Chat now with support
Chat with Support

Change Auditor Threat Detection 7.0.1 - User Guide

Threat Detection process

 

 

 

 

Using the Threat Detection Dashboard

Deployment and installation

For detailed instructions on how to deploy and properly install Threat Detection, see the Change Auditor for Threat Detection Deployment Guide.

For information about Change Auditor system requirements, see the Change Auditor Release Notes and the Change Auditor for Threat Detection Deployment Guide.

Accessing the dashboard

Once you have deployed the Threat Detection server, configured Change Auditor for Threat Detection, and the system has analyzed 30 days of historical data to create a baseline of user behavior, you can access the Threat Detection dashboard.

Select View | Threat Detection Dashboard.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating