The following table lists the features available with the Connected Threat Defense architecture and the required and optional products that integrate with each.
Feature |
Required Products |
Optional Products |
---|---|---|
Security threat monitoring |
Important:
At least one optional product is required to evaluate log data. |
|
Suspicious Object list synchronization For more information, see Suspicious Object Lists and Connected Threat Defense Product Integration. |
Important:
At least one optional product is required for Suspicious Object list synchronization. |
|
Suspicious Object sample submission |
|
|
Suspicious Object management |
|
|
Suspicious Object scan actions For more information, see Suspicious Object Scan Actions. |
|
|
Impact analysis |
Important:
Performing an impact analysis on Affected Users screen also requires Deep Discovery Inspector 3.8 (or later). For more information, see Analyzing Impact on Affected Users. |
|
Endpoint isolation For more information, see Isolating Endpoints. |
|
|
IOC management |
|
|