Configuring creation of the threat development chain

Expand all | Collapse all

To create a threat development chain the specified prerequisites must be met.

You can enable creation of the threat development chain for the objects detected on managed devices. The threat development chain is displayed on the incident card.

To enable creation of the threat development chain:

  1. Do one of the following:
    • Open the application properties window for an individual device.
    • Open the policy properties window.
  2. In the Repositories section select the Synchronization with Administration Server subsection.
  3. In the Synchronization with the Administration Server group of settings, select the Send data for creation of the threat development chain check box.
  4. If you configure the policy settings, in the upper right corner of the Synchronization with the Administration Server group of settings, change the switch from Undefined to Enforce.
  5. Click OK.
  6. Click the Save button.

Creation of the threat development chain is configured.

See also

Configuring data synchronization with the Administration Server

Page top