Vikas

8th place

590 points


Awards


Hint 218

hints

Hint for 2 - Collection

-5


Solves

Challenge Category Value Time
Sea of Threats! 2 1.1: Threat Center 20
Sea of Threats! 1 1.1: Threat Center 20
36 - Threat Detection Incident Response: Threat Center X 0: New-Scale 101, Compromised Insider, Malicious Insider 10
35 - Threat Detection Incident Response: Threat Center IX 0: New-Scale 101, Compromised Insider, Malicious Insider 10
34 - Threat Detection Incident Response: Threat Center VIII 0: New-Scale 101, Compromised Insider, Malicious Insider 10
33 - Threat Detection Incident Response: Threat Center VII 0: New-Scale 101, Compromised Insider, Malicious Insider 10
32 - Platform Insights: Outcomes Navigator III 0: New-Scale 101, Compromised Insider, Malicious Insider 15
31 - Platform Insights: Outcomes Navigator II 0: New-Scale 101, Compromised Insider, Malicious Insider 10
30 - Platform Insights: Outcomes Navigator I 0: New-Scale 101, Compromised Insider, Malicious Insider 15
29 - Threat Detection Incident Response: Automation Management III 0: New-Scale 101, Compromised Insider, Malicious Insider 15
28 - Threat Detection Incident Response: Automation Management II 0: New-Scale 101, Compromised Insider, Malicious Insider 15
27 - Threat Detection Incident Response: Automation Management I 0: New-Scale 101, Compromised Insider, Malicious Insider 20
26 - Threat Detection Incident Response: Search Natural Language II 0: New-Scale 101, Compromised Insider, Malicious Insider 30
25 - Threat Detection Incident Response: Search Natural Language I 0: New-Scale 101, Compromised Insider, Malicious Insider 40
24 - Threat Detection Incident Response: Search Basic 0: New-Scale 101, Compromised Insider, Malicious Insider 35
23 - Threat Detection Incident Response: Search Timeline II 0: New-Scale 101, Compromised Insider, Malicious Insider 20
22 - Threat Detection Incident Response: Search Timeline I 0: New-Scale 101, Compromised Insider, Malicious Insider 25
21 - Threat Detection Incident Response: Threat Center VI 0: New-Scale 101, Compromised Insider, Malicious Insider 10
20 - Threat Detection Incident Response: Threat Center V 0: New-Scale 101, Compromised Insider, Malicious Insider 15
19 - Threat Detection Incident Response: Threat Center IV 0: New-Scale 101, Compromised Insider, Malicious Insider 10
18 - Threat Detection Incident Response: Threat Center III 0: New-Scale 101, Compromised Insider, Malicious Insider 15
17 - Threat Detection Incident Response: Threat Center II 0: New-Scale 101, Compromised Insider, Malicious Insider 15
16 - Threat Detection Incident Response: Threat Center I 0: New-Scale 101, Compromised Insider, Malicious Insider 10
15 - Security Management: Threat Detection Management VI 0: New-Scale 101, Compromised Insider, Malicious Insider 10
14 - Security Management: Threat Detection Management V 0: New-Scale 101, Compromised Insider, Malicious Insider 10
13 - Security Management: Threat Detection Management IV 0: New-Scale 101, Compromised Insider, Malicious Insider 20
12 - Security Management: Threat Detection Management III 0: New-Scale 101, Compromised Insider, Malicious Insider 25
11 - Security Management: Threat Detection Management II 0: New-Scale 101, Compromised Insider, Malicious Insider 15
10 - Security Management: Threat Detection Management I 0: New-Scale 101, Compromised Insider, Malicious Insider 25
9 - Attack Surface Insights: Devices 0: New-Scale 101, Compromised Insider, Malicious Insider 10
8 - Attack Surface Insights: Users 0: New-Scale 101, Compromised Insider, Malicious Insider 10
7 - Context Management II 0: New-Scale 101, Compromised Insider, Malicious Insider 15
5 - Log Stream: Enrichment 0: New-Scale 101, Compromised Insider, Malicious Insider 10
6 - Context Management I 0: New-Scale 101, Compromised Insider, Malicious Insider 10
4 - Log Stream: Parsers II 0: New-Scale 101, Compromised Insider, Malicious Insider 15
3 - Log Stream: Parsers I 0: New-Scale 101, Compromised Insider, Malicious Insider 10
2 - Collection 0: New-Scale 101, Compromised Insider, Malicious Insider 10
1 - Platform Overview: Start Here! 0: New-Scale 101, Compromised Insider, Malicious Insider 5