Published on: 01/01/2020 in User Manual
How to import, merge, export, and manage assets.
Created on: 08/27/2019 in Advanced
Overview This article explains how to successfully ingest SQL Server events (at both the server and database level) to the DefenseStorm GRID. This provides users with applicable technical controls for monitoring activity on mission critical datas...
Created on: 04/18/2019 in Playbooks Cybersecurity
Overview Overview The plays and procedures in this playbook give you insight into how the DefenseStorm TRAC Team monitors your alerts. You can also perform these plays on any triggers created internally by your team. *Please leave all TR...
Created on: 03/26/2019
Welcome Welcome to DefenseStorm Put simply, DefenseStorm is a network security system for financial institutions. We monitor for suspicious activity, alert you when its found, and work with you to stop any potential attacks and prevent them from...
Created on: 03/25/2019 in Advanced
Overview NTP servers are essential to the proper functioning of the internet and all linked computer systems. The public NTP server associated with your DefenseStorm Virtual Machine synchronizes time on all your systems to assist with accurate log ...
Created on: 03/11/2019 in Advanced
Firewall Port Table Table of both inbound and outbound network ports for the DVM and Windows Agent. Direction Port / Protocol Purpose DVM Outbound 80 / TCP; HTTP OS Updates (Ubuntu) 123 / TCP, UDP ...
Created on: 02/11/2019 in Advanced
Overview This article provides integration scripts to ingest log data from cloud-based services into DefenseStorm GRID via the DVM. This list of community integrations will continue to grow based on customer requirements, requests, and DefenseStorm...
Created on: 09/12/2018
Using Markdown Language For Formatting DefenseStorm allows you to add markdown to Notes using a modified version of GitHub markdown language. This document describes commonly used markdown codes. For a full description of the syntax please refer to...
Created on: 07/10/2018 in Advanced
Overview Exchange Audit Logging Exchange audit logging must be setup at the mailbox level and is outside the scope of this document. Please refer to help that is available from Microsoft for setting up Exchange Audit Logging. Verification To v...
Created on: 05/17/2018 in Playbooks Compliance
Overview What to do when you get a request from an auditor This playbook provides examples of common requests you may get from auditors, the corresponding FFIEC statements & GRID features, and exactly what action is required by you to prove ...