Issues

Issues gives you a policy-driven way to continuously monitor cryptographic activity across your environment—and to decide what matters for your organization. You define Profiles that combine a Policy (how rules are enabled/weighted) with a query (scope) and a schedule (when to run). At each run, CipherInsights evaluates traffic and certificate data against your Rules (e.g., weak cipher suites, expired certificates, TLSClosed TLS (Transport Layer Security) and its predecessor SSL (Secure Sockets Layer) are protocols for establishing authenticated and encrypted links between networked computers. attributes), classifies findings by severity, and makes them available for triage and drilldown.

Start with the default profile delivered with the install, then create additional profiles for different audiences or scopes (e.g., production vs. development, internal vs. external). Use Policies to tailor which rules are enforced and at what priority; use schedules to capture on a cadence (daily by default) so you can track change over time. When you’re ready to investigate, open Issues → Results to see severity counts, filter by rule/category, and pivot directly to Evidence for context.

Tip:  Where to find this in the Analytics Hub portal:
Main Menu → Issues