Webhook technical insights
Handling webhook responses
Table 1. Response codes
This can be either an issue with the Change Auditor coordinator or the receiving server.
• Change Auditor Threat Detection Overview: This section provides information about threat detection concepts and how Change Auditor integrates with the Threat Detection server to process event data.
• Installation and Configuration: This section provides information on the required workflow, requirements, and procedures for deploying the Threat Detection server and configuring Change Auditor for threat detection.
• Threat Detection configuration commands: This section provides the PowerShell commands that you can use to manage a threat detection deployment.
Deploying Threat Detection