- Install Detect. See Installing Detect.
If you are upgrading your version of Detect, see Upgrade the Detect version.
- Upload threat data. See Managing threat data.
- Push the intel down to the endpoints. See Deploying intel.
- Address scan results and curate alerts. See Managing alerts.
Last updated: 3/12/2019 5:01 PM | Feedback