You have reached the end of the Analyzer Integrated Security tutorial. To return to a section of the tutorial, use the buttons below to access the table of contents or the index. For more information about Analyzer, see the STRATEGY Analyzer Guide.