• Concepts
    • Declaration of Compromise
    • Approaching Threat Hunting
  • Versions
    • 38.0.0
    • 39.0.0
    • 40.0.1 (latest)
  1. Documentation
  2. Concepts
  • Concepts
    • Approaching Threat Hunting
    • Declaration of Compromise
    • Declaration of Policy Violation
    • Detection and Event Enrichment Flow
    • The Most Powerful Capabilities
  • Stamus Security Platform
    • Stamus Central Server
    • Stamus Networks Probe
    • Security Posture
    • Compromises
    • Analytics
    • Encryption
    • Evidence
    • Hunting
    • Hunting Filters
    • Kibana Dashboards
    • Feature Request
  • Administration
    • Overview
    • Authentication
    • SCS settings
    • Capture Settings
    • Network Security Monitoring Settings
    • Declarations of Compromise
    • Declarations of Policy Violation
    • Events Filtering
    • File Extraction
    • Conditional PCAP logging
    • Global Configuration
    • Network Definitions
    • Probe Registration
    • Probe Templates
    • Stamus Loggers
    • Run Your Own Defense (RYOD)
    • Sources & Rulesets
    • Splunk
    • Suricata Sensors
    • Threat Intelligence
    • Webhooks
    • External Links Templates
  • Architectures
    • Single Tenant
    • Multiple Tenants
    • Cloud Installations
    • Deployment Guidelines
  • Maintenance
    • Licensing
    • Preparing the Installation
    • Installing Stamus Central Server
    • Stamus Network Appliances
    • USB Installation
    • Backup & Restore
    • Systems Upgrade
    • Troubleshooting
    • Monitoring
    • Releases Notes
    • Stamus Support
  • Developer Corner
    • REST API
    • SOAR Integration Examples
    • Python SDK
    • Data Structure
    • JSON Data Format
  • Community
    • SELKS
    • GopherCap
    • Let’s Chat!

Concepts¶

  • Approaching Threat Hunting
    • Building your Cyber Defense with SCS
    • Context Understanding
    • Active Hunting
    • Serious & Imminent Threats
    • Policies Overview
    • Use Cases
    • Creating a Policy
    • Exporting/Importing a Policy and Filtersets
    • Policy Actions
    • Best Practices
  • Declaration of Compromise
    • Detection Engines
    • Indicators of Compromise (IoC)
    • Declaration of Compromise (DoC)
  • Declaration of Policy Violation
    • Overview:
    • Key Features:
  • Detection and Event Enrichment Flow
  • The Most Powerful Capabilities
    • Combining the Best of Capabilities