Course Details
Course Outline
1 - Course Introduction
Introductions and course logistics Course objectives
2 - Custom Rules Basics
Execute / Write action rules Precedence Paths
3 - tom Rules Best Practices
Rule Triad Rule multiplication
4 - Rule Types
Custom rule type overview
5 - Optimizing Custom Rules
Evaluating events
6 - Event Rules
Creating and editing Testing before implementing
7 - Creating and editing Testing before implementing
Server versus agent issues
8 - Server Capabilities
Tools, logs, common issues, scenarios
9 - Agent Capabilities
Tools, logs, common issues, scenarios
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
System administrators and security operations personnel, including analysts and managers
Prerequisites