- Install Detect. See Installing Detect.
If you are upgrading your version of Detect, see Upgrade the Detect version.
- Upload threat data. See Managing threat data.
- Push the intel down to the endpoints. See Deploying intel.
- Address scan results and curate alerts. See Managing alerts.
Last updated: 9/17/2019 3:26 PM | Feedback