Related Resources
Next
This content path will guide you through best practices on InsightIDR.
Alerts and Detection
Understand Different Kinds of Alerts
Configure Alert Triggers
Using Detection
Attacker Behavior Analytics
Spear Phishing Detection
Automate Security Tasks
Get Started with Automation
Insight Orchestrator Overview
Automation Workflows
Automation Troubleshooting
Containment
Quarantine an Asset
User and Asset Containment Best Practices
Deception Technology
Using Deception Technology
Deception Technology: Honey Items
File Integrity Monitoring
FIM Recommendations
Investigations
Investigate an Asset or User
Investigating Powershell and Mimikatz Activity
Managed Detection and Response
How it Works: Managed Detection and Response
Around-the-Clock Expert Monitoring
Threat Intelligence
Using Threat Intelligence
Use Existing Threats or Add your Own