- Prerequisites for Configuring Exabeam Threat Detection, Investigation & Response (TDIR) Use Case Categories
- Configure Compromised Insiders Use Cases
- Configure External Threats Use Cases
- Configure Malicious Insiders Use Cases
PrevNext
Configure External Threats Use Cases
Quickly get started protecting your environment against External Threats use cases using Exabeam Security Operations Platform.
Review everything you need to configure so you can protect against five External Threats use cases:
Configure the Phishing Use Case DOCUMENTATION COMING SOON
Configure the Ransomware Use Case DOCUMENTATION COMING SOON
Configure the Brute Force Attack Use Case DOCUMENTATION COMING SOON
Configure the Cryptomining Use Case DOCUMENTATION COMING SOON