Manage security incidents and inbound requests

After a security incident has been created, there are numerous types of information that can be added and viewed as your analysis of the issue progresses toward resolution.