Books
[Start here] Installation Guide
UTMSatck installation guide for a monolithic and distributed architecture.
AD Auditor
The excessive access privileges, the increasing amount of devices with access to confidential dat...
Correlation rules
UTMStack is continuously fed event logs from a large number of sources in its organization's netw...
Dashboard builder
A dashboard displays a collection of visualizations and searches. You can arrange, resize, edit, ...
Data Parsing
Data parsing is a process in which a string of data is converted from one format to another. A da...
Incident Response
Incident response is the process by which Computer Security Incident Response Teams (CSIRT) help ...
Index Patterns
UTMStack requires index patterns to access the data that you want to explore. An index pattern se...
Log Explorer
UTMStack includes the Log Explorer module to filter and analyze data about logs, alerts, and acti...
Threat management
UTMStack monitors, collects, and correlates data to generate alerts based on the predefined rules...
Use Cases and Capabilities
Generic Signature-based and Analysis Heuristic and Rule-based Analysis Machine Learning Anomaly...
UTMStack Configuration
The Log explorer is the default tool used to manage all related to Log exploration. It provides a...
UTMStack Integrations
UTMStack collects and integrates security-related information from throughout an organization's I...
UTMStack Settings
UTMStack includes Settings Modules to allow users to adjust their user preferences, configure the...
Vulnerability Management (Vulnerability Scan)
UTMStack includes a Vulnerability Management solution that allows you automatically scan any user...