Basic Usage

This chapter helps you familiarize yourself with cognitix Threat Defender. The first topic provides an overview of the main interface components. The remaining topics explain in step-by-step instructions how to carry out basic tasks.

Tip

A freshly installed Threat Defender comes with several preset behavior-based correlation scenarios, static network objects, etc. for various use cases that you can enable or adapt to your requirements.


Additional References:

For information on the basic configuration of Threat Defender, installing a license and setting up user tracking, refer to Completing the Setup.