Skip to main content

Who is this article for?

Incydr
Code42 for Enterprise
CrashPlan for Enterprise
CrashPlan for Small Business

Incydr, yes.

CrashPlan for Enterprise, no.

Code42 for Enterprise, no.

CrashPlan for Small Business, no.

This article applies to Code42 cloud environments.

HOME
GETTING STARTED
RELEASE NOTES
FAQs
APIs
SYSTEM STATUS
Code42 Support

Training course: Detecting risk with Code42 Incydr

Who is this article for?

Incydr
Code42 for Enterprise
CrashPlan for Enterprise
CrashPlan for Small Business

Incydr, yes.

CrashPlan for Enterprise, no.

Code42 for Enterprise, no.

CrashPlan for Small Business, no.

This article applies to Code42 cloud environments.

Course introduction

For visibility into exposure and file exfiltration activities, you need data. Lots of data. And the foundation of Code42 Incydr's ability to speed insider risk detection and response comes from its ability to capture all file activity: on endpoints, corporate cloud, and email services. So in this overview video, we're going to show what Incydr can capture and from where.

In this course, we'll show you how to:

  • Detect risk in the Risk Exposure dashboard
  • Review alerts
  • Review departing employees
  • Review high-risk employees
  • Review a specific user
  • Run an ad-hoc search for file exfiltration activity

Time to complete course: 30 minutes

More training is available
For more training courses, visit Code42 University.

Module 1: Detect risk in the Risk Exposure dashboard

Module 2: Review alerts

Module 3: Review departing employees

Module 4: Review high-risk employees

Module 5: Review a specific user

Module 6: Ad-hoc activity searches

Module 7: Use cases

  • Was this article helpful?