Search Filters
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

55 total results found

Log Explorer

The Log explorer is the default tool used to manage all related to Log exploration. It provides a...

New scan

Vulnerability management New scan

Go to Vulnerabilties>New scan. Create a new task and then execute the scan. You can configure...

Alert Rule Management

Threat management

Configure rules to trigger actions when certain conditions are met.

AD Auditor

AD Auditor

The UTMSTack AD Auditor is divided into three sections: Overview, AD auditor, and Activity Tracke...

Overview

AD Auditor Overview

Overview This page displays a graphical organization's Active Directory view divided into five t...

AD auditor

AD Auditor AD Auditor

This section displays the Active directory structure. It includes a search bar to find an objec...

Activity tracker

AD Auditor Activity Tracker

The tracking functions allow monitoring the activity of specific objects, creating exhaustive rep...

New compliance report

Compliance management New compliance report

If our predefined reports do not suit your needs, you can either modify an existing report or gen...

Compliance management

Compliance management Compliance management

Compliance management This view displays a column with different regulatory standards (you can a...

Dashboards

Compliance management Dashboards

Dashboards A dashboard is a type of graphical user interface that provides at-a-glance views of ...

Visualization

Visualization Builder Visualization builder

1. Go to Visualization displays a table view with a list of visualizations. You can sort them by ...

Overview

Vulnerability management Overview

Go to the Vulnerabilities tab, and click to display a drop-down list with three options: New s...

Reporting and Documenting

Threat management

Scan results

Vulnerability management Scan results

Scan results. In this section, you can configure and manage the scans. Clicking on scan res...

Schedules

Vulnerability management Scan results

3.7 Schedules. Select a previously configured schedule from the tabular list. The following deta...

Port List

Vulnerability management Scan results

3.8 Ports list. Managing Port Lists. All existing port lists can be displayed by clicking on the...

Credentials

Vulnerability management Scan results

3.9 Credentials. Credentials for local security checks are required to allow NVTs to log into ta...

Logs summary

Log Explorer Logs Summary

Go to the Log explorer tab and click to display a drop-down list. Select the first option: Log ex...

Search

Log Explorer Search

Enter a query in the search box. A query extracts a report over a defined time frame. At the top ...

Filtering

Log Explorer Filtering

UTMStack uses several filtering criteria to get information about specific events or alarms. The...

Reporting

Log Explorer Reporting

UTMStack generates user-customized reports: Select SAVE   to save a query with a name and an o...

New dashboard

Dashboard builder Create a new dashboard

When you first log in to the UTMVault, go to the Dashboard tab to display the option: New dashboa...

Tag management

Threat management

A tag is a small data package consisting of a name and a value that is attached to a resource of ...

Search and Filtering

Threat management

AD Auditor

The excessive access privileges, the increasing amount of devices with access to confidential dat...

New compliance report

Compliance management

UTMSTack compliance management menu displays three options: 1. New compliance report 2. Complia...

Compliance management

Compliance management is the process by which managers plan, organise, control, and lead activiti...

Dashboard builder

A dashboard displays a collection of visualizations and searches. You can arrange, resize, edit, ...

Visualization Builder

This function allows for creating a new visualization. UTMStack processes data and displays the r...

Threat management

UTMStack monitors, collects, and correlates data to generate alerts based on the predefined rules...

Vulnerability management

The UTMStack built-in vulnerability scanner can detect known and unknown vulnerabilities in the n...

Correlation Engine Use Cases and Capabilities

Generic Signature-based and Analysis Heuristic and Rule-based Analysis Machine Learning Anomaly...

Overview

AD Auditor

Provides an overview of the active directory

AD Auditor

AD Auditor

The UTMSTack AD Auditor is divided into three sections: Overview, AD auditor, and Activity Tracker.

Activity Tracker

AD Auditor

The UTMSTack AD Auditor is divided into three sections: Overview, AD auditor, and Activity Tracke...

Compliance management

Compliance management

UTMSTack compliance management menu displays three options: 1. New compliance report 2. Complia...

Alerts Summary

Threat management

Dashboards

Compliance management

UTMSTack compliance management menu displays three options: 1. New compliance report 2. Complia...

Visualization builder

Visualization Builder

New scan

Vulnerability management

This chapter describes how to configure a new scan.

Overview

Vulnerability management

This chapter describes the overview page.

Scan results

Vulnerability management

Logs Summary

Log Explorer

By default, the page displays a tabular summary of the logs. The table view lists all the logs i...

Search

Log Explorer

Filtering

Log Explorer

Reporting

Log Explorer

Create a new dashboard

Dashboard builder

UTMSTack processes data and displays the results in different dashboards for real-time analysis. ...

Correlation features and Use Cases

Correlation Engine Use Cases and Capabi...

Generic Signature-based and Rule-Based Analysis Automated log analysis and management accelerate...