SOC Experts Community - Beta
0 like 0 dislike
in Security Concepts by (1.8k points)

1 Answer

0 like 0 dislike
by (190 points)
  • It monitors and analysis the user and system activities.
  • It performs auditing of the system files and other configurations and the operating system.
  • It assesses the integrity of system and data files
  • It conducts analysis of patterns based on known attacks.
  • It detects errors in system configuration.
  • It detects and cautions if the system is in danger.

SOC Experts - No. 1 Job Oriented Cybersecurity Training Program

View our Courses