ENGINSIGHT
WebsiteLoginKostenloser Testzugang
English
English
  • Overview
  • Features
  • Operation
    • Platform overview
    • Start Guide
    • Platform
      • Dashboard
        • Vulnerability Management
        • Operation Centers
        • My Dashboards
        • Configurations
      • Issues
      • Hosts (Pulsar Agent)
        • Pulsar Agent
        • Host details
        • Policy Manager
        • Software Inventory
        • Intrusion Detection System
        • File Integrity Monitoring
        • System events
        • Update Manager
        • Plugins
        • Machine Learning
      • Host (Pulsar-Agent) BETA
        • Pulsar Agent
        • Hostdetails
        • Softwareinventar
        • Plugins
        • Policies
        • Globale Tags
        • Tag Manager
        • System Events
        • Vulnerability Manager
        • Compliance
        • Intrusion Detection System
        • File Integrity Monitoring
        • Advanced Persistent Threats
      • Endpoints (Observer)
        • Endpoint details
        • Domains
        • Certificate Manager
        • Observer
      • Observations
      • Shield
      • Penetration Testing (Hacktor)
        • Run pentest
        • Audits
        • Audit Definitions
        • Target Groups
        • Auth-Providers
        • Hacktor
        • Custom Scripts
      • Discoveries
      • SIEM
        • Data Lake
        • Cockpits
        • Obfuscators
        • Workflows
        • Incidents
        • Extractors
        • Collectors
        • Loggernaut
        • Advanced Settings
        • Models
      • Alerts
      • Settings
      • Organisations
      • Tags
      • Searchbar
  • On-Premises
    • Requirements
    • Installation
      • Automatic Installation
      • Manual Installation
      • Load Balancing
      • SIEM
      • Deinstallation
    • Update
    • Configuration
      • HTTPS and Certificates
      • Licences and Organisations
      • Mail Server
      • 2-Factor Authentication
      • SSO via Office 365
      • Storage Times
      • White Label
      • NGINX Extractor
      • Field Level Encryption
      • Loggernaut-Configurations
  • Technical Details
    • System Requirements
      • Pulsar: Operating Systems
    • Current version numbers
    • Pentest Vectors
    • API
  • Partner section
    • Licenses and organizations
Powered by GitBook
On this page

Was this helpful?

  1. Operation
  2. Platform
  3. SIEM

Workflows

PreviousObfuscatorsNextIncidents

Last updated 6 months ago

Was this helpful?

Dive into the world of advanced security improvement by creating customized workflows using Event Streams. These workflows provide the backbone for even more effective detection of potential attacks. With just a few clicks, you have the ability to correlate different logs and integrate alerts related to created scenarios.

Create Workflow

Now select an event stream from the list and define the condition under which the workflow is to be triggered. With the help of the text modules, numerous scenarios can be created. Add further conditions via the "Add Workflow condition" button to optimally adapt your workflow to your scenario.

Under "Type" you have the choice between:

  • Filter Set a field name here, which is relevant for the event. Under Operator you can now decide whether this field should be equal or unequal to a value.

  • Group Use this field to consider the connection within the protocols. Example: Imagine you want to track events where a user logs in and then logs out within a short period of time. By setting the process ID to "Group", you can analyze a user's logon behavior. This way you avoid the alert being triggered every time user A logs in and user B logs out.

  • Display Field Specify fields here that you want to be displayed directly in the captured event (without having to browse the detail view first).

By clicking on "Add Refinement", you can include further fields of the previously defined stream.

By clicking on "Add workflow condition", you can also include events from other streams.

Finally, add your workflow by clicking on the "Add Workflow" field.

Click "Add Workflow" to create a new workflow. Assign a unique name and a short description. Below this, define a "severity level". The choices here are: Low, Medium, High and Critical. The selected severity level will be displayed later under and will help you to prioritize quickly.

Incidents