Detect Threats
The following chapters are intended to give you some ideas on how you can detect threats to your network using cognitix Threat Defender.
Tip
A freshly installed Threat Defender comes with several preset behavior-based correlation scenarios, static network objects, etc. for various use cases that you can enable or adapt to your requirements.
Additional References:
For information on how to activate IPS rule sets in Threat Defender, see IPS Settings.
See IPS Rule Definitions on how to create custom IPS rule sets.