The decision more than what occasions constitute a potential security breach is driven by a menace intelligence module that is built to the bundle.Each and every party is logged, so this Section of the system is policy-neutral — it just delivers a listing of activities wherein Examination may reveal repetition of steps or suspiciously numerous ac