Threat Stack
Version : Threat Stack
Threat Stack Cloud Security Platform provides continuous security monitoring in cloud environments, where network-based controls cannot be deployed. It is a platform-independent solution intended for companies of all sizes operating on-premises or in public, private, or hybrid cloud environments.
Netsurion Open XDR helps to monitor events from Threat Stack. Its dashboard, alerts and reports will help you to track user login activities and modify actions by user, to keep you informed about its activities. It will trigger alert whenever user has failed to login or any modification action by user or alert is triggered by Threat Stack.
The following are the key Data Source Integration available in Netsurion Open XDR.
Alerts
Type | Name | Description |
---|---|---|
Security | Threat Stack – User login failure | This alert is triggered when a user login failure is detected in Threat Stack. |
Compliance | Threat Stack – User action on modification | This alert is triggered when user has tried to modify actions like create, update, or delete is detected in Threat Stack. |
Compliance | Threat Stack – Alert triggered by Threat Stack | This alert is triggered when Threat Stack triggered alert is detected in real time. |
Reports
Type | Name | Description |
---|---|---|
Security | Threat Stack – User login failure | This report gives information about all the login failure detected in Threat Stack. Report contains user email address, user id, source, and other useful information. |
Compliance | Threat Stack – User login success | This report gives information about all the login success detected in Threat Stack. Reports contain user email address, user id, source, and other useful information. |
Compliance | Threat Stack – Threat Stack alert details | This report gives information about all the Threat Stack triggered alerts. Reports contains data source, severity, host name and other useful information. |
Documentation:
The configurations details are consistent with Netsurion Open XDR 9.3 and later, and Threat Stack.
Download Integration Guide and How-to Guide for configuration instructions and more information.