CyTech AQUILA - Cyber Incident Management (CIM): Reports

The Reports Dashboard provides a centralized interface for monitoring, analyzing, and reviewing security tickets and alert activity within a defined date range. It consolidates data into visual charts and categorized metrics, enabling analysts to evaluate incident trends, ticket statuses, and alert sources for more effective decision-making.

image.png

Date Range Selector

Defines the reporting period for all displayed metrics.

Functionality:

Operational Insight:

image.png

Incident Created vs Resolved

This graph shows the number of incidents created vs. resolved, depending on the selected date timeline.

image.png

Ticket Severity

This graph displays the distribution of tickets by severity level.

image.png

Ticket Category

Breaks down tickets based on their assigned category.

image.png

Ticket Status

This graph visualizes the current status of tickets to track resolution progress.

image.png

Ticket Alert Type

Provides a categorized breakdown of security alerts raised within the system. This helps analysts quickly identify the most frequent or severe types of alerts for prioritization and incident response. The feature also groups tickets by alert type and sorts them based on count, enabling analysts to focus on the most prevalent threats first.

Functionality

Analyst Use Case

image.png

Alerts Generated Count by Data Source

This section provides a breakdown of security alerts based on their originating data sources. It enables analysts to identify which systems or platforms are contributing the highest number of alerts, supporting more targeted investigation and resource allocation.

Components

Analyst Use Case

image.png

Alert Comparison: Current vs Previous Period

This section provides a comparative analysis of alerts generated during the current reporting period versus the previous period. The comparison highlights change in alert volume for specific alert types, helping analysts identify trends, anomalies, or shifts in the security landscape.

Components

Analyst Use Case

image.png

SLA

Displays Service Level Agreement (SLA) compliance, focusing on key performance metrics such as incident detection time and resolution time. This allows analysts and SOC teams to measure operational efficiency against defined service targets. The absence of data in the graph indicates that no incidents were recorded during the selected time period.

Components

Analyst Use Case

image.png

Peaks of Alerts

This visualization highlights time periods with the highest security alert activity. It provides analysts with a temporal view of alert distribution, making it easier to detect spikes, recurring trends, or unusual increases in activity. Alerts are categorized by severity levels such as Unfiltered, Low, Guarded, Elevated, High, and Severe, with corresponding counts shown for each.

By tracking alert peaks over time, this section helps security teams identify periods of heightened risk, allocate resources effectively, and prioritize investigation efforts.

image.png

Summary Incident Report

This section displays a detailed list of incidents recorded within the selected date range. Each entry includes the date of occurrence, incident title, case ID, severity level, and current status (e.g., Pending or Closed). Incidents are categorized and color-coded by severity, allowing analysts to quickly assess their criticality and prioritize response efforts.

The report also supports export functionality, enabling users to generate and share incident data for further analysis, auditing, or compliance purposes.

This structured summary ensures that all incidents are systematically tracked and monitored, providing visibility into both ongoing and resolved security events.

image.png

Create Report and My Library

The Reports module provides users with the ability to generate and manage analytical outputs for security incidents and operational performance. Within this module, two key functions are available:

image.png

image.png

Users can also see more information about the report by pressing the eye icon. In this section, they can "edit the report" or "download" it by pressing the button above. The users can also send it "via email" or "delete" the report.

image.png

Together, these functions provide both the flexibility to create new reports and the convenience of accessing saved outputs, supporting continuous monitoring, analysis, and decision-making.

Please refer to the document from the previous sub-module: CyTech AQUILA - Cyber Incident Management (CIM): Data Explorer

Please refer to the document for the next sub-module: CyTech AQUILA - Cyber Incident Management (CIM): Alert Rules

If you need further assistance, kindly contact our support at support@cytechint.com for prompt assistance and guidance.


Revision #6
Created 13 February 2026 02:10:29
Updated 17 April 2026 03:30:24