In this webcast, we will cover a few steps you could take to identify and filter on key events and/or vulnerabilities and quickly alert the proper staff to take action before the attackers do. We will show you how to deploy rules (whitelists and blacklists), set the system to detect important changes (new hosts, nearly expired certificates, etc), as well as deliver alerts to any users or systems that need to know.