NicoTest
1st place
310 points
Awards
Hint 241
hints
Hint for 25 - Threat Detection Incident Response: Search Natural Language I
-10
Solves
| Challenge | Category | Value | Time |
| 23 - Threat Detection Incident Response: Search Timeline II | 0: New-Scale 101, Compromised Insider, Malicious Insider | 20 | |
| 22 - Threat Detection Incident Response: Search Timeline I | 0: New-Scale 101, Compromised Insider, Malicious Insider | 25 | |
| 21 - Threat Detection Incident Response: Threat Center VI | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 20 - Threat Detection Incident Response: Threat Center V | 0: New-Scale 101, Compromised Insider, Malicious Insider | 15 | |
| 19 - Threat Detection Incident Response: Threat Center IV | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 18 - Threat Detection Incident Response: Threat Center III | 0: New-Scale 101, Compromised Insider, Malicious Insider | 15 | |
| 17 - Threat Detection Incident Response: Threat Center II | 0: New-Scale 101, Compromised Insider, Malicious Insider | 15 | |
| 16 - Threat Detection Incident Response: Threat Center I | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 15 - Security Management: Threat Detection Management VI | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 14 - Security Management: Threat Detection Management V | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 13 - Security Management: Threat Detection Management IV | 0: New-Scale 101, Compromised Insider, Malicious Insider | 20 | |
| 12 - Security Management: Threat Detection Management III | 0: New-Scale 101, Compromised Insider, Malicious Insider | 25 | |
| 11 - Security Management: Threat Detection Management II | 0: New-Scale 101, Compromised Insider, Malicious Insider | 15 | |
| 10 - Security Management: Threat Detection Management I | 0: New-Scale 101, Compromised Insider, Malicious Insider | 25 | |
| 9 - Attack Surface Insights: Devices | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 8 - Attack Surface Insights: Users | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 7 - Context Management II | 0: New-Scale 101, Compromised Insider, Malicious Insider | 15 | |
| 6 - Context Management I | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 5 - Log Stream: Enrichment | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 4 - Log Stream: Parsers II | 0: New-Scale 101, Compromised Insider, Malicious Insider | 15 | |
| 3 - Log Stream: Parsers I | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 2 - Collection | 0: New-Scale 101, Compromised Insider, Malicious Insider | 10 | |
| 1 - Platform Overview: Start Here! | 0: New-Scale 101, Compromised Insider, Malicious Insider | 5 |