The following table outlines the required products/services for individual Connected Threat Defense features. Ensure you have a valid license for each required product/service or contact your service provider to obtain an Activation Code.
Feature |
Required Products/Services |
---|---|
Security threat monitoring |
|
Suspicious Object list synchronization |
|
Suspicious Object sample submission |
|
Suspicious Object management |
|
Endpoint isolation |
|
IOC management |
|