Software Secure Access
Activity Manage

Virtual Appliances and Granular Identity Information

If you already forward DNS requests to Secure Access, all the DNS traffic visible in your Secure Access reports come from Registered Networks. The VAs provide internal IP visibility, allowing you to track down malicious or inappropriate traffic within your network to a specific IP address.