Versions
38.0.0
39.0.0
40.0.1
41.0.0
42.0.0 (latest)
Support
Documentation
Analyst manual
Concepts
Clear NDR
®
Capabilities
DoC & DoPV
Host Insights
Outlier Alerts
Conditional Logging
Approaching Threat Hunting
Detection and Event Enrichment Flow
Analyst manual
Security Posture
Analyzing Compromises
Analyzing Violations
Analytics
Encryption
Evidence
Hunting
Hunting Filters
Kibana Dashboards
Administration
Overview
Authentication
Clear NDR
®
Central Server settings
Capture Settings
Network Security Monitoring Settings
Declarations of Compromise
®
Declarations of Policy Violation
®
Events Filtering
File Extraction
Conditional PCAP logging
Global Configuration
Network Definitions
Probe Registration
Probe Templates
Stamus Loggers
Run Your Own Defense (RYOD)
Sources & Rulesets
Suricata Sensors
Threat Intelligence
Integrations
Webhooks and workflows
Linking towards Clear NDR
®
GUI
External Links Templates
Crowdstrike
Forescout eyeExtend
Microsoft
SentinelOne
Splunk
Architectures
Deployment Guidelines
Cloud Installations
Air gapped installations
Multiple Tenants
Maintenance
Licensing
Preparing the Installation
Installing Clear NDR
®
Central Server
Stamus Network Appliances
USB Installation
Backup & Restore
Systems Upgrade
Troubleshooting
Monitoring
Releases Notes
Stamus Support
Security Upgrade Policy
Developer Corner
REST API
SOAR Integration Examples
Python SDK
Data Structure
JSON Data Format
Feature Request
Community
Stamus App for Splunk
Suricata Language Server
Clear NDR
®
Community
Let’s Chat!
Analyst manual
¶
Security Posture
Top Menu Bar Options
Operational Center
Analyzing Compromises
Declaration of Compromise
®
Analyzing Violations
Declaration of Policy Violation
®
Analytics
Beaconing
Sightings
Detection Methods
Newly Registered Domains (NRD)
SMB Insights
Anatomy of a detection event
Additional resources
Encryption
Introduction / Setup
Logs and detection
Machine Learning-Enabled TLS Beaconing Detection
Decryption
Evidence
Hunting
Introduction
Top Menu Bar Options
Understanding the search
Keyboard shortcuts
Hunting Examples
Hunting Filters
Default hunting filters
Proactive Threat Hunting
Introduction to Guided Threat Hunting Filter Sets
User Defined Filters
IP Filter
ES Filters
Specific Filters
Creating Filter Sets
Complete List of Predefined Hunting Filter Sets
After the Initial Hunt
Kibana Dashboards
Export Kibana visualizations as CSV file
Export Kibana visualizations and dashbords from Stack Management
Edit Kibana visualizations
Create Kibana visualizations