Chat now with support
Chat with Support

Change Auditor Threat Detection 7.2 - User Guide

Risk scoring

Each alert is assigned a risk score based on the criticality of its threat indicators. All the alerts that have been identified for each user are combined to produce an overall user risk score that reflects how risky or suspicious that user is. To ensure that only highly suspicious patterns of activity are highlighted and more innocuous alerts are suppressed, risk scoring is applied at four different stages.

 

Threat Detection process

Threat Detection process includes the following steps:

 

 

 

 

Using the Threat Detection Dashboard

Deployment and installation

For detailed instructions on how to deploy and properly install Threat Detection, see the Change Auditor for Threat Detection Deployment Guide.

For information about Change Auditor system requirements, see the Change Auditor Release Notes and the Change Auditor for Threat Detection Deployment Guide.

Related Documents
Change Auditor Threat Detection - 7.2
Deployment Guide
User Guide
Showing 1 to 2 of 2 rows

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating