Recently Updated Pages

Linux Agent

UTMStackLinuxAgent Command line installation Download the latest installer from https://github...

MacOS Agent

UTMStack MacOS Agent Command line installation [Recommended] Download the latest installer fro...

Log filters

Log filters allow for parsing and mutating log data. UTMStack uses logstash and the Grok filter p...

Syslog Integrations

This integration can be configured from the Integrations section > Syslog menu. From the Sy...

Reporting

UTMStack generates user-customized reports: Select SAVE   to save a query with a name and an o...

Filtering

UTMStack uses several filtering criteria to get information about specific events or alarms. The...

Search

Enter a query in the search box. A query extracts a report over a defined time frame. At the top ...

Logs summary

Go to the Log explorer tab and click to display a drop-down list. Select the first option: Log ex...

Probe Connection Over the Internet

If you are running UTMStack as a managed service, hosting the master servers in your infrastructu...

Windows agent

Pre-installation requirements Compatible with Windows Server version 2012 R2 or higher. The W...

Installing The UTMStack Server

Operating System This installation guide provides instructions to perform the UTMStack installat...

Overview Dashboard

The AD Audit is the tool that keeps track of the user activity in the active directory forest. Th...

AD Audit

This section is where you can access the entire active directory. You can expand the directory tr...

Activity Tracker

Activity tracker allows you to track the activities of any user. When you mark any user for track...

Correlation features and Use Cases

Generic Signature-based and Rule-Based Analysis Automated log analysis and management accelerate...

Visualization

1. Go to Visualization displays a table view with a list of visualizations. You can sort them by ...

New dashboard

When you first log in to the UTMVault, go to the Dashboard tab to display the option: New dashboa...

Credentials

3.9 Credentials. Credentials for local security checks are required to allow NVTs to log into ta...

Port List

3.8 Ports list. Managing Port Lists. All existing port lists can be displayed by clicking on the...

Schedules

3.7 Schedules. Select a previously configured schedule from the tabular list. The following deta...