Support Center > Search Results > SecureKnowledge Details
Investigative Threat Prevention Best Practices Technical Level
Solution

This article incorporates video tutorials that explains the best way to investigate Threat Prevention attacks in your organization and helps to identify significant events generated by your Threat Prevention environment and understand their meaning:
·         Identify infected hosts and mobile devices
·         Detect malicious emails.
·         Learn about the attacks and the corresponding vulnerabilities in your system
·         Tune your threat prevention policy based on reports

Table of Contents

  • Threat Prevention Best Practices
  • Infected hosts
  • Malicious emails
  • Reconnaissance and Exploit
  • Mobile Devices
  • IPS Utilization

 

Threat Prevention Best Practices

 

Infected hosts

 

Malicious emails

 

Reconnaissance and Exploit

 

Mobile Devices

 

IPS Utilization

 

Related documentation:

Give us Feedback
Please rate this document
[1=Worst,5=Best]
Comment