22 lines
1.2 KiB
Markdown
22 lines
1.2 KiB
Markdown
---
|
|
layout: default
|
|
title: Using Security Analytics
|
|
nav_order: 20
|
|
has_children: true
|
|
has_toc: false
|
|
redirect_from:
|
|
- /security-analytics/usage/
|
|
---
|
|
|
|
# Using Security Analytics
|
|
|
|
After creating detectors and generating findings, functionality within the several Security Analytics windows offers visualizations and tools to help you investigate and manage findings, create focused alerts and notifications, import or customize rules, and edit detectors, among other tasks. This section discusses available features, their uses, and general navigation while working in the various windows. You can use the links below to go directly to information on a specific window.
|
|
|
|
* [The Overview page]({{site.url}}{{site.baseurl}}/security-analytics/usage/overview/)
|
|
* [Working with detectors]({{site.url}}{{site.baseurl}}/security-analytics/usage/detectors/)
|
|
* [Working with findings]({{site.url}}{{site.baseurl}}/security-analytics/usage/findings/)
|
|
* [Working with rules]({{site.url}}{{site.baseurl}}/security-analytics/usage/rules/)
|
|
* [Working with the correlation graph]({{site.url}}{{site.baseurl}}/security-analytics/usage/correlation-graph/)
|
|
* [Working with alerts]({{site.url}}{{site.baseurl}}/security-analytics/usage/alerts/)
|
|
|