Report Highlights

The following reports are very useful for the security administrator:

  • The Connections report shows the active TCP/IP connections between remote systems as well as the level of security on each (unsecured, or secured and the level of SSL/TLS in use).

  • The Correlation report enables you to quickly search for events on a single host, which match selection criteria (such as USERCODE or STATION). This allows the security administrator to do forensic analysis of the system.

  • The DMSII Transaction report shows the DMSII actions from the sumlog.

  • The System Security Violations report shows security violations across all analyzed sumlog files.