Hide Sources with De-identification
Some regions or organizations require restrictions to hide the sources of users making internet requests. To comply with these restrictions, you can hide source names when generating a report by enabling de-identification for a user. When enabled, a hash unique to that source replaces the source (identity) name.

|
You cannot enable or disable de-identification on your own account. At
least two administrators are required to use this feature and any administrator can turn it
on or off for another account.
|