Use Threat Investigation to locate suspicious objects in the network.
If the network is the target of an ongoing attack or an advanced persistent threat
(APT), a
threat investigation can assess the extent of damage caused by the targeted attack,
provide
information on the arrival and progression of the attack, and aid in planning an effective
security incident response.
Views: