Application rules are a swiss army knife for processing tasks and metadata generation tasks within the RSA Security Analytics platform. They can be used to offload logic and expensive computation from investigation and reporting by moving more complex queries early on in the processing pipeline, and they can be used to tag data with metadata as it comes in. In this brief six-minute video, YouTuber and security expert Sean Ennis gives a detailed walkthrough of how to create Application Rules within the RSA Security Analytics platform.
Widget not in any sidebars
Latest posts by Jeff Edwards (see all)
- Five Questions You Need To Ask Yourself When Evaluating SIEM Solutions - November 8, 2017
- Winning the Data Breach War with User and Entity Behavioral Analytics - November 3, 2017
- 5 Alternatives to The Gartner Magic Quadrant for SIEM - October 31, 2017