- Install Detect. See Installing Detect.
If you are upgrading your version of Detect, see Upgrade the Detect version.
- Upload threat data. See Managing threat data.
- Push the intel down to the endpoints. See Deploying intel.
- Address scan results and curate alerts. See Managing alerts.
Last updated: 6/20/2019 11:16 AM | Feedback