ENGINSIGHT
WebsiteLoginKostenloser Testzugang
English
English
  • Overview
  • Features
  • Operation
    • Platform overview
    • Start Guide
    • Platform
      • Dashboard
        • Vulnerability Management
        • Operation Centers
        • My Dashboards
        • Configurations
      • Issues
      • Hosts (Pulsar Agent)
        • Pulsar Agent
        • Host details
        • Policy Manager
        • Software Inventory
        • Intrusion Detection System
        • File Integrity Monitoring
        • System events
        • Update Manager
        • Plugins
        • Machine Learning
      • Host (Pulsar-Agent) BETA
        • Pulsar Agent
        • Hostdetails
        • Softwareinventar
        • Plugins
        • Policies
        • Globale Tags
        • Tag Manager
        • System Events
        • Vulnerability Manager
        • Compliance
        • Intrusion Detection System
        • File Integrity Monitoring
        • Advanced Persistent Threats
      • Endpoints (Observer)
        • Endpoint details
        • Domains
        • Certificate Manager
        • Observer
      • Observations
      • Shield
      • Penetration Testing (Hacktor)
        • Run pentest
        • Audits
        • Audit Definitions
        • Target Groups
        • Auth-Providers
        • Hacktor
        • Custom Scripts
      • Discoveries
      • SIEM
        • Data Lake
        • Cockpits
        • Obfuscators
        • Workflows
        • Incidents
        • Extractors
        • Collectors
        • Loggernaut
        • Advanced Settings
        • Models
      • Alerts
      • Settings
      • Organisations
      • Tags
      • Searchbar
  • On-Premises
    • Requirements
    • Installation
      • Automatic Installation
      • Manual Installation
      • Load Balancing
      • SIEM
      • Deinstallation
    • Update
    • Configuration
      • HTTPS and Certificates
      • Licences and Organisations
      • Mail Server
      • 2-Factor Authentication
      • SSO via Office 365
      • Storage Times
      • White Label
      • NGINX Extractor
      • Field Level Encryption
      • Loggernaut-Configurations
  • Technical Details
    • System Requirements
      • Pulsar: Operating Systems
    • Current version numbers
    • Pentest Vectors
    • API
  • Partner section
    • Licenses and organizations
Powered by GitBook
On this page

Was this helpful?

  1. Operation
  2. Platform
  3. SIEM

Models

Models uses historical and current data to recognize patterns in real time and identify deviations at an early stage.

PreviousAdvanced SettingsNextAlerts

Last updated 4 months ago

Was this helpful?

The AI time series makes it possible to compare historical data streams with current activities in real time in order to precisely detect anomalies. Through this continuous comparison, the model identifies deviations at an early stage and detects patterns that could indicate potential security risks. Alerts can be directly linked to conspicuous behavior, which significantly improves your response times. In addition, the insights gained can be clearly visualized via the SIEM cockpit so that you always have an overview of your security situation and can make informed adjustments to your strategies. The potential of the AI time series therefore unfolds in greater proactivity and efficiency of your entire SIEM system.

In the overview, you will find all the models created so far collected in one view.

Add Model

Under SIEM, switch to the “Models” module and click on Add model to create a new model.

  1. Enter a name and a short description.

  2. Select the appropriate stream for your model. If you do not select a stream, the number of all incoming logs will be displayed in the time series model.

  3. You then have the option of specifying a source field name to make your model more specific.

  4. Now select a suitable aggregator from those available. Here you have the choice between:

    1. Average

    2. Minimum

    3. Maximum

    4. Sum

    5. Unique values

    6. Number of values

  5. Your AI module is activated by default. If you do not want this, simply remove the tick.

  6. If you would like to make further settings, click on “Advanced settings” in the header bar. Select Interval to record data directly when it arrives or Variance to have number fields analyzed.

    1. Define the Bucket Size, which specifies the time span in which data points are aggregated into a bucket.

    2. Under Threshold , you define a limit range from which a certain action is triggered. This range helps to detect anomalies by specifying when values are considered unusual.

    3. The Delay determines how long to wait after a certain event before starting an analysis or action. This helps to minimize noise or false alerts.

Depending on the amount of data to be fed in, it may take some time to create your configured model.

Make sure that your model has at least 7 days of training data available. The system analyzes patterns hourly, daily and weekly - less data leads to unreliable forecasts and frequent false alerts.