NOTE: This document assumes your Security Administrator has built the necessary filters and configured Collectors for your system.