Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Next »

In the Reference Data Center, you can use the Reports button on the ribbon to run reports. A full history is maintained for each data record in the application. Reports show all reference data and the associated audit information. You can sort columns alphabetically, remove columns, clear a filter on a column, use Find to quickly identify items in a column, and freeze and unfreeze a column. You can use the Print or Export buttons on the ribbon to print or export a report in an Excel or CSV file format.

Data Strategy Report

The Data Strategy report provides field level information on data strategies, such as the field group, field group owner, field group release level, database, field name, table name, precision, field type, field process type, reference code name, enrichment field, data category, and approvals.
You can filter the search results by data strategy.
To run the Data Strategy report:

  1. From the Reference Desk workspace, click Securities in the left navigation.
    You see the Securities workspace with all the available securities.
  2. Click the View By drop down and select Security.
  3. Complete the required search criteria and click the Search button.
  4. You see the search results based on the criteria you selected.
  5. Select the security and click Reports.
    You see the Reports dialog box.
  6. Click Data Strategy and click OK.
  7. Click the Search button to display the results.

Release Status Detail Report

The Release Status Detail report shows the current release status at the individual security level. Information includes the security alias, release status, issue name, issue description, ticker, primary asset identifier, investment type, security type, maturity date, processing security type, asset currency, issue identifier, effective date, inactive flag, number of errors, number of warnings, number of errors and warnings, update source, update date, source, pool number, update type, alternate asset identifier, number of attachments, data strategy, and gold copy.
You can filter the search results by security, release status level, investment type, currency, data strategy, and gold copy.
To run the Release Status Detail report:

  1. From the Reference Desk workspace, click Securities in the left navigation.
  2. You see the Securities workspace with all the available securities.
  3. Click the View By drop down and select Security.
  4. Complete the required search criteria and click the Search button.
    You see the search results based on the criteria you selected.
  5. Select the security and click Reports.
    You see the Reports dialog box.
  6. Click Release Status Detail Report and click OK.
  7. Complete the required search criteria and click the Search button to display the results.

Release Status Summary Report

The Release Status Summary report shows the current release status grouped by gold copy and data strategy. Information includes the gold copy, data strategy, release status level, and number of securities.
You can filter the search results by composite source, days to look back, and data strategy.
To run the Release Status Summary report:
1.    From the Reference Desk workspace, click Securities in the left navigation.
     You see the Securities workspace with all the available securities.
2.    Click the View By drop down and select Security.
3.    Complete the required search criteria and click the Search button.
     You must specify an Effective Date. You see the search results based on the criteria you selected.
4.    Select the security and click Reports.
     You see the Reports dialog box.
5.    Click Release Status Summary Report and click OK.
6.    Complete the required search criteria and click the Search button to display the results.

Security Audit Report

The Security Audit report shows all data changes. Information includes the source, security alias, ticker, primary asset identifier, investment type, issue name, security type, coupon, maturity date, processing security type, effective date, journal type, table name, column name, field name, new value, old value, master journal instance, last modified, action, and last updated by.
You can filter search results by journal instance, source, security, investment type, security type, processing security type, update user, journal type, update type, last hours, and field identifier.
To run the Security Audit report:
1.    From the Reference Desk workspace, click Securities in the left navigation.
     You see the Securities workspace with all the available securities.
2.    Click the View By drop down and select Security.
3.    Complete the required search criteria and click the Search button.
     You must specify the Begin Date and End Date. You see the search results based on the criteria you selected.
4.    Select the security and click Reports.
     You see the Reports dialog box.
5.    Click Security Audit Report and click OK.
6.    Complete the required search criteria and click the Search button to display the results.

User Audit Report

The User Audit report shows the manual changes made to all securities and exceptions. Information includes audit type, action, security alias, user, date, issue name, investment type, processing security type, primary asset identifier, comments, start date, end date, old value, new value, source, and error code.
You can filter the search results by security, investment type, currency, and audit type. Options for audit type include authorize, auto expiration, edit xreference, no override, overlay (override), reject, release exception, security, and underlay (default).
To run the User Audit report:
1.    From the Reference Desk workspace, click Securities in the left navigation.
     You see the Securities workspace with all the available securities.
2.    Click the View By drop down and select Security.
3.    Complete the required search criteria and click the Search button.
     You see the search results based on the criteria you selected.
4.    Select the security and click Reports.
     You see the Reports dialog box.
5.    Click User Audit Report and click OK.
6.    Complete the required search criteria and click the Search button to display the results.







































 

  • No labels