New Articles

  1. Advanced

    Managing PowerShell Current reports on the use of Windows PowerShell as an attack platform bring up the increased need to detect and prevent the abuse of our system administration ecosystem. The recent release of Mandiant’s M-Trends 2017 annu...
  2. DefenseStorm ThreatMatch API

    Using the DefenseStorm ThreatMatch API DefenseStorm allows you to  programmatically script queries into ThreatMatch to access subscribed ThreatMatch threat feeds via a REST API. To begin utilizing the ThreatMatch API, you must first copy or g...
  3. Gathering Data from Third-Party IT Systems

    This article provides links to third-parties for device setup as well as DefenseStorm specific instructions to ensure data is gathered.  CarbonBlack Defense What Anti-virus Reference https://github.com/DefenseStorm/cbdefenseEventLo...
  4. Compliance

    Overview Compliance Overview Cybercompliance has become a hot topic item - especially around banking. The utilization of government guidelines such as FFIEC CAT and 20 Critical Security Controls have become industry standards, required for c...
  5. KO single screenshot snippet

    Burrow under covers chew on cable instantly break out into full speed gallop across the house for no reason. Need to chase tail. Relentlessly pursues moth stand in front of the computer screen hunt by meowing loudly at 5am next to human slave food d...
  6. KO show/hide all screenshot test 2

    Burrow under covers chew on cable instantly break out into full speed gallop across the house for no reason. Need to chase tail. Relentlessly pursues moth stand in front of the computer screen hunt by meowing loudly at 5am next to human slave food...
  7. KO no snippet

    Burrow under covers chew on cable instantly break out into full speed gallop across the house for no reason. Need to chase tail. Relentlessly pursues moth stand in front of the computer screen hunt by meowing loudly at 5am next to human slave food d...
  8. KO show/hide all screenshot test

    Burrow under covers chew on cable instantly break out into full speed gallop across the house for no reason. Need to chase tail. Relentlessly pursues moth stand in front of the computer screen hunt by meowing loudly at 5am next to human slave food...
  9. Reports

    Overview Creating a DefenseStorm Report To create a Report, the first step is to create a chart  to gather and display desired data. As soon as a new chart is created, it begins gathering applicable data from the previous 90 days. This ga...
  10. Tickets

    Overview Tickets Overview This article provides definitions, explanations, and recommendations for how to best utilize all the features available on the Tickets page including a use case walk-through. The features include Incidents, Task Schedul...