Skip to content

Secops And Incident Response

Malicious user mitigation with threat level classification. Automated response actions for suspicious behavior patterns.

Category: Security

  • Configure automated threat mitigation policies
  • Define rules for malicious user detection
  • Manage incident response workflows
  • Apply blocking or rate limiting to threats
ResourceDescriptionTierDependencies
mitigation_policyMitigation policyAdvancedNone
malicious_user_ruleMalicious user ruleAdvancedNone
DomainDescription
VirtualHTTP, TCP, UDP load balancing with origin pools.
Network SecurityNAT policies, firewalls, and segment connections.

Generated from enriched API specs and local xcsh examples.