Reports of events and actions that occur in a network are critical to the security administrator because they verify whether the deployed policy is working to satisfaction.

Report generation can provide a real world accounting of the security policy, and help the security administrator determine whether changes are needed to ensure a secure and problem-free network.