Information Centric Analytics (ICA) comes with sets of pre-configured risk models and event scenarios which you can modify and use as you see fit. You may also create new risk models and event scenarios as needed. Risk models and their constituent event scenarios should be designed and implemented in a manner consistent with your intended threat detection and risk mitigation strategy and architecture.
Release : 6.x
Risk modeling architecture, design, and tuning activities fall outside the scope of Broadcom support. If you require assistance with these activities, contact professional services.