SSH custom reports
There are three pre-configured custom reports included in the SSH produc:
-
Key Usage. This report provides information that will help you analyze the SSH keys log data that is collected and correlated with the SSH key inventory in Trust Protection Platform.
For more information, see Analyzing the Key Usage data report.
-
Network Discovery. This report provides information about the SSH devices discovered by network discovery, helping you see not only the bigger picture of your network discovery inventory, but also to highlight risks that may be present in your environment.
For more information, see Analyzing the Network Discovery report.
-
Authorized Users. This report provides information about connections between accounts, clients and hosts. This report helps you identify who has access to devices in your inventory.
For more information, see Analyzing the Authorized Clients report.