CSV Reports

When a scan completes, ADG generates:

  • A Scan Report
  • An optional Shared Password Report (if that scan option was selected)

These reports can be emailed to administrators and are also written to the file system.


✉️ Email Delivery

  • Both reports can be attached to Scan Completion Emails.
  • They are delivered in CSV format.

📑 Scan Report Field Definitions

FieldDescription
startDateScan start date (format: YYYY-MM-DD HH:MM:SS).
runTypeIndicates whether the scan was Manual or Scheduled.
sAMAccountNameThe user’s sAMAccountName attribute.
userPrincipalNameThe user’s UPN.
displayNameThe user’s display name.
emailAddressThe user’s primary email address (mail attribute).
statusThe type of match detected (Exact, Banned, Fuzzy, IDLink, etc.).
actionThe remediation action applied.
actionStatusThe status of the remediation action.
spyCloudEntrySourceSiteBreach site where the record originated.
spyCloudEntrySourceDescDescription of the breach source.
exposureCountFor Password-Only matches: how many times the password appeared in SpyCloud’s dataset.
exclusionIndicates if the account matched but was excluded from remediation.
exclusionDetailsThe collection or condition that caused the exclusion.
🔎

Note: If extended AD attributes are configured, they will also be included in the Scan Report CSV.


📑 Shared Password Report Field Definitions

FieldDescription
sAMAccountNamesComma-separated list of accounts sharing the same password.
countNumber of accounts using that shared password.

📁 Report Folder for Automation

CSV reports are saved locally in:

C:\ProgramData\SpyCloud\AD Guardian\7\Reports

  • Filenames are timestamped for traceability.
  • Naming conventions:
    • Scan Report_YYYYMMDD_<ScanID>.csv
    • Shared Password Report_YYYYMMDD_<ScanID>.csv
⚠️

You will not see a Shared Password Report if that option was not selected during the scan.


🔗 Integration & Automation

These CSV files are ideal for automation pipelines. They can be ingested by:

  • SIEM tools (e.g., Splunk, Sentinel)
  • Log analytics platforms
  • SOAR workflows

Once ingested, you can:

  • Open support tickets automatically
  • Generate incidents
  • Launch playbooks to remediate matches