The following reports are very useful for the security administrator:
-
The Connections report shows the active TCP/IP connections between remote systems as well as the level of security on each (unsecured, or secured and the level of SSL/TLS in use).
-
The Correlation report enables you to quickly search for events on a single host, which match selection criteria (such as USERCODE or STATION). This allows the security administrator to do forensic analysis of the system.
-
The DMSII Transaction report shows the DMSII actions from the sumlog.
-
The System Security Violations report shows security violations across all analyzed sumlog files.

