Orchestration Rules Management

Every networked environment generates thousands of logs from assorted systems. USM Anywhere and USM Central enable you to manage those logs and, through the use of rules, you can prevent and frustrate attacks. The management of the different rules helps you to make the most of your environment.

Keep in mind that setting up a rule base is an iterative process. That means it happens relatively slowly and needs to be tuned over a period of time. There are always new attacks and new indicators to monitor.

USM Central enables you to create and customize these rules to add specific policies for a particular event Any traffic or data exchange detected by AT&T Cybersecurity products through a sensor or external devices such as a firewall. or alarm Alarms provide notification of an event or sequence of events that require attention or investigation.. There are these orchestration rules:

Related Video Content

To view other related training videos, click here.