| Topic | Details |
| Topic 1 | - User Management: This domain covers determining appropriate roles for console access, creating and assigning roles with specific permissions, and managing API keys for platform access.
|
| Topic 2 | - Rules Configuration: This domain involves creating custom IOA rules, configuring exclusions to resolve false positives, managing IOC settings for threat detection, and configuring CID-wide General Settings.
|
| Topic 3 | - Policy Application: This domain encompasses configuring prevention policies for security posture, sensor update policies, RTR audit policies, containment policies with IP exclusions, and managing quarantined files.
|
| Topic 4 | - Group Creation: This domain covers assigning endpoints to appropriate groups for policy application and following best practices for managing host group structures.
|
| Topic 5 | - Sensor Deployment: This domain focuses on verifying installation prerequisites, applying default policies and best practices, uninstalling sensors, and troubleshooting sensor issues across supported operating systems.
|