Software (Example)
Overview- main menu:
If it is not secure, it will bring an overview of what is going wrong in the system.
Threat history:
That’s the history of threats that are mitigated by the security solution.
Quarantined files:
Those are the files that the system suspects to be malicious.
Agent details:
That’s the details of the endpoint security.
Then if the computer is connected to the internet and has a connection with the advanced threat cloud, it will show online; if it’s not, it will show offline.
Reference List:
SentinelOne., Available at: SentinelOne | Autonomous AI Endpoint Protection Platform | s1.ai. [Last Accessed 26th of May 2023]
Comments
Post a Comment