Professional Documents
Culture Documents
Secure Log
Secure Log
Threat Intelligence
Security Operations
Cloud Security
Endpoint Security
Th r e a t I n t e l l i g e n c e
Configuration Assessment Threat Hunting
Extended Detection and Response IT Hygiene
File Integrity Monitoring
Vulnerability Detection
Architecture
The SecureLog architecture is based
on agents, running on the monitored
endpoints, that forward security data to a
central server. Agentless devices such as
firewalls, switches, routers, and access points
are supported and can actively submit log
data via Syslog, SSH, or using their API. The
central server decodes and analyzes the
incoming information and passes the results
along to the SecureLog indexer for indexing
and storage.