Everything you love about the free and open Elastic Stack — geared toward security information and event management (SIEM). Leverage the speed, scale, and relevance of Elasticsearch for SIEM use cases to drive your security operations.
7.10 adds cloud and SaaS detections; EQL correlation and threat match rules; and integrations with Cisco Umbrella, Microsoft Defender, Juniper & Zoom.
Return search results in seconds with the speed of a schema-on-write architecture. Explore custom dashboards, drill into events of interest, and pivot through underlying data.
With prebuilt data integrations, quickly centralize information from your cloud, network, endpoints, applications — any source you like, really. And if you don’t see the integration you need, collaborate with the Elastic community to build it. That’s free and open for the win.
Gathering your data is the first step. Enabling uniform analysis is the next. With Elastic Common Schema (ECS), you can centrally analyze information like logs, flows, and contextual data from across your environment — no matter how disparate your data sources.
Elastic Security provides security teams with an interactive workspace to detect and respond to threats. Triage events and perform investigations, gathering evidence on an interactive timeline. Easily open and update cases, forwarding potential incidents to SecOps workflow and IT ticketing platforms.
Continuously guard your environment with correlation rules that detect tools, tactics, and procedures, as well as behaviors indicative of potential threats. Compare against threat indicators and prioritize accordingly. Cut to what matters with preconfigured risk and severity scores. Detections are aligned with MITRE ATT&CK® and publicly available for immediate implementation.
One agent, many use cases
Cloud-ready SIEM, deployable anywhere
- Audit events
- Auth logs
- DNS traffic
Auditbeat created an index pattern in Kibana with defined ECS fields, searches, visualizations, and dashboards. In a matter of minutes you can start viewing the latest system audit information in the SIEM app.
Auditbeat module assumes default operating system configuration. See the documentation for more details.