Investigation: Conduct an Investigation

Document created by RSA Information Design and Development on Jun 26, 2017Last modified by RSA Information Design and Development on Jul 28, 2017
Version 2Show Document
  • View in full screen mode
  

You can begin an investigation in several ways in Security Analytics. After you begin an investigation, there is no specific order in which to conduct the investigation. Instead, Security Analytics offers various methods of displaying the data, filtering the data, querying the data, acting on a drill point, and inspecting specific events.

You are here
Table of Contents > Conduct an Investigation

Attachments

    Outcomes