Suppressing threats empowers you to take control of identified threats by allowing you to suppress specific threat alerts for a defined period, accompanied by a justification. This capability enhances your team's focus on critical security issues, improving operational efficiency.
Contents
Locate Threats
- Select the infected asset from the dashboard.
- Open the Threat Details view.
- Click the Suppress Until button to begin suppression configuration.
Configure Threat Suppression
When configuring threat suppression, you will need to provide the following details:
- Suppression End Date/Time: Use the date/time picker to set the suppression expiry, ensuring timely re-evaluation of the threat.
-
Suppression Reason: Enter a clear rationale for the suppression in the text input field. This promotes accountability and supports informed decision-making.
By following these steps, you can effectively suppress threats, allowing your team to concentrate on addressing the most pressing security concerns.