
Security Validation
Return events generated by the security technology that match Mandiant Security Validation actions
Automated Defense
Data can be fetched or forwarded in CEF syslog, CSV, JSON or LEEF syslog. Mandiant Automated Defense supports two variation of CSV, two variations of JSON and fetching from Palo Alto Networks Cortex Data Lake and Elasticsearch.