Views:
Use Threat Investigation to locate suspicious objects in the network. If the network is the target of an ongoing attack or an advanced persistent threat (APT), a threat investigation can assess the extent of damage caused by the targeted attack, provide information on the arrival and progression of the attack, and aid in planning an effective security incident response.