Security Analytics Malware Analysis can operate as a service on a Security Analytics Decoder or as a service on a dedicated appliance. This guide includes instructions for setting up the operating environment and then configuring the Security Analytics Malware Analysis service. After this configuration is complete, analysts can conduct malware analyses.
Previous Topic:Roles and Permissions for Analysts
You are hereTable of Contents > Basic Setup