{"id":22197,"date":"2023-06-08T16:10:42","date_gmt":"2023-06-09T00:10:42","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/06\/08\/news-15927\/"},"modified":"2023-06-08T16:10:42","modified_gmt":"2023-06-09T00:10:42","slug":"news-15927","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/06\/08\/news-15927\/","title":{"rendered":"Unveiling Nebula&#8217;s Report 2.0: A new approach to security reporting"},"content":{"rendered":"<p>We&#8217;re excited to announce Report 2.0, a major upgrade to our report system in Nebula. Report 2.0 is not just a cosmetic touch up&mdash;it&#8217;s a completely revamped security reporting solution designed to cater to your diverse business requirements, allowing for a more dynamic, data-driven approach to IT security.<\/p>\n<h2>Key features of Report 2.0<\/h2>\n<p>This upgrade comes as part of a three-phase solution to redefine our reporting capabilities. The core features of Report 2.0 include:<\/p>\n<ul>\n<li><strong>More Intuitive User Experience<\/strong>. The upgraded report system offers an intuitive user interface designed to lower barriers and improve visibility into your IT landscape. This feature enables you to make data-driven decisions, effectively enhancing your security approach.<\/li>\n<li><strong>Enhanced Visibility<\/strong>. The new system offers an insightful view of your security posture, demonstrating the value Malwarebytes delivers, at your preferred frequency.<\/li>\n<li><strong>Integrated Functionality<\/strong>. With the aim of lowering reliance on third-party solutions, Report 2.0 is an integrated solution with all functionalities accessible within the console.<\/li>\n<li><strong>Pre-built Report Library<\/strong>. Our new feature includes an expanded library of pre-built report widgets. This comprehensive collection addresses common use cases, complete with interpretations and recommendations, giving you a head start in your reporting tasks.<\/li>\n<\/ul>\n<h2>More formats, better customization<\/h2>\n<p>Previously, reports could only be generated in a CSV file format. They displayed various information related to detections of malware, endpoints, logged endpoint events, quarantined items, and detailed information on identified assets.<\/p>\n<p>The new system offers a more comprehensive, engaging reporting experience.<\/p>\n<p>Not just CSV files anymore, you can now generate reports in a PDF format, with charts and graphs included where applicable. Not only that, but an Excel format will be added soon.<\/p>\n<p>Reports can now be sent to multiple recipients, both console and non-console users, with the ability to include or exclude the report creator. An open text field has been also added, allowing for personalized introductions to the reports.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/easset_upload_file38425_269245_e.png\" alt=\"\" width=\"977\" height=\"677\" \/><\/p>\n<p style=\"text-align: center;\">New Report Scheduling Modal<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/easset_upload_file30747_269245_e.png\" alt=\"\" width=\"783\" height=\"868\" \/><\/p>\n<p style=\"text-align: center;\">New Email notification<\/p>\n<h2>New report types and widgets<\/h2>\n<p>Report 2.0 initially introduces the PDF format to the following existing reports as part of a phased rollout:<\/p>\n<ul>\n<li><strong>Endpoint Summary<\/strong><\/li>\n<li><strong>Software Inventory Summary<\/strong><\/li>\n<li><strong>Quarantine Summary<\/strong><\/li>\n<li><strong>Events Summary<\/strong><\/li>\n<li><strong>Detection summary<\/strong><\/li>\n<\/ul>\n<p>Each report now comes with widgets to capture specific data sets, custom date ranges, and formatted charts. These widgets offer a detailed breakdown that allows for close monitoring of potential threats and strategizing accordingly.<\/p>\n<p>For example, in the &#8216;Detection Summary&#8217; report, widgets are used to display the total detections, endpoints with the most detections, detections by group and threat category, most frequently detected threats, and detections per day.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/easset_upload_file3529_269245_e.png\" alt=\"\" width=\"592\" height=\"833\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p style=\"text-align: center;\">Detection Summary report<\/p>\n<p>From &#8216;Endpoint Summary&#8217; to &#8216;Software Inventory Summary&#8217;, &#8216;Quarantine Summary&#8217; and &#8216;Events Summary&#8217;, each report offers a comprehensive view of your security landscape.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/easset_upload_file38575_269245_e.png\" alt=\"\" width=\"566\" height=\"797\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p style=\"text-align: center;\">Endpoint Summary report<br \/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/easset_upload_file30420_269245_e.png\" alt=\"\" width=\"507\" height=\"714\" \/><\/p>\n<p style=\"text-align: center;\">Software Inventory&nbsp;report&nbsp;<\/p>\n<h2><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/easset_upload_file80183_269245_e.png\" alt=\"\" width=\"443\" height=\"623\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/h2>\n<p style=\"text-align: center;\">Quarantine summary<br \/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/easset_upload_file52011_269245_e.png\" alt=\"\" width=\"496\" height=\"698\" style=\"display: block; margin-left: auto; margin-right: auto;\" \/><\/p>\n<p style=\"text-align: center;\">Events summary<\/p>\n<h2>Onwards and upwards<\/h2>\n<p>We&#8217;re thrilled to bring this new feature to our customers, making your experience with Nebula&#8217;s reporting more effective and insightful.&nbsp;<a href=\"https:\/\/service.malwarebytes.com\/hc\/en-us\/articles\/4413799118611\">Learn more about&nbsp;<\/a><a href=\"https:\/\/service.malwarebytes.com\/hc\/en-us\/articles\/4413799118611\">Report 2.0<\/a><a href=\"https:\/\/service.malwarebytes.com\/hc\/en-us\/articles\/4413799118611\">&nbsp;here<\/a>!<\/p>\n<p>Not a current Nebula user&nbsp;interested in getting started? <a href=\"https:\/\/www.malwarebytes.com\/business\/contact-us\">Reach out for a free trial.<\/a><\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/introducing-reports-2.0\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding=\"10\">\n<tr>\n<td valign=\"top\" align=\"left\">\n<p>Categories: <a href=\"https:\/\/www.malwarebytes.com\/blog\/category\/business\" rel=\"category tag\">Business<\/a><\/p>\n<p>We&#8217;re excited to announce Report 2.0, a major upgrade to our report system in Nebula.<\/p>\n<table width=\"100%\">\n<tr>\n<td align=\"right\">\n<p><b>(<a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/introducing-reports-2.0\" title=\"Unveiling Nebula's Report 2.0: A new approach to security reporting \">Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2023\/06\/introducing-reports-2.0\">Unveiling Nebula&#8217;s Report 2.0: A new approach to security reporting <\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1001],"class_list":["post-22197","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-business"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=22197"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/22197\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=22197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=22197"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=22197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}