Search: What Do You Need Help With?
Important: This topic is for the Classic Search experience. To view the content for the Next Generation Search experience see Search.
For information on Classic experiences, see Archer Classic Experiences.
Snippet Name: search_feature_descriptionUse the Search feature to search records and generate real-time reports. Searches can be simple, just as a key word search, or complex, such as a multi-application search using multiple filter options.
On this page
I need help using the interface
Search Results
A report contains records within an application and related applications. You can refine the report by specific columns within your report.
Manage your columns in your report or tabs.
Under Options you can enable special modes such as Inline Edit.
Creating a Search
(optional) Chose fields from your records to display as part of your report.
(optional) Apply filters to fields to sort your results.
(optional) Expand to full screen where you can use inline edit to update content.
Uniquely name your report and define access.
Save as a new report, Save the existing report, or Discard changes.
I need help running searches (user)
End-users can create and save searches.
-
Creating a Chart....
I need help using a particular application or questionnaire
The Archer Help Center contains help for each Archer solution use case. Based on the application or questionnaire you're working in, use the table below to find your relevant help.
Note: Ask your admin if you're unsure of which version of a use case you're using.
Jump to: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Application or Questionnaire |
Use Case |
Help Link |
---|---|---|
Business Continuity & IT Disaster Recovery Planning |
||
Allocated Controls |
Assessments & Authorization |
|
Agency
|
Assessments & Authorization |
|
Continuous Monitoring |
||
Application Assessment |
IT Risk Management |
|
Applications
|
Audit Engagements & Workpapers |
|
Data Governance |
||
Operational Risk Management |
||
Third Party Governance |
||
Appointment |
Audit Engagements & Workpapers |
|
Article 30 Checklist |
Data Governance |
|
Assessment Campaign |
Operational Risk Management |
|
Assessment Objective Library |
Assessments & Authorization |
|
Assessment Objectives |
||
Audit Engagement
|
Audit Engagements & Workpapers |
Audit Management Help
|
Audit Planning & Quality |
||
Audit Entity
|
Audit Engagements & Workpapers |
|
Audit Planning & Quality |
||
Audit Observations |
Audit Engagements & Workpapers |
|
Audit Plan |
Audit Planning & Quality |
|
Audit Program Library |
Audit Engagements & Workpapers |
|
Audit Workpaper |
||
Authoritative Sources |
Policy Program Management |
|
Authorization Package |
Assessments & Authorization |
|
|
Audit Engagements & Workpapers |
|
Audit Planning & Quality |
||
BC/DR Plans |
Business Continuity & IT Disaster Recovery Planning |
|
BIA Archive
|
Business Impact Analysis |
|
Operational Scenario Analysis |
||
BIA Campaign
|
Business Impact Analysis |
|
Operational Scenario Analysis |
||
Breach Response Procedure Library |
Cyber Incident & Breach Response |
IT & Security Risk Management Help
|
Breach Risk Assessment |
||
Breach Tasks |
||
Business Impact Analysis
|
Business Impact Analysis |
|
Operational Scenario Analysis |
||
Business Processes
|
Audit Engagements & Workpapers |
|
Risk Assessment Management |
||
Business Impact Analysis |
||
Data Governance |
||
IT Controls Assurance |
||
Third Party Engagement |
||
Enterprise Risk Management |
||
Business Processes Assessment Data |
Operational Risk Management |
|
Business Unit
|
Business Impact Analysis |
|
ESG Management |
||
Issues Management |
||
Key Indicator Management |
||
Third Party Catalog |
||
PCI Management |
||
Certificates of Insurance |
Third Party Engagement |
|
Change Requests
|
Controls Assurance Program Management |
Regulatory & Corporate Compliance Help
|
Financial Controls Monitoring |
||
Issues Management |
||
IT Controls Assurance |
||
Policy Program Management |
||
Cloud Service |
Assessments & Authorization |
|
Company
|
Business Impact Analysis |
|
ESG Management |
||
Issues Management |
||
Key Indicator Management |
||
Third Party Catalog |
||
Compliance Engagement
|
Controls Assurance Program Management |
Regulatory & Corporate Compliance Help
|
Financial Controls Monitoring |
||
IT Controls Assurance |
||
Compliance Project |
PCI Management |
|
Compliance Scope
|
Controls Assurance Program Management |
|
IT Controls Assurance
|
IT & Security Risk Management Help
|
|
Configuration Check Results |
||
Configuration Checks |
||
Contacts
|
Audit Engagements & Workpapers |
|
Data Governance |
||
ESG Double Materiality Calculator |
||
ESG Management |
||
Incident Management |
||
Loss Event Management |
||
Operational Risk Management |
||
Third Party Catalog |
|
|
Contracts |
Third Party Catalog |
|
Control 302 Certifications |
Financial Controls Monitoring |
|
Control Assessment Data |
Operational Risk Management |
|
Control Catalog |
Assessments & Authorization |
|
Control Generator
|
Controls Assurance Program Management |
|
IT Controls Assurance |
||
Control Implementation |
Assessments & Authorization |
Public Sector Help |
Control Matrix |
PCI Management |
IT & Security Risk Management Help |
Control Overlay |
Assessments & Authorization |
|
Control Procedures
|
Controls Assurance Program Management |
|
Data Governance |
||
Financial Controls Monitoring |
||
Information Security Monitoring System |
||
IT Controls Assurance |
||
IT Risk Management |
||
PCI Management |
||
Enterprise Risk Management |
||
Control Scoping Unit
|
Audit Engagements & Workpapers |
|
Controls Assurance Program Management |
||
PCI Management |
||
Control Self Assessments
|
Controls Assurance Program Management |
|
IT Controls Assurance |
||
Control Snapshots
|
Controls Assurance Program Management |
|
IT Controls Assurance |
||
Control Standards |
Policy Program Management |
|
Corporate Global Variables |
Archer Insight |
|
Corporate Objectives |
Operational Risk Management |
|
Crisis Events |
Crisis Management |
|
Cyber Incident & Breach Response |
||
Data Identification Assessment |
Privacy Program Management |
|
Data Protection Impact Assessment |
||
Data Protection Projects |
||
Degrees and Certifications
|
Audit Planning & Quality |
|
Cyber Incident & Breach Response |
||
Department
|
Assessments & Authorization |
|
Continuous Monitoring |
||
Design Test Results
|
Controls Assurance Program Management |
|
IT Controls Assurance |
||
Device Assessment |
IT Risk Management |
|
Devices
|
Audit Engagements & Workpapers |
|
Data Governance |
||
Third Party Governance |
||
Digital Identity |
Assessments & Authorization |
|
Disclosures |
Sustainability Reporting |
|
Division
|
Business Impact Analysis |
|
ESG Management |
||
Issues Management |
||
Key Indicator Management |
||
Third Party Catalog |
||
Double Materiality Calculator |
Double Materiality Calculator |
|
Third Party Risk Management |
|
|
Engagement Types |
Third Party Catalog |
|
Engagements
|
||
Third Party Engagement |
||
Third Party Risk Management |
||
Entity Scoping Unit |
Audit Engagements & Workpapers |
|
ESG Data Gathering Programs |
ESG Management
|
|
ESG Library |
||
ESG Management System |
||
ESG Metric Results |
||
ESG Metrics |
||
ESG Organization Metrics |
||
Ethics Violations |
Incident Management
|
|
Evidence Repository
|
Audit Engagements & Workpapers |
|
Controls Assurance Program Management |
Regulatory & Corporate Compliance Help
|
|
Financial Controls Monitoring |
||
IT Controls Assurance |
||
Exception Requests |
Issues Management |
|
Expense Reports |
Audit Planning & Quality |
|
Expense Slips |
||
|
Audit Engagements & Workpapers |
|
Risk Assessment Management |
||
Assessments & Authorization |
|
|
Continuous Monitoring |
||
Data Governance |
||
ESG Management |
||
Incident Management |
||
IT Risk Management |
||
Third Party Catalog |
||
Facility Assessment |
Risk Assessment Management |
|
Findings
|
Assessments & Authorization |
|
Issues Management |
||
POA&M Management |
||
Findings Folders
|
Issues Management |
Audit Management Help |
POA&M Management |
||
Forensic Analysis |
Cyber Incident & Breach Response |
|
Fraud Assessment |
Risk Assessment Management |
|
Financial Controls Monitoring |
Regulatory & Corporate Compliance Help
|
|
General Ledger Risk Assessment |
||
|
Continuous Monitoring |
|
POA&M Management |
||
Audit Planning & Quality |
||
Impact Approval Rules |
Loss Event Management |
|
Impact Tolerances |
Operational Scenario Analysis |
|
Incident Investigations |
Cyber Incident & Breach Response |
IT & Security Risk Management Help
|
Incident Journal |
||
Incident Response Procedure Library |
||
Incident Response Procedures |
||
Incidents |
Incident Management |
|
Information Asset Assessment |
IT Risk Management |
|
Information Assets |
Data Governance |
|
Information Types |
Assessments & Authorization
|
|
Interconnections |
||
Insight Consequences |
Archer Insight
|
|
Insight Control Probability |
||
Insight Driver Probability |
||
Insight Drivers |
||
Insight Risk Event |
||
Insight Upstream Risk Probability |
||
Insurance |
Operational Risk Management |
|
Internal Audit Customer Survey |
Audit Planning & Quality |
|
Internal Audit Department Annual Review |
||
Internal Audit Quality Assurance Review Checklist |
||
Investigations |
Incident Management |
|
ISMS |
Information Security Monitoring System |
IT & Security Risk Management Help
|
ISMS Audit |
||
ISMS Controls |
||
ISMS Risks |
||
ISO 27001 Gap Analysis |
||
Crisis Management |
||
Location Based Risk Assessment |
Third Party Governance |
|
Loss Event Impacts |
Loss Event Management |
|
Loss Events |
||
|
Continuous Monitoring |
|
IT Security Vulnerabilities Program |
||
Management of Material Topics |
ESG Management |
|
Master Service Agreement |
Third Party Engagement |
|
Material Topic Identification Questionnaire |
ESG Management
|
|
Material Topic Repository |
ESG Double Materiality Calculator |
|
ESG Management |
||
Material Topic Responses |
ESG Management |
|
Materiality Assessment Campaign |
ESG Double Materiality Calculator |
|
ESG Management |
||
Metric Provider Identification Survey |
ESG Management |
|
Metrics |
Key Indicator Management |
|
Metrics Library |
||
Metrics Results |
||
Milestones |
Continuous Monitoring |
|
POA&M Management |
||
Missions |
||
Data Governance |
||
Notification History
|
Crisis Management |
|
Cyber Incident & Breach Response |
||
Notifications and Call Trees
|
Business Continuity & IT Disaster Recovery Planning |
|
Cyber Incident & Breach Response |
||
|
Assessments & Authorization |
|
Continuous Monitoring |
||
Operating Effectiveness Testing Package |
Financial Controls Monitoring |
Regulatory & Corporate Compliance Help
|
Operating Test Results
|
Controls Assurance Program Management |
|
IT Controls Assurance |
||
Operational Resilience Assessment |
Operational Scenario Analysis |
|
Operational Scenario Analysis |
||
Operational Scenario Library |
||
|
Continuous Monitoring |
|
IT Security Vulnerabilities Program |
||
PBC Documentation Requests
|
Audit Engagements & Workpapers |
|
Financial Controls Monitoring |
||
PCI 3.2.1 Self-Assessment (SAQ) |
PCI Management |
IT & Security Risk Management Help
|
PCI 4.0 Self-Assessment (SAQ) |
||
PCI Controls |
||
Plan Entity
|
Audit Engagements & Workpapers |
|
Audit Planning & Quality |
||
POA&Ms
|
Continuous Monitoring |
|
POA&M Management |
||
Policies |
Policy Program Management |
|
PPSM |
Assessments & Authorization |
Public Sector Help |
Primary Controls
|
Controls Assurance Program Management |
Regulatory & Corporate Compliance Help |
IT Controls Assurance |
||
PCI Management |
||
Privacy Impact Assessment
|
Privacy Program Management |
|
Assessments & Authorization |
Public Sector Help | |
Privacy Roles and Responsibilities |
Data Governance |
Regulatory & Corporate Compliance Help |
Privacy Threshold Analysis |
Assessments & Authorization |
|
Process Narrative Walkthrough |
Financial Controls Monitoring |
Regulatory & Corporate Compliance Help |
Process Narratives |
||
Processing Activities |
Data Governance |
|
Products and Services
|
Risk Assessment Management |
|
Operational Scenario Analysis |
||
Third Party Engagement |
|
|
Third Party Risk Management |
||
Financial Controls Monitoring |
||
Question Library
|
Audit Planning & Quality |
|
Risk Assessment Management |
||
Assessments & Authorization |
||
Controls Assurance Program Management |
||
Crisis Management |
||
Cyber Incident & Breach Response |
IT & Security Risk Management Help
|
|
IT Controls Assurance |
||
IT Risk Management |
||
PCI Management |
||
Third Party Engagement |
|
|
Third Party Risk Management |
||
Business Continuity & IT Disaster Recovery Planning |
|
|
Recovery Tasks |
||
Regulatory Communications |
Privacy Program Management |
Regulatory & Corporate Compliance Help
|
Regulatory Intelligence Items |
Corporate Obligations Management |
|
Regulatory Intelligence Review |
||
Remediation Plans |
Issues Management |
|
Requirements |
Business Continuity & IT Disaster Recovery Planning |
|
Resilience Scorecard |
Operational Scenario Analysis |
|
Resilience Threat Register
|
Business Continuity & IT Disaster Recovery Planning |
|
Operational Scenario Analysis |
||
Response Procedures |
Incident Management |
|
Retention Schedules |
Data Governance |
|
Risk Acceptance
|
Continuous Monitoring |
|
POA&M Management |
||
Risk Analysis |
PCI Management |
|
Risk Approval Assessment |
Enterprise Risk Management |
|
Risk Assessment
|
Risk Assessment Management |
|
IT Risk Management |
||
Risk Assessment Data |
Operational Risk Management |
|
Risk Generator
|
IT Risk Management |
|
Enterprise Risk Management |
Enterprise & Operational Risk Management Help
|
|
Risk Hierarchy |
||
Risk Project
|
Risk Assessment Management |
|
IT Risk Management |
||
Risk Scoping Unit |
Audit Engagements & Workpapers |
|
Risk Statements
|
IT Risk Management |
|
Enterprise Risk Management |
||
Risks (formerly Risk Register)
|
Information Security Monitoring System |
IT & Security Risk Management Help
|
IT Risk Management |
||
Operational Scenario Analysis |
||
Enterprise Risk Management |
||
Roles and Responsibilities
|
Business Continuity & IT Disaster Recovery Planning |
|
Financial Controls Monitoring |
||
Continuous Monitoring
|
|
|
Scanner and Sensor Results |
||
Scanner and Sensor Rules |
||
Scenario Results
|
Audit Engagements & Workpapers |
|
Operational Scenario Analysis |
||
Scoping Units
|
Controls Assurance Program Management |
|
IT Controls Assurance |
IT & Security Risk Management Help
|
|
Security Alerts |
Cyber Incident & Breach Response |
|
Security Controls |
||
Security Events |
||
Security Incidents |
||
Self-Assessment |
Operational Risk Management |
|
Service Interruption Results |
Operational Scenario Analysis |
|
Service Interruptions |
||
SOC Policies |
Cyber Incident & Breach Response |
|
Software
|
Continuous Monitoring |
|
POA&M Management |
||
Statement of Applicability |
Information Security Monitoring System |
|
Storage Devices |
Third Party Governance |
|
Subcontractors |
Third Party Engagement |
|
Subsystems
|
Assessments & Authorization |
|
Continuous Monitoring |
||
Supplier Request Form |
Third Party Engagement |
Third Party Governance |
Sustainability Report |
Sustainability Reporting |
|
System of Record Notice (SORN) |
Assessments & Authorization |
|
Cyber Incident & Breach Response |
IT & Security Risk Management Help
|
|
Teams |
||
Technical Control Manual Assessment |
IT Controls Assurance |
|
Technologies
|
Continuous Monitoring |
|
Third Party Governance |
||
Testing/Exercise |
Business Continuity & IT Disaster Recovery Planning |
|
Third Party Campaign |
Third Party Governance |
|
Third Party Contract Reviews |
Third Party Engagement |
|
Third Party Document Repository |
Third Party Risk Management |
|
Third Party ESG Assessment |
||
Third Party Financial Viability Assessments |
Third Party Engagement |
|
Third Party Metrics |
Third Party Governance |
|
Third Party Metrics Library |
||
Third Party Metrics Results |
||
Third Party Profile
|
Operational Scenario Analysis |
|
Third Party Catalog |
|
|
Third Party Resilience Assessment |
Third Party Risk Management |
|
Threat Assessment |
IT Risk Management |
IT & Security Risk Management Help
|
Threat Intelligence |
||
Threat Project |
||
Thresholds |
ESG Management |
|
Timesheet Tasks |
Audit Planning & Quality |
|
Training
|
Audit Planning & Quality© |
|
Cyber Incident & Breach Response |
||
Archer Insight |
||
|
Continuous Monitoring |
|
IT Security Vulnerabilities Program |
||
Vulnerability Library
|
Continuous Monitoring |
Public Sector Help |
IT Security Vulnerabilities Program |
||
Vulnerability Reference Lists
|
Continuous Monitoring |
|
IT Security Vulnerabilities Program |
IT & Security Risk Management Help | |
Vulnerability Scan Definition |
IT Security Vulnerabilities Program |
|
Vulnerability Scan Requests |
||
Vulnerability Scan Results
|
Continuous Monitoring |
|
IT Security Vulnerabilities Program |
IT & Security Risk Management Help | |
Vulnerability Tickets
|
Continuous Monitoring |
|
IT Security Vulnerabilities Program |
IT & Security Risk Management Help | |
Third Party Governance |