This page lists current threats in the organization along with corresponding security recommendations. Figure 9.32 – Recommendations page Selecting an item displays a flyout with information and activities. From here, you can select individual security recommendations to view detailed information about devices or other areas that might be exposed, relevant items tracked in the Common […]