1. /
  2. Security Response/
  3. Glossary/
  4. lookup tables

Glossary

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | _1234567890

lookup tables

A set of configurable tables that let you describe the assets and resources of your network. You populate the lookup tables with information that is used to determine incident severity, for example, specifying the systems that host critical or sensitive information, and the systems that require high availability. For example, the IP Watch List and the Trojan Horses table are two types of lookup tables.