Logo UTMStack
Search Shelves Books Log in
Info
Content
Recent Books

Correlation Engine Use Cases and Capabilities

Generic Signature-based and Analysis Heuristic and Rule-based Analysis Machine Learning Anomaly...

UTMStack Module Installation Manual

UTMStack Installation Manual

Vulnerability management

The UTMStack built-in vulnerability scanner can detect known and unknown vulnerabilities in the n...

Alert management

UTMStack monitors, collects, and correlates data to generate alerts based on the predefined rules...

Visualization Builder

This function allows for creating a new visualization. UTMStack processes data and displays the r...

Dashboard builder

A dashboard displays a collection of visualizations and searches. You can arrange, resize, edit, ...

Compliance management

Compliance management is the process by which managers plan, organise, control, and lead activiti...

AD Auditor

The excessive access privileges, the increasing amount of devices with access to confidential dat...

Log Explorer

The Log explorer is the default tool used to manage all related to Log exploration. It provides a...

Recently Updated Pages

Correlation features and Use Cases

Generic Signature-based and Rule-Based Analysis Automated log analysis and management accelerate...

Manual

1 UTMStack Installation Manual   A guide for Docker Swarm deployment   1.1 Introduction UTMS...

Module installation manual

1- Installation of modules 1.1- Pre-installation requirements 1.1.1- On all UTMStack servers (M...

New scan

Go to Vulnerabilties>New scan. Create a new task and then execute the scan. You can configure...

Logs summary

Go to the Log explorer tab and click to display a drop-down list. Select the first option: Log ex...

New dashboard

When you first log in to the UTMVault, go to the Dashboard tab to display the option: New dashboa...

Dashboards

Dashboards A dashboard is a type of graphical user interface that provides at-a-glance views of ...

Compliance management

Compliance management This view displays a column with different regulatory standards (you can a...

New compliance report

If our predefined reports do not suit your needs, you can either modify an existing report or gen...

Overview

Go to the Vulnerabilities tab, and click to display a drop-down list with three options: New s...

Visualization

1. Go to Visualization displays a table view with a list of visualizations. You can sort them by ...

Filtering

UTMStack uses several filtering criteria to get information about specific events or alarms. The...

Recent Activity
Admin
Admin updated book Correlation Engine Use Cases and Capabilities
3 months ago
Admin
Admin created page Correlation features and Use Cases
3 months ago
Admin
Admin created book Correlation Engine Use Cases and Capabilities
3 months ago
Admin
Admin updated book UTMStack Module Installation Manual
4 months ago
Admin
Admin created page Manual
4 months ago
Admin
Admin updated book Dashboard builder
4 months ago
Admin
Admin updated book Log Explorer
4 months ago

Books

Sort
Name
  • Name
  • Created Date
  • Updated Date

AD Auditor

The excessive access privileges, the increasing amount of devices with access to confidential dat...

Alert management

UTMStack monitors, collects, and correlates data to generate alerts based on the predefined rules...

Compliance management

Compliance management is the process by which managers plan, organise, control, and lead activiti...

Correlation Engine Use Cases and Capabilities

Generic Signature-based and Analysis Heuristic and Rule-based Analysis Machine Learning Anomaly...

Dashboard builder

A dashboard displays a collection of visualizations and searches. You can arrange, resize, edit, ...

Log Explorer

The Log explorer is the default tool used to manage all related to Log exploration. It provides a...

UTMStack Installation Manual

UTMStack Module Installation Manual

Visualization Builder

This function allows for creating a new visualization. UTMStack processes data and displays the r...

Vulnerability management

The UTMStack built-in vulnerability scanner can detect known and unknown vulnerabilities in the n...

Actions
Back to top