This chapter helps you familiarize yourself with cognitix Threat Defender. The first topic gives an overview of the main interface components. The remaining topics explain in step-by-step instructions how to carry out basic tasks.
- The User Interface
- Discovering the Network
- Creating Static Network Objects
- Creating Dynamic Network Objects
- Creating Global Rules
- Creating Correlation Scenarios: Blocking TCP Port Scanners
- Viewing the Content of Event Tracking Tables
- Using Asset Tracking
A freshly installed Threat Defender comes with several preset behavior-based correlation scenarios, static network objects, etc. for various use cases that you can simply enable or adapt to your requirements.
For information on the basic configuration of Threat Defender, installing a license and setting up user tracking, refer to Completing the Setup.