4 Click Finish. If you have an active network, you might see something similar to:
NOTE: To display a 3-D graph without real-time events, click the Display Events down-arrow
and select No.
13.1.2 Exploit Detection
To view any events indicating a possible exploitation, you must have the following:
Advisor Feed
Intrusion detection
Vulnerability scanning
294 Sentinel 6.1 Rapid Deployment User Guide