You receive an email from a third-party vendor that one of their services is compromised,thevendor names a specific IP address that the compromised service was using. Where would you input this indicator to find any activity related to this IP address?
The Process Activity View provides a rows-and-columns style view of the events generated in a detection. Why might this be helpful?
How are processes on the same plane ordered (bottom 'VMTOOLSD.EXE' to top CMD.EXE')?
Aside from a Process Timeline or Event Search, how do you export process event data from a detection in .CSV format?
When reviewing a Host Timeline, which of the following filters is available?
What action is used when you want to save a prevention hash for later use?