Updated Articles

  1. Leveraging GRID for Compliance

    By choosing DefenseStorm to help keep you safe, you’ve chosen to improve your ability to prove that compliance is top priority. The newest updates to the GRID are designed to show compliance to auditors and network security to board members. W...
  2. What Statements does the DefenseStorm GRID help you comply with?

    How we keep you in compliance with FFIEC Guidelines, and what you need to do.
  3. Advanced

  4. User Manual

  5. ThreatMatch

    Have you ever wondered how the FBI or CIA catch cybercriminals? Well, part of it is through their extensive threat-sharing network. DefenseStorm ThreatMatch utilizes that network and gives you access to threat feeds from various companies and gove...
  6. Collecting Logs and Events from Windows Machines

    Explains how to obtain windows events from your windows machines to DefenseStorm.
  7. Events

    How to search through Events efficiently, and create Incidents, Triggers, and Classifiers from the Events page.
  8. DVM Modifications (SNMP & accepting SSL)

    One of the many advantages of the DefenseStorm GRID is the level of customization and modifications available. Two of those options include,  Enabling the DVM to accept Syslog over SSL  Setting to Receive SNMP Traps  Enabling DVM...
  9. Exchange Audit Logging

    Exchange Audit Logging Exchange audit logging must be setup at the mailbox level and is outside the scope of this document. Please refer to help that is available from Microsoft for setting up Exchange Audit Logging. To verify if you have Audit Lo...
  10. DefenseStorm ThreatMatch API

    Using the DefenseStorm ThreatMatch API DefenseStorm allows you to  programmatically script queries into ThreatMatch to access subscribed ThreatMatch threat feeds via a REST API. To begin utilizing the ThreatMatch API, you must first copy or g...