report_management

Report Management

Wireless Manager contains various kind of reports which can be either predefined, custom, Analytics, schedules or archives. Under predefined reports, we have assessment reports, compliance reports, incident reports, device inventory, and airtight mobile client. Custom reports are the ones which are made by an individual which are also shareable. Analytics reports show us visibility and association analytics data in the form CSV downloadable format. Reports can also be scheduled in reports scheduled by me or reports scheduled for me. Archive tab contains all the archived reports that have been fetched, renamed or deleted.

JSON Table

Attribute Data Type Description
reportName String Name of the report that is being fetched.
reportDescription String Detailed description of the report that is being fetched.
reportType String Type or category of the report that is being fetched. The applicable values are:

  • CUSTOM_PRIVATE
  • CUSTOM
  • COMPLIANCE
  • INCIDENT
  • INFRASTRUCTURE
  • CLIENT
  • ASSESMENT
  • PERFORMANCE
  • INTEGRATION
reportId int System-generated unique ID of the report that is being fetched.
userId int ID of the user who is fetching this report.
schedule application/json A group of attributes related to the scheduling settings of report. The applicable values are onetime and recurring.
displayId int A read-only field for internal use.
sectionList application/json A list of the sections in the report that is being fetched.
sectionList/sectionId int System-generated unique ID of the section of the report.
sectionList/name String Name of the report section.
sectionList/description String Description of the report section.
sectionList/sectionType application/json The type or category of the report section that is being fetched.
sectionList/sectionType/name String Name of the category.
sectionList/sectionType/displayNameKey String Display name.
sectionList/sectionType/entityList application/json A list of report entities such as Sensor, AP, and Client for which the section data needs to be fetched.
sectionList/sectionType/entityList/name String Name of the entity.
sectionList/display boolean A true or false value indicating whether the section is to be displayed.
sectionList/entityList application/json Entity list associated with the section.
sectionList/entityList/name String Name of the entity list associated with the section.
sectionList/entityList/displayName String Display name of the entity list associated with the section.
sectionList/entityList/attributes String Attributes of the entity list associated with the section.
sectionList/entityList/entityAttributes String Attributes of the entity list associated with the section.
sectionList/displayAttrs application/json Display attributes associated with the section.
sectionList/displayAttrs/attributeName String Attribute name that will appear in the report.
sectionList/displayAttrs/table boolean A true or false value indicating whether the data summary table needs to be displayed in the generated report.
sectionList/displayAttrs/display boolean A true or false value indicating whether the display attribute need to be displayed in the generated report section.
sectionList/displayAttrs/chart String The chart type for the report data. The applicable values are:

  • BAR
  • PIE
  • NONE
sectionList/condition application/json Conditions associated with the section on which the section data will be filtered.
sectionList/condition/conditions application/json Conditions containing individual condtions.
sectionList/condition/conditions/value String Attribute value associated with the condition.
sectionList/condition/conditions/conditionRef String Operatorassociated with condtion.
sectionList/condition/conditions/attributeRef String Attribute name associated with the condtion.
lookNFeel application/json Description of the appearance of the generated report.
lookNFeel/header application/json Description of the appearance of the header.
lookNFeel/header/leftAlignedHeaderText String Text to be displayed on top left corner of PDF and HTML report.
lookNFeel/header/rightAlignedHeaderText String Text to be displayed on top left corner, on right side of the leftAlingedHeaderText.
lookNFeel/header/companyName String Company name on the report.
lookNFeel/header/companyAddress String Company address.
lookNFeel/header/companyWebsite String URL of the company Website.
lookNFeel/header/coverPageLogoImageKey String Image key for logo.
lookNFeel/header/coverPageBGImageKey String Key for background image on report cover.
lookNFeel/header/headerTextColor application/json Header text font color used for PDF and HTML report.
lookNFeel/header/headerTextColor/r int Red color value for the header text.
lookNFeel/header/headerTextColor/g int Green color value for the header text.
lookNFeel/header/headerTextColor/b int Blue color value in RGB for header text.
lookNFeel/header/headerTextBGColor application/json A group of attributes related to the background color of the header text.
lookNFeel/header/headerTextBGColor/r int Red color value in RGB for the header background color.
lookNFeel/header/headerTextBGColor/g int Green color value in RGB for header background color.
lookNFeel/header/headerTextBGColor/b int Blue color value in RGB for header background color.
lookNFeel/header/titleText String Title text to be displayed in front of the report name in HTML report.
lookNFeel/header/titleTextColor application/json A group of attributes related to the title text font color.
lookNFeel/header/titleTextColor/r int Red color value in RGB for title text.
lookNFeel/header/titleTextColor/g int Green color value in RGB for title text.
lookNFeel/header/titleTextColor/b int Blue color value in RGB for title text.
lookNFeel/header/titleTextBGColor application/json Title text background color used for PDF and HTML report.
lookNFeel/header/titleTextBGColor/r int Red color value in RGB for title text background.
lookNFeel/header/titleTextBGColor/g int Green color value in RGB for title text background.
lookNFeel/header/titleTextBGColor/b int Blue color value in RGB for title text background.
lookNFeel/header/displayReportGenerationInfo boolean A true or false value indicating whether to show the report generation information.
lookNFeel/header/displayReportDescriptionText boolean A true or false value indicating whether to show report description text.
lookNFeel/section application/json Look and feel attributes for each section.
lookNFeel/section/sectionNameTitle String Table header name to denote section title.
lookNFeel/section/sectionTitleTextColor application/json Section title text font color.
lookNFeel/section/sectionTitleTextColor/r int Red color value in RGB for section title text.
lookNFeel/section/sectionTitleTextColor/g int Green color value in RGB for section title text.
lookNFeel/section/sectionTitleTextColor/b int Blue color value in RGB for section title text.
lookNFeel/section/sectionTitleBGColor application/json A group of attributes related to the Section title text background color used for PDF and HTML reports.
lookNFeel/section/sectionTitleBGColor/r int Red color value in RGB for the section title background.
lookNFeel/section/sectionTitleBGColor/g int Green color value in RGB for the section title background.
lookNFeel/section/sectionTitleBGColor/b int Blue color value in RGB for the section title background.
lookNFeel/section/sectionHeaderTextColor application/json A group of attributes related to the Section header text color used in PDF and HTML reports.
lookNFeel/section/sectionHeaderTextColor/r int Red color value in RGB for section title header text.
lookNFeel/section/sectionHeaderTextColor/g int Green color value in RGB for section title header text.
lookNFeel/section/sectionHeaderTextColor/b int Blue color value in RGB for section title header text.
lookNFeel/section/sectionHeaderBGColor application/json A group of attributes related to the Section header background color used for PDF and HTML report.
lookNFeel/section/sectionHeaderBGColor/r int Red color value in RGB for section title header background.
lookNFeel/section/sectionHeaderBGColor/g int Green color value in RGB for section title header background.
lookNFeel/section/sectionHeaderBGColor/b int Blue color value in RGB for section title header background.
lookNFeel/section/displaySectionDescriptionText boolean A true or false value indicating whether the section description text need to be displayed.
lookNFeel/section/displaySectionQuery boolean A true or false value indicating whether the section query need to be displayed.
lookNFeel/summary application/json Look and feel attributes to display summary.
lookNFeel/summary/displayReportSummary boolean A true or false value indicating whether the report summary needs to be shown.
lookNFeel/summary/reportSummaryText String Report summary title
lookNFeel/summary/summaryHeaderTextColor application/json A group of attributes related to the Summary header text color used for PDF and HTML reports
lookNFeel/summary/summaryHeaderTextColor/r int Red color value in RGB for summary header.
lookNFeel/summary/summaryHeaderTextColor/g int Green color value in RGB for summary header.
lookNFeel/summary/summaryHeaderTextColor/b int Blue color value in RGB for summary header.
lookNFeel/summary/summaryHeaderBGColor application/json A group of attributes related to the Summary header background color used for PDF and HTML report.
lookNFeel/summary/summaryHeaderBGColor/r int Red color value in RGB for summary header background.
lookNFeel/summary/summaryHeaderBGColor/g int Green color value in RGB for summary header background.
lookNFeel/summary/summaryHeaderBGColor/b int Blue color value in RGB for summary header background.
lookNFeel/summary/includeSectionWithZeroResults boolean A true or false value indicating whether to show sections with zero result.
lookNFeel/summary/summaryTableHeaderTextColor application/json Summary table header text color used for PDF and HTML report.
lookNFeel/summary/summaryTableHeaderTextColor/r int Red color value in RGB for the summary table header text color.
lookNFeel/summary/summaryTableHeaderTextColor/g int Green color value in RGB for the summary table header text color.
lookNFeel/summary/summaryTableHeaderTextColor/b int Blue color value in RGB for the summary table header text color.
lookNFeel/summary/summaryTableHeaderBGColor application/json Summary table header background color used for PDF and HTML reports.
lookNFeel/summary/summaryTableHeaderBGColor/r int Red color value in RGB for the summary table header background color.
lookNFeel/summary/summaryTableHeaderBGColor/g int Green color value in RGB for summary table header background color.
lookNFeel/summary/summaryTableHeaderBGColor/b int Blue color value in RGB for summary table header background color.
lookNFeel/summary/displayReportSummaryTable boolean A true or false value indicating whether to show the report summary table .
lookNFeel/summary/displaySectionName boolean A true or false value value indicating whether to the section name will appear in the report.
lookNFeel/summary/sectionName String Section title text
lookNFeel/summary/displaySectionDescription boolean A true or false value indicating whether the section description will appear in the report.
lookNFeel/summary/sectionDescription String Section description text
lookNFeel/summary/displayQueryType boolean A true or false value indicating whether to show query type.
lookNFeel/summary/queryType String Section query type title
lookNFeel/summary/displayResultCount boolean A true or false value indicating whether to show the result count.
lookNFeel/summary/resultCount String The total result count
lookNFeel/summary/displayJumpTo boolean A true or false value indicating whether to show jump to link.
lookNFeel/summary/jumpTo String Jump to link title text. For e.g Jump To
lookNFeel/summary/displayReportChart boolean A true or false value indicating whether to show summary charts in the report.
lookNFeel/summary/reportChartType String The applicable values are:

  • BAR
  • PIE
  • NONE
defaultLookNFeel boolean A true or false value indicating whether to use the default look and feel configuration.
reportDefFileName String Report definition file name associated with the report.
deprecated boolean A true or false value indicating whether the report is deprecated or not. The default value is false.
deprecateMessage String Deprecated warning message to be displayed in the PDF report.

Copy Sample JSON
Sample JSON
[
    {
        "reportName": "HIPAA Wireless Compliance Report",
        "reportDescription": "\n     The Health Insurance Portability and Accountability Act (HIPAA) of 1996 by the Department of Health and Human Services (DHHS), mandates that healthcare organizations must safeguard the privacy and security of patient health information transmitted electronically.\n\nHIPAA Security Rule 45 CFR seeks to control leakage of patient health data to unauthorized users. This report assesses the wireless security posture of the organization and identifies wireless vulnerabilities that may expose your organization to leakage of patient health data.\n\n1. Section 164.308(a)(1): This section requires a security management process to be set up for risk assessment and management.  This HIPAA report is the first step in establishing a security management process to assess and manage the risk of patient health data leakage through wireless.\n\n2. Section 164.308(a)(6): This section requires formal documentation and response procedures to be set up to handle wireless security incidents promptly. Periodic generation and archival of this HIPAA report establishes that your organization has a formal documentation and rapid response program to handle incidents related to patient health data leakage through wireless.\n\n3. Section 164.312(e)(1): This section requires patient health data transmitted over wireless networks to be guarded against unauthorized access. Periodic generation and archival of this HIPAA report establishes that your organization has the capabilities to monitor, detect and safeguard against patient health data leakage through wireless.\n\nSince wireless environments change dynamically, it is recommended that you conduct a HIPAA wireless vulnerability assessment at least once every 15 days. Archive the HIPAA Wireless Compliance reports. Establish an ongoing wireless security program to fix the top vulnerabilities and to minimize your wireless security exposure.\n\nThe sections of this report list the wireless vulnerabilities detected in your network and the severity of security risk caused by these vulnerabilities.\n        ",
        "reportType": "COMPLIANCE",
        "reportId": 3,
        "userId": 1,
        "schedule": null,
        "displayId": 0,
        "sectionList": [
            {
                "sectionId": 1,
                "name": "Section 164.312(e)(1) : Guest Clients connecting to Authorized Access Point",
                "description": "\n                Guest clients connecting to your authorized AP indicates a potential malicious attempt to break into your corporate network through the WLAN.\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "CL_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "PROTOCOL",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SSID",
                        "table": true,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SECURITY",
                        "table": true,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "GUEST_CLIENT",
                                "conditionRef": "EQUALS",
                                "attributeRef": "DEVICE_FOLDER"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "YES",
                                "conditionRef": "EQUALS",
                                "attributeRef": "HAD_UNAUTH_ASSOC"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 2,
                "name": "Section 164.312(e)(1) : Unauthorized Client Connections",
                "description": "\n                Unauthorized clients connecting to your authorized AP indicates a potential malicious attempt to break into your corporate network through the WLAN. This wireless vulnerability may lead to theft of patient health data in violation of Section 164.312(e)(1).\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "AP_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "PROTOCOL",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SSID",
                        "table": true,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SECURITY",
                        "table": true,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "AUTHORIZED_AP",
                                "conditionRef": "EQUALS",
                                "attributeRef": "DEVICE_FOLDER"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "YES",
                                "conditionRef": "EQUALS",
                                "attributeRef": "HAD_UNAUTH_ASSOC"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 3,
                "name": "Sections 164.312(a)(1) and 164.312(e)(1) : Authorized Clients in Bridging/ICS Mode",
                "description": "\n                Authorized Clients in Bridging/ICS mode is a severe violation of WLAN best practices.\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "CL_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "PROTOCOL",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SSID",
                        "table": true,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "AUTHORIZED_CLIENT",
                                "conditionRef": "EQUALS",
                                "attributeRef": "DEVICE_FOLDER"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "YES",
                                "conditionRef": "EQUALS",
                                "attributeRef": "WAS_CLIENT_BRIDGED"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 4,
                "name": "Sections 164.312(a)(1) and 164.312(e)(1) : Mis-associating Authorized Clients",
                "description": "\n                Authorized clients that associate with an external or a threat posing AP (e.g., rogue AP) are likely bypassing your firewalls and content (URL, malware, spam) filter policies. Such misbehaving clients can lead to reduced productivity, liability for illegal content flowing through your network, or leak sensitive data. This wireless vulnerability may lead to leakage of patient health data in violation of Sections 164.312(a)(1) and 164.312(e)(1).\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "CL_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "MACADDRESS",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "PROTOCOL",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "AUTHORIZED_CLIENT",
                                "conditionRef": "EQUALS",
                                "attributeRef": "DEVICE_FOLDER"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "YES",
                                "conditionRef": "EQUALS",
                                "attributeRef": "HAD_MISASSOC"
                            },
                            {
                                "value": "YES",
                                "conditionRef": "EQUALS",
                                "attributeRef": "HAD_THREATAP_CONN"
                            },
                            {
                                "value": "YES",
                                "conditionRef": "EQUALS",
                                "attributeRef": "HAD_AUTH_GUEST_CONN"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 5,
                "name": "Sections 164.312(a)(1) and 164.312(e)(1) : Soft Mobile Hotspot or Windows 7 Virtual WiFi APs",
                "description": "\n                A Soft Mobile Hotspot AP is a WiFi client device such as a laptop or a smartphone  operating as an access point. A Soft Mobile Hotspot AP connected to your enterprise network, for instance, through Ethernet or WiFi (using Windows 7 Virtual WiFi) can share its enterprise network access with other unauthorized devices. Using a Soft Mobile Hotspot AP as backdoor, outsiders can bypass your wired security measures and gain access to private enterprise network and sensitive data. This vulnerability can lead to theft of patient health data in violation of HIPAA Section 164.312(a)(1) and Section 164.312(e)(1).\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "CL_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "MACADDRESS",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "YES",
                                "conditionRef": "EQUALS",
                                "attributeRef": "WAS_SOFT_AP"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 6,
                "name": "Section 164.312(e)(1) : Open Connections",
                "description": "\n                Communication of your authorized devices is unprotected; your sensitive data is in the open up for grabs! This wireless vulnerability may lead to leakage of patient health data in violation of Section 164.312(e)(1).\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "CL_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SSID",
                        "table": true,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "PROTOCOL",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "AUTHORIZED_CLIENT",
                                "conditionRef": "EQUALS",
                                "attributeRef": "DEVICE_FOLDER"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "INFRASTRUCTURE",
                                "conditionRef": "EQUALS",
                                "attributeRef": "CONNECTION_TYPE"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "OPEN",
                                "conditionRef": "EQUALS",
                                "attributeRef": "SECURITY"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 7,
                "name": "Section 164.312(e)(1) : WEP Connections",
                "description": "\n                Your authorized devices are using the broken WEP encryption for communication. WEP gives a false sense of security. WEP can be easily cracked and your sensitive data can be stolen over-the-air. This wireless vulnerability may lead to leakage of patient health data in violation of Section 164.312(e)(1).\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "CL_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SSID",
                        "table": true,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "PROTOCOL",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "AUTHORIZED_CLIENT",
                                "conditionRef": "EQUALS",
                                "attributeRef": "DEVICE_FOLDER"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "INFRASTRUCTURE",
                                "conditionRef": "EQUALS",
                                "attributeRef": "CONNECTION_TYPE"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "WEP",
                                "conditionRef": "EQUALS",
                                "attributeRef": "SECURITY"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 8,
                "name": "Sections 164.312(a)(1) and 164.312(e)(1) : Ad-hoc Networks",
                "description": "\n                Authorized clients directly connecting to unauthorized clients is a major security threat; such connections open a backdoor to your network and your authorized devices may be infected with viral SSIDs. Ad hoc connections even between authorized clients should be discouraged as these connections can bypass your corporate security policies. This wireless vulnerability may lead to theft of patient health data in violation of Sections 164.312(a)(1) and 164.312(e)(1).\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "CL_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "PROTOCOL",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "AUTHORIZED_CLIENT",
                                "conditionRef": "EQUALS",
                                "attributeRef": "DEVICE_FOLDER"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "YES",
                                "conditionRef": "EQUALS",
                                "attributeRef": "HAD_ADHOC_PARTICIPATION"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 9,
                "name": "Sections 164.312(a)(1) and 164.312(e)(1) : Honeypot Attacks",
                "description": "\n                External APs with Authorized SSIDs are called Honeypots or Evil Twins. Honeypots can lure authorized clients into an inadvertent association, which is a major security threat. Your clients may unwittingly provide confidential information (e.g., password); the honeypot can launch a man-in-the-middle attack and insert itself into authorized communication or it can scan the client for vulnerabilities. This wireless vulnerability may lead to theft of patient health data in violation of Sections 164.312(a)(1) and 164.312(e)(1).\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "AP_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "PROTOCOL",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SSID",
                        "table": true,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SECURITY",
                        "table": true,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "AUTHORIZED_AP",
                                "conditionRef": "NOT_EQUALS",
                                "attributeRef": "DEVICE_FOLDER"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "YES",
                                "conditionRef": "EQUALS",
                                "attributeRef": "WAS_HONEYPOT"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 10,
                "name": "Section 164.312(e)(1) : Victims of Honeypot Attack",
                "description": "\n                A Honeypot attack has succeeded. An unauthorized AP with authorized SSID is called Honeypot or Evil Twin. Authorized clients have connected to a Honeypot. Your clients may unwittingly provide confidential information (e.g., password); the honeypot can launch a man-in-the-middle attack and insert itself into authorized communication or it can scan the client for vulnerabilities. This wireless vulnerability may lead to theft of patient health data in violation of Section 164.312(e)(1).\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "CL_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "PROTOCOL",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "AUTHORIZED_CLIENT",
                                "conditionRef": "EQUALS",
                                "attributeRef": "DEVICE_FOLDER"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "YES",
                                "conditionRef": "EQUALS",
                                "attributeRef": "HAD_HONEYPOT_CONN"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 11,
                "name": "Sections 164.312(a)(1), 164.312(c)(1) and 164.312(e)(1) : MAC Spoofing",
                "description": "\n                Detection of MAC spoofing indicates that a hacker has knowledge about the MAC addresses of your authorized devices and is using it maliciously. Your network security is potentially breached or prone to a denial-of-service attack. This wireless vulnerability may lead to theft of patient health data in violation of Sections 164.312(a)(1), 164.312(c)(1) and 164.312(e)(1).\n            ",
                "sectionType": {
                    "name": "EVENT",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "EVENT",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "EVENT_ID",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "EVENT_LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DATE_AND_TIME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "EVENT_DETAILS",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "320",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "489",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "601",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "820",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "989",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "502",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 12,
                "name": "Section 164.312(e)(1) : WEP Cracking",
                "description": "\n                Active WEP cracking on authorized AP was detected! This wireless vulnerability may lead to theft of patient health data in violation of Section 164.312(e)(1).\n            ",
                "sectionType": {
                    "name": "EVENT",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "EVENT",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "EVENT_ID",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "EVENT_LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DATE_AND_TIME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "EVENT_DETAILS",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "500",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "501",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 13,
                "name": "Section 164.312(e)(1) : Ad-hoc Mode",
                "description": "\n                Authorized clients in ad hoc connection mode are likely infected with viral SSIDs and can inadvertently compromise the security of your entire network by accepting direct connections. Unauthorized clients can enter your network through such connections, while authorized clients can bypass your security policy control (e.g., firewalls, and URL, spam, and malware filters). This wireless vulnerability may lead to theft of patient health data in violation of Section 164.312(e)(1).\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "CL_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "MACADDRESS",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SSID",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "ADHOC",
                                "conditionRef": "EQUALS",
                                "attributeRef": "CONNECTION_TYPE"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "AUTHORIZED_CLIENT",
                                "conditionRef": "EQUALS",
                                "attributeRef": "DEVICE_FOLDER"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 14,
                "name": "Sections 164.312(a)(1) and 164.312(e)(1) : Rogue Access Points",
                "description": "\n                Rogue APs are unauthorized APs that are likely to be connected to your corporate network in violation of your security policies. Outsiders can enter the corporate network using these Rogue APs as wireless backdoors. This wireless vulnerability may lead to theft of patient health data in violation of Sections 164.312(a)(1) and 164.312(e)(1).\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "AP_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "PROTOCOL",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SSID",
                        "table": true,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SECURITY",
                        "table": true,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "ROGUE_AP",
                                "conditionRef": "EQUALS",
                                "attributeRef": "DEVICE_FOLDER"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "YES",
                                "conditionRef": "EQUALS",
                                "attributeRef": "WAS_ACTIVE"
                            },
                            {
                                "value": "YES",
                                "conditionRef": "EQUALS",
                                "attributeRef": "WAS_ROGUE"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 15,
                "name": "Sections 164.312(a)(1), 164.312(c)(1) and 164.312(e)(1) : Open Authorized Access Points",
                "description": "\n                Installing authorized APs without any security is a severe violation of WLAN best practices. An open AP is a backdoor through which malicious users can enter the network to which it is connected, eavesdrop on over-the-air data, or conduct illegal activities which may entail liability to the owner of the network. Open APs not only compromise the security of your entire network, but open your network to even inadvertent, unauthorized usage. This wireless vulnerability may lead to theft of patient health data in violation of Sections 164.312(a)(1), 164.312(c)(1) and 164.312(e)(1).\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "AP_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "PROTOCOL",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SSID",
                        "table": true,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "AUTHORIZED_AP",
                                "conditionRef": "EQUALS",
                                "attributeRef": "DEVICE_FOLDER"
                            },
                            {
                                "value": "UNCATEGORIZED_AP",
                                "conditionRef": "EQUALS",
                                "attributeRef": "DEVICE_FOLDER"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "AUTHORIZED_AP",
                                "conditionRef": "EQUALS",
                                "attributeRef": "DEVICE_FOLDER"
                            },
                            {
                                "value": "POTENTIALLY_AUTHORIZED",
                                "conditionRef": "EQUALS",
                                "attributeRef": "SUGGESTED_CLASSIFICATION_FOR_AP"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "OPEN",
                                "conditionRef": "EQUALS",
                                "attributeRef": "SECURITY"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "YES",
                                "conditionRef": "NOT_EQUALS",
                                "attributeRef": "IS_GUEST_AP"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 16,
                "name": "Section 164.312(e)(1) : Potential Victim of Wi-Phishing Attack",
                "description": "\n                In Wi-Phishing, hackers use common or factory-default SSIDs to lure clients to unwittingly connect to their AP instead of the authorized WLAN. Clients probing for these common SSIDs are prime candidates for a Wi-Phishing attack. This wireless vulnerability may lead to leakage of patient health data in violation of Section 164.312(e)(1).\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "CL_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "MACADDRESS",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "YES",
                                "conditionRef": "EQUALS",
                                "attributeRef": "HAD_PROBED_VUL_SSID"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 17,
                "name": "Sections 164.312(a)(1), 164.312(c)(1) and 164.312(e)(1) : WEP Authorized Access Points",
                "description": "\n                It is well known that the Wired Equivalent Privacy (WEP) encryption is broken and can be easily exploited to steal sensitive data and possibly to enter your network. This wireless vulnerability may lead to theft of patient health data in violation of Sections 164.312(a)(1), 164.312(c)(1) and 164.312(e)(1).\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "AP_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "PROTOCOL",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SSID",
                        "table": true,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "AUTHORIZED_AP",
                                "conditionRef": "EQUALS",
                                "attributeRef": "DEVICE_FOLDER"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "WEP",
                                "conditionRef": "EQUALS",
                                "attributeRef": "SECURITY"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 18,
                "name": "Section 164.312(e)(1) : Unencrypted Broadcast/Multicast Traffic",
                "description": "\n                A hacker can collect sensitive information about your network through unencrypted broadcast/multicast control traffic and use to discover other vulnerabilities or launch an attack. If you are using broadcast/multicast applications, then application data is prone to eavesdropping. This wireless vulnerability may lead to leakage of patient health data in violation of Section 164.312(e)(1).\n            ",
                "sectionType": {
                    "name": "EVENT",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "EVENT",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "EVENT_ID",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "EVENT_LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DATE_AND_TIME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "EVENT_DETAILS",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "363",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "386",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 19,
                "name": "Sections 164.312(a)(1) and 164.312(e)(1) : Authorized Access Points using Vulnerable SSIDs",
                "description": "\n                An authorized AP with a commonly used (e.g., factory-default) SSID is more likely to attract attention from hackers or inadvertently from outsiders with their devices usually probing for these SSIDs. This wireless vulnerability may lead to theft of patient health data in violation of Sections 164.312(a)(1) and Section 164.312(e)(1).\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "AP_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "PROTOCOL",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SSID",
                        "table": true,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SECURITY",
                        "table": true,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "AUTHORIZED_AP",
                                "conditionRef": "EQUALS",
                                "attributeRef": "DEVICE_FOLDER"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "YES",
                                "conditionRef": "EQUALS",
                                "attributeRef": "HAS_VULNERABLE_SSID"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 20,
                "name": "Section 164.312(e)(1) : Misconfigured Authorized Access Points",
                "description": "\n                Settings on an authorized AP violate your configuration policies. Policy incompliant devices may be vulnerable. This wireless vulnerability may lead to theft of patient health data in violation of Section 164.312(e)(1).\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "AP_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "PROTOCOL",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SSID",
                        "table": true,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SECURITY",
                        "table": true,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "AUTHORIZED_AP",
                                "conditionRef": "EQUALS",
                                "attributeRef": "DEVICE_FOLDER"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "OPEN",
                                "conditionRef": "NOT_EQUALS",
                                "attributeRef": "SECURITY"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "WEP",
                                "conditionRef": "NOT_EQUALS",
                                "attributeRef": "SECURITY"
                            }
                        ]
                    },
                    {
                        "conditions": [
                            {
                                "value": "YES",
                                "conditionRef": "EQUALS",
                                "attributeRef": "VIOLATES_SECURITY_POLICY"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 21,
                "name": "Sections 164.308(a)(6) and 164.312(c)(1) : Denial-of-Service (DoS) Attacks",
                "description": "\n                A denial-of-service (DoS) attack can selectively deny wireless connectivity to specific devices or can disrupt your entire WLAN. A WiFi DoS attack usually involves an unauthorized device spoofing itself as authorized and sending management messages (e.g., disassociation, deauthentication) with the fake identity, in turn disconnecting authorized devices or disallowing access to the WLAN. A response mechanism to address this vulnerability is required as per Sections 164.308(a)(6) and 164.312(c)(1).\n            ",
                "sectionType": {
                    "name": "EVENT",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "EVENT",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "EVENT_ID",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "EVENT_LOCATION",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DATE_AND_TIME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "EVENT_DETAILS",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": [
                    {
                        "conditions": [
                            {
                                "value": "251",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "471",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "252",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "472",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "253",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "473",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "254",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "255",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "475",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "256",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "476",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "257",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "477",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "259",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "260",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "480",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "261",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "481",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "262",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "482",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "263",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "483",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "265",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "266",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "299",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "391",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            },
                            {
                                "value": "499",
                                "conditionRef": "EQUALS",
                                "attributeRef": "EVENT"
                            }
                        ]
                    }
                ]
            },
            {
                "sectionId": 22,
                "name": "Categorized List of Detected Access Points",
                "description": "\n                Access points detected in your environment and their classification.\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "AP_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION_PC",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SECURITY",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SSID",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "PROTOCOL",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": []
            },
            {
                "sectionId": 23,
                "name": "Categorized List of Detected Clients",
                "description": "\n                Clients that were detected in your environment and their classification.\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "CL_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION_PC",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SSID",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "PROTOCOL",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": []
            },
            {
                "sectionId": 24,
                "name": "List of Wireless Scanners",
                "description": "\n                Wireless scanners that have been deployed.\n            ",
                "sectionType": {
                    "name": "DEVICE",
                    "displayNameKey": null,
                    "entityList": null
                },
                "display": true,
                "entityList": [
                    {
                        "name": "SN_DEVICE",
                        "displayName": "####",
                        "attributes": null,
                        "entityAttributes": null
                    }
                ],
                "displayAttrs": [
                    {
                        "attributeName": "LOCATION_PC",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "DEVICE_NAME",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "MACADDRESS",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "IP_ADDRESS",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    },
                    {
                        "attributeName": "SENSOR_MODEL",
                        "table": false,
                        "display": true,
                        "chart": "NONE"
                    }
                ],
                "condition": []
            }
        ],
        "lookNFeel": {
            "header": {
                "leftAlignedHeaderText": "AirTight Networks, Inc.",
                "companyName": "Mojo Networks, Inc.",
                "companyAddress": "339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043",
                "companyWebsite": "www.mojonetworks.com",
                "coverPageLogoImageKey": null,
                "coverPageBGImageKey": null,
                "rightAlignedHeaderText": "Reports-Customized",
                "headerTextColor": {
                    "r": 70,
                    "g": 70,
                    "b": 70
                },
                "titleText": "Report Name",
                "titleTextColor": {
                    "r": 255,
                    "g": 255,
                    "b": 255
                },
                "titleTextBGColor": {
                    "r": 118,
                    "g": 118,
                    "b": 118
                },
                "displayReportGenerationInfo": true,
                "displayReportDescriptionText": true,
                "headerTextBGColor": {
                    "r": 252,
                    "g": 181,
                    "b": 93
                }
            },
            "section": {
                "sectionNameTitle": "Section Name",
                "sectionTitleTextColor": {
                    "r": 205,
                    "g": 64,
                    "b": 0
                },
                "sectionTitleBGColor": {
                    "r": 205,
                    "g": 64,
                    "b": 0
                },
                "sectionHeaderTextColor": {
                    "r": 0,
                    "g": 0,
                    "b": 0
                },
                "sectionHeaderBGColor": {
                    "r": 230,
                    "g": 230,
                    "b": 230
                },
                "displaySectionDescriptionText": true,
                "displaySectionQuery": false
            },
            "summary": {
                "displayReportSummary": true,
                "reportSummaryText": "Report Summary",
                "summaryHeaderTextColor": {
                    "r": 205,
                    "g": 64,
                    "b": 0
                },
                "summaryHeaderBGColor": {
                    "r": 205,
                    "g": 64,
                    "b": 0
                },
                "includeSectionWithZeroResults": true,
                "summaryTableHeaderTextColor": {
                    "r": 0,
                    "g": 0,
                    "b": 0
                },
                "summaryTableHeaderBGColor": {
                    "r": 230,
                    "g": 230,
                    "b": 230
                },
                "displayReportSummaryTable": true,
                "displaySectionName": true,
                "sectionName": "Section Name",
                "displaySectionDescription": false,
                "sectionDescription": "Section Description",
                "displayQueryType": false,
                "queryType": "Section Query Type",
                "displayResultCount": true,
                "resultCount": "Result Count",
                "displayJumpTo": true,
                "jumpTo": "Jump to",
                "displayReportChart": false,
                "reportChartType": "BAR"
            }
        },
        "defaultLookNFeel": true,
        "reportDefFileName": "HIPAA_(1996)_Compliance_Assessment.xml",
        "deprecated": false,
        "deprecateMessage": ""
    }
]
API Calls

/V5/reports

/V5/reports/{reporttype}

/V5/reports/generate/{reportid}

/V5/reports/export/{reportid}

/V5/reports

/V5/reports/import

Get Reports

Description This API is used to fetch a report based on the specified report name or all the
reports from the Mojo Server or the Arista Cloud Services.
Users with the roles can call this API: superuser, administrator, operator, and viewer.
Syntax
GET <Base_URL>/reports?name=<value>

Here,

  • name

    It specifies name of the report you want to fetch. It takes a string value.
    for example :HIPAA Wireless Compliance Report. If report name not specified then it
    fetches all the reports.

Sample code
GET https://training.mojonetworks.com/new/webservice/v5/reports?
name=HIPAA Wireless Compliance Report
Request Body This API call does not require any request body parameters.
Response Body If the API call is successful, the HTTP response status is 200.
The response body contains the details of the fetched report.

Get Reports By Type

Description This API is used to fetch all reports of a specified type and from a location in
the Mojo Server or Arista Cloud Services.
Users with the roles can call this API: superuser, administrator, operator, and viewer.
Syntax
GET <Base_URL>/reports/{reporttype}?locationId=<value>

Here,

  • reporttype

    It specifies the type of report to be fetched. The applicable
    values are:

    • CUSTOM_PRIVATE
    • CUSTOM
    • COMPLIANCE
    • INCIDENT
    • INFRASTRUCTURE
    • CLIENT
    • ASSESSMENT
    • PERFORMANCE
    • INTEGRATION
  • locationId

    It specifies the ID of the location for which the reports of the specified type
    have to be fetched. It takes an integer value. To retrieve the value for location id refer Locations call.

Sample code
GET https://training.mojonetworks.com/new/webservice/v5/reports/COMPLIANCE?
locationId=1
Request Body This API call does not require any request body parameters.
Response Body If the API call is successful, the HTTP response status is 200.
The response body contains the details of all the fetched reports of the specified type and
for the specified location.

Export a Report Configuration

Description This API is used to export a report configuration based on the specified report ID
in Mojo Server or Arista Cloud Services.
Users with the roles can call this API: superuser, administrator, operator, and viewer.
Syntax
GET <Base_URL>/reports/export/{reportid}

Here,

  • reportid

    Is an integer value indicating the ID of the report whose configuration has to
    be exported. For example, 37

Sample code
GET https://training.mojonetworks.com/new/webservice/v5/reports/export/37
Request Body This API call does not require any request body parameters.
Response Body If the API call is successful, the HTTP response status is 200.
The response body contains a partial URL to access the exported report configuration.
This partial URL must be appended to:

https://<Mojo_Server_IP>/new/

Where

<Mojo_Server_IP>

is the IP address or FQDN of the Mojo Server.
If you are using Arista Cloud Services, then use the URL provided by the Mojo Networks
Support team instead of the server IP.
A sample response is as follows:

api/sfiles?id=73064a72-61aa-4b17-ab07-843f83ea7444&dwnlfnpre=null

The resulting URL to access the file is as follows:

https://training.mojonetworks.com/new/webservice/
sfiles?id=73064a72-61aa-4b17-ab07-843f83ea7444&dwnlfnpre=null

Import a Report Configuration

Description This API is used to import a report configuration in to the Mojo Server or
Arista Cloud Services.
Users with the roles can call this API: superuser, administrator, operator, and viewer.
Syntax
POST <Base_URL>/reports/import?reporttype=<Value>&reportname=<Value>

Here,

  • reporttype

    It takes a string value and the applicable values are CUSTOM and CUSTOM_PRIVATE.

  • reportname

    It takes a string value which is the name of the report. If this parameter
    is not specified, the report name in the report configuration being imported is retained.

Sample code
POST https://training.mojonetworks.com/new/webservice/V5/reports/import?
reporttype=CUSTOM
Request Body The request body accepts form-data with the key as File and you have to provide file in the value field.
Response Body If the API call is successful, the HTTP response status is 204.
The response body contains does not contain any data.

Add a Custom Report

Description This API is used to add a report in the Mojo Server or the Arista Cloud Services.
Users with the roles can call this API: superuser, administrator, operator, and viewer.
Syntax
POST <Base_URL>/reports
Sample code
POST https://training.mojonetworks.com/new/webservice/V5/reports
Request Body This API call requires the details of the report to be created, which is passed to the
report parameter in the request body. The parameter value is passed in the application/json
format. A sample section listing entry that would be appended to the Report JSON in the
request is as follows:

{
	"report": 
	{
    	...
       Report JSON

	          ...
	},
   	"sectionSettingMap":
	{
		"1": 
		{
			"listing": true,
			"summary": false
		}, 
               "2": 
                {
        	        "listing": true,
                        "summary": false
		}

	}
}
Response Body If the API call is successful, the HTTP response status is 200.
The response body contains the details of the newly added report. If the report
type is CUSTOM, the report is included under Shared Reports in Wireless Manager.
If the report type is CUSTOM_PRIVATE, the report is included under My Reports.

Generate a Report

Description This API is used to generate report based on the specified report ID, type, and
other report details in Mojo Server or Arista Cloud Services.
Users with the roles can call this API: superuser, administrator, operator, and viewer.
Syntax
GET <Base_URL>/reports/generate/{reportid}?reporttype=<value>
&info=<value>

Here,

  • reportid

    Is an integer value indicating the ID of the report to be generated.
    For example, 21. The applicable values are:

    • CUSTOM_PRIVATE
    • CUSTOM
    • COMPLIANCE
    • INCIDENT
    • INFRASTRUCTURE
    • CLIENT
    • ASSESSMENT
    • PERFORMANCE
    • INTEGRATION

    The value of the info parameter specifies additional details of the report to be generated.
    The parameter value is specified in the application/json format.

Sample code
Get https://training.mojonetworks.com/new/webservice/V5/reports/generate/21?
reporttype=”ASSESSMENT”&info=%7B%0A%09%22locationId%22%3A%20%7B
%0A%09%09%22type%22%3A%20%22locallocationid%22%2C%0A%09%09%22id
%22%3A%200%0A%09%7D%2C%0A%09%22toBeArchived%22%3A%20%22false%
22%2C%0A%09%22customToDuration%22%3A%201518603552000%2C%0A%09%
22customFromDuration%22%3A%201518257952000%2C%0A%09%22
deleteArchiveAfterDays%22%3A%2010%2C%0A%09%22reportFormat
%22%3A%20%22XML%22%0A%7D
Request Body This API call does not require any request body parameters.
Response Body If the API call is successful, the HTTP response status is 200.
The response body contains a partial URL to access the generated report.
This partial URL must be appended to:

https://<Mojo_Server_IP>/new/

Where

<Mojo_Server_IP>

is the IP address or FQDN of the Mojo Server. If you are using
Arista Cloud Services, then use the URL provided by the Mojo Networks Support team instead of
the server IP.

A sample response is as follows:

api/sfiles?id=4e10692f-df15-4d2d-9214-ba6cb4a6440b&dwnlfnpre=null

The resulting URL to access the association analytics is as follows:

https://training.mojonetworks.com/new/webservice/sfiles?
id=4e10692f-df15-4d2d-9214-ba6cb4a6440b&dwnlfnpre=null

Test APIs

Description This API is used to fetch the APs that match the specified filter criteria from the allowed locations for the logged-in user. If no filters are specified, all the APs from the allowed locations are fetched. However, this API is not supported in a server cluster environment.

Note: Do not use this API to fetch more than 100 devices. For fetching larger number of devices, consider using the Get Paged List of APs API.

User Privileges Users with the following roles can call this API: superuser, administrator, and operator.

Request Body Parameters
This API call does not require any request body parameters.

Response Body
If the API call is successful, the HTTP response status is 200. The response body contains the details of the APs that match the filter criteria. The response is in the application/json format. Click AP to view the complete detais of the JSON along with a sample output.

Error codes
If the API call is successful, the HTTP response status is 200.

Syntax
GET /devices/aps
Sample code
GET https://training.mojonetworks.com/new/webservice/v2/devices/aps
GET
https://training.mojonetworks.com/new/webservice/v2/devices/aps?macaddress=00:11:74:33:23:12&macaddress=00:11:74:45:12:21
GET
https://training.mojonetworks.com/new/webservice/v2/devices/aps?capability=49&locationid=10&locationid=12&sortcolumn=devicename&sortascending=false
URL Parameters This API call takes optional URL parameters to filter the list of APs to be fetched and the column on which the output must be sorted. AP Filter Parameters lists the parmeter names, datatypes, applicable values, and whether the results can be sorted based on the parameter.
Query Parameters This API call takes optional URL parameters to filter the list of APs to be fetched and the column on which the output must be sorted. AP Filter Parameters lists the parmeter names, datatypes, applicable values, and whether the results can be sorted based on the parameter.
Response Body If the API call is successful, the HTTP response status is 200. The response body contains the details of the APs that match the filter criteria. The response is in the application/json format. Click AP to view the complete detais of the JSON along with a sample output.