When an analyst is investigating an offense, what is the property that specifies the device that attempts to breach the security of a component on the network?
A QRadar analyst is using the Log Activity screen to investigate the events that triggered an offense. How can the analyst differentiate events that are associated with an offense?
On the Log Activity tab in QRadar. what are the options available when right-clicking an IP address of an event to access more event filter information?