Security Incident Response setup

The types of setup procedures you follow depend on your specific needs. Many of the setup procedures are optional, such as defining process definitions, security incident groups, SLAs, and runbooks. You can also set up post incident reviews, analyst assignment rules, and email matching rules.