Threat Response integrates with AMP for Endpoints to provide Visibility and Control. By adding the AMP for Endpoints module to Threat Response, investigators will be able to search for IP addresses, domains, URLs and file hashes that has been recorded by AMP for Endpoints. AMP for Endpoints also provides you the capabilities within Threat Response to block a file SHA or isolate an affected host.
To integrate AMP for Endpoints with Threat Response, you may follow the in product configuration steps or check out our AMP module configuration video on YouTube.
Learn more about Threat Response here, or check out other FAQs here.