Introduction
This guide explains the best way to investigate Threat Prevention attacks in your organization.
In a threat investigation, you need to be able to identify significant events generated by your Threat Prevention environment and understand their meaning.