Elastic Security downloads

Kibana Dashboard example to visualize osquery performance

Logstash Pipeline to load Meraki logs via Syslog into Elasticsearch

A Kibana Canvas dashboard example that visualizes suricata logs collected with Filebeat.

A collection of rules based on the Sigma detection rules for web server looks, e.g. apache, nginx or IIS.

A collection of rules based on the Sigma detection rules for proxy server and web server looks, e.g. zeek or suricata.

A collection of rules based on the Sigma detection rules for Windows Sysmon events based on Winlogbeat data.

A collection of rules based on the Sigma rules for Windows (process creation folder) based on Winlogbeat data .

A collection of rules based on the Sigma rules for Windows (inbuilt folder) based on Winlogbeat data .

A collection of rules based on the Sigma rules for AWS based on the Filebeat AWS module and Elastic agent integration.


More about Elastic Security

Elastic Security is the combination of SIEM and Endpoint protection within one single tool. While the Elastic Security Endpoint agent is collecting data from the host for the SIEM it also actively prevents against Malware and Ransomware attacks.

The Kibana dashboards in this category helping to get better overview of the security related data within in the Elastic Stack. They also show how to use the results of the SIEM detection engine to get better understanding of the current system status.