Skip to content

How to use correlation rules for effective threat detection

Photo of IT users and ManageEngine
Hosted By
IT users and M.
How to use correlation rules for effective threat detection

Details

The importance of correlating events from across the network.How correlation rules work under the hood.Differences between prebuilt and custom correlation rules.Why do you need custom correlation rules?Three use cases and real life examples of threat detection with event correlation.Using correlation rules in Log360 for effective defence.

Photo of Orlando Cybersecurity Meetup group
Orlando Cybersecurity Meetup
See more events