Which of the following actions under the Investigate menu will pivot to Falcon Identity Protection from an identity-based detection?
AnswerB
ExplanationFalcon Identity Protection integrates directly with Threat Hunter to enable deeper investigation of identity-based activity. According to the CCIS curriculum, selecting Search for involved entities in Threat Hunter allows analysts to pivot from an identity-based detection into Threat Hunter while preserving identity context.
This pivot enables analysts to examine related users, service accounts, endpoints, and authentication behavior using advanced queries and timelines. Importantly, this action maintains the identity-centric investigation flow, bridging detections with broader hunting capabilities.
The other options do not perform this specific pivot:
Investigating users or endpoints remains within entity views.
Searching for events in Threat Hunter does not preserve entity context.
Because Search for involved entities in Threat Hunter is the correct pivot action, Option B is the verified answer.