- Knowledge base
- Reports
- Schedules
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
How do I create/schedule a System & Network Security report?
To schedule a network scan report, follow this instruction. Notice that you first need to create a template that can be selected for the schedule.
- Log in to the Security Center.
- Click Reports in the main menu.
- Click Schedules.
- Click +Add schedule > Network scan.
- Under the headline General information enter the following:
- Name: the name of the report, e.g. Monthly executive network scan report.
- Report template: select the template you want to use. Notice that only Scan templates are listed because you selected that type in step 4.
- Under the headline Source, you can use the source selected in the template or make the changes you want.
- IPs/Ranges: the source for your report. Can be a specific host or network. You can add any number of hosts.
- Include hosts that: here, you include hosts that have all or any of the specific tags that you enter.
- Do not Include hosts that: here, you exclude hosts that have all or any of the specific tags that you enter.
- Under the headline Schedule enter the following:
- Starts on: select the first start date and time. Notice that reoccurring schedules will start at the time set here.
- Timezone: select the time zone for the schedule.
- Repeat every: select the number of days, weeks, or months between the reports.
- Under the headline Notification enter the following:
- Notifications: check if you want a notification to be sent by email when the report is generated.
- Subject: enter a custom subject for the notification, or use default.
- Sender name: enter a custom sender name for the notification, or use default.
- Sender email: enter a custom sender email for the notification, or use default. If you use your own email (e.g. notifications@yourbusiness.com) address, please add the following SPF record for the domain (e.g. business.com) to avoid problems receiving the emails:
http://support.holmsecurity.com/hc/en-us/articles/213446285 - Recipient: enter the recipient for the notification.
- Message: enter a custom message for the notification, or use default.
Additionally, you can also, instead of notifications, use Recipients to receive an encrypted PDF file by email.
- Under the headline Recipients enter the following:
- Click +Add Recipients If you want to enable the encrypted PDF sendout of the report.
- Email: The Email of the recipient.
- Phone number: The phone number of the recipient.
- Click OK.
- Done!