How does the Device Trajectory feature work?

How does the Device Trajectory feature work?

How does the Device Trajectory feature work?

A.
It searches for potential threats based on identified activities.

B.
It tracks file behavior across the network to see which devices it enters and exits.

C.
It analyzes the data from file and process retrospection to provide a new level of threat
intelligence.

D.
It isolates suspicious files and runs tests to determine their authenticity.

E.
It tracks file behavior on a device to pinpoint the root cause of a compromise.



Leave a Reply 0

Your email address will not be published. Required fields are marked *