Up until now within the Threatcare app you've experienced what an easy Breach and Attack Simulation (BAS) platform is suppose to feel like. If you haven't...Go directly to Jail. Do not pass Go. Do not collect $200!

However if you're not into the monopoly thing just start with a few out-of-the-box playbooks or try creating your own playbook 🤓.

Make results actionable

Export individual results

If you're interested in quick validation e.g. testing a products mitigation responses to a single technique or playbook, choose "View Details" to drill into the specifics of that event. Then export the artifacts to assist with log correlation, or query the unique Event Identifier within evaluating products logs.

Export individual events

Export multiple results

When your creating an report It's best to select all the events that you'd like to apply to the statement.

Export multiple events

Each event within your remediation report will be categorized and can be located by its respective tactic name.

Remediation Report preview

Whats next?

Now that you've got an idea of how to make your actions a bit more actionable with reports, streamline that activity with Threatcare Agents. Which is meant to enhance your security instrumentation visibility across multiple networks.

Did this answer your question?