Overview
MindFort’s reporting feature generates comprehensive, stakeholder-ready security reports that summarize your red team assessment results. These reports are designed for executives, compliance teams, and other stakeholders who need clear, actionable security insights.Generating Reports
Quick Report Generation
1
Access Reporting
Navigate to the Reporting page from the main menu.
2
Start Generation
Click “Generate Report” to open the report creation dialog.
3
Select Target
Choose the target (web application) you want to report on from the dropdown menu.
4
Confirm Generation
Click “Generate” to start the report creation process.
5
Wait for Completion
Report generation typically takes ~30 seconds. The new report will appear in your reports list.
Reports are generated based on the latest assessment results for the selected target, including all findings and remediation status.
Report Generation Time
- Typical Duration: 30 seconds for standard reports
- Factors Affecting Time: Number of findings, assessment complexity, evidence processing
- Status Updates: Real-time progress indicators during generation
- Refresh Guidance: If a report doesn’t appear after reasonable time, refresh the page
Report Management
Reports List Interface
The reporting dashboard provides comprehensive report management:Search and Organization
- Search Reports: Find specific reports by target name or date
- Sort Options: Order by generation date, target, or report type
- Filter Capabilities: Show reports for specific targets or time periods
- Bulk Selection: Select multiple reports for batch operations
Report Actions
- Download: Get PDF or other formats for sharing
- Preview: Quick view of report contents before downloading
- Delete: Remove old or unnecessary reports
- Regenerate: Create updated version with latest findings
Report Lifecycle Management
Active Reports
- Recent Generation: Newly created reports with current data
- Download Ready: Available for immediate stakeholder sharing
- Current Status: Reflects latest assessment results and remediation progress
Historical Reports
- Archive Value: Track security progress over time
- Compliance Documentation: Evidence of ongoing security efforts
- Trend Analysis: Compare security posture across time periods
- Audit Trail: Historical record for compliance and governance
Keep monthly reports for each target to demonstrate continuous security improvement to stakeholders and auditors.
Report Content and Structure
Executive Summary
Reports include high-level insights for leadership:- Security Posture Overview: Overall risk assessment and key metrics
- Critical Findings Summary: Most important issues requiring immediate attention
- Risk Score Trends: How security has improved or degraded over time
- Remediation Progress: Status of previously identified issues
Technical Details
Comprehensive information for technical teams:- Finding Breakdown: Detailed vulnerability descriptions and evidence
- Exploitability Analysis: Real-world risk assessment for each issue
- Proof-of-Concept Evidence: Screenshots and exploitation demonstrations
- Remediation Guidance: Specific technical steps to address findings
Business Impact Analysis
Context for business stakeholders:- Risk Assessment: How vulnerabilities could affect business operations
- Compliance Implications: Impact on regulatory requirements
- Resource Requirements: Effort needed for remediation
- Timeline Recommendations: Suggested priorities and deadlines
Appendices and Supporting Information
- Methodology: How the red team assessment was conducted
- Scope Definition: What was and wasn’t tested
- Technical Evidence: Detailed logs, screenshots, and exploit code
- Glossary: Definitions of technical terms for non-technical readers
Report Formats and Customization
Standard Report Formats
- PDF Reports: Professional, printable format for meetings and documentation
- Executive Summary: Condensed version focusing on business impact
- Technical Deep-Dive: Detailed technical information for development teams
- Compliance Format: Structured for regulatory and audit requirements
Customization Options
While reports are automatically generated, they include:- Target-Specific Context: Information relevant to the assessed application
- Severity-Based Organization: Findings arranged by business priority
- Evidence Integration: Screenshots and proof-of-concept seamlessly embedded
- Remediation Tracking: Progress on previously identified issues
Stakeholder Communication
Executive Presentations
Use reports effectively with leadership:- Focus on Business Impact: Lead with risk to operations and reputation
- Highlight Progress: Show improvements from previous assessments
- Resource Requests: Use findings to justify security investment
- Timeline Planning: Present realistic remediation schedules
Technical Team Coordination
Share detailed information with development teams:- Specific Fixes: Direct teams to actionable remediation steps
- Priority Queue: Help teams understand which issues to address first
- Evidence Review: Provide proof-of-concept for understanding vulnerabilities
- Progress Tracking: Document remediation efforts and validation
Compliance and Audit
Leverage reports for regulatory requirements:- Regular Assessment Evidence: Demonstrate ongoing security monitoring
- Remediation Documentation: Show systematic approach to vulnerability management
- Trend Analysis: Prove continuous improvement in security posture
- Third-Party Validation: Use red team evidence for external audit requirements
Ensure reports containing sensitive security information are handled according to your organization’s data classification policies.
Best Practices
Regular Reporting Cadence
Monthly Reports
- Standard Frequency: Generate monthly reports for each critical target
- Trend Tracking: Compare month-over-month security improvements
- Stakeholder Updates: Regular communication maintains security visibility
- Compliance Documentation: Consistent reporting supports audit requirements
Quarterly Deep Dives
- Comprehensive Analysis: Detailed reports following thorough assessments
- Strategic Planning: Input for quarterly security roadmap discussions
- Budget Justification: Evidence for security spending and resource allocation
- Board Reporting: Executive-level security posture communication
Report Organization
File Naming Convention
Storage and Access
- Secure Storage: Store reports in encrypted, access-controlled locations
- Version Control: Keep historical versions for trend analysis
- Access Management: Limit access based on role and need-to-know
- Retention Policy: Define how long to maintain historical reports
Distribution Strategy
Stakeholder-Specific Sharing
- Executives: Focus on executive summary and business impact sections
- Development Teams: Provide full technical details and remediation guidance
- Compliance Teams: Share methodology, scope, and remediation tracking
- Third Parties: Create sanitized versions removing sensitive internal details
Troubleshooting
Report Generation Issues
Report Not Appearing
Solutions:- Wait the full ~30 seconds for generation to complete
- Refresh the page to update the reports list
- Check that the selected target has recent assessment data
- Try generating for a different target to test system functionality
Generation Taking Too Long
Possible Causes:- Large number of findings requiring processing
- Complex evidence compilation (many screenshots/proof-of-concept)
- System load during peak usage times
- Network connectivity issues
- Wait up to 2-3 minutes for complex reports
- Try again during off-peak hours
- Contact support if delays persist beyond expected timeframes
Download Problems
Download Fails or Corrupts
Solutions:- Check browser popup/download settings
- Disable ad blockers that might interfere with downloads
- Try a different browser or incognito/private mode
- Ensure stable internet connection during download
- Clear browser cache and try again
File Size Issues
Considerations:- Reports with extensive evidence may be large files
- Ensure sufficient local storage space
- Consider network bandwidth for large downloads
- Break large distributions into smaller, targeted reports
Content Issues
Missing Information
Check:- Target has completed assessments to report on
- Selected target is correct
- Recent assessment data is available
- All findings have been processed and validated
Outdated Information
Remember:- Reports reflect assessment data at time of generation
- Run new assessments before generating updated reports
- Regenerate reports after significant remediation efforts
- Historical reports intentionally show point-in-time status
Access and Permission Issues
Cannot Generate Reports
Possible Causes:- Insufficient user permissions for reporting
- Target access restrictions
- Subscription plan limitations
- Organizational policy restrictions
- Contact your organization administrator
- Verify your user role includes reporting permissions
- Check if target is assigned to your user account
- Review subscription plan features and limitations