This section assumes that your security administrator has built the necessary filters and configured Collectors for your system.
Security Analysts
Creating Incidents
iTRAC
Correlation
For trademark and copyright information, see Legal Notices.