Congratulations! You have successfully completed the Network Security Overview.

You should now be able to:

  • Explain how the Network Security’s MVX engine analyzes suspicious files and URLs.
  • Describe how infection and callback rules are generated and shared with the FireEye user community via the FireEye Dynamic Threat Intelligence (DTI) Cloud to protect against future attacks.
  • Differentiate between an integrated and distributed deployment.
  • Explain the benefits of response workflow integration using the full suite of FireEye products.
Scroll to Top