You can enable or disable the automatic use of an IOC file for searching for indicators of compromise on hosts with the Endpoint Agent component.
To enable or disable the automatic use of an IOC file for searching for indicators of compromise on hosts with the Endpoint Agent component:
This opens the table of IOC files.
Automatic use of an IOC file for searching for indicators of compromise on hosts with the Endpoint Agent component is enabled or disabled.
Users with the Security auditor and Security officer roles cannot enable or disable automatic application of an IOC file.