Getting Started: Investigating Suspicious Activity With Torq
In this brief video, Torq Field CTO Marco Garcia demonstrates how uncomplicated it is to investigate suspicious activity using Torq.
Garcia shows how to:
- Connect UEBA/Next Gen SIEM solutions and enrich the data from external systems or threat intelligence platforms
- Trigger workflows or create time based workflows that can be triggered if a user’s action can’t be validated
- Conduct a user-in-the-loop workflow, including automating activity across multiple systems (slack/teams/email) to validate actions
+ more...