The following table outlines the required products/services for individual
Connected Threat Defense features. Ensure you have a valid license for each required
product/service or contact your service provider to obtain an Activation Code.
Feature
|
Required Products/Services
|
Security threat monitoring
|
|
Suspicious Object list synchronization
|
|
Suspicious Object sample submission
|
|
Suspicious Object management
|
|
Endpoint isolation
|
|
IOC management
|
|