Threat Rules

Threat categories provided as standard out-of-the-box

APMAWSActive DirectoryApplicationAssetVisibilityAzureCloudCollectionCommand and Control
Configuration AuditCredential AccessData ProtectionDefense EvasionEndpoint SecurityExecutionGCPGoogle WorkspaceHostIdentity
Identity and AccessImpactInitial AccessLateral MovementLinuxLog AuditingMacOSMicrosoft 365NetworkOkta
PersistencePost-ExecutionPrivilege EscalationWindowsZoomcyberarkpas

Scroll to Top