- Install Detect. See Installing Detect.
If you are upgrading your version of Detect, see Upgrade the Detect version.
- Upload threat data. See Managing threat data.
- Push the intel down to the endpoints. See Deploying intel.
- Address scan results and curate alerts. See Managing alerts.
Last updated: 5/15/2018 1:06 PM | Feedback