SECTION 3: SECURITY REPORTS T WO METHODS FOR SCHEDULING SECURITY REPORTSM86 S ECURITY E VALUATION G UIDE 77• All URLs - Check this checkbox to export all URLs• Top - Specify the number of top URLs to be exportedStep C: Include the users or group in the Users frameIn the Users frame, select one of the accordions and indicate criteria to include inthe report to be generated:• By User Group - If selecting this option, choose the User Group for your reportquery results.• By Specific User - If selecting this option, enter the end user name—using the‘%’ wildcard to return multiple usernames—and then click Preview Users todisplay query results in the list box below.• By IP - If selecting this option, enter the end user IP address for filtering yourresults—using the ‘%’ wildcard to return multiple IP addresses—and then clickPreview Users to display query results in the list box below.For a Traffic Analysis or Rule Transactions report, you can narrow your searchresult by including filters:1. Click >> Filters at the bottom right of the panel to display the filter resultspanel.2. Choose a filter type from an available accordion (Policies, Rules, Action,Content Type) and indicate criteria to use in the filter:• Select one or more records from the Available list box and click add > tomove the record(s) to the Assigned list box.• Click the “Assign All” checkbox to select all records and grey-out thepanel.3. Click << Back to return to the Security Report Wizard panel.Step D: Complete information in the Email Settings frameIn the Email Settings frame:1. Enter at least one Email address and then click Add to include the emailaddress in the list box below.2. Specify the Delivery method for the email address: “To” (default), “Bcc”, or“Cc”.3. Type in the Subject for the email message.4. If you wish, enter text to be included in the Body of the message.5. Specify the Output type for the email: “E-Mail As Attachment” or “E-Mail AsLink”.