Skip to content

Details

The importance of correlating events from across the network.How correlation rules work under the hood.Differences between prebuilt and custom correlation rules.Why do you need custom correlation rules?Three use cases and real life examples of threat detection with event correlation.Using correlation rules in Log360 for effective defence.

Members are also interested in