A. To define which Falcon analysts can contain endpoints
B. To define the duration of Network Containment
C. To define the trigger under which a machine is put in Network Containment (e.g. a critical detection)
D. To define allowed IP addresses over which your hosts will communicate when contained
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!