- Prerequisites for Configuring Exabeam Threat Detection, Investigation & Response (TDIR) Use Case Categories
- Configure Compromised Insiders Use Cases
- Configure External Threats Use Cases
- Configure Malicious Insiders Use Cases
PrevNext
Configure Malicious Insiders Use Cases
Quickly get started protecting your environment against Malicious Insiders use cases using Exabeam Security Operations Platform
Review everything you need to configure so you can protect against eight Malicious Insiders use cases:
Configure the Physical Security Use Case DOCUMENTATION COMING SOON
Configure the Workforce Protection Use Case DOCUMENTATION COMING SOON
Configure the Abnormal Authentication and Access Use Case DOCUMENTATION COMING SOON