<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dashboard 30-day reporting - on-demand or scheduled in Mobile</title>
    <link>https://community.checkpoint.com/t5/Mobile/Dashboard-30-day-reporting-on-demand-or-scheduled/m-p/39556#M202</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Administrators can now either generate a 30-day report on-demand, or can sign-up for receiving a report at the end of every month.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The report includes:&lt;/STRONG&gt;&lt;/P&gt;&lt;TABLE class="j-table jiveBorder" style="border: 1px solid #c6c6c6;" width="100%"&gt;&lt;THEAD&gt;&lt;TR style="background-color: #efefef;"&gt;&lt;TH style="width: 17.086%;"&gt;Section Heading&lt;/TH&gt;&lt;TH style="width: 29.914%;"&gt;Section Description&lt;/TH&gt;&lt;TH style="width: 47%;"&gt;Example&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;Device Status Snapshot&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;This section gives an overview of the number of devices that are Active, Provisioned, or In-Active state at the time the report was generated.&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63507" class="image-1 jive-image j-img-centered j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63507_pastedImage_1.png" style="display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;Active Device Risk Status Snapshot&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;This section gives device risk status for all Active devices at the time the report was generated.&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63512" class="image-3 j-img-centered jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63512_pastedImage_5.png" style="width: auto; height: auto; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;Device Status Over Time&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;This section gives an overview of the number of devices Added, Activated, or Deleted over the 30-days covered by the report.&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63508" class="image-2 j-img-centered jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63508_pastedImage_3.png" style="width: auto; height: auto; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;Device Activations Over Time&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;This section gives an overview of the number of device activations (device state changed from Provisioned/User Notified to Active) over the 30-days covered by the report.&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63513" class="j-img-centered jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63513_pastedImage_7.png" style="width: auto; height: auto; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;App Installations By Risk Level&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;This section shows the total number of apps installed across all mobile devices used in your business, and the number of apps found to be at High, Medium, and Low risk over the 30-days covered by the report.&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63514" class="image-5 j-img-centered jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63514_pastedImage_9.png" style="width: 620px; height: 160px; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;App Install Over Time&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;This section shows the app installations over time over the 30-days covered by the report.&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63515" class="image-6 j-img-centered jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63515_pastedImage_1.png" style="width: 620px; height: 189px; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;Network Attacks Snapshot&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;This sections shows the total number of man-in-the-middle attacks by type that took place during the 30-days covered by the report.&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63516" class="image-7 j-img-centered jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63516_pastedImage_3.png" style="width: 204px; height: 181px; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;Network Attacks Over Time&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;This section shows the number of network attacks (man-in-the-middle) over time that took place during the 30-days covered by the report.&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63517" class="j-img-centered jive-image image-8" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63517_pastedImage_5.png" style="width: 620px; height: 278px; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;SMS Phishing Attacks Snapshot&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;This section shows the total number of SMS Phishing attacks that took place during the 30-days covered by the report.&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63519" class="j-img-centered jive-image image-10" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63519_pastedImage_9.png" style="width: 203px; height: 184px; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;SMS Phishing Attacks Over Time&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;&lt;SPAN&gt;This section shows the number of&amp;nbsp;SMS Phishing attacks over time that took place during the 30-days covered by the report.&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63518" class="image-9 j-img-centered jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63518_pastedImage_7.png" style="width: 620px; height: 278px; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;Device Security Settings Events&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;&lt;P&gt;This section shows the number of events over the 30-days covered by the report where a device was discovered to be in the following states:&lt;/P&gt;&lt;UL style="list-style-type: disc;"&gt;&lt;LI&gt;Allows Unknown App Sources&lt;/LI&gt;&lt;LI&gt;Device Data is Not Encrypted&lt;/LI&gt;&lt;LI&gt;Device is Rooted&lt;/LI&gt;&lt;LI&gt;Device installed a Network Profile&lt;/LI&gt;&lt;LI&gt;Device has USB debugging enabled&lt;/LI&gt;&lt;LI&gt;Enhanced Access Control is not enforced&lt;/LI&gt;&lt;LI&gt;Device is Jailbroken&lt;/LI&gt;&lt;LI&gt;Verified Boot disabled&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63520" class="image-11 j-img-centered jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63520_pastedImage_11.png" style="width: 500px; height: 149px; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To see an example of this report, please see &lt;A _jive_internal="true" href="https://community.checkpoint.com/servlet/JiveServlet/download/2750-5-10299/SandBlast Mobile Report.pdf"&gt;the attachment&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To create an on-demand report covering the past 30-days:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL style="padding: 0px 0px 0px 30px;"&gt;&lt;LI style="text-align: left;"&gt;Login to your Admin account on your SandBlast Mobile Dashboard, and go to your profile settings by clicking the&amp;nbsp;&lt;IMG __jive_id="63521" class="image-12 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63521_pastedImage_13.png" style="width: 38px; height: 29px;" /&gt;&amp;nbsp;icon.&lt;/LI&gt;&lt;LI style="text-align: left;"&gt;Click "Create".&lt;BR /&gt;&lt;IMG __jive_id="63524" class="image-15 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63524_pastedImage_1.png" style="width: 620px; height: 276px;" /&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To register for the end of month schedule reports:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI style="text-align: left;"&gt;Login to your Admin account on your SandBlast Mobile Dashboard, and go to your profile settings by clicking the&amp;nbsp;&lt;IMG __jive_id="63521" class="image-12 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63521_pastedImage_13.png" style="width: 38px; height: 29px;" /&gt;&amp;nbsp;icon.&lt;/LI&gt;&lt;LI style="text-align: left;"&gt;Click "Edit".&lt;BR /&gt;&lt;IMG __jive_id="63522" class="image-13 jive-image" height="269" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63522_pastedImage_14.png" width="623" /&gt;&lt;/LI&gt;&lt;LI style="text-align: left;"&gt;Move the Schedule report toggle to ON.&lt;/LI&gt;&lt;LI style="text-align: left;"&gt;Click "Save".&lt;BR /&gt;&lt;IMG __jive_id="63523" class="jive-image image-14" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63523_pastedImage_15.png" style="width: 620px; height: 247px;" /&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 07 Mar 2018 22:21:21 GMT</pubDate>
    <dc:creator>Pamela_S__Lee</dc:creator>
    <dc:date>2018-03-07T22:21:21Z</dc:date>
    <item>
      <title>Dashboard 30-day reporting - on-demand or scheduled</title>
      <link>https://community.checkpoint.com/t5/Mobile/Dashboard-30-day-reporting-on-demand-or-scheduled/m-p/39556#M202</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Administrators can now either generate a 30-day report on-demand, or can sign-up for receiving a report at the end of every month.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The report includes:&lt;/STRONG&gt;&lt;/P&gt;&lt;TABLE class="j-table jiveBorder" style="border: 1px solid #c6c6c6;" width="100%"&gt;&lt;THEAD&gt;&lt;TR style="background-color: #efefef;"&gt;&lt;TH style="width: 17.086%;"&gt;Section Heading&lt;/TH&gt;&lt;TH style="width: 29.914%;"&gt;Section Description&lt;/TH&gt;&lt;TH style="width: 47%;"&gt;Example&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;Device Status Snapshot&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;This section gives an overview of the number of devices that are Active, Provisioned, or In-Active state at the time the report was generated.&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63507" class="image-1 jive-image j-img-centered j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63507_pastedImage_1.png" style="display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;Active Device Risk Status Snapshot&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;This section gives device risk status for all Active devices at the time the report was generated.&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63512" class="image-3 j-img-centered jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63512_pastedImage_5.png" style="width: auto; height: auto; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;Device Status Over Time&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;This section gives an overview of the number of devices Added, Activated, or Deleted over the 30-days covered by the report.&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63508" class="image-2 j-img-centered jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63508_pastedImage_3.png" style="width: auto; height: auto; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;Device Activations Over Time&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;This section gives an overview of the number of device activations (device state changed from Provisioned/User Notified to Active) over the 30-days covered by the report.&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63513" class="j-img-centered jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63513_pastedImage_7.png" style="width: auto; height: auto; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;App Installations By Risk Level&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;This section shows the total number of apps installed across all mobile devices used in your business, and the number of apps found to be at High, Medium, and Low risk over the 30-days covered by the report.&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63514" class="image-5 j-img-centered jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63514_pastedImage_9.png" style="width: 620px; height: 160px; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;App Install Over Time&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;This section shows the app installations over time over the 30-days covered by the report.&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63515" class="image-6 j-img-centered jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63515_pastedImage_1.png" style="width: 620px; height: 189px; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;Network Attacks Snapshot&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;This sections shows the total number of man-in-the-middle attacks by type that took place during the 30-days covered by the report.&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63516" class="image-7 j-img-centered jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63516_pastedImage_3.png" style="width: 204px; height: 181px; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;Network Attacks Over Time&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;This section shows the number of network attacks (man-in-the-middle) over time that took place during the 30-days covered by the report.&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63517" class="j-img-centered jive-image image-8" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63517_pastedImage_5.png" style="width: 620px; height: 278px; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;SMS Phishing Attacks Snapshot&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;This section shows the total number of SMS Phishing attacks that took place during the 30-days covered by the report.&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63519" class="j-img-centered jive-image image-10" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63519_pastedImage_9.png" style="width: 203px; height: 184px; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;SMS Phishing Attacks Over Time&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;&lt;SPAN&gt;This section shows the number of&amp;nbsp;SMS Phishing attacks over time that took place during the 30-days covered by the report.&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63518" class="image-9 j-img-centered jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63518_pastedImage_7.png" style="width: 620px; height: 278px; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="text-align: left; vertical-align: top; width: 17.086%;"&gt;Device Security Settings Events&lt;/TD&gt;&lt;TD style="text-align: left; vertical-align: top; width: 29.914%;"&gt;&lt;P&gt;This section shows the number of events over the 30-days covered by the report where a device was discovered to be in the following states:&lt;/P&gt;&lt;UL style="list-style-type: disc;"&gt;&lt;LI&gt;Allows Unknown App Sources&lt;/LI&gt;&lt;LI&gt;Device Data is Not Encrypted&lt;/LI&gt;&lt;LI&gt;Device is Rooted&lt;/LI&gt;&lt;LI&gt;Device installed a Network Profile&lt;/LI&gt;&lt;LI&gt;Device has USB debugging enabled&lt;/LI&gt;&lt;LI&gt;Enhanced Access Control is not enforced&lt;/LI&gt;&lt;LI&gt;Device is Jailbroken&lt;/LI&gt;&lt;LI&gt;Verified Boot disabled&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;TD style="width: 47%;"&gt;&lt;IMG __jive_id="63520" class="image-11 j-img-centered jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63520_pastedImage_11.png" style="width: 500px; height: 149px; display: block; margin-left: auto; margin-right: auto;" /&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To see an example of this report, please see &lt;A _jive_internal="true" href="https://community.checkpoint.com/servlet/JiveServlet/download/2750-5-10299/SandBlast Mobile Report.pdf"&gt;the attachment&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To create an on-demand report covering the past 30-days:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL style="padding: 0px 0px 0px 30px;"&gt;&lt;LI style="text-align: left;"&gt;Login to your Admin account on your SandBlast Mobile Dashboard, and go to your profile settings by clicking the&amp;nbsp;&lt;IMG __jive_id="63521" class="image-12 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63521_pastedImage_13.png" style="width: 38px; height: 29px;" /&gt;&amp;nbsp;icon.&lt;/LI&gt;&lt;LI style="text-align: left;"&gt;Click "Create".&lt;BR /&gt;&lt;IMG __jive_id="63524" class="image-15 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63524_pastedImage_1.png" style="width: 620px; height: 276px;" /&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To register for the end of month schedule reports:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI style="text-align: left;"&gt;Login to your Admin account on your SandBlast Mobile Dashboard, and go to your profile settings by clicking the&amp;nbsp;&lt;IMG __jive_id="63521" class="image-12 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63521_pastedImage_13.png" style="width: 38px; height: 29px;" /&gt;&amp;nbsp;icon.&lt;/LI&gt;&lt;LI style="text-align: left;"&gt;Click "Edit".&lt;BR /&gt;&lt;IMG __jive_id="63522" class="image-13 jive-image" height="269" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63522_pastedImage_14.png" width="623" /&gt;&lt;/LI&gt;&lt;LI style="text-align: left;"&gt;Move the Schedule report toggle to ON.&lt;/LI&gt;&lt;LI style="text-align: left;"&gt;Click "Save".&lt;BR /&gt;&lt;IMG __jive_id="63523" class="jive-image image-14" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63523_pastedImage_15.png" style="width: 620px; height: 247px;" /&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 Mar 2018 22:21:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Mobile/Dashboard-30-day-reporting-on-demand-or-scheduled/m-p/39556#M202</guid>
      <dc:creator>Pamela_S__Lee</dc:creator>
      <dc:date>2018-03-07T22:21:21Z</dc:date>
    </item>
  </channel>
</rss>

