Getting started

  1. Install Detect. See Installing Detect.

    If you are upgrading your version of Detect, see Upgrade the Detect version.

  2. Upload threat data. See Managing threat data.
  3. Push the intel down to the endpoints. See Deploying intel.
  4. Address scan results and curate alerts. See Managing alerts.

Last updated: 9/17/2019 3:26 PM | Feedback