Investigation
Use the tools on the Forensics tab to help you investigate.
1.
Use free-form search to search for traits of vulnerabilities, exploits, or other
malicious behavior that is specified in the security bulletin.
2.
Use free-form search to cross-reference research or other data to derive
indicators.
3.
Use Surveyor to investigate interactions that possibly exploited vulnerabilities
that were identified.
4.
Examine suspect content that is flagged by the product.
5.
Review content that underlies potentially risky interactions by using data
reconstruction.
6.
Use Surveyor to retrace the activities of potentially risky entities.
12
QRadar Incident Forensics User Guide
Do'stlaringiz bilan baham: |