<!--
  This file is a part of the open-eBackup project.
  This Source Code Form is subject to the terms of the Mozilla Public License, v. 2.0.
  If a copy of the MPL was not distributed with this file, You can obtain one at
  http://mozilla.org/MPL/2.0/.
  
  Copyright (c) [2024] Huawei Technologies Co.,Ltd.
  
  THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND,
  EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT,
  MERCHANTABILITY OR FIT FOR A PARTICULAR PURPOSE.
  -->


<!DOCTYPE html
  PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
      <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
   
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="DC.Type" content="topic">
<meta name="DC.Title" content="Viewing a Report">
<meta name="product" content="">
<meta name="DC.Relation" scheme="URI" content="en-us_topic_0000002200876229.html">
<meta name="prodname" content="">
<meta name="version" content="">
<meta name="brand" content="00-OceanCyber 300 1.2.0 Online Help">
<meta name="DC.Publisher" content="20250228">
<meta name="DC.Format" content="XHTML">
<meta name="DC.Identifier" content="EN-US_TOPIC_0000002165515132">
<meta name="DC.Language" content="en-us">
<link rel="stylesheet" type="text/css" href="public_sys-resources/commonltr.css">
<title>Viewing a Report</title>
</head>
<body style="clear:both; padding-left:10px; padding-top:5px; padding-right:5px; padding-bottom:5px"><a name="EN-US_TOPIC_0000002165515132"></a><a name="EN-US_TOPIC_0000002165515132"></a>

<h1 class="topictitle1">Viewing a Report</h1>
<div id="body0000001482253574"><p id="EN-US_TOPIC_0000002165515132__p819284091811">This section describes how to view a data security report.</p>
<div class="section" id="EN-US_TOPIC_0000002165515132__section16497142464611"><h4 class="sectiontitle">Procedure</h4><ol id="EN-US_TOPIC_0000002165515132__ol7499132416464"><li id="EN-US_TOPIC_0000002165515132__en-us_topic_0000001311216213_li860116571586"><span><span id="EN-US_TOPIC_0000002165515132__ph449522856112636">In the navigation pane, choose <span class="uicontrol" id="EN-US_TOPIC_0000002165515132__en-us_topic_0000002055871086_uicontrol614262734415"><b>Reports</b></span>.</span> The report overview page displays the report name, <strong id="EN-US_TOPIC_0000002165515132__b13831614152610">Report Creation Time</strong>, <strong id="EN-US_TOPIC_0000002165515132__b12365131702610">Storage Device</strong>, <strong id="EN-US_TOPIC_0000002165515132__b790716188262">vStore</strong>, <strong id="EN-US_TOPIC_0000002165515132__b7356321192613">File System</strong>, and <strong id="EN-US_TOPIC_0000002165515132__b2042222412616">Statistical Range</strong>.</span><p><p id="EN-US_TOPIC_0000002165515132__p19265183783913"><span><img id="EN-US_TOPIC_0000002165515132__image0715934134817" src="en-us_image_0000002165355516.png"></span></p>
<p id="EN-US_TOPIC_0000002165515132__p53741914154411"></p>
</p></li><li id="EN-US_TOPIC_0000002165515132__li132281054173619"><span>Click <span><img id="EN-US_TOPIC_0000002165515132__image6493184417373" src="en-us_image_0000002165515204.png"></span> in the lower right corner of the report to be viewed. The detailed report is displayed. The report provides the latest infected snapshots, historical detection snapshots, and the protected object list of the latest snapshot. The report pages of intelligent detection and real-time detection are slightly different.</span><p><ul id="EN-US_TOPIC_0000002165515132__ul1584131813240"><li id="EN-US_TOPIC_0000002165515132__li1484115186241">Intelligent detection report page<p id="EN-US_TOPIC_0000002165515132__p1117710390388"><a name="EN-US_TOPIC_0000002165515132__li1484115186241"></a><a name="li1484115186241"></a><span><img id="EN-US_TOPIC_0000002165515132__image568563916382" src="en-us_image_0000002200761833.png"></span></p>
<p id="EN-US_TOPIC_0000002165515132__p1111213153279"></p>
</li><li id="EN-US_TOPIC_0000002165515132__li936742418247">Real-time detection report page<p id="EN-US_TOPIC_0000002165515132__p175182021171715"><a name="EN-US_TOPIC_0000002165515132__li936742418247"></a><a name="li936742418247"></a><span><img id="EN-US_TOPIC_0000002165515132__image21401308247" src="en-us_image_0000002165515208.png"></span></p>
<p id="EN-US_TOPIC_0000002165515132__p2139184542617"></p>
<div class="note" id="EN-US_TOPIC_0000002165515132__note1221171818507"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><p id="EN-US_TOPIC_0000002165515132__p7222118125017">You can obtain information about suspected infected hosts based on the source IP addresses in the suspicious file list.</p>
</div></div>
</li></ul>
</p></li><li id="EN-US_TOPIC_0000002165515132__li6808715891"><span>Click a protected object to view the detection status of copy files in the protected object.</span><p><ul id="EN-US_TOPIC_0000002165515132__ul2024620362215"><li id="EN-US_TOPIC_0000002165515132__li162468361825">View information about protected objects of Veeam. The report shows the copy file status of a protected object.<p id="EN-US_TOPIC_0000002165515132__p11349183533610"><a name="EN-US_TOPIC_0000002165515132__li162468361825"></a><a name="li162468361825"></a><span><img id="EN-US_TOPIC_0000002165515132__image14876144013018" src="en-us_image_0000002200761825.png"></span></p>
<p id="EN-US_TOPIC_0000002165515132__p1095194813277"></p>
</li><li id="EN-US_TOPIC_0000002165515132__li724613369216">View information about protected objects of NetBackup. The report shows the detection status of the latest infected copy files and copy files of protected objects.<p id="EN-US_TOPIC_0000002165515132__p194222043134"><a name="EN-US_TOPIC_0000002165515132__li724613369216"></a><a name="li724613369216"></a><span><img id="EN-US_TOPIC_0000002165515132__image840031515515" src="en-us_image_0000002165355512.png"></span></p>
<p id="EN-US_TOPIC_0000002165515132__p1089319461839"></p>
</li><li id="EN-US_TOPIC_0000002165515132__li1469612174315">View information about protected objects of Commvault. The report shows the detection status of the latest infected copy files and copy files of protected objects.<p id="EN-US_TOPIC_0000002165515132__p1391855713811"><a name="EN-US_TOPIC_0000002165515132__li1469612174315"></a><a name="li1469612174315"></a><span><img id="EN-US_TOPIC_0000002165515132__image756235853814" src="en-us_image_0000002200876285.png"></span></p>
<div class="p" id="EN-US_TOPIC_0000002165515132__p6591103210547"><div class="note" id="EN-US_TOPIC_0000002165515132__note3674153716242"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><p id="EN-US_TOPIC_0000002165515132__p367483719240">The number of files displayed in the report may be greater than that of original files. This is because files may be split due to the backup policy of the backup software.</p>
</div></div>
</div>
</li></ul>
</p></li></ol>
</div>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="en-us_topic_0000002200876229.html">Viewing a Data Security Report</a></div>
</div>
</div>

<div class="hrcopyright"><hr size="2"></div><div class="hwcopyright">Copyright &copy; Huawei Technologies Co., Ltd.</div></body>
</html>