Concepts
Declaration of Compromise
Approaching Threat Hunting
Versions
38.0.0
39.0.0
40.0.1 (latest)
Support
Documentation
Concepts
Concepts
Approaching Threat Hunting
Declaration of Compromise
Stamus Central Server
Security Posture
Compromises
Analytics
Hunting
Hunting Filters
Kibana Dashboards
Feature Request
Administration
Overview
Authentication
Capture Settings
Declarations of Compromise
Events Filtering
File Extraction
Global Configuration
Network Definitions
Probe Registration
Probe Templates
Run Your Own Defense (RYOD)
Sources & Rulesets
Splunk
Suricata Sensors
Threat Intelligence
Webhooks
Architectures
Single Tenant
Multiple Tenants
Cloud Architectures
Maintenance
Licensing
Preparing the Installation
Installing Stamus Central Server
Stamus Network Appliances
USB Installation
Backup & Restore
Systems Upgrade
Troubleshooting
Releases Notes
Stamus Support
Developer Corner
REST API
SOAR Integration Examples
Python SDK
Data Structure
JSON Data Format
Community
SELKS
GopherCap
Let’s Chat!
Warning:
You are viewing an older version of this documentation. Most recent is here:
40.0.1
Concepts
¶
Approaching Threat Hunting
Building your Cyber Defense with SCS
Context Understanding
Active Hunting
Serious & Imminent Threats
Policies Overview
Use Cases
Creating a Policy
Policy Actions
Best Practices
Declaration of Compromise
Detection Engines
Indicators of Compromise (IoC)
Declaration of Compromise (DoC)