Threat Rules

Threat categories provided as standard out-of-the-box

APMAWSActive DirectoryApplicationAssetVisibilityAzureCloudCollectionCommand and Control
Configuration AuditCredential AccessData ProtectionDefense EvasionEndpoint SecurityExecutionGCPGoogle WorkspaceHostIdentity
Identity and AccessImpactInitial AccessLateral MovementLinuxLog AuditingMacOSMicrosoft 365NetworkOkta
PersistencePost-ExecutionPrivilege EscalationWindowsZoomcyberarkpas

Complete the feedback poll and get a gift!


(1 = Poor, 5 = Excellent)
(1 = Poor, 5 = Excellent)
(1 = Poor, 5 = Excellent)

This will close in 0 seconds