Activity and Compliance Reports
TrustLogix Activity and Compliance Reports provide an auditable trail of all interactions across your multi-cloud data landscape. By correlating metadata, these reports offer the observability needed to transition to a dynamic Zero-Trust security model.
Insights are delivered through dynamic visual charts and diagrams instead of static text, allowing you to identify trends—such as spikes in failed logins or clusters of inactive users—at a glance before drilling into the details.
Reports
The Reports page provides a comprehensive suite of deep-dive analytics designed to give security administrators and data owners granular visibility into usage, entitlements, and risk across the entire data estate. These reports move beyond high-level dashboard summaries, allowing users to select specific accounts, apply custom filters, and schedule reports for automated delivery. Once a scheduled or requested report is processed, it can be downloaded directly from this page for further audit or compliance use.

The available reports are categorized into four primary areas:
Usage Reports
These reports focus on user behavior and data interaction patterns to identify inefficiencies or potential security gaps.
Inactive Users Report: Lists all users who have not logged into the system for a specified number of days, helping to identify dormant accounts for cleanup.
Filtered by inactive time threshold (number of days).
Dark Data Report: Identifies data objects (tables, views, etc.) that have not been accessed within a defined timeframe, aiding in data lifecycle management and reducing the attack surface.
You can filter this report by a user-defined timeframe (e.g., 30, 60, or 90 days) to accurately identify "cold" data based on your storage and security requirements.
Classification Report: Provides a list of objects mapped to specific classifications and identifies the users who currently have access to them.
Filtered by specific classifications.
Unused Roles By Users: Lists users who have been granted roles but have not utilized them, highlighting opportunities to implement the principle of least privilege.
You can refine this report by selecting specific roles and specifying the number of days since last use (e.g., roles not used in the last 60 days) to audit exactly who is—or isn’t—utilizing high-privilege access.
Long Running User Sessions: Tracks users whose login sessions have exceeded a defined time threshold, which may indicate a security risk or orphaned processes.
You can refine this report by selecting a Session time threshold (in hours) and defining a specific Start and End Date to isolate sessions that exceed your organization’s security policy.
Snowflake Listing Consumer Usage Report: Contains the daily count of requests made by listings on the Snowflake Marketplace and data exchanges.
You can generate this report by specifying a Start Date and End Date to analyze consumption trends and request volume over a defined period.
Snowflake Data Share Consumer Report: Provides an overview of which tables are being joined together (pairs), broken down by the consumer of the data.
You can generate or filter this report by specifying a Start Date and End Date to analyze consumption trends over a chosen period.
Snowflake Secondary Roles Report: Identifies users and their roles where the default secondary role setting is set to 'ALL'.
User Activity Report: Generates a complete, detailed log of all user activities performed within a specific data source over a chosen period.
Narrow your audit by User Name(s), specific Actions, Database/Schema/Table hierarchy, and a precise Start/End Date.
Entitlement Reports
These reports provide a clear map of permissions, helping administrators understand exactly "who has access to what" across complex environments.
Entitlement Report By User: Lists all objects a specific user has been assigned access to, along with their corresponding privilege sets.
Target your audit by selecting a Data Source, specific User Name(s), and optional parameters for Object Type (e.g., Table, View) or specific Object Name(s).
Entitlement Report By Role: Details all objects assigned to specific roles and the associated privileges granted to those roles.
Target your audit by selecting a Data Source, entering specific Role Name(s), and optionally filtering by Object Type (e.g., Database, User and/or Warehouse).
Entitlement Report By Group: Provides a consolidated view of all objects and privileges assigned to specific user groups.
Refine your audit by selecting a Data Source, specifying the Group(s) to be reviewed, and optionally filtering by Object Type (e.g., User and/or Catalog).
Overlapping Privilege Analysis: Identifies instances where a user has been granted the same privileges through multiple roles for the same database, helping to simplify role hierarchies.
Target the analysis by selecting a Data Source, a specific User Name, the target Database Name, and the specific Object Privilege(s) you wish to audit.
Unused Privileges By Users: pinpoints specific users who have been granted privileges but have not actually exercised them.
Refine the report by selecting a Data Source, specifying User Name(s), choosing the Object Privilege(s) to audit, and setting the Last used (days) threshold to identify long-term inactivity.
Risk Reports
Risk Summary Report: Provides a high-level summary of risks identified by various monitoring policies, broken down by category and policy type to prioritize remediation efforts.
Generate the summary by selecting a Data Source and defining a specific Start Date and End Date to review risk trends over a chosen period.
TrustLogix Reports
Audit Report: Tracks internal administrative events within the TrustLogix platform itself, such as user logins to the portal and the creation of new access policies.
Access Policy Secured Objects: This report contains the list of objects that are secured by the access policies.
Refine the report by selecting a Data Source, a specific RBAC or ABAC Tag Policy, and the Policy Type to isolate how specific data sets are being secured.
Data Source Overview Reports
Identity Security: Identity related risks in the last 7 days which includes inactive users and overly granted roles etc.
Dark Data: Objects that have not been accessed in the last 90 days.
Shadow IT Client Tools: Tools connecting in the last 7 days that are not part of the application allow list.
Data Management: Data movement activity in the last 7 days
Data Access: Data access activity on classified objects in the last 7 days
Failed Login Activity: User login failures in the last 7 days
Last updated
Was this helpful?

