Link Search Menu Expand Document

Reports

Table of Contents

Elastio is a powerful backup solution that keeps your data safe and secure. It features continuous anti-malware and anti-ransomware protection that scans your recovery points for security threats. Additionally, Elastio performs file system checks on your recovery points to ensure there are no file system integrity issues.

You can access the results of all integrity checks performed through the Reports section of the Elastio tenant console. Elastio also offers a Compliance Reports Page where you can generate detailed reports on each ransomware, malware, and file system check performed, or more general compliance reports as required and save them in various formats.

To access the Compliance Reports Page, simply log into your Elastio Tenant and navigate to the Reports tab in the left-side menu. With Elastio, you can be sure that your backups are always in compliance with various regulations and are safeguarded against malware and ransomware attacks.

Figure 1: Compliance Reports page

Figure 1: Compliance Reports page

To run a report of a certain kind, click on the Run Report button.

Figure 2: Run Report button

Figure 2: Run Report button

Security Reports

Head over to the Security Reports page to find a handy table listing all the recovery points that were previously scanned. The table provides a wealth of information, including the date when the Integrity Scan was run against each recovery point. You’ll also see the Account ID and Regions where Cloud Connector has been deployed. It’s an easy and convenient way to keep tabs on your recovery points and ensure that they’re secure.

Figure 3: The Recovery Points table

Figure 3: The Recovery Points table

You can filter the reports by applying one of the filters from the drop-down list.

Figure 4: Reports Filter

Figure 4: Reports Filter

Applying multiple filters to the reports will show multiple results accordingly.

Figure 5: Reports Filters

Figure 5: Reports Filters

Clicking on the recovery point will display the information related to the recovery point and the protected asset.

Figure 6: Recovery Point Assets

Figure 6: Recovery Point page

Clicking on the asset will display the Integrity Malware and Ransomware Scan Results.

Figure 7: Scan Results

Figure 7: Scan Results

Alternatively, you can access the ransomware and malware check results for every recovery point checked on the per asset basis. To do so, navigate to the Assets page.

Figure 8: Assets Page layout

Figure 8: Assets Page layout

Clicking on the asset will display the list of the recovery points with their respective integrity scan status to the left. The green icon means that no malware or ransomware was identified, and if the icon is red - a vulnerability was found.

Figure 9: Assets Scan results

Figure 9: Assets Scan results

Recovery Test Reports

Want to know if your recovery points are ready to go in case of a disaster? Elastio’s Recovery Test Reports have got you covered.

Figure 10: Recovery Test Reports page

Figure 10: Recovery Test Reports page

Simply click on the “Run Report” button in the Filesystem Recovery Test Report section, and voila - a new page carrying all the file system integrity scan reports for the current month will open up. You’ll see the date that each scan was run, the origin (or recovery point) that was scanned, as well as the account number and region. And if you want even more details about a particular recovery point, just click on the recovery point ID and you’ll be taken straight to the recovery point page.

With Elastio’s Recovery Test Reports, you can rest easy knowing that your recovery points are always ready to be used at a moment’s notice.

Figure 11: Recovery Point page

Figure 11: Recovery Point page

By clicking the data item ID a pop-up will open for the recovery points where 2 or more reports are present. By selecting the file system integrity report will open the report page.

Alternatively, if the row on the Recovery Test Reports page is expanded by clicking the “+” button to the left of the date value, a new line will carry a link to view the filesystem check report. To open the report, click the “View report” link here.

Figure 12: Filesystem check report page

Figure 12: Filesystem Check Report page

Compliance reports

Keeping up with compliance regulations can be a headache, but Elastio’s got you covered. In the Compliance Reports section, you’ll find a variety of reports to help you stay on top of your backups and ensure that they’re always in compliance.

At the moment, you can access two report types: the Most Recent Backup Report and the Detailed Backup Report. But don’t worry - more report types are on the way! With Elastio’s Compliance Reports, you can rest assured that you’re always in compliance with regulations, no matter how complex they may be.

Most Recent Backup Report

By clicking on the “Run Report” button under the Most Recent Backup Report a new page will open.

Figure 13: Most Recent Backup Report selectors

Figure 13: Most Recent Backup Report selectors

You can select the time range from the drop down list or enter it manually. Additionally, you can change the report kind. Available kinds are:

  • Policy Managed EC2
  • Policy Managed EBS
  • Customer Managed EC2
  • Customer Managed EBS
  • Customer Managed Block
  • Customer Managed File
  • Customer Managed Stream

Figure 14: Most Recent Backup Report kinds

Figure 14: Most Recent Backup Report kinds

If a kind is inactive that would mean that you do not have any assets of that kind in the selected time frame.

The report can be exported in different formats. At the moment the available formats are: XLSX, DOCX and CSV.

Figure 15: Most Recent Backup Report export

Figure 15: Most Recent Backup Report export

Detailed Backup Report

If you need detailed information about your backups, click the “Run report” button under the Detailed Backup Report name in the Compliance Reports section, and a new page will open up.

On this page, you’ll see date sectors and another “Run report” button. Simply select the time frame you’re interested in, hit the button, and voila - your detailed report will be generated. It’s an easy and convenient way to get all the information you need about your backups, so you can rest easy knowing that everything is up-to-date and in compliance.

When the report is ready you will be able to download it in different formats: XLSX, DOCX and CSV.

Figure 16: Detailed Backup Report export

Figure 16: Detailed Backup Report export

AWS Ransomware and Malware Scan Detail Report

AWS Ransomware and Malware Scan Detail Report allows you to get insight into the malware and / or ransomware scans performed on the AWS assets. This report is downloaded directly to your machine in PDF format. It contains general summary representing the number of infected assets, files, affected accounts and regions etc. Additionally it contains a complete detailed list of infected assets, infected files and completed scans.

In order to generate the AWS Ransomware and Malware Scan Detail Report on the Reports page of your tenant in the Compliance Reports section press the “Run now!” button under the “AWS Ransomware and Malware Scan Detail Report”. You will be redirected to the AWS Ransomware and Malware Scan Detail Report page.

Figure 17: AWS Ransomware and Malware Scan Detail Report

Figure 17: AWS Ransomware and Malware Scan Detail Report

Select the time frame you are interested in (by default the current month is selected), then press the “Generate and Download Report” button. A file will be downloaded to your machine.

First page of this report displays a summary: number of infected assets, files and scans performed.

Figure 18: AWS Ransomware and Malware Scan Detail Report - Overview

Figure 18: AWS Ransomware and Malware Scan Detail Report - Overview

The next section of the report represents the Account Summary: Account, Protected Assets, Active Threats, Front-end Data Protected (GIB) and Cumulative Data Scanned (GIB).

Figure 19: AWS Ransomware and Malware Scan Detail Report - Account Summary

Figure 19: AWS Ransomware and Malware Scan Detail Report - Account Summary

Next section of the report is the Scanned Asset Summary. It contains Account, Region, Asset Name, Asset Type, Active Threats, From-end Date Protected (GIB), and Cumulative Data Scanned (GIB).

Figure 20: AWS Ransomware and Malware Scan Detail Report - Scanned Asset Summary

Figure 20: AWS Ransomware and Malware Scan Detail Report - Scanned Asset Summary

In the next section of the report the list of all Infected Assets can be found. They are listed in the table containing the following information: Account, Region, Asset Name, First Detected (date), Asset type and Threats (a list of malware and ransomware threats detected).

Figure 21: AWS Ransomware and Malware Scan Detail Report - Infected Assets

Figure 21: AWS Ransomware and Malware Scan Detail Report - Infected Assets

In the following section of the report Infected Files you can find a complete list of all files determined to contain malware or ransomware. Account, Region, Asset, Threat Path, Threat Name, First Detected (UTC), First Detected Recovery Point ID and Asset Type are displayed in the table.

Figure 22: AWS Ransomware and Malware Scan Detail Report - Infected Files

Figure 22: AWS Ransomware and Malware Scan Detail Report - Infected Files

The final report section Completed Scans contains a detailed list of all scans performed. It is separated by the type of the asset being scanned and contains the following fields: Scan Date, Account, Region, Asset, Asset Type, Recovery Point ID, Scan Type, Scan Status, Scanned Data (GIB), Scanned Flles, Last Clean Recovery Point.

Figure 23: AWS Ransomware and Malware Scan Detail Report - Completed Scans

Figure 23: AWS Ransomware and Malware Scan Detail Report - Completed Scans