Users Guide

Dell Networking W-ClearPass Policy Manager 6.6 | User Guide W-ClearPass Insight Reports | 769
Chapter 15
W-ClearPass Insight Reports
This chapter describes how to use the W-ClearPass 6.6 Insight Reporting tool.
This chapter includes the following information:
l About W-ClearPass Insight
l About the Insight Dashboard
l Searching the Insight Database
l Creating Alerts
l Creating Reports
l Insight Report Categories Reference
l Administration Operations
l Managing Insight Admin Privileges
About W-ClearPass Insight
This section presents an overview of W-ClearPass Insight. It provides the following information:
l Introduction
l Enabling Insight and Specifying a Master Insight Node
l Launching Insight
Introduction
W-ClearPass Insight is an application for use with W-ClearPass Policy Manager that is capable of aggregating
data from multiple Policy Manager appliances that contain archived network access logs.
You can access each application within the W-ClearPass suite with a single login. You need only sign in once for
access to W-ClearPass Policy Manager, Insight, Onboard, and Guest. For more information, see Launching
Insight below.
l Insight makes it easy to add many different types of report "widgets" that will produce reports that provide
the specific kinds of information you need to monitor and understand what is occurring on the network.
You can create customized reports to track detailed authentication records, audit trails, and details on
network-access trends (see About the Insight Dashboard on page 772).
l The Insight Search feature allows you to search for clients, users, W-ClearPass servers, and network access
devices (see Searching the Insight Database on page 781).
l This chapter illustrates how to generate customized reports that analyze authentication information, device
profiling, client health and posture data, as well as guest and BYOD use cases (for details, see Creating
Reports on page 789 and Insight Report Categories Reference on page 798).
l This chapter also describes how to configure alerts that allow you to receive near-real-time messages
regarding anomalous network activity. Alerts can be delivered via SMS or email notification to multiple
recipients.
You can also set up a User Watchlist (a list of VIPs, executives or devices that warrant special tracking) that
you can monitor for authentication failures or other key events (see Creating Alerts on page 783).