Thank you for your feedback.
Form temporarily unavailable. Please try again or contact to submit your comments.

Security Operations email duplication rules

Log in to subscribe to topics and get notified when content changes.

Security Operations email duplication rules

You can use Duplication Rules to handle duplicate email records for security, vulnerability, IoCs, and so on.

Duplication rules have two purposes. First, to prevent too many duplicate records from being created. Second, when a duplicate is detected, to set what fields in the record are updated. Only active duplicates are looked for. If the record is not active, for instance, if the incident has been closed, then any new identical problem is a new incident.