- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
The attached document has been used as a lab guide to configure the machine learning in your environment.
Replace the VM and Expedition details using your configuration and traffic logs to start using machine learning to show how App-ID can be employed to reduce the attack surface of your security policies.