This chapter describes how to protect computers from security risks using the Behavior Monitoring feature.
Topics include:
Behavior Monitoring
Configuring Global Behavior Monitoring Settings
Behavior Monitoring Privileges
Behavior Monitoring Notifications for Security Agent Users
Behavior Monitoring Logs