1 |
All Data |
SWIM |
The all data view provides detailed information about software image updates on devices |
PDF CSV TDE |
2 |
All Data Version 2.0 |
SWIM |
This all data view provides detailed information exclusively for devices that have undergone software image updates |
CSV TDE JSON |
3 |
Threat Detail |
Rogue and aWIPS |
This report provides for the detailed information about the rogue AP's and aWIPS threats that are seen in the network |
CSV TDE JSON |
4 |
New Threat |
Rogue and aWIPS |
This report provides for the detailed information about the new rogue AP's and aWIPS threats that are seen in the network |
CSV TDE JSON |
5 |
Rogue Additional Detail |
Rogue and aWIPS |
This report provides additional information of the rogue threats with details at BSSID level. The additional information includes Switch Port details in case of Rogue on Wire, first time when the rogue is seen in the network etc. |
CSV TDE JSON |
6 |
Non Compliant Devices |
Licensing |
This report provides information about non compliant devices |
PDF CSV |
7 |
Non Compliance Summary |
Licensing |
This report provides summary of non compliant device series |
PDF CSV |
8 |
AireOS Controllers Licenses |
Licensing |
Provides license information about AireOS controllers |
PDF CSV |
9 |
License Usage Upload Details |
Licensing |
Provides information about license usage uploading schedule |
PDF CSV |
10 |
License Historical Usage |
Licensing |
This report provides the historical data of license usages. |
CSV |
11 |
Configuration Archive |
Configuration Archive |
This report contains Device Name, Device Family, Device Type, IP Address, Created Time, Triggered By, Category, Device User Name, Connection Mode, Client IP Address |
CSV PDF JSON |
12 |
All Data |
Inventory |
The all data view provides detailed information about network devices, Distribution of devices over time, Device Count by Site, Device Count by Device Type and Device Count by Software Version, Device Count by Fabric Role |
PDF CSV TDE |
13 |
Port Reclaim View |
Inventory |
This report displays the port details, based on last usage time. |
CSV TDE JSON |
14 |
All Data Version 2.0 |
Inventory |
This new all data view provides detailed information about network devices, distribution of devices over time, device count by site, device count by device type, device count by software version and device count by fabric role, more efficiently |
PDF CSV TDE |
15 |
AP Performance Report |
Long Term |
This cloud-generated report contains a detailed list of Key Performance Indicators from Access Points in the network |
CSV TDE JSON |
16 |
Long Term AP Detail |
Long Term |
This report contains long term detailed list of Access Points in the network |
CSV TDE JSON |
17 |
Long Term AP Radio |
Long Term |
This report contains long term detailed list of Access Point Radios in the network |
CSV TDE JSON |
18 |
Long Term AP Usage and Client Breakdown |
Long Term |
This report provides Long Term breakdown of clients and usage by OS types, SSID and VLAN, also total usage through selected APs |
PDF CSV TDE JSON |
19 |
Long Term Client Detail |
Long Term |
This client report view provides detailed information about the list of Wireless clients that are seen in the network |
CSV TDE JSON |
20 |
Long Term Client Session |
Long Term |
This client session report view provides detailed information about the wireless client sessions seen in the network |
CSV TDE JSON |
21 |
Long Term Network Device Availability |
Long Term |
This network device availability report view provides Long Term detailed information about average availability of devices |
CSV TDE JSON |
22 |
AP |
Access Point |
This report contains a detailed list of Access Points in the network |
CSV TDE JSON |
23 |
AP Radio |
Access Point |
This report contains a detailed list of Access Point Radios in the network |
CSV TDE JSON |
24 |
AP - Usage and Client Breakdown |
Access Point |
This report provides breakdown of clients and usage by OS types, SSID and VLAN, also total usage through selected APs |
PDF CSV TDE JSON |
25 |
Worst Interferers |
Access Point |
Interferers detected by AP Radio sorted descending with worst severity. (Interferers data is only available from eWLC controllers and unavailable from AireOS controllers, and Interferers with type BT Link, BT Discovery and BLE Beacon are filtered out) |
CSV TDE JSON |
26 |
AP RRM Events |
Access Point |
This report contains AP RRM Events Over time grouped by APs |
CSV TDE JSON |
27 |
Security Advisories Data |
Security Advisories |
The Security Advisory data view provides detailed information about network devices and the security advisories that were detected on them from the previous scan. |
PDF CSV TDE |
28 |
Network Device Compliance |
Compliance |
This report contains Device Name, Device Family, Device Type,IP Address, Compliance Status, Software Image Status,Startup Vs Running Configuration Status,Critical Security Advisories Status,Network Profiles Status. |
CSV PDF JSON |
29 |
Endpoint Profiling |
AI Endpoint Analytics |
This endpoints report view provides profiling information about the endpoints that are seen in the network. |
CSV |
30 |
Audit Log |
Audit Log |
This audit log report provides detailed information about audits for given time frame. |
CSV JSON |
31 |
Security Group to Security Groups |
Group Communication Summary |
Summary of communication between the selected security group and all other relevant security groups for the period chosen. |
CSV |
32 |
Security Group to ISE Endpoint Profile Groups |
Group Communication Summary |
Summary of communication between the selected security group and all other relevant ISE endpoint profile groups for the period chosen. |
CSV |
33 |
Security Group to Host Groups |
Group Communication Summary |
Summary of communication between the selected security group and all other relevant Stealthwatch host groups for the period chosen. |
CSV |
34 |
ISE Endpoint Profile Group to Security Groups |
Group Communication Summary |
Summary of communication between the selected ISE endpoint profile groups and all other relevant Stealthwatch host groups for the period chosen. |
CSV |
35 |
ISE Endpoint Profile Group to ISE Endpoint Profile Groups |
Group Communication Summary |
Summary of communication between the selected ISE endpoint profile groups and all other relevant ISE Endpoint Profile groups for the period chosen. |
CSV |
36 |
ISE Endpoint Profile Group to Host Groups |
Group Communication Summary |
Summary of communication between the selected ISE endpoint profile groups and all other relevant Host groups for the period chosen. |
CSV |
37 |
Host Group to Security Groups |
Group Communication Summary |
Summary of communication between the selected Stealthwatch host groups and all other relevant security groups for the period chosen. |
CSV |
38 |
Host Group to ISE Endpoint Profile Group |
Group Communication Summary |
Summary of communication between the selected Stealthwatch host groups and all other relevant ISE Endpoint Profile Groups for the period chosen. |
CSV |
39 |
Host Group to Host Group |
Group Communication Summary |
Summary of communication between the selected Stealthwatch host groups and all other relevant Host Groups for the period chosen. |
CSV |
40 |
Client Summary |
Client |
This client report view provides an executive summary like health and counts of clients that are seen in the network. |
PDF |
41 |
Top N Summary |
Client |
This client report view provides Top Locations by Client count and Top Locations by Poor Client Health. |
PDF |
42 |
Client Detail |
Client |
This client report view provides detailed information about the list of clients that are seen in the network |
CSV TDE JSON |
43 |
Client Trend |
Client |
This client report view provides client count trend and client traffic trend for the given time period |
PDF |
44 |
Client Session |
Client |
This client session report view provides detailed information about the wireless client sessions seen in the network |
CSV TDE JSON |
45 |
Busiest Client |
Client |
This client report view provides busiest clients by usage, tx bytes or rx bytes. |
CSV TDE JSON |
46 |
Unique Clients and Users Summary |
Client |
This client report view provides clients and users summary, also breakdowns by protocol, vendor, SSID and VLAN |
PDF |
47 |
Executive Summary |
Executive Summary |
Analyze how the network is performing with insights into network devices, clients and issues |
PDF |
48 |
Network Device Availability |
Network Devices |
This network device availability report view provides detailed information about average availability of devices |
CSV TDE JSON |
49 |
Channel Change Count |
Network Devices |
The report provides visibility into the channel changes observed on Access Point Radio |
CSV TDE JSON |
50 |
Transmit Power Change Count |
Network Devices |
The report provides visibility into the transmit power changes observed on Access Point Radio |
CSV TDE JSON |
51 |
VLAN |
Network Devices |
This vlan report provides detailed information about the list of vlans that are seen in the network |
CSV TDE |
52 |
Port Capacity |
Network Devices |
This Port Capacity report provides detailed information about the port usage in the network |
CSV TDE |
53 |
PoE |
Network Devices |
This PoE report view provides detailed information about the switch power and ports |
CSV TDE JSON |
54 |
Device CPU and Memory Utilization |
Network Devices |
This report provides detailed information about top N CPU/Memory utilization of the managed devices |
CSV |
55 |
Network Interface Utilization |
Network Devices |
This report provides detailed information about Top N or Bottom N interface utilization metrics |
CSV |
56 |
Device Lifecycle Information |
Telemetry |
This device lifecycle information report provides detailed information about Hardware End-of-life warnings, Software End-of-Life warnings and Field Notices applicable to the devices in your network |
JSON |
57 |
EoX Data |
EoX |
The EoX data view provides detailed information about network devices and the EoX alerts that were detected on them from the previous scan. |
PDF CSV TDE |
58 |
Security Group to Security Group |
Group Pair Communication Analytics |
Select source and destination security group names and direction of communication to view service, port, and protocol for the period chosen. |
CSV |
59 |
Security Group to ISE Endpoint Profile Group |
Group Pair Communication Analytics |
Select source security group and destination ISE endpoint profile group names and direction of communication to view service, port, and protocol for the period chosen. |
CSV |
60 |
Security Group to Host Group |
Group Pair Communication Analytics |
Select source security group and destination Stealthwatch host group names and direction of communication to view service, port, and protocol for the period chosen. |
CSV |
61 |
ISE Endpoint Profile Group to Security Group |
Group Pair Communication Analytics |
Select source ISE endpoint profile group and destination security group names and direction of communication to view service, port, and protocol for the period chosen. |
CSV |
62 |
ISE Endpoint Profile Group to ISE Endpoint Profile Group |
Group Pair Communication Analytics |
Select source ISE endpoint profile group and destination ISE Endpoint Profile Group names and direction of communication to view service, port, and protocol for the period chosen. |
CSV |
63 |
ISE Endpoint Profile Group to Host Group |
Group Pair Communication Analytics |
Select source ISE endpoint profile group and destination Host Group names and direction of communication to view service, port, and protocol for the period chosen. |
CSV |
64 |
Host Group to Security Group |
Group Pair Communication Analytics |
Select source Stealthwatch host group and destination security group names and direction of communication to view service, port, and protocol for the period chosen. |
CSV |
65 |
Host Group to ISE Endpoint Profile Group |
Group Pair Communication Analytics |
Select source Stealthwatch host group and destination ISE Endpoint Profile names and direction of communication to view service, port, and protocol for the period chosen. |
CSV |
66 |
Host Group to Host Group |
Group Pair Communication Analytics |
Select source Stealthwatch host group and destination Stealthwatch host names and direction of communication to view service, port, and protocol for the period chosen. |
CSV |