- Install Detect. See Installing Detect.
If you are upgrading your version of Detect, see Upgrade the Detect version.
- Upload threat data. See Managing threat data.
- Push the intel down to the endpoints. See Deploying intel.
- Address scan results and curate alerts. See Managing alerts.
Last updated: 8/29/2018 10:23 AM | Feedback