Introduction

This guide explains the best way to investigate Threat Prevention attacks in your organization.

In a threat investigation, you need to be able to identify significant events generated by your Threat Prevention environment and understand their meaning.