Investigation
Use the tools on the Forensics tab to help you investigate.
1.
Use free-form search to search for identifiers of data that was leaked.
2.
Examine suspect content that is flagged by the product.
3.
Review the full extent of leaked or leaking data by reviewing data
reconstruction.
4.
Use Digital Impression and visualizations to explore all involved entity
relationships.
5.
Use Surveyor to see a timeline of activities so that you can retrace an attack.
6.
Use free-form search to discover the motivations for the data leak.
7.
Use data-pivoting to find linkages to other data that was possibly leaked.
Do'stlaringiz bilan baham: |