2 Working with Security Monitoring and Analytics
This section includes ways you can configure, administer, and maintain Security Monitoring and Analytics on a regular basis.
Task Description | More Information |
---|---|
Receive alert notifications based on security thresholds values you define. |
Create a Security Alert Rule |
Tune correlation rules to achieve more relevant detections by adjusting available parameter values. |
Tuning Rule Specs by Editing Its Parameters |
Specify associated elements in your correlation rule as whitelisted to reduce false positives event detections. |
Tuning Rule Exceptions by Whitelisting Rule Attributes |
Provide learning orientation by specifying learning attributes using machine learning models. |
Administer Machine Learning Capabilities |