This section assumes that your security administrator has built the necessary filters and configured Collectors for your system.
Section 15.1, Security Analysts
Section 15.2, Creating Incidents
Section 15.3, iTRAC
Section 15.4, Correlation