...
With Email Isolation, administrators can configure isolation policies based on specific criteria, such as sender reputation, attachment type, or keyword filtering. Isolated messages are stored securely and can be analyzed for threats, providing visibility into potential attacks and allowing organizations to take action to prevent them.
Configuration requirements
To run this collector, there are some configurations detailed below that you need to consider.
...
Configuration
...
Details
...
Cylance APP
...
You need to run a Cylance app.
...
Application ID
...
Once you create the App, it gives you an Application ID.
...
Application Secret
...
Once you create the App, it gives you an Application Secret.
...
Tenant ID
...
You can find it in your Cylance console.
Devo collector features
Feature | Details |
---|---|
Allow parallel downloading ( |
|
Running environments |
|
Populated Devo events |
|
Flattening preprocessing |
|
Allowed source events obfuscation |
|
...