Question 81
To observe what network services are in use in a network's activity overall, which of the following dashboards in Enterprise Security will contain the most relevant data?
Question 82
How does ES know local customer domain names so it can detect internal vs. external emails?
Question 83
Which of the following ES features would a security analyst use while investigating a network anomaly notable?
Question 84
What do threat gen searches produce?
Question 85
A site has a single existing search head which hosts a mix of both CIM and non-CIM compliant applications. All of the applications are mission-critical. The customer wants to carefully control cost, but wants good ES performance. What is the best practice for installing ES?