Basic Usage

This chapter helps you familiarize yourself with cognitix Threat Defender. The first topic gives an overview of the main interface components. The remaining topics explain in step-by-step instructions how to carry out basic tasks.

A freshly installed Threat Defender comes with several preset behavior-based correlation scenarios, static network objects, etc. for various use cases that you can simply enable or adapt to your requirements.

Additional References:

For information on the basic configuration of Threat Defender, installing a license and setting up user tracking, refer to Completing the Setup.

results matching ""

    No results matching ""