This chapter helps you familiarize yourself with cognitix Threat Defender. The first topic provides an overview of the main interface components. The remaining topics explain in step-by-step instructions how to carry out basic tasks.
A freshly installed Threat Defender comes with several preset behavior-based correlation scenarios, static network objects, etc. for various use cases that you can enable or adapt to your requirements.
- The User Interface
- Discovering the Network
- Creating Static Network Objects
- Creating Dynamic Network Objects
- Creating Global Rules
- Creating Correlation Scenarios: Blocking TCP Port Scanners
- Viewing the Content of Event Tracking Tables
- Using Asset Tracking
For information on the basic configuration of Threat Defender, installing a license and setting up user tracking, refer to Completing the Setup.