Overview of FSO Plugins
Mohammad Anwar gives a brief overview of the plugins for the FireEye Security Orchestrator product, including a description of what plugins are, how to install them, and configure them for use in FSO.
Mohammad Anwar gives a brief overview of the plugins for the FireEye Security Orchestrator product, including a description of what plugins are, how to install them, and configure them for use in FSO.
Dan Faltisco explains how to contain a possibly compromised host within FireEye Endpoint Security.
Jason Forcht explains how to read a FireEye Endpoint triage report. These reports allow a security analyst to easily investigate a possible compromise.
Matt Beyhl explains how to create logon banners for FireEye’s Endpoint Security system. These banners enable administrators to display custom messages which will be seen by the user during the login process.
Andrew Lasser explains how to easily create custom dashboards in FireEye Helix.
Mike Olsen explains how to create a multi-stage rules in FireEye Helix. Multi-stage rules trigger alerts of a possible compromise when a sequence of events occur.
Bryon Wolcott explains how to access the Helix API with PowerShell or other scripting languages to interact with Helix.
Dan Smithson describes how FireEye technology can be leveraged to identify indicators of compromise from FireEye’s intel pool.
Matt Beyhl discusses the deployment and health check for our FireEye Network Security (NX) tool.