Vulnerability Remediation enhances your security posture by providing visibility and intelligence into vulnerabilities and their associated risk
Breach Assessment continuously probes Active Directory for domain misconfigurations, vulnerabilities, and persistence using attack simulations to identify risks
Device Control specifies block or allow policies on different types of devices that attach to client computers, such as USB, infrared, and FireWire devices