SlideShare a Scribd company logo
Security Report -
Roles, Memberships, Members & Expanded Members
Report of Roles, Memberships,
Members and Expanded
Members.
Analysis can be done for all
Namespaces or selectively by
Role, Group, etc.
Security Report
This report shows the memberships
of all Accounts in the Namespace.
Security reports for Accounts, Roles,
Groups, etc. are flexible enabling
the user to get the information needed
in a useful format.
Security Audit Report
Report of object security
grouped by object with
overridden security.
For the folder: BI Marketing.
Security Profiler
Security Profiler shows all objects that
a security object has access to.
In this example we see a summary of
objects that Duncan Reilly has access to.
The objects in the folder BI Reporting
that Duncan Reilly has access to along
with permissions for each object.

More Related Content

Similar to Cognos Security with NetVisn

Active Directory Auditing and Reporting Tool
Active Directory Auditing and Reporting ToolActive Directory Auditing and Reporting Tool
Active Directory Auditing and Reporting Tool
Vyapin Software Systems Private Limited
 
Types of Workday Reports and how to create them
Types of Workday Reports and how to create themTypes of Workday Reports and how to create them
Types of Workday Reports and how to create them
ERP Cloud Training
 
Online Training Information Security Management
Online Training Information Security ManagementOnline Training Information Security Management
Online Training Information Security Management
easy2comply
 
OBIEE Interview Questions
OBIEE Interview QuestionsOBIEE Interview Questions
OBIEE Interview Questions
mrinalsingh385
 
Data base security
Data base securityData base security
Data base security
Sara Nazir
 
Cis5205 s2-16-assignment2-specs
Cis5205 s2-16-assignment2-specsCis5205 s2-16-assignment2-specs
Cis5205 s2-16-assignment2-specs
Sandeep Ratnam
 
Satisfy Regulatory Requirements in Business Objects (GDPR, HIPAA, SOX, FISMA,...
Satisfy Regulatory Requirements in Business Objects (GDPR, HIPAA, SOX, FISMA,...Satisfy Regulatory Requirements in Business Objects (GDPR, HIPAA, SOX, FISMA,...
Satisfy Regulatory Requirements in Business Objects (GDPR, HIPAA, SOX, FISMA,...
Wiiisdom
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
Meghaj Mallick
 
Logger HIPAA CIP 1.0 Solutions Guide
Logger HIPAA CIP 1.0 Solutions GuideLogger HIPAA CIP 1.0 Solutions Guide
Logger HIPAA CIP 1.0 Solutions Guide
protect724rkeer
 
rgiampaoli.unleashinghyperion.pdf
rgiampaoli.unleashinghyperion.pdfrgiampaoli.unleashinghyperion.pdf
rgiampaoli.unleashinghyperion.pdf
Ricardo Giampaoli
 
Unleashing Hyperion Planning Security Using ODI
Unleashing Hyperion Planning Security Using ODIUnleashing Hyperion Planning Security Using ODI
Unleashing Hyperion Planning Security Using ODI
Rodrigo Radtke de Souza
 
Manage Engine Log 360
Manage Engine Log 360Manage Engine Log 360
Manage Engine Log 360
KrishnarjunaaCreatio
 
Security settings in dynamics 365 customer engagement (crm)
Security settings in dynamics 365 customer engagement (crm)Security settings in dynamics 365 customer engagement (crm)
Security settings in dynamics 365 customer engagement (crm)
Magnifez Technologies
 
National Institute of Standards and Technology (NIST) checklist
National Institute of Standards and Technology (NIST) checklistNational Institute of Standards and Technology (NIST) checklist
National Institute of Standards and Technology (NIST) checklist
priyanshamadhwal2
 
NIST Cybersecurity Framework building a checklist.pdf
NIST Cybersecurity Framework building a checklist.pdfNIST Cybersecurity Framework building a checklist.pdf
NIST Cybersecurity Framework building a checklist.pdf
infosecTrain
 
NIST CHECKLIST by InfosecTrain.pdf InfosecTrain
NIST CHECKLIST by InfosecTrain.pdf InfosecTrainNIST CHECKLIST by InfosecTrain.pdf InfosecTrain
NIST CHECKLIST by InfosecTrain.pdf InfosecTrain
infosec train
 
Red Hat Summit 2017 - Red Hat Container Catalog
Red Hat Summit 2017 - Red Hat Container CatalogRed Hat Summit 2017 - Red Hat Container Catalog
Red Hat Summit 2017 - Red Hat Container Catalog
Red Hat
 
25 bi business intelligence & ad-hoc reporting
25   bi business intelligence & ad-hoc reporting25   bi business intelligence & ad-hoc reporting
25 bi business intelligence & ad-hoc reporting
mohamed refaei
 
Documentation Sample 1
Documentation Sample 1Documentation Sample 1
Documentation Sample 1
Jerry Taylor
 
Report documentation 06 03-04 - reviewed 08-06-14
Report documentation  06 03-04 - reviewed 08-06-14Report documentation  06 03-04 - reviewed 08-06-14
Report documentation 06 03-04 - reviewed 08-06-14
Envisn
 

Similar to Cognos Security with NetVisn (20)

Active Directory Auditing and Reporting Tool
Active Directory Auditing and Reporting ToolActive Directory Auditing and Reporting Tool
Active Directory Auditing and Reporting Tool
 
Types of Workday Reports and how to create them
Types of Workday Reports and how to create themTypes of Workday Reports and how to create them
Types of Workday Reports and how to create them
 
Online Training Information Security Management
Online Training Information Security ManagementOnline Training Information Security Management
Online Training Information Security Management
 
OBIEE Interview Questions
OBIEE Interview QuestionsOBIEE Interview Questions
OBIEE Interview Questions
 
Data base security
Data base securityData base security
Data base security
 
Cis5205 s2-16-assignment2-specs
Cis5205 s2-16-assignment2-specsCis5205 s2-16-assignment2-specs
Cis5205 s2-16-assignment2-specs
 
Satisfy Regulatory Requirements in Business Objects (GDPR, HIPAA, SOX, FISMA,...
Satisfy Regulatory Requirements in Business Objects (GDPR, HIPAA, SOX, FISMA,...Satisfy Regulatory Requirements in Business Objects (GDPR, HIPAA, SOX, FISMA,...
Satisfy Regulatory Requirements in Business Objects (GDPR, HIPAA, SOX, FISMA,...
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
 
Logger HIPAA CIP 1.0 Solutions Guide
Logger HIPAA CIP 1.0 Solutions GuideLogger HIPAA CIP 1.0 Solutions Guide
Logger HIPAA CIP 1.0 Solutions Guide
 
rgiampaoli.unleashinghyperion.pdf
rgiampaoli.unleashinghyperion.pdfrgiampaoli.unleashinghyperion.pdf
rgiampaoli.unleashinghyperion.pdf
 
Unleashing Hyperion Planning Security Using ODI
Unleashing Hyperion Planning Security Using ODIUnleashing Hyperion Planning Security Using ODI
Unleashing Hyperion Planning Security Using ODI
 
Manage Engine Log 360
Manage Engine Log 360Manage Engine Log 360
Manage Engine Log 360
 
Security settings in dynamics 365 customer engagement (crm)
Security settings in dynamics 365 customer engagement (crm)Security settings in dynamics 365 customer engagement (crm)
Security settings in dynamics 365 customer engagement (crm)
 
National Institute of Standards and Technology (NIST) checklist
National Institute of Standards and Technology (NIST) checklistNational Institute of Standards and Technology (NIST) checklist
National Institute of Standards and Technology (NIST) checklist
 
NIST Cybersecurity Framework building a checklist.pdf
NIST Cybersecurity Framework building a checklist.pdfNIST Cybersecurity Framework building a checklist.pdf
NIST Cybersecurity Framework building a checklist.pdf
 
NIST CHECKLIST by InfosecTrain.pdf InfosecTrain
NIST CHECKLIST by InfosecTrain.pdf InfosecTrainNIST CHECKLIST by InfosecTrain.pdf InfosecTrain
NIST CHECKLIST by InfosecTrain.pdf InfosecTrain
 
Red Hat Summit 2017 - Red Hat Container Catalog
Red Hat Summit 2017 - Red Hat Container CatalogRed Hat Summit 2017 - Red Hat Container Catalog
Red Hat Summit 2017 - Red Hat Container Catalog
 
25 bi business intelligence & ad-hoc reporting
25   bi business intelligence & ad-hoc reporting25   bi business intelligence & ad-hoc reporting
25 bi business intelligence & ad-hoc reporting
 
Documentation Sample 1
Documentation Sample 1Documentation Sample 1
Documentation Sample 1
 
Report documentation 06 03-04 - reviewed 08-06-14
Report documentation  06 03-04 - reviewed 08-06-14Report documentation  06 03-04 - reviewed 08-06-14
Report documentation 06 03-04 - reviewed 08-06-14
 

More from Envisn

Object dependency 08-06-11
Object dependency   08-06-11Object dependency   08-06-11
Object dependency 08-06-11
Envisn
 
Model package dependency - reviewed 08-06-14
Model   package dependency - reviewed 08-06-14Model   package dependency - reviewed 08-06-14
Model package dependency - reviewed 08-06-14
Envisn
 
License management reviwed 08-06-14
License management   reviwed 08-06-14License management   reviwed 08-06-14
License management reviwed 08-06-14
Envisn
 
Documentation slides model - reviewed 08-06-14
Documentation slides   model - reviewed 08-06-14Documentation slides   model - reviewed 08-06-14
Documentation slides model - reviewed 08-06-14
Envisn
 
Database Dependency with NetVisn
Database Dependency with NetVisnDatabase Dependency with NetVisn
Database Dependency with NetVisn
Envisn
 
IBM Cognos Framework Unleashed
IBM Cognos Framework UnleashedIBM Cognos Framework Unleashed
IBM Cognos Framework Unleashed
Envisn
 

More from Envisn (6)

Object dependency 08-06-11
Object dependency   08-06-11Object dependency   08-06-11
Object dependency 08-06-11
 
Model package dependency - reviewed 08-06-14
Model   package dependency - reviewed 08-06-14Model   package dependency - reviewed 08-06-14
Model package dependency - reviewed 08-06-14
 
License management reviwed 08-06-14
License management   reviwed 08-06-14License management   reviwed 08-06-14
License management reviwed 08-06-14
 
Documentation slides model - reviewed 08-06-14
Documentation slides   model - reviewed 08-06-14Documentation slides   model - reviewed 08-06-14
Documentation slides model - reviewed 08-06-14
 
Database Dependency with NetVisn
Database Dependency with NetVisnDatabase Dependency with NetVisn
Database Dependency with NetVisn
 
IBM Cognos Framework Unleashed
IBM Cognos Framework UnleashedIBM Cognos Framework Unleashed
IBM Cognos Framework Unleashed
 

Recently uploaded

一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
aguty
 
ML-PPT-UNIT-2 Generative Classifiers Discriminative Classifiers
ML-PPT-UNIT-2 Generative Classifiers Discriminative ClassifiersML-PPT-UNIT-2 Generative Classifiers Discriminative Classifiers
ML-PPT-UNIT-2 Generative Classifiers Discriminative Classifiers
MastanaihnaiduYasam
 
How To Control IO Usage using Resource Manager
How To Control IO Usage using Resource ManagerHow To Control IO Usage using Resource Manager
How To Control IO Usage using Resource Manager
Alireza Kamrani
 
Econ3060_Screen Time and Success_ final_GroupProject.pdf
Econ3060_Screen Time and Success_ final_GroupProject.pdfEcon3060_Screen Time and Success_ final_GroupProject.pdf
Econ3060_Screen Time and Success_ final_GroupProject.pdf
blueshagoo1
 
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdfreading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
perranet1
 
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
eoxhsaa
 
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
lzdvtmy8
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
bmucuha
 
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
nyvan3
 
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
agdhot
 
Overview IFM June 2024 Consumer Confidence INDEX Report.pdf
Overview IFM June 2024 Consumer Confidence INDEX Report.pdfOverview IFM June 2024 Consumer Confidence INDEX Report.pdf
Overview IFM June 2024 Consumer Confidence INDEX Report.pdf
nhutnguyen355078
 
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
Rebecca Bilbro
 
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理 原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
tzu5xla
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
ihavuls
 
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
eudsoh
 
Sid Sigma educational and problem solving power point- Six Sigma.ppt
Sid Sigma educational and problem solving power point- Six Sigma.pptSid Sigma educational and problem solving power point- Six Sigma.ppt
Sid Sigma educational and problem solving power point- Six Sigma.ppt
ArshadAyub49
 
Data Scientist Machine Learning Profiles .pdf
Data Scientist Machine Learning  Profiles .pdfData Scientist Machine Learning  Profiles .pdf
Data Scientist Machine Learning Profiles .pdf
Vineet
 
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
Timothy Spann
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
ElizabethGarrettChri
 
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
9gr6pty
 

Recently uploaded (20)

一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
 
ML-PPT-UNIT-2 Generative Classifiers Discriminative Classifiers
ML-PPT-UNIT-2 Generative Classifiers Discriminative ClassifiersML-PPT-UNIT-2 Generative Classifiers Discriminative Classifiers
ML-PPT-UNIT-2 Generative Classifiers Discriminative Classifiers
 
How To Control IO Usage using Resource Manager
How To Control IO Usage using Resource ManagerHow To Control IO Usage using Resource Manager
How To Control IO Usage using Resource Manager
 
Econ3060_Screen Time and Success_ final_GroupProject.pdf
Econ3060_Screen Time and Success_ final_GroupProject.pdfEcon3060_Screen Time and Success_ final_GroupProject.pdf
Econ3060_Screen Time and Success_ final_GroupProject.pdf
 
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdfreading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
reading_sample_sap_press_operational_data_provisioning_with_sap_bw4hana (1).pdf
 
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
 
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
一比一原版英国赫特福德大学毕业证(hertfordshire毕业证书)如何办理
 
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
一比一原版加拿大麦吉尔大学毕业证(mcgill毕业证书)如何办理
 
Overview IFM June 2024 Consumer Confidence INDEX Report.pdf
Overview IFM June 2024 Consumer Confidence INDEX Report.pdfOverview IFM June 2024 Consumer Confidence INDEX Report.pdf
Overview IFM June 2024 Consumer Confidence INDEX Report.pdf
 
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
 
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理 原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
原版一比一爱尔兰都柏林大学毕业证(UCD毕业证书)如何办理
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
一比一原版马来西亚博特拉大学毕业证(upm毕业证)如何办理
 
Sid Sigma educational and problem solving power point- Six Sigma.ppt
Sid Sigma educational and problem solving power point- Six Sigma.pptSid Sigma educational and problem solving power point- Six Sigma.ppt
Sid Sigma educational and problem solving power point- Six Sigma.ppt
 
Data Scientist Machine Learning Profiles .pdf
Data Scientist Machine Learning  Profiles .pdfData Scientist Machine Learning  Profiles .pdf
Data Scientist Machine Learning Profiles .pdf
 
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
 
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
 

Cognos Security with NetVisn

  • 1. Security Report - Roles, Memberships, Members & Expanded Members Report of Roles, Memberships, Members and Expanded Members. Analysis can be done for all Namespaces or selectively by Role, Group, etc.
  • 2. Security Report This report shows the memberships of all Accounts in the Namespace. Security reports for Accounts, Roles, Groups, etc. are flexible enabling the user to get the information needed in a useful format.
  • 3. Security Audit Report Report of object security grouped by object with overridden security. For the folder: BI Marketing.
  • 4. Security Profiler Security Profiler shows all objects that a security object has access to. In this example we see a summary of objects that Duncan Reilly has access to. The objects in the folder BI Reporting that Duncan Reilly has access to along with permissions for each object.