Report Management
Wireless Manager contains various kind of reports which can be either predefined, custom, Analytics, schedules or archives. Under predefined reports, we have assessment reports, compliance reports, incident reports, device inventory, and airtight mobile client. Custom reports are the ones which are made by an individual which are also shareable. Analytics reports show us visibility and association analytics data in the form CSV downloadable format. Reports can also be scheduled in reports scheduled by me or reports scheduled for me. Archive tab contains all the archived reports that have been fetched, renamed or deleted.
Attribute | Data Type | Description |
---|---|---|
reportName | String | Name of the report that is being fetched. |
reportDescription | String | Detailed description of the report that is being fetched. |
reportType | String | Type or category of the report that is being fetched. The applicable values are:
|
reportId | int | System-generated unique ID of the report that is being fetched. |
userId | int | ID of the user who is fetching this report. |
schedule | application/json | A group of attributes related to the scheduling settings of report. The applicable values are onetime and recurring. |
displayId | int | A read-only field for internal use. |
sectionList | application/json | A list of the sections in the report that is being fetched. |
sectionList/sectionId | int | System-generated unique ID of the section of the report. |
sectionList/name | String | Name of the report section. |
sectionList/description | String | Description of the report section. |
sectionList/sectionType | application/json | The type or category of the report section that is being fetched. |
sectionList/sectionType/name | String | Name of the category. |
sectionList/sectionType/displayNameKey | String | Display name. |
sectionList/sectionType/entityList | application/json | A list of report entities such as Sensor, AP, and Client for which the section data needs to be fetched. |
sectionList/sectionType/entityList/name | String | Name of the entity. |
sectionList/display | boolean | A true or false value indicating whether the section is to be displayed. |
sectionList/entityList | application/json | Entity list associated with the section. |
sectionList/entityList/name | String | Name of the entity list associated with the section. |
sectionList/entityList/displayName | String | Display name of the entity list associated with the section. |
sectionList/entityList/attributes | String | Attributes of the entity list associated with the section. |
sectionList/entityList/entityAttributes | String | Attributes of the entity list associated with the section. |
sectionList/displayAttrs | application/json | Display attributes associated with the section. |
sectionList/displayAttrs/attributeName | String | Attribute name that will appear in the report. |
sectionList/displayAttrs/table | boolean | A true or false value indicating whether the data summary table needs to be displayed in the generated report. |
sectionList/displayAttrs/display | boolean | A true or false value indicating whether the display attribute need to be displayed in the generated report section. |
sectionList/displayAttrs/chart | String | The chart type for the report data. The applicable values are:
|
sectionList/condition | application/json | Conditions associated with the section on which the section data will be filtered. |
sectionList/condition/conditions | application/json | Conditions containing individual condtions. |
sectionList/condition/conditions/value | String | Attribute value associated with the condition. |
sectionList/condition/conditions/conditionRef | String | Operatorassociated with condtion. |
sectionList/condition/conditions/attributeRef | String | Attribute name associated with the condtion. |
lookNFeel | application/json | Description of the appearance of the generated report. |
lookNFeel/header | application/json | Description of the appearance of the header. |
lookNFeel/header/leftAlignedHeaderText | String | Text to be displayed on top left corner of PDF and HTML report. |
lookNFeel/header/rightAlignedHeaderText | String | Text to be displayed on top left corner, on right side of the leftAlingedHeaderText. |
lookNFeel/header/companyName | String | Company name on the report. |
lookNFeel/header/companyAddress | String | Company address. |
lookNFeel/header/companyWebsite | String | URL of the company Website. |
lookNFeel/header/coverPageLogoImageKey | String | Image key for logo. |
lookNFeel/header/coverPageBGImageKey | String | Key for background image on report cover. |
lookNFeel/header/headerTextColor | application/json | Header text font color used for PDF and HTML report. |
lookNFeel/header/headerTextColor/r | int | Red color value for the header text. |
lookNFeel/header/headerTextColor/g | int | Green color value for the header text. |
lookNFeel/header/headerTextColor/b | int | Blue color value in RGB for header text. |
lookNFeel/header/headerTextBGColor | application/json | A group of attributes related to the background color of the header text. |
lookNFeel/header/headerTextBGColor/r | int | Red color value in RGB for the header background color. |
lookNFeel/header/headerTextBGColor/g | int | Green color value in RGB for header background color. |
lookNFeel/header/headerTextBGColor/b | int | Blue color value in RGB for header background color. |
lookNFeel/header/titleText | String | Title text to be displayed in front of the report name in HTML report. |
lookNFeel/header/titleTextColor | application/json | A group of attributes related to the title text font color. |
lookNFeel/header/titleTextColor/r | int | Red color value in RGB for title text. |
lookNFeel/header/titleTextColor/g | int | Green color value in RGB for title text. |
lookNFeel/header/titleTextColor/b | int | Blue color value in RGB for title text. |
lookNFeel/header/titleTextBGColor | application/json | Title text background color used for PDF and HTML report. |
lookNFeel/header/titleTextBGColor/r | int | Red color value in RGB for title text background. |
lookNFeel/header/titleTextBGColor/g | int | Green color value in RGB for title text background. |
lookNFeel/header/titleTextBGColor/b | int | Blue color value in RGB for title text background. |
lookNFeel/header/displayReportGenerationInfo | boolean | A true or false value indicating whether to show the report generation information. |
lookNFeel/header/displayReportDescriptionText | boolean | A true or false value indicating whether to show report description text. |
lookNFeel/section | application/json | Look and feel attributes for each section. |
lookNFeel/section/sectionNameTitle | String | Table header name to denote section title. |
lookNFeel/section/sectionTitleTextColor | application/json | Section title text font color. |
lookNFeel/section/sectionTitleTextColor/r | int | Red color value in RGB for section title text. |
lookNFeel/section/sectionTitleTextColor/g | int | Green color value in RGB for section title text. |
lookNFeel/section/sectionTitleTextColor/b | int | Blue color value in RGB for section title text. |
lookNFeel/section/sectionTitleBGColor | application/json | A group of attributes related to the Section title text background color used for PDF and HTML reports. |
lookNFeel/section/sectionTitleBGColor/r | int | Red color value in RGB for the section title background. |
lookNFeel/section/sectionTitleBGColor/g | int | Green color value in RGB for the section title background. |
lookNFeel/section/sectionTitleBGColor/b | int | Blue color value in RGB for the section title background. |
lookNFeel/section/sectionHeaderTextColor | application/json | A group of attributes related to the Section header text color used in PDF and HTML reports. |
lookNFeel/section/sectionHeaderTextColor/r | int | Red color value in RGB for section title header text. |
lookNFeel/section/sectionHeaderTextColor/g | int | Green color value in RGB for section title header text. |
lookNFeel/section/sectionHeaderTextColor/b | int | Blue color value in RGB for section title header text. |
lookNFeel/section/sectionHeaderBGColor | application/json | A group of attributes related to the Section header background color used for PDF and HTML report. |
lookNFeel/section/sectionHeaderBGColor/r | int | Red color value in RGB for section title header background. |
lookNFeel/section/sectionHeaderBGColor/g | int | Green color value in RGB for section title header background. |
lookNFeel/section/sectionHeaderBGColor/b | int | Blue color value in RGB for section title header background. |
lookNFeel/section/displaySectionDescriptionText | boolean | A true or false value indicating whether the section description text need to be displayed. |
lookNFeel/section/displaySectionQuery | boolean | A true or false value indicating whether the section query need to be displayed. |
lookNFeel/summary | application/json | Look and feel attributes to display summary. |
lookNFeel/summary/displayReportSummary | boolean | A true or false value indicating whether the report summary needs to be shown. |
lookNFeel/summary/reportSummaryText | String | Report summary title |
lookNFeel/summary/summaryHeaderTextColor | application/json | A group of attributes related to the Summary header text color used for PDF and HTML reports |
lookNFeel/summary/summaryHeaderTextColor/r | int | Red color value in RGB for summary header. |
lookNFeel/summary/summaryHeaderTextColor/g | int | Green color value in RGB for summary header. |
lookNFeel/summary/summaryHeaderTextColor/b | int | Blue color value in RGB for summary header. |
lookNFeel/summary/summaryHeaderBGColor | application/json | A group of attributes related to the Summary header background color used for PDF and HTML report. |
lookNFeel/summary/summaryHeaderBGColor/r | int | Red color value in RGB for summary header background. |
lookNFeel/summary/summaryHeaderBGColor/g | int | Green color value in RGB for summary header background. |
lookNFeel/summary/summaryHeaderBGColor/b | int | Blue color value in RGB for summary header background. |
lookNFeel/summary/includeSectionWithZeroResults | boolean | A true or false value indicating whether to show sections with zero result. |
lookNFeel/summary/summaryTableHeaderTextColor | application/json | Summary table header text color used for PDF and HTML report. |
lookNFeel/summary/summaryTableHeaderTextColor/r | int | Red color value in RGB for the summary table header text color. |
lookNFeel/summary/summaryTableHeaderTextColor/g | int | Green color value in RGB for the summary table header text color. |
lookNFeel/summary/summaryTableHeaderTextColor/b | int | Blue color value in RGB for the summary table header text color. |
lookNFeel/summary/summaryTableHeaderBGColor | application/json | Summary table header background color used for PDF and HTML reports. |
lookNFeel/summary/summaryTableHeaderBGColor/r | int | Red color value in RGB for the summary table header background color. |
lookNFeel/summary/summaryTableHeaderBGColor/g | int | Green color value in RGB for summary table header background color. |
lookNFeel/summary/summaryTableHeaderBGColor/b | int | Blue color value in RGB for summary table header background color. |
lookNFeel/summary/displayReportSummaryTable | boolean | A true or false value indicating whether to show the report summary table . |
lookNFeel/summary/displaySectionName | boolean | A true or false value value indicating whether to the section name will appear in the report. |
lookNFeel/summary/sectionName | String | Section title text |
lookNFeel/summary/displaySectionDescription | boolean | A true or false value indicating whether the section description will appear in the report. |
lookNFeel/summary/sectionDescription | String | Section description text |
lookNFeel/summary/displayQueryType | boolean | A true or false value indicating whether to show query type. |
lookNFeel/summary/queryType | String | Section query type title |
lookNFeel/summary/displayResultCount | boolean | A true or false value indicating whether to show the result count. |
lookNFeel/summary/resultCount | String | The total result count |
lookNFeel/summary/displayJumpTo | boolean | A true or false value indicating whether to show jump to link. |
lookNFeel/summary/jumpTo | String | Jump to link title text. For e.g Jump To |
lookNFeel/summary/displayReportChart | boolean | A true or false value indicating whether to show summary charts in the report. |
lookNFeel/summary/reportChartType | String | The applicable values are:
|
defaultLookNFeel | boolean | A true or false value indicating whether to use the default look and feel configuration. |
reportDefFileName | String | Report definition file name associated with the report. |
deprecated | boolean | A true or false value indicating whether the report is deprecated or not. The default value is false. |
deprecateMessage | String | Deprecated warning message to be displayed in the PDF report. |
[ { "reportName": "HIPAA Wireless Compliance Report", "reportDescription": "\n The Health Insurance Portability and Accountability Act (HIPAA) of 1996 by the Department of Health and Human Services (DHHS), mandates that healthcare organizations must safeguard the privacy and security of patient health information transmitted electronically.\n\nHIPAA Security Rule 45 CFR seeks to control leakage of patient health data to unauthorized users. This report assesses the wireless security posture of the organization and identifies wireless vulnerabilities that may expose your organization to leakage of patient health data.\n\n1. Section 164.308(a)(1): This section requires a security management process to be set up for risk assessment and management. This HIPAA report is the first step in establishing a security management process to assess and manage the risk of patient health data leakage through wireless.\n\n2. Section 164.308(a)(6): This section requires formal documentation and response procedures to be set up to handle wireless security incidents promptly. Periodic generation and archival of this HIPAA report establishes that your organization has a formal documentation and rapid response program to handle incidents related to patient health data leakage through wireless.\n\n3. Section 164.312(e)(1): This section requires patient health data transmitted over wireless networks to be guarded against unauthorized access. Periodic generation and archival of this HIPAA report establishes that your organization has the capabilities to monitor, detect and safeguard against patient health data leakage through wireless.\n\nSince wireless environments change dynamically, it is recommended that you conduct a HIPAA wireless vulnerability assessment at least once every 15 days. Archive the HIPAA Wireless Compliance reports. Establish an ongoing wireless security program to fix the top vulnerabilities and to minimize your wireless security exposure.\n\nThe sections of this report list the wireless vulnerabilities detected in your network and the severity of security risk caused by these vulnerabilities.\n ", "reportType": "COMPLIANCE", "reportId": 3, "userId": 1, "schedule": null, "displayId": 0, "sectionList": [ { "sectionId": 1, "name": "Section 164.312(e)(1) : Guest Clients connecting to Authorized Access Point", "description": "\n Guest clients connecting to your authorized AP indicates a potential malicious attempt to break into your corporate network through the WLAN.\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "CL_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "PROTOCOL", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "SSID", "table": true, "display": true, "chart": "NONE" }, { "attributeName": "SECURITY", "table": true, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "GUEST_CLIENT", "conditionRef": "EQUALS", "attributeRef": "DEVICE_FOLDER" } ] }, { "conditions": [ { "value": "YES", "conditionRef": "EQUALS", "attributeRef": "HAD_UNAUTH_ASSOC" } ] } ] }, { "sectionId": 2, "name": "Section 164.312(e)(1) : Unauthorized Client Connections", "description": "\n Unauthorized clients connecting to your authorized AP indicates a potential malicious attempt to break into your corporate network through the WLAN. This wireless vulnerability may lead to theft of patient health data in violation of Section 164.312(e)(1).\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "AP_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "PROTOCOL", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "SSID", "table": true, "display": true, "chart": "NONE" }, { "attributeName": "SECURITY", "table": true, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "AUTHORIZED_AP", "conditionRef": "EQUALS", "attributeRef": "DEVICE_FOLDER" } ] }, { "conditions": [ { "value": "YES", "conditionRef": "EQUALS", "attributeRef": "HAD_UNAUTH_ASSOC" } ] } ] }, { "sectionId": 3, "name": "Sections 164.312(a)(1) and 164.312(e)(1) : Authorized Clients in Bridging/ICS Mode", "description": "\n Authorized Clients in Bridging/ICS mode is a severe violation of WLAN best practices.\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "CL_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "PROTOCOL", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "SSID", "table": true, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "AUTHORIZED_CLIENT", "conditionRef": "EQUALS", "attributeRef": "DEVICE_FOLDER" } ] }, { "conditions": [ { "value": "YES", "conditionRef": "EQUALS", "attributeRef": "WAS_CLIENT_BRIDGED" } ] } ] }, { "sectionId": 4, "name": "Sections 164.312(a)(1) and 164.312(e)(1) : Mis-associating Authorized Clients", "description": "\n Authorized clients that associate with an external or a threat posing AP (e.g., rogue AP) are likely bypassing your firewalls and content (URL, malware, spam) filter policies. Such misbehaving clients can lead to reduced productivity, liability for illegal content flowing through your network, or leak sensitive data. This wireless vulnerability may lead to leakage of patient health data in violation of Sections 164.312(a)(1) and 164.312(e)(1).\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "CL_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "MACADDRESS", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "PROTOCOL", "table": false, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "AUTHORIZED_CLIENT", "conditionRef": "EQUALS", "attributeRef": "DEVICE_FOLDER" } ] }, { "conditions": [ { "value": "YES", "conditionRef": "EQUALS", "attributeRef": "HAD_MISASSOC" }, { "value": "YES", "conditionRef": "EQUALS", "attributeRef": "HAD_THREATAP_CONN" }, { "value": "YES", "conditionRef": "EQUALS", "attributeRef": "HAD_AUTH_GUEST_CONN" } ] } ] }, { "sectionId": 5, "name": "Sections 164.312(a)(1) and 164.312(e)(1) : Soft Mobile Hotspot or Windows 7 Virtual WiFi APs", "description": "\n A Soft Mobile Hotspot AP is a WiFi client device such as a laptop or a smartphone operating as an access point. A Soft Mobile Hotspot AP connected to your enterprise network, for instance, through Ethernet or WiFi (using Windows 7 Virtual WiFi) can share its enterprise network access with other unauthorized devices. Using a Soft Mobile Hotspot AP as backdoor, outsiders can bypass your wired security measures and gain access to private enterprise network and sensitive data. This vulnerability can lead to theft of patient health data in violation of HIPAA Section 164.312(a)(1) and Section 164.312(e)(1).\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "CL_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "MACADDRESS", "table": false, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "YES", "conditionRef": "EQUALS", "attributeRef": "WAS_SOFT_AP" } ] } ] }, { "sectionId": 6, "name": "Section 164.312(e)(1) : Open Connections", "description": "\n Communication of your authorized devices is unprotected; your sensitive data is in the open up for grabs! This wireless vulnerability may lead to leakage of patient health data in violation of Section 164.312(e)(1).\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "CL_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "SSID", "table": true, "display": true, "chart": "NONE" }, { "attributeName": "PROTOCOL", "table": false, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "AUTHORIZED_CLIENT", "conditionRef": "EQUALS", "attributeRef": "DEVICE_FOLDER" } ] }, { "conditions": [ { "value": "INFRASTRUCTURE", "conditionRef": "EQUALS", "attributeRef": "CONNECTION_TYPE" } ] }, { "conditions": [ { "value": "OPEN", "conditionRef": "EQUALS", "attributeRef": "SECURITY" } ] } ] }, { "sectionId": 7, "name": "Section 164.312(e)(1) : WEP Connections", "description": "\n Your authorized devices are using the broken WEP encryption for communication. WEP gives a false sense of security. WEP can be easily cracked and your sensitive data can be stolen over-the-air. This wireless vulnerability may lead to leakage of patient health data in violation of Section 164.312(e)(1).\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "CL_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "SSID", "table": true, "display": true, "chart": "NONE" }, { "attributeName": "PROTOCOL", "table": false, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "AUTHORIZED_CLIENT", "conditionRef": "EQUALS", "attributeRef": "DEVICE_FOLDER" } ] }, { "conditions": [ { "value": "INFRASTRUCTURE", "conditionRef": "EQUALS", "attributeRef": "CONNECTION_TYPE" } ] }, { "conditions": [ { "value": "WEP", "conditionRef": "EQUALS", "attributeRef": "SECURITY" } ] } ] }, { "sectionId": 8, "name": "Sections 164.312(a)(1) and 164.312(e)(1) : Ad-hoc Networks", "description": "\n Authorized clients directly connecting to unauthorized clients is a major security threat; such connections open a backdoor to your network and your authorized devices may be infected with viral SSIDs. Ad hoc connections even between authorized clients should be discouraged as these connections can bypass your corporate security policies. This wireless vulnerability may lead to theft of patient health data in violation of Sections 164.312(a)(1) and 164.312(e)(1).\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "CL_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "PROTOCOL", "table": false, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "AUTHORIZED_CLIENT", "conditionRef": "EQUALS", "attributeRef": "DEVICE_FOLDER" } ] }, { "conditions": [ { "value": "YES", "conditionRef": "EQUALS", "attributeRef": "HAD_ADHOC_PARTICIPATION" } ] } ] }, { "sectionId": 9, "name": "Sections 164.312(a)(1) and 164.312(e)(1) : Honeypot Attacks", "description": "\n External APs with Authorized SSIDs are called Honeypots or Evil Twins. Honeypots can lure authorized clients into an inadvertent association, which is a major security threat. Your clients may unwittingly provide confidential information (e.g., password); the honeypot can launch a man-in-the-middle attack and insert itself into authorized communication or it can scan the client for vulnerabilities. This wireless vulnerability may lead to theft of patient health data in violation of Sections 164.312(a)(1) and 164.312(e)(1).\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "AP_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "PROTOCOL", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "SSID", "table": true, "display": true, "chart": "NONE" }, { "attributeName": "SECURITY", "table": true, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "AUTHORIZED_AP", "conditionRef": "NOT_EQUALS", "attributeRef": "DEVICE_FOLDER" } ] }, { "conditions": [ { "value": "YES", "conditionRef": "EQUALS", "attributeRef": "WAS_HONEYPOT" } ] } ] }, { "sectionId": 10, "name": "Section 164.312(e)(1) : Victims of Honeypot Attack", "description": "\n A Honeypot attack has succeeded. An unauthorized AP with authorized SSID is called Honeypot or Evil Twin. Authorized clients have connected to a Honeypot. Your clients may unwittingly provide confidential information (e.g., password); the honeypot can launch a man-in-the-middle attack and insert itself into authorized communication or it can scan the client for vulnerabilities. This wireless vulnerability may lead to theft of patient health data in violation of Section 164.312(e)(1).\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "CL_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "PROTOCOL", "table": false, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "AUTHORIZED_CLIENT", "conditionRef": "EQUALS", "attributeRef": "DEVICE_FOLDER" } ] }, { "conditions": [ { "value": "YES", "conditionRef": "EQUALS", "attributeRef": "HAD_HONEYPOT_CONN" } ] } ] }, { "sectionId": 11, "name": "Sections 164.312(a)(1), 164.312(c)(1) and 164.312(e)(1) : MAC Spoofing", "description": "\n Detection of MAC spoofing indicates that a hacker has knowledge about the MAC addresses of your authorized devices and is using it maliciously. Your network security is potentially breached or prone to a denial-of-service attack. This wireless vulnerability may lead to theft of patient health data in violation of Sections 164.312(a)(1), 164.312(c)(1) and 164.312(e)(1).\n ", "sectionType": { "name": "EVENT", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "EVENT", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "EVENT_ID", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "EVENT_LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DATE_AND_TIME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "EVENT_DETAILS", "table": false, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "320", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "489", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "601", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "820", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "989", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "502", "conditionRef": "EQUALS", "attributeRef": "EVENT" } ] } ] }, { "sectionId": 12, "name": "Section 164.312(e)(1) : WEP Cracking", "description": "\n Active WEP cracking on authorized AP was detected! This wireless vulnerability may lead to theft of patient health data in violation of Section 164.312(e)(1).\n ", "sectionType": { "name": "EVENT", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "EVENT", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "EVENT_ID", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "EVENT_LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DATE_AND_TIME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "EVENT_DETAILS", "table": false, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "500", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "501", "conditionRef": "EQUALS", "attributeRef": "EVENT" } ] } ] }, { "sectionId": 13, "name": "Section 164.312(e)(1) : Ad-hoc Mode", "description": "\n Authorized clients in ad hoc connection mode are likely infected with viral SSIDs and can inadvertently compromise the security of your entire network by accepting direct connections. Unauthorized clients can enter your network through such connections, while authorized clients can bypass your security policy control (e.g., firewalls, and URL, spam, and malware filters). This wireless vulnerability may lead to theft of patient health data in violation of Section 164.312(e)(1).\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "CL_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "MACADDRESS", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "SSID", "table": false, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "ADHOC", "conditionRef": "EQUALS", "attributeRef": "CONNECTION_TYPE" } ] }, { "conditions": [ { "value": "AUTHORIZED_CLIENT", "conditionRef": "EQUALS", "attributeRef": "DEVICE_FOLDER" } ] } ] }, { "sectionId": 14, "name": "Sections 164.312(a)(1) and 164.312(e)(1) : Rogue Access Points", "description": "\n Rogue APs are unauthorized APs that are likely to be connected to your corporate network in violation of your security policies. Outsiders can enter the corporate network using these Rogue APs as wireless backdoors. This wireless vulnerability may lead to theft of patient health data in violation of Sections 164.312(a)(1) and 164.312(e)(1).\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "AP_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "PROTOCOL", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "SSID", "table": true, "display": true, "chart": "NONE" }, { "attributeName": "SECURITY", "table": true, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "ROGUE_AP", "conditionRef": "EQUALS", "attributeRef": "DEVICE_FOLDER" } ] }, { "conditions": [ { "value": "YES", "conditionRef": "EQUALS", "attributeRef": "WAS_ACTIVE" }, { "value": "YES", "conditionRef": "EQUALS", "attributeRef": "WAS_ROGUE" } ] } ] }, { "sectionId": 15, "name": "Sections 164.312(a)(1), 164.312(c)(1) and 164.312(e)(1) : Open Authorized Access Points", "description": "\n Installing authorized APs without any security is a severe violation of WLAN best practices. An open AP is a backdoor through which malicious users can enter the network to which it is connected, eavesdrop on over-the-air data, or conduct illegal activities which may entail liability to the owner of the network. Open APs not only compromise the security of your entire network, but open your network to even inadvertent, unauthorized usage. This wireless vulnerability may lead to theft of patient health data in violation of Sections 164.312(a)(1), 164.312(c)(1) and 164.312(e)(1).\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "AP_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "PROTOCOL", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "SSID", "table": true, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "AUTHORIZED_AP", "conditionRef": "EQUALS", "attributeRef": "DEVICE_FOLDER" }, { "value": "UNCATEGORIZED_AP", "conditionRef": "EQUALS", "attributeRef": "DEVICE_FOLDER" } ] }, { "conditions": [ { "value": "AUTHORIZED_AP", "conditionRef": "EQUALS", "attributeRef": "DEVICE_FOLDER" }, { "value": "POTENTIALLY_AUTHORIZED", "conditionRef": "EQUALS", "attributeRef": "SUGGESTED_CLASSIFICATION_FOR_AP" } ] }, { "conditions": [ { "value": "OPEN", "conditionRef": "EQUALS", "attributeRef": "SECURITY" } ] }, { "conditions": [ { "value": "YES", "conditionRef": "NOT_EQUALS", "attributeRef": "IS_GUEST_AP" } ] } ] }, { "sectionId": 16, "name": "Section 164.312(e)(1) : Potential Victim of Wi-Phishing Attack", "description": "\n In Wi-Phishing, hackers use common or factory-default SSIDs to lure clients to unwittingly connect to their AP instead of the authorized WLAN. Clients probing for these common SSIDs are prime candidates for a Wi-Phishing attack. This wireless vulnerability may lead to leakage of patient health data in violation of Section 164.312(e)(1).\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "CL_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "MACADDRESS", "table": false, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "YES", "conditionRef": "EQUALS", "attributeRef": "HAD_PROBED_VUL_SSID" } ] } ] }, { "sectionId": 17, "name": "Sections 164.312(a)(1), 164.312(c)(1) and 164.312(e)(1) : WEP Authorized Access Points", "description": "\n It is well known that the Wired Equivalent Privacy (WEP) encryption is broken and can be easily exploited to steal sensitive data and possibly to enter your network. This wireless vulnerability may lead to theft of patient health data in violation of Sections 164.312(a)(1), 164.312(c)(1) and 164.312(e)(1).\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "AP_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "PROTOCOL", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "SSID", "table": true, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "AUTHORIZED_AP", "conditionRef": "EQUALS", "attributeRef": "DEVICE_FOLDER" } ] }, { "conditions": [ { "value": "WEP", "conditionRef": "EQUALS", "attributeRef": "SECURITY" } ] } ] }, { "sectionId": 18, "name": "Section 164.312(e)(1) : Unencrypted Broadcast/Multicast Traffic", "description": "\n A hacker can collect sensitive information about your network through unencrypted broadcast/multicast control traffic and use to discover other vulnerabilities or launch an attack. If you are using broadcast/multicast applications, then application data is prone to eavesdropping. This wireless vulnerability may lead to leakage of patient health data in violation of Section 164.312(e)(1).\n ", "sectionType": { "name": "EVENT", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "EVENT", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "EVENT_ID", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "EVENT_LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DATE_AND_TIME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "EVENT_DETAILS", "table": false, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "363", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "386", "conditionRef": "EQUALS", "attributeRef": "EVENT" } ] } ] }, { "sectionId": 19, "name": "Sections 164.312(a)(1) and 164.312(e)(1) : Authorized Access Points using Vulnerable SSIDs", "description": "\n An authorized AP with a commonly used (e.g., factory-default) SSID is more likely to attract attention from hackers or inadvertently from outsiders with their devices usually probing for these SSIDs. This wireless vulnerability may lead to theft of patient health data in violation of Sections 164.312(a)(1) and Section 164.312(e)(1).\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "AP_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "PROTOCOL", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "SSID", "table": true, "display": true, "chart": "NONE" }, { "attributeName": "SECURITY", "table": true, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "AUTHORIZED_AP", "conditionRef": "EQUALS", "attributeRef": "DEVICE_FOLDER" } ] }, { "conditions": [ { "value": "YES", "conditionRef": "EQUALS", "attributeRef": "HAS_VULNERABLE_SSID" } ] } ] }, { "sectionId": 20, "name": "Section 164.312(e)(1) : Misconfigured Authorized Access Points", "description": "\n Settings on an authorized AP violate your configuration policies. Policy incompliant devices may be vulnerable. This wireless vulnerability may lead to theft of patient health data in violation of Section 164.312(e)(1).\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "AP_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "PROTOCOL", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "SSID", "table": true, "display": true, "chart": "NONE" }, { "attributeName": "SECURITY", "table": true, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "AUTHORIZED_AP", "conditionRef": "EQUALS", "attributeRef": "DEVICE_FOLDER" } ] }, { "conditions": [ { "value": "OPEN", "conditionRef": "NOT_EQUALS", "attributeRef": "SECURITY" } ] }, { "conditions": [ { "value": "WEP", "conditionRef": "NOT_EQUALS", "attributeRef": "SECURITY" } ] }, { "conditions": [ { "value": "YES", "conditionRef": "EQUALS", "attributeRef": "VIOLATES_SECURITY_POLICY" } ] } ] }, { "sectionId": 21, "name": "Sections 164.308(a)(6) and 164.312(c)(1) : Denial-of-Service (DoS) Attacks", "description": "\n A denial-of-service (DoS) attack can selectively deny wireless connectivity to specific devices or can disrupt your entire WLAN. A WiFi DoS attack usually involves an unauthorized device spoofing itself as authorized and sending management messages (e.g., disassociation, deauthentication) with the fake identity, in turn disconnecting authorized devices or disallowing access to the WLAN. A response mechanism to address this vulnerability is required as per Sections 164.308(a)(6) and 164.312(c)(1).\n ", "sectionType": { "name": "EVENT", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "EVENT", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "EVENT_ID", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "EVENT_LOCATION", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DATE_AND_TIME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "EVENT_DETAILS", "table": false, "display": true, "chart": "NONE" } ], "condition": [ { "conditions": [ { "value": "251", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "471", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "252", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "472", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "253", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "473", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "254", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "255", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "475", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "256", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "476", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "257", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "477", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "259", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "260", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "480", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "261", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "481", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "262", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "482", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "263", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "483", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "265", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "266", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "299", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "391", "conditionRef": "EQUALS", "attributeRef": "EVENT" }, { "value": "499", "conditionRef": "EQUALS", "attributeRef": "EVENT" } ] } ] }, { "sectionId": 22, "name": "Categorized List of Detected Access Points", "description": "\n Access points detected in your environment and their classification.\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "AP_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION_PC", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "SECURITY", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "SSID", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "PROTOCOL", "table": false, "display": true, "chart": "NONE" } ], "condition": [] }, { "sectionId": 23, "name": "Categorized List of Detected Clients", "description": "\n Clients that were detected in your environment and their classification.\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "CL_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION_PC", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "SSID", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "PROTOCOL", "table": false, "display": true, "chart": "NONE" } ], "condition": [] }, { "sectionId": 24, "name": "List of Wireless Scanners", "description": "\n Wireless scanners that have been deployed.\n ", "sectionType": { "name": "DEVICE", "displayNameKey": null, "entityList": null }, "display": true, "entityList": [ { "name": "SN_DEVICE", "displayName": "####", "attributes": null, "entityAttributes": null } ], "displayAttrs": [ { "attributeName": "LOCATION_PC", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "DEVICE_NAME", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "MACADDRESS", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "IP_ADDRESS", "table": false, "display": true, "chart": "NONE" }, { "attributeName": "SENSOR_MODEL", "table": false, "display": true, "chart": "NONE" } ], "condition": [] } ], "lookNFeel": { "header": { "leftAlignedHeaderText": "AirTight Networks, Inc.", "companyName": "Mojo Networks, Inc.", "companyAddress": "339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043", "companyWebsite": "www.mojonetworks.com", "coverPageLogoImageKey": null, "coverPageBGImageKey": null, "rightAlignedHeaderText": "Reports-Customized", "headerTextColor": { "r": 70, "g": 70, "b": 70 }, "titleText": "Report Name", "titleTextColor": { "r": 255, "g": 255, "b": 255 }, "titleTextBGColor": { "r": 118, "g": 118, "b": 118 }, "displayReportGenerationInfo": true, "displayReportDescriptionText": true, "headerTextBGColor": { "r": 252, "g": 181, "b": 93 } }, "section": { "sectionNameTitle": "Section Name", "sectionTitleTextColor": { "r": 205, "g": 64, "b": 0 }, "sectionTitleBGColor": { "r": 205, "g": 64, "b": 0 }, "sectionHeaderTextColor": { "r": 0, "g": 0, "b": 0 }, "sectionHeaderBGColor": { "r": 230, "g": 230, "b": 230 }, "displaySectionDescriptionText": true, "displaySectionQuery": false }, "summary": { "displayReportSummary": true, "reportSummaryText": "Report Summary", "summaryHeaderTextColor": { "r": 205, "g": 64, "b": 0 }, "summaryHeaderBGColor": { "r": 205, "g": 64, "b": 0 }, "includeSectionWithZeroResults": true, "summaryTableHeaderTextColor": { "r": 0, "g": 0, "b": 0 }, "summaryTableHeaderBGColor": { "r": 230, "g": 230, "b": 230 }, "displayReportSummaryTable": true, "displaySectionName": true, "sectionName": "Section Name", "displaySectionDescription": false, "sectionDescription": "Section Description", "displayQueryType": false, "queryType": "Section Query Type", "displayResultCount": true, "resultCount": "Result Count", "displayJumpTo": true, "jumpTo": "Jump to", "displayReportChart": false, "reportChartType": "BAR" } }, "defaultLookNFeel": true, "reportDefFileName": "HIPAA_(1996)_Compliance_Assessment.xml", "deprecated": false, "deprecateMessage": "" } ]
/V5/reports
/V5/reports/{reporttype}
/V5/reports/generate/{reportid}
/V5/reports/export/{reportid}
/V5/reports
/V5/reports/import