You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
#### Enterprise-ready SIEM and XDR powered by Real-Time correlation and Threat Intelligence
18
17
19
-
Welcome to the UTMStack open-source project! UTMStack is a unified threat management platform that merges SIEM (Security Information and Event Management) and XDR (Extended Detection and Response) technologies. Our unique approach allows real-time correlation of log data, threat intelligence, and malware activity patterns from multiple sources, enabling the identification and halting of complex threats that use stealthy techniques. Visit an [online demo here.](https://utmstack.com/demo)
18
+
## Introduction
20
19
21
-
We have a [dedicated repository](https://github.com/utmstack/rules) for correlation rules, contributors are welcome to submit a pull request.
20
+
Welcome to the UTMStack open-source project! UTMStack is a unified threat management platform that merges SIEM (Security Information and Event Management) and XDR (Extended Detection and Response) technologies. Our unique approach allows real-time correlation of log data, threat intelligence, and malware activity patterns from multiple sources, enabling the identification and halting of complex threats that use stealthy techniques. Visit an [online demo here.](https://utmstack.com/demo)
@@ -33,7 +38,6 @@ We have a [dedicated repository](https://github.com/utmstack/rules) for correla
33
38
- SOC AI-Powered Analysis
34
39
- Security Compliance
35
40
36
-
37
41
## Why UTMStack?
38
42
39
43
UTMStack stands out in threat prevention by surpassing the boundaries of traditional systems. Our software platform can swiftly analyze log data to identify and halt threats at their source in real-time, even if the threat was not directly detected on the server itself. This seamless integration of SIEM and XDR capabilities sets UTMStack apart from competitors, providing organizations with an effective, holistic cybersecurity suite that enhances threat detection, response, and remediation across clients’ valuable digital infrastructure. Correlation happens before data ingestion, reducing workload and improving response times.
@@ -80,7 +84,7 @@ Definitions:
80
84
- Cold log storage: archived data that should be restored before accessing it.
81
85
- Data source: any individual source of logs, for example, devices, agents, SaaS integrations.
82
86
83
-
Resources needed for one month of hot log storage.
87
+
Required resources for one month of hot log storage.
84
88
- For 50 data sources (120 GB) of hot log storage you will need 4 Cores, 16 GB RAM, 150 GB Disk Space
85
89
- For 120 data sources (250 GB) of hot log storage you will need 8 Cores, 16 GB RAM, 250 GB Disk Space
86
90
- For 240 data sources (500 GB) of hot log storage you will need 16 Cores, 32 GB RAM, 500 GB Disk Space
@@ -109,16 +113,16 @@ Once UTMStack is installed, use admin as the user and the password generated dur
109
113
Note: Use HTTPS in front of your server name or IP to access the login page.
110
114
111
115
### Required ports
112
-
- 22/TCP Secure Shell (We recommend to create a firewall rule to allow it only from admin workstation)
113
-
- 80/TCP UTMStack Web-based Graphical User Interface Redirector (We recommend to create a firewall rule to allow it only from admin and security analyst workstations)
114
-
- 443/TCP UTMStack Web-based Graphical User Interface (We recommend to create a firewall rule to allow it only from admin and security analyst workstations)
115
-
- 9090/TCP Cockpit Web-based Graphical Interface for Servers (We recommend to create a firewall rule to allow it only from admin workstation)
116
-
- Others ports will be required during the configuration of UTMStack's integrations in order to receive logs. (Please follow the security recommendations given on the integration guide if exists)
116
+
- 22/TCP Secure Shell (We recommend creating a firewall rule to allow it only from admins workstations)
117
+
- 80/TCP UTMStack Web-based Graphical User Interface Redirector (We recommend creating a firewall rule to allow it only from admin and security analyst workstations)
118
+
- 443/TCP UTMStack Web-based Graphical User Interface (We recommend creating a firewall rule to allow it only from admin and security analyst workstations)
119
+
- 9090/TCP Cockpit Web-based Graphical Interface for Servers (We recommend creating a firewall rule to allow it only from admin workstation)
120
+
- Others ports will be required during the configuration of UTMStack's integrations to receive logs. (Please follow the security recommendations given on the integration guide if exists)
117
121
118
122
# FAQ
119
123
- Is this based on Grafana, Kibana, or a similar reporting tool?
120
124
Answer: It is not. UTMStack has been built from the ground up to be a simple and intuitive SIEM/XDR.
121
125
- Does UTMStack use ELK for log correlation?
122
126
Answer: It does not. UTMStack correlation engine was built from scratch to analyze data before ingestion and maximize real-time correlation.
123
-
- What is the difference between the Open Source and Enterprise version?
127
+
- What is the difference between the Open Source and Enterprise versions?
124
128
The enterprise version includes features that would typically benefit enterprises and MSPs. For example, support, faster correlation, frequent threat intelligence updates, and Artificial Intelligence.
Copy file name to clipboardExpand all lines: backend/src/main/java/com/park/utmstack/domain/application_modules/validators/impl/ModuleConfigurationValidator.java
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -32,7 +32,7 @@ public boolean isValid(GroupConfigurationDTO dto, ConstraintValidatorContext con
Copy file name to clipboardExpand all lines: backend/src/main/java/com/park/utmstack/repository/datainput_ingestion/UtmDataInputStatusRepository.java
+11-1Lines changed: 11 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -47,9 +47,19 @@ public interface UtmDataInputStatusRepository extends JpaRepository<UtmDataInput
47
47
* Extract data sources that are not already configured
48
48
* @return A list of ${@link UtmDataInputStatus}
49
49
*/
50
-
@Query("select distinct ds.dataType from UtmDataInputStatus ds where ds.dataType not in (select dt.dataType from UtmDataTypes dt) and ds.dataType != :dataType")
50
+
51
+
@Query("""
52
+
select distinct lower(trim(ds.dataType))
53
+
from UtmDataInputStatus ds
54
+
where lower(trim(ds.dataType)) not in (
55
+
select lower(trim(dt.dataType)) from UtmDataTypes dt
56
+
)
57
+
and lower(trim(ds.dataType)) != lower(trim(:dataType))
0 commit comments