Skip to content

Commit

Permalink
Fix broken image links
Browse files Browse the repository at this point in the history
  • Loading branch information
JessicaValdes0032 committed Oct 12, 2023
1 parent bb96421 commit 5175c53
Show file tree
Hide file tree
Showing 10 changed files with 46 additions and 46 deletions.
Binary file added Images/utmstack.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
6 changes: 5 additions & 1 deletion Installation/MasterServerInstallation.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,11 @@ This guide will walk you through the process of installing UTMStack on a Linux s

## Step 1: Prepare the System

Before starting the installation, make sure that your system meets the minimum requirements and is up to date. Run the following commands to update the package list and install the necessary dependencies:
Before starting the installation, make sure that your system meets the minimum requirements and is up to date.

Please refer to the **<a href="./SystemRequirements">System Requirements</a>** page in the UTMStack documentation for detailed information about the recommended specifications for your environment.

Execute the following commands to update the package list and install the required dependencies on your Ubuntu 22.04 LTS system:

``` bash
sudo apt update
Expand Down
4 changes: 2 additions & 2 deletions Installation/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -39,11 +39,11 @@ The UTMStack installation process consists of three main steps:

3. **Navigate to Settings**: Locate the settings menu, accessible through a hamburger menu icon on the right side of the interface.

<img title="setting capture" alt="setting capture" src="./Images/Images/../../../Images/settingcapture.PNG">
<img title="setting capture" alt="setting capture" src="./Images/Images/../../../Images/settingcapture.png">

4. **Personalize UTMStack**: Explore the various settings modules available, such as license, data retention, compliance, user access audit, and more. Customize these settings according to your organization's needs and security policies.

<img title="setting capture" alt="setting capture" src="./Images/Images/../../../Images/settingcapture2.PNG">
<img title="setting capture" alt="setting capture" src="./Images/Images/../../../Images/settingcapture2.png">

<br>For more detailed instructions on settings , please refer to the **<a href="../UTMStackComponents/Configuration/Readme">Configuration Section</a>** in the UTMStack documentation.
<br>
Expand Down
64 changes: 30 additions & 34 deletions Introduction.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,53 +3,49 @@ layout: default
title: Introduction
nav_order: 1
permalink: /
---

# UTMStack: Next-Generation SIEM and Compliance Platform

Welcome to the UTMStack documentation, your comprehensive guide to our powerful cybersecurity platform. UTMStack® is a Unified Threat Management Platform specifically designed for hybrid environments, making it easy to deploy across both on-premises and cloud providers. Designed with the most advanced cybersecurity technology, it offers an extensive array of essential cybersecurity solutions. Our platform offers a wide range of modular services, including compliance management, log management, vulnerability management, identity management, threat management, and asset management. This documentation will walk you through the platform's key features, installation requirements, configuration steps, and best practices, enabling you to maximize the security and efficiency of your organization.

As a testament to its adaptability and integration potential, UTMStack seamlessly integrates with the world's leading cloud providers, including Azure and Google Cloud. This high-level compatibility offers increased flexibility and ensures that users can manage their cybersecurity regardless of their infrastructure setup.

## Overview of our Solution
### Powerful Capabilities for Enhanced Security
UTMStack® incorporates a proprietary correlation engine that enables real-time threat detection and response. By analyzing data during ingestion, our platform minimizes detection and response times, allowing you to take swift action against emerging threats. Fine-tuning the system with customizable false positive conditions and tags helps reduce alert fatigue. With a vast collection of over 30 billion Indicators of Compromise (IOC) elements, UTMStack® leverages live threat intelligence platforms and advanced correlation rules to ensure highly effective detection.

### Seamless Integration and Customization
Designed for hybrid environments, UTMStack® can be easily deployed across on-premises and cloud providers. Our platform integrates seamlessly with various technologies, including cloud services, network devices, and more. Leveraging APIs, Syslog, Netflow, or Agents, you can connect UTMStack® to your existing infrastructure, ensuring comprehensive visibility and streamlined security management.

### Threat Intelligence Integration
UTMStack® provides a 24/7 Security Operations Center powered by AI and Threat Intelligence, streamlining alert investigations, automating classification, reducing analyst workload, and enabling real-time threat detection with a proprietary correlation engine.
---

# UTMStack: Elevate Your Cybersecurity with Open Source SIEM and XDR

We believe that these capabilities will greatly enhance the security posture and operational efficiency of your organization.
## Key Features and Modules
Welcome to the UTMStack documentation - your passport to the future of cybersecurity.

### Log Management (SIEM)
UTMStack's Security Information and Event Management (SIEM) module allows you to collect, store, and correlate log data from various sources. By leveraging this information, you can generate compliance reports and gain valuable insights into security incidents.
## [Experience UTMStack in Action!](https://utmstack.com/demo)
![UTMStack Interface](./Images/utmstack.jpg)

### Access Rights Auditor
Track and manage account access and permission changes within your organization. UTMStack's Access Rights Auditor module helps you monitor user activities and sends alerts in the event of suspicious behavior.
## Unleashing Power and Precision
UTMStack is not just another security tool; it is a revolutionary system blending SIEM (Security Information and Event Management) and XDR (Extended Detection and Response) technologies, transforming them into a powerhouse of real-time correlation and threat intelligence.

### Incident Response
Handle security incidents efficiently with UTMStack's Incident Response module. You can remotely manage your environment and respond to attacks directly from the centralized dashboard, ensuring swift and effective incident resolution.
### **Why UTMStack?**
- **Real-Time Threat Intelligence**: Armed with over 30 billion Indicators of Compromise (IoC), UTMStack identifies and mitigates threats in real-time.
- **AI-Powered Analysis**: Experience the synergy of human expertise and artificial intelligence ensuring precise threat detection and response.
- **Holistic View**: Seamless integration with the existing infrastructure for a comprehensive view of your security posture.
- **Compliance Management**: Effortlessly meet GDPR, GLBA, HIPAA, SOC, and ISO standards.

### Endpoint Protection
Protect your endpoints and servers with UTMStack's Advanced Threat Protection. Our platform provides robust security measures to safeguard your critical assets against advanced threats.
[Watch How UTMStack Transforms Security Management](https://www.youtube.com/watch?v=Rqbl65cJMuA)

## Combat Advanced Persistent Threats (APTs)
In the evolving digital landscape, APTs represent a sophisticated and stealthy menace. UTMStack is your fortress, a meticulous guardian that tirelessly works to identify and neutralize intricate threats employing real-time log data correlation, threat intelligence, and malware activity patterns from diverse sources.

### Compliance
Ensure compliance with industry regulations and standards such as GDPR, GLBA, HIPAA, SOC, and ISO. UTMStack provides compliance reports and dashboards to help you demonstrate adherence to these requirements.
## How UTMStack Stands Apart
Your antivirus might be a formidable defense against malware, but when it comes to APTs, UTMStack takes cybersecurity to the next level.

### **Adaptable and Intelligent**
- **AI Integration**: Streamline alert investigations and classification, reducing analyst workload and enhancing accuracy.
- **Real-Time Action**: Swift detection and responsive actions against threats ensuring your organization's digital safety.

### File Tracker
Maintain control over sensitive information with UTMStack's File Tracker. This module enables you to track changes and access to classified data, ensuring data integrity and confidentiality.
[Discover the Intelligence of UTMStack](https://www.youtube.com/watch?v=lKkydWFiu4Y)

## Compliance and Security Hand in Hand
Navigating the intricate web of regulatory requirements is effortless with UTMStack. From HIPAA to GDPR, achieve and demonstrate compliance with intuitive dashboards and detailed reports. Every log, every alert, every action is recorded, analyzed, and stored to simplify audits and ensure accountability.

# Our Commitment
At UTMStack, we are committed to democratizing enterprise-level cybersecurity solutions. We believe that cybersecurity should not be a luxury accessible only to large organizations. Our mission is to provide competitive pricing and make top-notch cybersecurity services accessible to companies of all sizes. By doing so, we aim to significantly reduce the number of small businesses that face financial ruin following a data breach or cyber attack.
### **Security at Its Core**
- **Isolation and Protection**: Every instance shielded, every data encrypted, every access controlled.
- **Global Standards**: Adherence to international security and compliance norms ensuring global applicability.

Join UTMStack Today
## Join the Future of Cybersecurity with UTMStack
Don’t just stay ahead of threats; anticipate, analyze, and annihilate them with UTMStack. Every feature, every module is meticulously crafted, empowering you to transform data into actionable insights, vulnerabilities into fortifications, and threats into opportunities for strengthening security.

Take control of your cybersecurity with UTMStack. Benefit from our comprehensive suite of cybersecurity services, simplified management, and cost-effective solutions. Start protecting your organization against threats and ensuring compliance today.
[Launch Your Own 24/7 Security Operations Center with UTMStack!](https://utmstack.com/demo)

"UTMStack - Where innovation meets invincibility, and security becomes an enabler of innovation!"
2 changes: 1 addition & 1 deletion QuickStart.md
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,7 @@ Post installation, the first time you get access to UTMStack, its going to be re
- **UTMStack email address**: The official UTMStack email address that will be used to send out notifications.
- **UTMStack base url**: The default is `https://UTMStack.UTMStack.com`.
- **UTMStack base url**: This refers to the primary URL or address through which all users and systems interact with the UTMStack platform. For example: `https://UTMStack.UTMStack.com`.
- **Mail Server Host**: For example: `example.hostmail.com`.
Expand Down
4 changes: 2 additions & 2 deletions UTMStackComponents/Dashboards/DashboardCreation.md
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,7 @@ Each visualization in your dashboard can be resized and repositioned to best fit
**Add Filter**
Use the Add Filter option to narrow down the data displayed in your visualizations. This can be particularly useful when you want to filter specific fields of your datasource.

<img alt="dashobard view" src="./../Images/../../Images/Components/Dashboards/myfilter.PNG">
<img alt="dashobard view" src="./../Images/../../Images/Components/Dashboards/myfilter.png">

When creating a filter, you can define various parameters:

Expand All @@ -84,7 +84,7 @@ When creating a filter, you can define various parameters:

After creating and arranging your visualizations in the Dashboard Editor, it's time to save your work. UTMStack provides a variety of saving options to best accommodate your needs.

<img alt="dashobard view" src="./../Images/../../Images/Components/Dashboards/savedashwithmyfilter.PNG">
<img alt="dashobard view" src="./../Images/../../Images/Components/Dashboards/savedashwithmyfilter.png">

* **Name**: Provide a unique name for your dashboard. This name will help identify your dashboard in the list of available dashboards.

Expand Down
6 changes: 3 additions & 3 deletions UTMStackComponents/Incidents/Incidents.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ nav_order: 1
# Incident Managment
The Incident Management page is a crucial component of the UTMStack platform, dedicated to providing a comprehensive overview of all incidents within your organization. Designed to echo the layout and functionality of the Threat Management's Alert page, it ensures a seamless and consistent user experience across different modules.

<img alt="dashobard view" src="./../Images/../../Images/Components/Incidents/dash.PNG">
<img alt="dashobard view" src="./../Images/../../Images/Components/Incidents/dash.png">


## Data Grid
Expand All @@ -22,13 +22,13 @@ On the Incident page, the Filters section lets you drill down on specific incide
## Operations
The Incident Management page extends its functionality by allowing you to perform several key operations on each incident. These include updating the incident's status, adding notes for context, and executing a command for mitigation or resolution. This set of functionalities optimizes your incident response process, ensuring it remains efficient and effective.

<img alt="dashobard view" src="./../Images/../../Images/Components/Incidents/status.PNG">
<img alt="dashobard view" src="./../Images/../../Images/Components/Incidents/status.png">

## Incident Details and Related Alerts

By clicking on an incident, a window appears on the right side presenting detailed information about the incident, as well as alerts related to it. From this view, you can perform operations on the incident, inspect its history, or analyze associated alerts.


<img alt="dashobard view" src="./../Images/../../Images/Components/Incidents/incidentdetails.PNG">
<img alt="dashobard view" src="./../Images/../../Images/Components/Incidents/incidentdetails.png">

This consolidated view of incidents and related alerts boosts your understanding of the security incident landscape, aiding in faster and more informed decision-making.
2 changes: 1 addition & 1 deletion UTMStackComponents/Incidents/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ has_children: true

The **Incident Management Module** stands as a vital component of UTMStack, meticulously designed to address and manage any incidents surfacing within your organization's digital domain. This module bifurcates into two primary sections: Incident Management and Incident Response.

![Dashboard View](./../Images/../../Images/Components/Incidents/menu.PNG)
![Dashboard View](./../Images/../../Images/Components/Incidents/menu.png)

## Incidents

Expand Down
2 changes: 1 addition & 1 deletion UTMStackComponents/Threat Management/AlertManagement.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ nav_order: 1

Welcome to the Alert Management Section. This resource is tailored to guide you through the nuances and intricacies of our Alert Management system. From the mechanisms of correlation rules and alert generation to severity classifications and data visualizations, this guide encapsulates it all.

![Dashboard View](./../Images/../../Images/Components/ThreatManagment/AlertDashboard.PNG)
![Dashboard View](./../Images/../../Images/Components/ThreatManagment/AlertDashboard.png)

## Introduction

Expand Down
2 changes: 1 addition & 1 deletion UTMStackComponents/Threat Management/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,6 @@ The module is split into two key sections:

Additionally, the module comes equipped with an array of predefined alert options. These filters can provide quick views of alerts based on various criteria, such as the source (like Azure or Windows) or the alert classification (such as false positives).

<img alt="dashobard view" src="./../Images/../../Images/Components/ThreatManagment/threatmenu.PNG">
<img alt="dashobard view" src="./../Images/../../Images/Components/ThreatManagment/threatmenu.png">


0 comments on commit 5175c53

Please sign in to comment.