Intended for both new and seasoned users alike, this course covers examining the state of endpoints across the enterprise, retrieving data, and quickly executing changes as necessary. Participants also learn how to automate the detection and remediation of threats in seconds, empowering your frontline, security, and IT operations teams to secure, control and manage every endpoint.
- Questions & Sensors
- Hardware and software reporting
- Using IOC Detect to locate indicators of compromise
- Leveraging Tanium Connect to integrate with other tools.
- Support & troubleshooting
- Windows and Linux patching
- Software distribution
- Hunting with the incident response module
- Performing forensic analysis with IR Gatherer and Trace