The following table lists the features available with the Connected Threat Defense architecture and the required and optional products that integrate with each.
Feature |
Required Products |
Optional Products |
---|---|---|
Security threat monitoring |
Note:
At least one optional product is required to evaluate log data. |
|
Suspicious Object list synchronization For more information, see Suspicious Object Lists and Connected Threat Defense Product Integration. |
Note:
At least one optional product is required for synchronization. |
|
Suspicious Object sample submission |
|
|
Suspicious Object management |
|
|
Suspicious Object scan actions For more information, see Suspicious Object Scan Actions. |
|
|
Impact assessment |
|
|
Endpoint isolation For more information, see Isolating Endpoints. |
|
|
IOC management |
|
|