• Concepts
    • Declaration of Compromise
    • Approaching Threat Hunting
  • Versions
    • 38.0.0
    • 39.0.0
    • 40.0.1 (latest)
  1. Documentation
  2. Stamus Security Platform
  • Concepts
    • Approaching Threat Hunting
    • Declaration of Compromise
    • Declaration of Policy Violation
    • Detection and Event Enrichment Flow
    • The Most Powerful Capabilities
  • Stamus Security Platform
    • Stamus Central Server
    • Stamus Networks Probe
    • Security Posture
    • Compromises
    • Analytics
    • Encryption
    • Evidence
    • Hunting
    • Hunting Filters
    • Kibana Dashboards
    • Feature Request
  • Administration
    • Overview
    • Authentication
    • SCS settings
    • Capture Settings
    • Network Security Monitoring Settings
    • Declarations of Compromise
    • Declarations of Policy Violation
    • Events Filtering
    • File Extraction
    • Conditional PCAP logging
    • Global Configuration
    • Network Definitions
    • Probe Registration
    • Probe Templates
    • Stamus Loggers
    • Run Your Own Defense (RYOD)
    • Sources & Rulesets
    • Splunk
    • Suricata Sensors
    • Threat Intelligence
    • Webhooks
    • External Links Templates
  • Architectures
    • Single Tenant
    • Multiple Tenants
    • Cloud Installations
    • Deployment Guidelines
  • Maintenance
    • Licensing
    • Preparing the Installation
    • Installing Stamus Central Server
    • Stamus Network Appliances
    • USB Installation
    • Backup & Restore
    • Systems Upgrade
    • Troubleshooting
    • Monitoring
    • Releases Notes
    • Stamus Support
  • Developer Corner
    • REST API
    • SOAR Integration Examples
    • Python SDK
    • Data Structure
    • JSON Data Format
  • Community
    • SELKS
    • GopherCap
    • Let’s Chat!

Stamus Security Platform¶

  • Stamus Central Server
  • Stamus Networks Probe
  • Security Posture
    • Top Menu Bar Options
    • Operational Center
  • Compromises
    • Impacted Assets
    • Timeline
    • Coverage
  • Analytics
    • Beaconing
    • Sightings
    • Detection Methods
    • Newly Registered Domains (NRD)
    • Anatomy of a detection event
    • Additional resources
  • Encryption
    • Introduction / Setup
    • Logs and detection
    • Machine Learning-Enabled TLS Beaconing Detection
    • Decryption
  • Evidence
  • Hunting
    • Introduction
    • Top Menu Bar Options
    • Understanding the search
    • Keyboard shortcuts
    • Hunting Examples
  • Hunting Filters
    • Overview
    • Predefined Hunting Filter Sets
    • User Defined Filters
    • IP Filter
    • ES Filters
    • Specific Filters
    • Creating Filter Sets
  • Kibana Dashboards
    • Export Kibana visualizations as CSV file
    • Export Kibana visualizations and dashbords from Stack Management
    • Edit Kibana visualizations
    • Create Kibana visualizations
  • Feature Request
    • Requesting a Feature