Search Filters
Search Results
48 total results found
AD Auditor
The excessive access privileges, the increasing amount of devices with access to confidential dat...
Log filters
Log filters allow for parsing and mutating log data. UTMStack uses logstash and the Grok filter p...
Add a new index pattern
UTMStack requires an index pattern to access the data you want to explore. An index pattern selec...
Default index patterns
UTMStack includes default index patterns such as: alert-*: Query all data that is in the data ...
Heat Map
A heat map allows graphing the individual values contained in a matrix through colors. The metric...
Region Map
A Region Map displays the aggregation metrics values by IP addresses by specifying the aggregatio...
Metric
A metric visualization displays a single number for each aggregation you select: Metric Aggregat...
Gauge
A gauge visualization displays in which predefined range falls your metric. Metric Aggregations:...
Goal
A goal visualization displays how your metric progresses toward a fixed goal. Metric Aggregation...
List
The List visualization shows a list with the data that you select in the Field. You can create a ...
Table
The Table visualization displays aggregated data according to the metric. Metric Aggregations: ...
Tag Cloud Chart
A tag cloud visualization is a visual representation of text data that allows you to visualize fr...
Line, Area LineBar, Bar, and Bar Horizontal charts
Line, Area LineBar, Bar, and Bar Horizontal charts allow you to plot your data on the X/Y axis. ...
Pie charts
The slice size of a pie chart is determined by the metrics aggregation. The following aggregation...
New dashboard
When you first log in to the UTMVault, go to the Dashboard tab to display the option: New dashboa...
Correlation features and Use Cases
Generic Signature-based and Rule-Based Analysis Automated log analysis and management accelerate...
Syslog Integrations
Deprecation note: this configuration is only requered for UTMStack versions previous to 8.x as th...
Use Cases and Capabilities
Generic Signature-based and Analysis Heuristic and Rule-based Analysis Machine Learning Anomaly...
Log Explorer
UTMStack includes the Log Explorer module to filter and analyze data about logs, alerts, and acti...
Index Patterns
UTMStack requires index patterns to access the data that you want to explore. An index pattern se...
UTMStack Integrations
UTMStack collects and integrates security-related information from throughout an organization's I...
Data Parsing
Data parsing is a process in which a string of data is converted from one format to another. A da...
UTMStack Settings
UTMStack includes Settings Modules to allow users to adjust their user preferences, configure the...
UTMStack Configuration
The Log explorer is the default tool used to manage all related to Log exploration. It provides a...
Dashboard builder
A dashboard displays a collection of visualizations and searches. You can arrange, resize, edit, ...
Threat management
UTMStack monitors, collects, and correlates data to generate alerts based on the predefined rules...
Overview Dashboard
The AD Audit is the tool that keeps track of the user activity in the active directory forest. Th...
Correlation rules
UTMStack is continuously fed event logs from a large number of sources in its organization's netw...
Incident Response
Incident response is the process by which Computer Security Incident Response Teams (CSIRT) help ...
Vulnerability Management (Vulnerability Scan)
UTMStack includes a Vulnerability Management solution that allows you automatically scan any user...
[Start here] Installation Guide
UTMSatck installation guide for a monolithic and distributed architecture.
Activity Tracker
Activity tracker allows you to track the activities of any user. When you mark any user for track...
AD Audit
This section is where you can access the entire active directory. You can expand the directory tr...
Application Integration Modules
Click on the menu Integrations to see all the applications that UTMStack has integrated. UTMSt...