Skip to content
This repository was archived by the owner on Apr 4, 2025. It is now read-only.

Commit 1605c49

Browse files
authored
Add Integrations and other bugs (#17)
1 parent a51573e commit 1605c49

File tree

8 files changed

+31
-6
lines changed

8 files changed

+31
-6
lines changed

Images/Integrations/IBMAIXlogo.png

49.2 KB
Loading

Images/Integrations/fortiweblogo.png

28.3 KB
Loading

Images/Integrations/netflowlogo.png

68.2 KB
Loading

Images/Integrations/pfsenselogo.png

34 KB
Loading

Integrations/ThreatDetectionandResponse.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,3 +62,10 @@ Our team is always working on a new integration, but here is the list of what we
6262
| 42 | Nginx | <img title="Nginx" alt="Nginx" src="../Images/Integrations/logonginx.svg"> |
6363
| 43 | Sophos Central | <img title="Sophos Central" alt="Sophos Central" src="../Images/Integrations/logosophoscentral.svg"> |
6464
| 44 | SentinelOne Endpoint Security | <img title="SentinelOne Endpoint Security" alt="SentinelOne Endpoint Security" src="../Images/Integrations/logosentinelone.svg"> |
65+
| 45 | PfSense | <img title="SentinelOne Endpoint Security" alt="SentinelOne Endpoint Security" src="../Images/Integrations/pfsenselogo.png"> |
66+
| 46 | IBM AIX | <img title="SentinelOne Endpoint Security" alt="SentinelOne Endpoint Security" src="../Images/Integrations/IBMAIXlogo.png.png"> |
67+
| 47 | FortiWeb | <img title="SentinelOne Endpoint Security" alt="SentinelOne Endpoint Security" src="../Images/Integrations/logofortigate.png"> |
68+
| 48 | NetFlow | <img title="SentinelOne Endpoint Security" alt="SentinelOne Endpoint Security" src="../Images/Integrations/netflowlogo.png"> |
69+
70+
71+

QuickStart.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Follow the provided guide: [Generate SSL with Certbot](./Installation/SSLConfigu
5353
5454
## 2. Initial Configuration
5555
56-
Post installation, the first time you get access to UTMStack, its going to be required that enter the old password and establish the new one.The default username is `admin`. Your initial password and other configurations can be found in `/root/UTMStack.yml`.
56+
Post installation, the first time you get access to UTMStack, its going to be required that enter the old password and establish the new one.The default username is `admin`. Your initial password and other configurations can be found in `/root/utmstack.yml`.
5757
5858
After that you need to configure the email setting
5959

UTMStackComponents/Compliance/README.md

Lines changed: 22 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,16 +26,34 @@ For example, if you wish to monitor the Office 365 Account Activity regarding su
2626
![vm settings](./../Images/Components/../../../Images/Components/Compliance/compliancedash.png)
2727

2828
## Supported Compliance Standards
29-
Our module supports several critical compliance standards, ensuring that your organization stays compliant in various sectors:
29+
Compliance with the latest regulations often requires generating reports for internal use and auditors.
30+
UTMStack simplifies compliance management by combining essential security tools into a single database
31+
and providing several built-in reports and interactive dashboards. It is reinforced by an event and logs
32+
explorer for advanced analysis and a report/dashboard builder that helps visualize and display data.
3033

3134
### 1. Health Insurance Portability and Accountability Act (HIPAA)
32-
HIPAA is a U.S. federal law that sets national standards to protect sensitive patient health information from unauthorized disclosure. The HIPAA section within the Compliance Management module incorporates reports specifically designed to monitor compliance with critical HIPAA provisions, such as sections §164.308(a)(1)(ii)(A)(D), §164.312(b), and others. Each report aims to facilitate the implementation of policies and procedures to detect and manage security violations effectively.
35+
Security management process and audit controls
36+
report include accounts validation, relevant
37+
security alerts, login reports, relevant windows
38+
events, file and system access, cloud reports
39+
(Azure, AWS), Office365 threat Intelligence,
40+
account validations, firewall relevant activity,
41+
relevant system statistics, unsuccessful logon,
42+
privilege escalation.
3343

3444
### 2. General Data Protection Regulation (GDPR)
35-
GDPR is a comprehensive data protection law in the European Union (EU), which regulates the processing of personal data. The software offers pre-configured reports to ensure that your data processing operations adhere to GDPR's core principles.
45+
Logon Activity, Logon failure, vulnerability report,
46+
potential data exposure, relevant Security alerts,
47+
data retention, and potential data privacy
48+
compromises.
3649

3750
### 3. Gramm-Leach-Bliley Act (GLBA)
38-
GLBA, also known as the Financial Modernization Act of 1999, controls how financial institutions handle the private information of individuals. The GLBA section in the module contains reports tailored to key GLBA provisions, assisting you in maintaining GLBA compliance.
51+
§§6801(b)(3) Successful Login / Logoff,
52+
§§6801(b)(1) File Access,
53+
§§6801(b)(2) Policy Changes in Active Directory,
54+
§§6801(b)(2) New and enabled user Accounts in
55+
Active Directory,
56+
§§501B(2)(3) GLBA Login section
3957

4058
### 4. System and Organization Controls 2 (SOC 2)
4159
SOC 2 report focuses on a business’s non-financial reporting controls relating to security, availability, processing integrity, confidentiality, and privacy of a system. The software provides essential reports aligned with the Control Criteria (CC) of SOC 2 to facilitate the achievement and maintenance of SOC 2 compliance.

UTMStackComponents/Configuration/indexPattern.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Examples of patterns and their uses:
1515

1616
- `log-*` - Matches all indices that start with `log-`.
1717
- `alert-*` - Matches all indices that start with `alert-`.
18-
- `log-winventlog-*` - Used for indices related to Windows event logs.
18+
- `log-wineventlog-*` - Used for indices related to Windows event logs.
1919
- `log-o365-*` - Used for Office 365 logs.
2020
- `log-firewall-*` - Matches indices for various firewall logs.
2121

0 commit comments

Comments
 (0)