ManageEngine: The top 5 correlation rules to master threat detection in your network
An effective SIEM solution should enable you to analyze events that happen in disparate parts of your network and correlate them as a single incident. This must be achieved through the use of both built-in and customized correlation rules. While built-in rules help you look for the most well-known threats, custom rules help you thwart attacks that may be of special concern to you.
Join us in this webinar and learn how to use correlation rules to track these five security challenges:
- Brute-force attacks
- Excessive file activity and modifications
- Excessive password change failure