Effective Security Workflows

Hi Everyone,

I have just started using ICON and I am looking for effective workflow ideas. Could you please share some different workflow concepts? I do not need the entire workflow in detail, just the ideas.

For context, I am have workflows related to AbusedIPDBs and multi-country authentication.

Thank you!

1 Like

Iā€™d start with the Discover tab in ICON, there are a lot of Workflow ideas there. You could always use these as a starting point.
image

1 Like