These guides contain information and instructions to enable users to get the most out of Adaptive Defense 360 and Adaptive Defense.
The guides are aimed at network administrators who need to protect their organization's IT systems and mobile devices, find out the extent of the security problems detected, and define response and remediation plans against targeted attacks and advanced persistent threats (APTs).
Even though Adaptive Defense 360 and Adaptive Defense are managed services that offers security without the network administrator having to intervene, they also provide clear and detailed information about the activity of the processes and programs run by all users on company systems, regardless of whether they are known or unknown threats or legitimate programs.
In order for network administrators to correctly interpret the information and draw conclusions that can improve corporate security, it is necessary to have some knowledge of Windows processes, file systems and registry, as well as understanding the most frequently used network protocols.
Click the screw icon on your product Administration console to access the guide: