Books

[Start here] Installation Guide

UTMSatck installation guide for a monolithic and distributed architecture.

AD Auditor

The excessive access privileges, the increasing amount of devices with access to confidential dat...

Correlation rules

UTMStack is continuously fed event logs from a large number of sources in its organization's netw...

Dashboard builder

A dashboard displays a collection of visualizations and searches. You can arrange, resize, edit, ...

Data Parsing

Data parsing is a process in which a string of data is converted from one format to another. A da...

Incident Response

Incident response is the process by which Computer Security Incident Response Teams (CSIRT) help ...

Index Patterns

UTMStack requires index patterns to access the data that you want to explore. An index pattern se...

Log Explorer

UTMStack includes the Log Explorer module to filter and analyze data about logs, alerts, and acti...

Threat management

UTMStack monitors, collects, and correlates data to generate alerts based on the predefined rules...

Use Cases and Capabilities

Generic Signature-based and Analysis Heuristic and Rule-based Analysis Machine Learning Anomaly...

UTMStack Configuration

The Log explorer is the default tool used to manage all related to Log exploration. It provides a...

UTMStack Integrations

UTMStack collects and integrates security-related information from throughout an organization's I...

UTMStack Settings

UTMStack includes Settings Modules to allow users to adjust their user preferences, configure the...

Vulnerability Management (Vulnerability Scan)

UTMStack includes a Vulnerability Management solution that allows you automatically scan any user...