Search Filters
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

14 total results found

AD Auditor

The excessive access privileges, the increasing amount of devices with access to confidential dat...

Use Cases and Capabilities

Generic Signature-based and Analysis Heuristic and Rule-based Analysis Machine Learning Anomaly...

Index Patterns

UTMStack requires index patterns to access the data that you want to explore. An index pattern se...

UTMStack Integrations

UTMStack collects and integrates security-related information from throughout an organization's I...

Data Parsing

Data parsing is a process in which a string of data is converted from one format to another. A da...

UTMStack Settings

UTMStack includes Settings Modules to allow users to adjust their user preferences, configure the...

UTMStack Configuration

The Log explorer is the default tool used to manage all related to Log exploration. It provides a...

Dashboard builder

A dashboard displays a collection of visualizations and searches. You can arrange, resize, edit, ...

Log Explorer

UTMStack includes the Log Explorer module to filter and analyze data about logs, alerts, and acti...

Threat management

UTMStack monitors, collects, and correlates data to generate alerts based on the predefined rules...

Correlation rules

UTMStack is continuously fed event logs from a large number of sources in its organization's netw...

Incident Response

Incident response is the process by which Computer Security Incident Response Teams (CSIRT) help ...

Vulnerability Management (Vulnerability Scan)

UTMStack includes a Vulnerability Management solution that allows you automatically scan any user...

[Start here] Installation Guide

UTMSatck installation guide for a monolithic and distributed architecture.