A Playbook for Command and Control Traffic Usecase that automates user querying on directory service, threat intelligence queries, malicious hash blocking by adding it on the blacklist and getting process hashes directly from the endpoint. It also enables semi-autonomous responding with the help of analyst tasks
Suggested for you are based on app category, product compatibility, popularity, rating and newness. Some apps may not show based on entitlements. Learn more about entitlements.
Please upgrade to one of the following broswers: Internet Explorer 11 (or greater) or the latest version of Chrome or Firefox