{"id":17438,"date":"2017-07-11T09:00:08","date_gmt":"2017-07-11T13:00:08","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=17438"},"modified":"2019-11-15T06:46:14","modified_gmt":"2019-11-15T11:46:14","slug":"kis-reports-tip","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/kis-reports-tip\/17438\/","title":{"rendered":"Tip of the week: How to create reports for technical support"},"content":{"rendered":"<p>When problems arise and you need to ask questions, you may be frustrated at being asked for technical information first. If you post on a forum or call tech support, only to be confronted with a request for an \u201capplication operation report,\u201d here\u2019s what you need to do, and why.<\/p>\n<p>An application operation report contains information about how the application works, what it does, and what causes it to crash if an error occurs. Operation reports give additional information, and they provide much more useful detail than a simple forum post like \u201cThis is not working. I need help!\u201d The reports are created for developers so that they can look into the problem and implement relevant changes in the next application releases.<\/p>\n<p>Adding the reports to inquiries will help the technical support team resolve your problem faster. In this post, we explain how to create an application operation report.<\/p>\n<h2>A report on the operation of a component<\/h2>\n<p>1. From the Settings screen of Kaspersky Internet Security 2017, go to <em>Additional \u2014 Reports and Quarantine<\/em> and select the check box next to <em>Log non-critical events<\/em>.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/07\/07122631\/report_1_en.png\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/07\/07122631\/report_1_en.png\" alt=\"Settings screen of Kaspersky Internet Security 2017\" width=\"700\" height=\"520\" class=\"aligncenter size-full wp-image-17439\"><\/a><\/p>\n<p>2. Reproduce the action that caused the error. For example, if you cannot update databases, then <a href=\"http:\/\/support.kaspersky.com\/12739?cid=blog&amp;utm_source=blog.kaspersky.com&amp;utm_medium=social&amp;utm_campaign=maria_kr_on_blog&amp;utm_content=reports_in_kis_2017_com\" target=\"_blank\" rel=\"noopener noreferrer\">start a database update<\/a>. Wait for the error to occur.<\/p>\n<p>3. In the main window of the application, select <em>More Tools \u2014 Reports \u2014 Detailed reports<\/em>.<\/p>\n<p>4. In the <em>Detailed reports<\/em> window, select the name of your component, for example, <em>Update<\/em>, and click <em>Export<\/em>.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/07\/07122637\/report_2_en.png\"><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/07\/07122637\/report_2_en.png\" alt=\"\" width=\"700\" height=\"309\" class=\"aligncenter size-full wp-image-17440\"><\/a><\/p>\n<p>5. Save the report.<\/p>\n<p>6. Uncheck the option for logging non-critical events.<\/p>\n<p>That\u2019s it: Your report is ready. The best way to create a request with information that something is not working as intended is through <a href=\"https:\/\/my.kaspersky.com\/support\/requests\/create\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">My Kaspersky<\/a>. You\u2019ll need to be registered for that.<\/p>\n<p>Other reports are reviewed in detail in this article in our <a href=\"http:\/\/support.kaspersky.com\/12994?cid=blog&amp;utm_source=blog.kaspersky.com&amp;utm_medium=social&amp;utm_campaign=maria_kr_on_blog&amp;utm_content=reports_in_kis_2017_com\" target=\"_blank\" rel=\"noopener noreferrer\">Knowledge Base<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-cyberattacks\">\n","protected":false},"excerpt":{"rendered":"<p>What a troubleshooting report is and how to create one.<\/p>\n","protected":false},"author":668,"featured_media":17441,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7,9],"tags":[882,2557,180,522,2319,567,131],"class_list":{"0":"post-17438","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-products","8":"category-tips","9":"tag-bugs","10":"tag-errors","11":"tag-kaspersky-internet-security","12":"tag-products-2","13":"tag-reports","14":"tag-technical-support-2","15":"tag-tips"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/kis-reports-tip\/17438\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/kis-reports-tip\/11765\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/kis-reports-tip\/11325\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/kis-reports-tip\/10802\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/kis-reports-tip\/13688\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/kis-reports-tip\/13726\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/kis-reports-tip\/17963\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/kis-reports-tip\/3644\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/kis-reports-tip\/9268\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/kis-reports-tip\/9549\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/kis-reports-tip\/7060\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/kis-reports-tip\/14119\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/kis-reports-tip\/16803\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/kis-reports-tip\/17574\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/kis-reports-tip\/17560\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/products-2\/","name":"products"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/668"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=17438"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17438\/revisions"}],"predecessor-version":[{"id":29951,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/17438\/revisions\/29951"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/17441"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=17438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=17438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=17438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}