Books
AD Auditor
The excessive access privileges, the increasing amount of devices with access to confidential dat...
Alert management
UTMStack monitors, collects, and correlates data to generate alerts based on the predefined rules...
Compliance management
Compliance management is the process by which managers plan, organise, control, and lead activiti...
Correlation Engine Use Cases and Capabilities
Generic Signature-based and Analysis Heuristic and Rule-based Analysis Machine Learning Anomaly...
Dashboard builder
A dashboard displays a collection of visualizations and searches. You can arrange, resize, edit, ...
Log Explorer
The Log explorer is the default tool used to manage all related to Log exploration. It provides a...
UTMStack Installation Manual
UTMStack Module Installation Manual
Visualization Builder
This function allows for creating a new visualization. UTMStack processes data and displays the r...
Vulnerability management
The UTMStack built-in vulnerability scanner can detect known and unknown vulnerabilities in the n...