Video

Correlate Activity Across Your Environment With Scheduled Queries

Analyze all of your collected log data to bring more context and correlation to your threat detection efforts with Scheduled Queries.

Duration: 5:21 minutes

Scheduled Queries lets you correlate activity across your environment by analyzing all of your collected log data. It does this by running searches on intervals against your data lake, so user and machine behavior can be evaluated across applications and systems to identify malicious activity that would otherwise be difficult to detect. 

It helps you detect advanced attacks like C2 beacons, unusual login attempts, password spraying, and more. Start using Scheduled Queries to detect threats in your environment today. Read the documentation and review our example queries