ankita jain
10th place
490 points
Awards
Hint 243
hints
Hint for 27 - Threat Detection Incident Response: Automation Management I
-10
Hint 240
hints
Hint for 24 - Threat Detection Incident Response: Search Basic
-20
Solves
| Challenge | Category | Value | Time |
| 36 - Threat Detection Incident Response: Threat Center X | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 35 - Threat Detection Incident Response: Threat Center IX | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 34 - Threat Detection Incident Response: Threat Center VIII | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 33 - Threat Detection Incident Response: Threat Center VII | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 32 - Platform Insights: Outcomes Navigator III | 0: New-Scale 101, Compromised Insider, Malicious Insider | 15 | |
| 31 - Platform Insights: Outcomes Navigator II | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 30 - Platform Insights: Outcomes Navigator I | 0: New-Scale 101, Compromised Insider, Malicious Insider | 15 | |
| 29 - Threat Detection Incident Response: Automation Management III | 0: New-Scale 101, Compromised Insider, Malicious Insider | 15 | |
| 28 - Threat Detection Incident Response: Automation Management II | 0: New-Scale 101, Compromised Insider, Malicious Insider | 15 | |
| 27 - Threat Detection Incident Response: Automation Management I | 0: New-Scale 101, Compromised Insider, Malicious Insider | 20 | |
| 26 - Threat Detection Incident Response: Search Natural Language II | 0: New-Scale 101, Compromised Insider, Malicious Insider | 30 | |
| 25 - Threat Detection Incident Response: Search Natural Language I | 0: New-Scale 101, Compromised Insider, Malicious Insider | 40 | |
| 23 - Threat Detection Incident Response: Search Timeline II | 0: New-Scale 101, Compromised Insider, Malicious Insider | 20 | |
| 22 - Threat Detection Incident Response: Search Timeline I | 0: New-Scale 101, Compromised Insider, Malicious Insider | 25 | |
| 21 - Threat Detection Incident Response: Threat Center VI | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 20 - Threat Detection Incident Response: Threat Center V | 0: New-Scale 101, Compromised Insider, Malicious Insider | 15 | |
| 19 - Threat Detection Incident Response: Threat Center IV | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 18 - Threat Detection Incident Response: Threat Center III | 0: New-Scale 101, Compromised Insider, Malicious Insider | 15 | |
| 17 - Threat Detection Incident Response: Threat Center II | 0: New-Scale 101, Compromised Insider, Malicious Insider | 15 | |
| 16 - Threat Detection Incident Response: Threat Center I | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 15 - Security Management: Threat Detection Management VI | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 14 - Security Management: Threat Detection Management V | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 13 - Security Management: Threat Detection Management IV | 0: New-Scale 101, Compromised Insider, Malicious Insider | 20 | |
| 12 - Security Management: Threat Detection Management III | 0: New-Scale 101, Compromised Insider, Malicious Insider | 25 | |
| 11 - Security Management: Threat Detection Management II | 0: New-Scale 101, Compromised Insider, Malicious Insider | 15 | |
| 10 - Security Management: Threat Detection Management I | 0: New-Scale 101, Compromised Insider, Malicious Insider | 25 | |
| 9 - Attack Surface Insights: Devices | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 8 - Attack Surface Insights: Users | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 7 - Context Management II | 0: New-Scale 101, Compromised Insider, Malicious Insider | 15 | |
| 6 - Context Management I | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 5 - Log Stream: Enrichment | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 4 - Log Stream: Parsers II | 0: New-Scale 101, Compromised Insider, Malicious Insider | 15 | |
| 3 - Log Stream: Parsers I | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 2 - Collection | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 1 - Platform Overview: Start Here! | 0: New-Scale 101, Compromised Insider, Malicious Insider | 5 |