JD

11th place

445 points


Awards


Hint 228

hints

Hint for 12 - Security Management: Threat Detection Management III

-15


Solves

Challenge Category Value Time
28 - Threat Detection Incident Response: Automation Management II 0: New-Scale 101, Compromised Insider, Malicious Insider 15
27 - Threat Detection Incident Response: Automation Management I 0: New-Scale 101, Compromised Insider, Malicious Insider 20
26 - Threat Detection Incident Response: Search Natural Language II 0: New-Scale 101, Compromised Insider, Malicious Insider 30
25 - Threat Detection Incident Response: Search Natural Language I 0: New-Scale 101, Compromised Insider, Malicious Insider 40
24 - Threat Detection Incident Response: Search Basic 0: New-Scale 101, Compromised Insider, Malicious Insider 35
23 - Threat Detection Incident Response: Search Timeline II 0: New-Scale 101, Compromised Insider, Malicious Insider 20
15 - Security Management: Threat Detection Management VI 0: New-Scale 101, Compromised Insider, Malicious Insider 10
14 - Security Management: Threat Detection Management V 0: New-Scale 101, Compromised Insider, Malicious Insider 10
13 - Security Management: Threat Detection Management IV 0: New-Scale 101, Compromised Insider, Malicious Insider 20
12 - Security Management: Threat Detection Management III 0: New-Scale 101, Compromised Insider, Malicious Insider 25
22 - Threat Detection Incident Response: Search Timeline I 0: New-Scale 101, Compromised Insider, Malicious Insider 25
21 - Threat Detection Incident Response: Threat Center VI 0: New-Scale 101, Compromised Insider, Malicious Insider 10
20 - Threat Detection Incident Response: Threat Center V 0: New-Scale 101, Compromised Insider, Malicious Insider 15
19 - Threat Detection Incident Response: Threat Center IV 0: New-Scale 101, Compromised Insider, Malicious Insider 10
18 - Threat Detection Incident Response: Threat Center III 0: New-Scale 101, Compromised Insider, Malicious Insider 15
17 - Threat Detection Incident Response: Threat Center II 0: New-Scale 101, Compromised Insider, Malicious Insider 15
16 - Threat Detection Incident Response: Threat Center I 0: New-Scale 101, Compromised Insider, Malicious Insider 10
11 - Security Management: Threat Detection Management II 0: New-Scale 101, Compromised Insider, Malicious Insider 15
10 - Security Management: Threat Detection Management I 0: New-Scale 101, Compromised Insider, Malicious Insider 25
9 - Attack Surface Insights: Devices 0: New-Scale 101, Compromised Insider, Malicious Insider 10
8 - Attack Surface Insights: Users 0: New-Scale 101, Compromised Insider, Malicious Insider 10
7 - Context Management II 0: New-Scale 101, Compromised Insider, Malicious Insider 15
6 - Context Management I 0: New-Scale 101, Compromised Insider, Malicious Insider 10
5 - Log Stream: Enrichment 0: New-Scale 101, Compromised Insider, Malicious Insider 10
4 - Log Stream: Parsers II 0: New-Scale 101, Compromised Insider, Malicious Insider 15
3 - Log Stream: Parsers I 0: New-Scale 101, Compromised Insider, Malicious Insider 10
2 - Collection 0: New-Scale 101, Compromised Insider, Malicious Insider 10
1 - Platform Overview: Start Here! 0: New-Scale 101, Compromised Insider, Malicious Insider 5