TLS Cipher Suite Usage

These reports summarize how TLSClosed TLS (Transport Layer Security) and its predecessor SSL (Secure Sockets Layer) are protocols for establishing authenticated and encrypted links between networked computers. is negotiated across your environment. Each report breaks down observed cipher suites, key-exchange methods, authentication algorithms, bulk ciphers (block/stream), and message authentication. Trend charts track changes over time, and a Bad TLS Ciphers Successfully Negotiated section highlights risk.

Tip:  Where to find this in the Analytics Hub portal:
Main Menu → Reports
Built-in Reports
  • All Time: Cumulative view across the full retention period.

  • End of Current Quarter: Quarter-to-date summary for audits and leadership reviews.

  • Weekly: Last 7 days.

  • Weekly, External Nets Only: Last 7 days, limited to traffic with external networks.

  • Weekly, Internal Nets Only: Last 7 days, limited to internal-to-internal traffic.

Built-in reports may be edited (including scheduling for later running), deleted, or run immediately. For details on these actions, see Report Operations.