The following sections show how to perform various complex use cases that involve setting up correlation scenarios, creating network objects and configuring rules, among other things. They are primarily for users who are already familiar with the Threat Defender user interface.
- Using Network Segmentation
- Using Behavior-based Correlation
- Detecting MITRE ATT&CK Techniques
- Exporting Reporting Data to Elastic/ELK