Which three incident types will be reflected in the Incident Explorer section of Runtime Defense? (Choose three.)
Which three incident types will be reflected in the Incident Explorer section of Runtime Defense? (Choose three.)
The Incident Explorer section of Runtime Defense typically includes categories related to direct security threats and malicious activities. This encompasses Crypto miners, Brute Force, and Port Scanning. These incident types are reflective of common and critical security issues detected by runtime defense systems, as they signify active exploitation attempts or reconnaissance activities that could lead to or indicate a breach.
ABD https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/runtime_defense/incident_types
ABD This section describes the incident types surfaced in Incident Explorer. Altered binary Backdoor admin accounts Backdoor SSH access Brute force Crypto miners Execution flow hijack attempt Kubernetes attack Lateral movement Malware Port scanning Reverse shell Suspicious binary https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/runtime_defense/incident_types