This repository has been archived by the owner on May 15, 2019. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 46
User Guide
Everardo Lopez Sandoval edited this page Sep 21, 2016
·
7 revisions
This section contains a walk-through of the User Interface view. The intended audience is the people who will be reviewing the results for potential threats. Each section of this guide refers to a particular screen or view in the solution.
- Flows
- [Suspicious Connects – Analyst View](Suspicious Connects)
- [Threat Investigation – Analyst View](Threat Investigation)
- Storyboard
- [Ingest Summary – Analyst View](Ingest Summary)
- DNS
- [Suspicious DNS – Analyst View](Suspicious DNS)
- [Threat Investigation – Analyst View](DNS Threat Investigation)
- [Storyboard](DNS Storyboard)
- Proxy
- [Suspicious Proxy - Analyst View](Suspicious Proxy)
- [Threat Investigation - Analyst View](Proxy Threat Investigation)
- [Storyboard](Proxy Storyboard)