adam:ONE® Domain & IP Reporting
Data Collection for Neutralized Threat Reports and Dashboard Reports
Last updated: May 14, 2026
ADAMnetworks has the ability to provide Dashboard Reporting Metrics and a Neutralized Threat Report (NTR) for all known and unknown threats that have been neutralized by the adam:ONE® solution. The data used for the system to operate can be stored for processing to create an NTR. This NTR contains detailed analysis that can be used for reporting to executives or board of directors for an organization and it paints a clear picture that is easy to understand what the value of Zero Trust Connectivity is for the organization that is implementing it.
In order to provide these services, the customer consents to allowing collecting of data in our reporting system.
This report outlines the data we log related to Domains and Internet Protocol (IP) addresses through the adam:ONE® system. It is designed to be clear and concise, focusing on what data is collected, why it is collected, how it is handled, and your rights regarding its use. If you have any questions or require further clarification, please contact our support team at support@adamnet.works.
Purpose and Use of Stored Data
The primary goal of storing this data is to provide analysis and reporting of the functionality of the adam:ONE® system to the customer:
- Dashboard Domain & Traffic Reporting: User interface displaying basic feedback on system operations to the administrator.
- Policy Enforcement Motives Fulfilled: Chart of threats neutralized mapped over policy enforcement motives: Security; Content Protection; Privacy or Productivity.
- Threats Neutralized Visibility: Metrics of denying connections to malicious domains or IPs based on policy decisions of the administrator according to Policy or Zero Trust Connectivity principles.
- Security Analysis and Incident Response: Analyzing logs to investigate security incidents, such as attempted breaches, circumvention attempts or potential malicious connection attempts.
- In-depth Visibility to Defenders & Administrators: Analyzing logs to provide insight into potentially harmful connections neutralized by the adam:ONE® system.
- Performance Optimization: Monitoring traffic to domains and IPs to suggest improvements, like optimizing policy rules for faster legitimate access.
- Compliance and Reporting: Generating reports for regulatory compliance or internal audits.
- Security Research: Using data by the ADAMnetworks team for the purpose of strengthening cyber defenses and enhancing ADAMnetworks services to our customers.
Data is used solely for these service-related purposes and is not shared with third parties except in the following limited cases:
- With your explicit consent for special projects beyond the standard NTRs.
- To comply with legal obligations (e.g., court orders).
- With trusted security partners for threat intelligence to strengthen adam:ONE® service capability (data is anonymized and aggregated).
We do not sell, rent, or otherwise monetize this data.
Data Collected
With consent of the customer, the data that is already used by the solution to operate could be stored by the adam:ONE® system for use of forensics and analysis by ADAMnetworks and the Customer. The stored data is limited to what is necessary for this purpose and does not include personal identifiable information (PII) such as usernames, passwords, or any content from communications.
Key Data Elements Logged:
Domains:
- Timestamp of request
- Domain names
- Requesting IP and MAC address
- DNS responses
- Whether the request was denied or allowed
- Reason for denial if applicable
IP Packet Metadata:
- Method of denying or allowing the connection
- Timestamp of packet
- Source IP, Port and MAC
- Destination IP, Port and MAC
- Protocol
- Number of Bytes transferred
- Number of Packets
Privacy Preserved
We do not log the content of web pages, emails, or other user-generated data. No decryption is done and privacy remains intact. Logging is aggregated where possible to minimize detail while maintaining effectiveness.
Geographic Regions Where Data Is Stored
Data is stored in a secured logging endpoint — a separate database detached from the centralized controller (Brain).
Data is stored according to data sovereignty laws the customer entity is operating in:
- Canada: Stored in multiple data centers in the USA.
- USA: Stored in multiple data centers in the USA.
- KSA: Stored in multiple data centers in the KSA.
Privacy and Security Measures
We value your privacy and security. We implement the following safeguards:
- Data Minimization: Only essential data is logged, and retention is limited to reporting range needs only, after which it is securely deleted.
- Encryption: All logs are encrypted in transit and at rest using industry-standard AES protocols.
- Access Controls: Access to logs is restricted to authorized personnel on a need-to-know basis, with multi-factor authentication and audit trails.
- Anonymization: Where possible, data is anonymized to prevent re-identification.
- Compliance: Our practices align with industry standard privacy practice.
You have the right to request access to your logs, request deletion, or opt out of certain logging features (though this may affect or nullify the ability to provide reports).
Customer Approval
By continuing to use our service that includes Data Reporting as described in this Transparency Report, you acknowledge that you have reviewed the details of our data storage practices and consent to the collection, use, and storage of data as described. This approval enables us to activate or continue the adam:ONE® system's Reporting features for your account.
Important Notice
If Data Reporting is disabled, there is no method to re-capture historical data which would not be stored in the reporting system. This will nullify the ability to provide ADAMnetworks issued NTRs for any time period where Data Reporting is switched off.
Thank you for trusting ADAMnetworks with your security needs. We are committed to maintaining the highest standards of transparency and protection.
Contact Us
For more information on ADAMnetworks and our reporting practices, please contact our support team:
support@adamnet.works