- CheckMates
- :
- Products
- :
- Quantum
- :
- Threat Prevention
- :
- Investigative Threat Prevention Best Practices
Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×
Sign in with your Check Point UserCenter/PartnerMap account to access more great content and get a chance to win some Apple AirPods! If you don't have an account, create one now for free!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Investigative Threat Prevention Best Practices
My colleague pointed this out for us:
sk167102 Investigative Threat Prevention Best Practices
This article incorporates video tutorials that explains the best way to investigate Threat Prevention attacks in your organization and helps to identify significant events generated by your Threat Prevention environment and understand their meaning:
· Identify infected hosts and mobile devices
· Detect malicious emails.
· Learn about the attacks and the corresponding vulnerabilities in your system
· Tune your threat prevention policy based on reports
This is really great, even for hardcore threat8) hunters, check it out!
CCSP - CCSE / CCTE / CTPS / CCME / CCSM Elite / SMB Specialist
0 Replies
