Search Filters
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

57 total results found

UTMStack Module installation manual

Reporting and documenting

Alert management Reporting and Documenting

At the top side of the screen, you can see four icons to manage the reports Save reports: Yo...

Search

Log Explorer

Filtering

Log Explorer

Module installation manual

UTMStack Module installation manual

1- Installation of modules 1.1- Pre-installation requirements 1.1.1- On all UTMStack servers (M...

AD Auditor

AD Auditor

The UTMSTack AD Auditor is divided into three sections: Overview, AD auditor, and Activity Tracke...

Overview

AD Auditor Overview

Overview This page displays a graphical organization's Active Directory view divided into five t...

AD auditor

AD Auditor AD Auditor

This section displays the Active directory structure. It includes a search bar to find an objec...

Activity tracker

AD Auditor Activity Tracker

The tracking functions allow monitoring the activity of specific objects, creating exhaustive rep...

Alerts summary

Alert management Alerts Summary

UTMStack runs on a standard web browser. When you first log in, it displays the main page. Go to ...

Search and filtering

Alert management Search and Filtering

On the left side of the screen, you find the next fields. Each field includes a search bar to fin...

Tags

Alert management Tag management

Tags can be used as a quick method of identifying and filtering alertsClick on the Manage tags ta...

Create a new dashboard

Dashboard builder

UTMSTack processes data and displays the results in different dashboards for real-time analysis. ...

Alert rule management

Alert management Alert Rule Management

Concepts Alerts work by running checks on a schedule to detect conditions. When a condition is m...

Manage events

Alert management Manage Event

An Event is any change in your system. The logs for instance, represent an event that occurred. ...

New compliance report

Compliance management New compliance report

If our predefined reports do not suit your needs, you can either modify an existing report or gen...

Compliance management

Compliance management Compliance management

Compliance management This view displays a column with different regulatory standards (you can a...

Dashboards

Compliance management Dashboards

Dashboards A dashboard is a type of graphical user interface that provides at-a-glance views of ...

Visualization

Visualization Builder Visualization builder

1. Go to Visualization displays a table view with a list of visualizations. You can sort them by ...

New scan

Vulnerability management New scan

Go to Vulnerabilties>New scan. Create a new task and then execute the scan. You can configure...

Overview

Vulnerability management Overview

Go to the Vulnerabilities tab, and click to display a drop-down list with three options: New s...

Scan results

Vulnerability management Scan results

Scan results. In this section, you can configure and manage the scans. Clicking on scan res...

Schedules

Vulnerability management Scan results

3.7 Schedules. Select a previously configured schedule from the tabular list. The following deta...

Logs Summary

Log Explorer

By default, the page displays a tabular summary of the logs. The table view lists all the logs i...

Scan results

Vulnerability management

AD Auditor

The excessive access privileges, the increasing amount of devices with access to confidential dat...

Activity Tracker

AD Auditor

The UTMSTack AD Auditor is divided into three sections: Overview, AD auditor, and Activity Tracke...

Alert management

UTMStack monitors, collects, and correlates data to generate alerts based on the predefined rules...

Compliance management

Compliance management is the process by which managers plan, organise, control, and lead activiti...

Visualization Builder

This function allows for creating a new visualization. UTMStack processes data and displays the r...

Vulnerability management

The UTMStack built-in vulnerability scanner can detect known and unknown vulnerabilities in the n...

UTMStack Installation Manual

Dashboard builder

A dashboard displays a collection of visualizations and searches. You can arrange, resize, edit, ...

Log Explorer

The Log explorer is the default tool used to manage all related to Log exploration. It provides a...

Overview

AD Auditor

Provides an overview of the active directory

AD Auditor

AD Auditor

The UTMSTack AD Auditor is divided into three sections: Overview, AD auditor, and Activity Tracker.

Alerts Summary

Alert management

Overview

Vulnerability management

This chapter describes the overview page.

Search and Filtering

Alert management

Reporting and Documenting

Alert management

Tag management

Alert management

A tag is a small data package consisting of a name and a value that is attached to a resource of ...

Alert Rule Management

Alert management

Configure rules to trigger actions when certain conditions are met.

Manage Event

Alert management

UTMSTack receives normalized log data from one or more Sensors, correlates and prioritizes them. ...

New compliance report

Compliance management

UTMSTack compliance management menu displays three options: 1. New compliance report 2. Complia...

Compliance management

Compliance management

UTMSTack compliance management menu displays three options: 1. New compliance report 2. Complia...

Dashboards

Compliance management

UTMSTack compliance management menu displays three options: 1. New compliance report 2. Complia...

Visualization builder

Visualization Builder

New scan

Vulnerability management

This chapter describes how to configure a new scan.

Port List

Vulnerability management Scan results

3.8 Ports list. Managing Port Lists. All existing port lists can be displayed by clicking on the...