- Prerequisites for Configuring Exabeam Threat Detection, Investigation & Response (TDIR) Use Case Categories
- Configure Compromised Insiders Use Cases
- Configure External Threats Use Cases
- Configure Malicious Insiders Use Cases
PrevNext
Configure Compromised Insiders Use Cases
Quickly get started protecting your environment against Compromised Insiders use cases using Exabeam Security Operations Platform.
Review everything you need to configure so you can protect against eight Compromised Insiders use cases: