• Concepts
    • Declaration of Compromise
    • Approaching Threat Hunting
  • Versions
    • 38.0.0
    • 39.0.0
    • 40.0.1 (latest)
  1. Documentation
  2. Architectures
  • Concepts
    • Approaching Threat Hunting
    • Declaration of Compromise
    • Declaration of Policy Violation
    • Detection and Event Enrichment Flow
    • The Most Powerful Capabilities
  • Stamus Security Platform
    • Stamus Central Server
    • Stamus Networks Probe
    • Security Posture
    • Compromises
    • Analytics
    • Encryption
    • Evidence
    • Hunting
    • Hunting Filters
    • Kibana Dashboards
    • Feature Request
  • Administration
    • Overview
    • Authentication
    • SCS settings
    • Capture Settings
    • Network Security Monitoring Settings
    • Declarations of Compromise
    • Declarations of Policy Violation
    • Events Filtering
    • File Extraction
    • Conditional PCAP logging
    • Global Configuration
    • Network Definitions
    • Probe Registration
    • Probe Templates
    • Stamus Loggers
    • Run Your Own Defense (RYOD)
    • Sources & Rulesets
    • Splunk
    • Suricata Sensors
    • Threat Intelligence
    • Webhooks
    • External Links Templates
  • Architectures
    • Single Tenant
    • Multiple Tenants
    • Cloud Installations
    • Deployment Guidelines
  • Maintenance
    • Licensing
    • Preparing the Installation
    • Installing Stamus Central Server
    • Stamus Network Appliances
    • USB Installation
    • Backup & Restore
    • Systems Upgrade
    • Troubleshooting
    • Monitoring
    • Releases Notes
    • Stamus Support
  • Developer Corner
    • REST API
    • SOAR Integration Examples
    • Python SDK
    • Data Structure
    • JSON Data Format
  • Community
    • SELKS
    • GopherCap
    • Let’s Chat!

Architectures¶

  • Single Tenant
  • Multiple Tenants
    • Multi Tenancy
    • Chained SCS Tenancy
  • Cloud Installations
    • AWS - Amazaon Web Services
    • GCP - Google cloud platform
    • Microsoft Azure Cloud
    • Considerations
  • Deployment Guidelines
    • Traffic Capture Points
    • Traffic Forwarding
    • Requirements
    • Configuration Recommendations
    • Challenges