Investigation
Use the tools on the Forensics tab to help you investigate.
1.
Use free-form search to search for symptoms of the sabotage.
2.
Examine suspect content that is flagged by the product.
3.
Use visual navigation, Digital Impression, and content filtering to explore the
symptoms and detect identifiers of the saboteur.
4.
Use Surveyor to trace the activities of the saboteur.
5.
Use data reconstruction to discover saboteur roles and motivations.
6.
Use data reconstruction to review the content that the saboteur used.
7.
Use free-form search, Surveyor, and suspect content to reveal the compromised
systems and procedures that enabled the sabotage.
Do'stlaringiz bilan baham: |