parameter: emailBody
Description
This parameter is valid only if the action is email. Specifies the text to be included in the email message body.
Examples
emailBody=This+report+provides+weekly+web+use+data+for+the+
west+coast+office
119 of 132
Symantec Reporter Administrator Guide
Note: To be properly processed by command shells, use either plus signs (+) instead of
spaces or enclose the string in double-quotes (").
Parameter: filterN
Description
Reports can contain multiple filters (analogous to the WHERE clause of a SQL query). Each filter is composed of three
components separated by a pipe (|) character: field, operator, and values. If a report includes multiple filter parameters,
the filters are ANDed together; however, if a single filter contains multiple values, the values are ORed together. By
default, no filters are applied.
Examples
filter0=sc_filter_category|IS|*spyware*|*suspicious*
Parameter: graphType
Description
The type of graph to be rendered into the report. This parameter is valid only when format=pdf. Graphs are currently not
supported for two and three-level reports. The valid graph types are Pie, Column, Line, Area, Scatter, Bar, and Stackbar.
Examples
graphType=Pie
Note: If graphType is specified, you must also specify graphColumns. The default is no graph
or report.
Parameter: graphColumns
Description
Examples
graphColumns=1
graphColumns=1|2|3
120 of 132
Reporter 10.5.1.1
Note: If graphColumns is specified, you must also specify graphType. The default is no
graph or report.
Parameter: dateRelativeUnit
Description
Specifies a date filter using relative dates instead of absolute start and end times. Valid values are hour, date, week, month,
and year. If dateRelativeUnit is set, dateStart and dateEnd must be the number of relative units (not Unix epoch or an
ISO 8601 string).
Examples
n dateRelativeUnit=week&dateStart=0 // Current week
Parameter: dateStart
Description
Configures a beginning date filter. There are three syntaxes for the date:
n If dateRelativeUnit is set, it is the number of those units relative to the current time (for example: 5).
Examples
n dateStart=2019-12-31T13:00:00-00:00
n dateStart=1254299093
n dateStart=5
121 of 132
Symantec Reporter Administrator Guide
Parameter: dateEnd
Description
Configures an ending date filter. There are three different syntaxes for the date:
Examples
n dateEnd=2019-12-31T13:00:00-00:00
n dateEnd=1254299093
n dateEnd=5
Parameter: showLast
Description
Only applicable for trend reports (must be summarized by date field): true or false.
End Point: /api/create
Creates a new report definition and begins generation of the report.
Required Parameters
n username
n password
n database
n role
n label
Optional Parameters
n format
n sort
n action
122 of 132
Reporter 10.5.1.1
n filterN
n graphType
n graphColumns
n dateStart
n dateEnd
n dateRelativeUnit
n emailTo
n emailCC
n emailBCC
n emailSubject
n emailBody
End Point: /api/status
Checks the status of a report. Returns the running time and the percent complete.
Required Parameters
n username
n password
n reportId
123 of 132
Symantec Reporter Administrator Guide
Required Parameters
n username
n password
n reportId
Required Parameters
n username
n password
n reportId
Required Parameters
n username
n password
n role
Required Parameters
n username
n password
n role
n database
124 of 132
Reporter 10.5.1.1
Sample Output
Valid values for summarizeBy parameter:
===================================================
year
month
week
...
Valid values for summarizeBy (in Trend Reports):
===================================================
year
month
week
...
Valid values for columns parameter (in a Summary Report):
===================================================
hits
page_views
browse_time
...
Valid values for columns parameter (in a Detail Report):
===================================================
year
month
week
...
Valid values for filter parameter:
===================================================
day_of_week
hour_of_day
c_ip
sc_status
...
Debugging
f you receive an HTTP status code of 400 to 499, it means that the request sent to Reporter was invalid. There are several
reasons for invalid requests, such as invalid field, username, password, and so on. In addition to the generic status code
(for example: 400), Reporter returns a more detailed error message in the body of the HTTP response that explains
which part of the request is invalid and why. Some HTTP tools (such as wget) do not provide access to the response body
for non-200 responses. To debug the issue, enter the URL into the browser address bar (Firefox, Internet Explorer) and
press Enter. The browser displays the detailed error message. For example, the following request:
https://localhost:8082/api/create?username=test&password=test1test&database=draper&role=test
&label=report1 &columns=date|url|hits|page_views|bogus
httpStatusCode: 400
httpMessage: Bad Request
detailedMessage: Invalid column bogus
125 of 132
Symantec Reporter Administrator Guide
Relative Dates
When creating a report (/api/create), you can specify a date filter using absolute units or relative units. Absolute dates
can be specified as the Unix epoch or as an ISO 8601 string. Relative dates are powerful but are slightly more complex.
Relative dates specify date filters in one of the following categories: Current, Previous, and Current and Previous.
If the dateRelativeUnit parameter is set, dateStart and dateEnd define the number of units into the past. The following
are valid units: year, month, week, day, and hour.
It is important to understand that dateStart and dateEnd always represent a point in time that is on a boundary of a
whole unit (year, month, week). A value of zero for dateStart or dateEnd represents the nearest whole unit in the past.
Therefore, if dateStart is set to zero and dateRelativeUnit is set to year, the dateStart represents January 1, of the
current year. If dateStart is set to zero and dateRelativeUnit is set to week, the dateStart represents Sunday of the
current week.
Examples
In the following examples, dateRelativeUnit=year and today's date is 2019-10-01 (YYYY-MM-DD). Thus, dateStart or
dateEnd have the following absolute values:
dateRelativeUnit=year&dateStart=0
dateRelativeUnit=year&dateStart=1&dateEnd=0
dateRelativeUnit=year&dateStart=2&dateEnd=0
dateRelativeUnit=year&dateStart=1
Trend Reports
To create trend reports:
1. Summarize by a time based field. See "End Point: /api/listFields" on page 124 to view a list of summarizeBy fields
that are usable used in trend reports.
126 of 132
Reporter 10.5.1.1
Diagnose Reporter
If Reporter is experiencing a type of connection or other error, the review the System Event Log. With serious problems,
you might work with Symantec Technical Support to upload diagnostic information for analysis.
Caution: Do not shut down the appliance using the switch or by removing the power
cables. Abruptly removing power can result in irreparable data loss. Always use the
shutdown command from the CLI to power down the appliance.
For the Reporter appliance (RP-S500), the CLI provides a command to shutdown the appliance.
#enable
#shutdown graceful
Allows Reporter to unload its databases and stop all log processing before terminating the process and powering down
the appliance.
Symptom
Users receive a certificate error in the browser.
Scenarios
You must repeat this procedure any time a new Reporter certificate is generated, which most likely occurs from one of
the following actions.
n You use the generate-ssl-certificate command to generate a new certificate (see CLI Commands).
127 of 132
Symantec Reporter Administrator Guide
Workaround
1. Obtain the browser certificate.
b. Click Import.
d. Click Apply.
When you select a session event log, Reporter displays the Warnings, Errors, and Critical levels of transaction data .
128 of 132
Reporter 10.5.1.1
2. In the options header, select which details to display. In the data area, the symbols indicate to the type of journal
entry.
The header displays icons, which enables you customize which types of data are displayed:
n Info—Not selected by default in some modes. This options toggles the most verbose event log records, as
every type of Reporter transaction displays.
n Warnings—A light event that Reporter can often overcome by re-attempting later. For example, Reporter
is not able to contact the SMTP server when attempting to send an e-mail.
n Errors—Errors are messages indicate something went wrong, possibly resulting in data loss. Continuing the
SMTP example, Reporter reached the maximum retry attempts for a non-responsive SMTP server. That
message is not sent and Reporter logs an error.
n Critical—Critical errors messages should be rare. They occur when a Reporter system crash is eminent. An
example of this type of message is if your databases directory does not have write permissions, Reporter
cannot continue and shuts down. Critical messages provide valuable information to a support person.
The Administration > System Overview > Reporter System Information page contains the SR Number field. When
you enter the number and click Upload, Reporter sends comprehensive diagnostic data to Symantec for problem
analysis.
Tip: If your network firewall is configured to block unproxied traffic, see the Connect to an
Explicit Proxy for External Communication section in "Administrative Tasks" on page 48.
Reporter creates a .zip file named reporterdiags, which contains the diagnostic information.
If you cannot access the Reporter Management Console, you must run the bcrdiagnostics.exe application from a
command line and answer the prompts.
RAID Array (RP-S500)
For the Reporter appliance (RP-S500), the CLI provides a RAID command that displays the current status of the RAID
array. With this, you can view the current hard drive status.
129 of 132
Symantec Reporter Administrator Guide
#enable
#raid status
...
Update Time : Mon Jul 27 20:56:38 2015
State : clean
Active Devices : 24
Working Devices : 24
Failed Devices : 0
Spare Devices : 0
...
In the above output excerpt, the State is clean. The possible values are the following.
n Clean—RAID rebuild is completed and there are no pending writes to mirror disks.
n Clean, degraded—RAID rebuild is completed and there are no pending writes to mirror disks; however, an array
contains faulty disks.
n Active, resyncing—RAID rebuild is completed and there are pending/ongoing writes to primary/mirror disks.
n Active, degraded—RAID rebuild is completed and there are pending/ongoing writes to primary/mirror disks; an
array contains faulty disks.
130 of 132
Reporter 10.5.1.1
If this error or similar occurs or you discover that your Reporter configuration is not working properly, attempt to restore
to a backed up configuration.
2. Enter enable.
Reporter displays the available backed-up configurations. The backed-up identification is a date and time format
(year/month/day/hour/seconds):
YYYYMMDDHHM
Note: If you stop Reporter before step 3, you can use the reporter-settings
automatic command to list the available backups. Likewise, you can subsequently
enter reporter-settings automatic <backup_ID> to restore a particular
configuration backup.
4. Enter stop-reporter.
131 of 132
Symantec Reporter Administrator Guide
Reporter# stop-reporter
Are you sure you want to stop Reporter (this could take several minutes - or more)? [y/n] y
.....bcreporter stop/waiting
This halts the Reporter service (it does not shut down the appliance).
5. Enter the restore-settings manual <backup_ID> command, where backup_ID is the configuration from the
restore-settings manual list command. If you know the time of the event that caused the corruption, be sure
to select a backup configuration prior to that time.
Tip: If you invoke the start-reporter command without committing changes to any
opened configuration file (edit mode), Reporter flushes those uncommitted changes
and does not make a backup copy.
After executing the backup-settings command, you can use FTP or SCP to move backup files to and from the file directory.
For example, you can create a settings backup file on one Reporter appliance, copy it to your FTP server, and then move it
to the /.settings.backups/ folder on a different Reporter appliance.
Caution: The backup settings can only be restored onto a Reporter that is running the same
version that was running when the backup was created. It is highly recommended that you
create a new backup every time you upgrade to a new Reporter version.
To support this new command, the restore-settings command has been modified to have two options:
n automatic—This option behaves like the previously available restore-settings command to view and restore the
available, automatically backed up settings sets.
n manual—This option is new and is used to view or restore the available settings .zip files from the
/.settings.backups/ folder.
132 of 132