Monitoring: Enterprise View
Enterprise/Group-based situational awareness visibility Monitoring: Client View
All critical forensic data at endpoint are available for investigation Monitoring: IHIPS Activity View
Built-in analytics to assist in hunting Indicators of compromise Monitoring: IHIPS-AutoRun View
Built-in analytics to assist in hunting Indicators of compromise
Monitoring: IHIPS-File View
Built-in analytics to assist in hunting Indicators of compromise Monitoring: ASR Proxy View
Authentication setting could be overwritten by administrators