Configure Basic Services
Configure Network Data (Packet) Capture
Configure Log Collection
Configure Endpoint Data Collection
Configure UEBA
Configure Real-Time Analysis, Enrichment Lookup, and Automated Threat Detection
Configure Event Stream Analytics |
Review Best Practices for Writing ESA Rules |
Configure Enrichment Lookup Capability |
Configure Automated Threat Detection |
Configure Incident Management Capability
Configure Application Settings and Dashboards
Configure Reports
Configure Security and User Access