Threat Mitigator deploys mitigation patterns to ensure that Threat Mitigator removes or mitigates security risks or threats from the affected endpoints. Mitigation Patterns can be one of the following:
Official
Pattern Release
Custom
Pattern
Note: These custom patterns are only available for 24 hours.