TLS Cipher Suite Usage
These reports summarize how TLS
TLS (Transport Layer Security) and its predecessor SSL (Secure Sockets Layer) are protocols for establishing authenticated and encrypted links between networked computers. is negotiated across your environment. Each report breaks down observed cipher suites, key-exchange methods, authentication algorithms, bulk ciphers (block/stream), and message authentication. Trend charts track changes over time, and a Bad TLS Ciphers Successfully Negotiated section highlights risk.
Main Menu → Reports
Built-in Reports
-
All Time: Cumulative view across the full retention period.
-
End of Current Quarter: Quarter-to-date summary for audits and leadership reviews.
-
Weekly: Last 7 days.
-
Weekly, External Nets Only: Last 7 days, limited to traffic with external networks.
-
Weekly, Internal Nets Only: Last 7 days, limited to internal-to-internal traffic.
Built-in reports may be edited (including scheduling for later running), deleted, or run immediately. For details on these actions, see Report Operations.
Was this page helpful? Provide Feedback