You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We are currently working on refining and strengthening the data processing and correlation capabilities within UTMStack. To ensure that event parsing is as accurate as possible across real-world scenarios, we are looking for the community's support in collecting log samples.
We are requesting raw event logs from the following integrations:
To streamline the integration process, we prefer logs in their original format as delivered by each tool (JSON, Syslog, or CSV). If possible, please organize the information by clearly indicating the source (e.g., a file named sentinelone_events.json or a folder named mikrotik_syslogs/).
Critical Note on Privacy and Security:
Our priority is to ensure your infrastructure remains secure. Please, before sharing any logs, make sure to anonymize or sanitize sensitive data, such as:
Real public IP addresses.
Specific usernames or email addresses.
Hostnames, internal domains, or license identifiers.
How can you contribute in an organized way?
Attachments: You can drag and drop files directly into this discussion thread (feel free to compress them into a .zip or .tar.gz file to maintain the folder structure per tool).
Public Repositories: You can host the logs in a public repository of your own and share the link here.
GitHub Gists: If you prefer sharing specific snippets, you can upload them as a GitHub Gist and paste the link here, indicating which technology each one corresponds to.
Any volume of events is a huge help in improving threat visibility and detection for all UTMStack users.
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
Hi everyone,
We are currently working on refining and strengthening the data processing and correlation capabilities within UTMStack. To ensure that event parsing is as accurate as possible across real-world scenarios, we are looking for the community's support in collecting log samples.
We are requesting raw event logs from the following integrations:
Formats and Organization:
To streamline the integration process, we prefer logs in their original format as delivered by each tool (JSON, Syslog, or CSV). If possible, please organize the information by clearly indicating the source (e.g., a file named
sentinelone_events.jsonor a folder namedmikrotik_syslogs/).Critical Note on Privacy and Security:
Our priority is to ensure your infrastructure remains secure. Please, before sharing any logs, make sure to anonymize or sanitize sensitive data, such as:
How can you contribute in an organized way?
Attachments: You can drag and drop files directly into this discussion thread (feel free to compress them into a
.zipor.tar.gzfile to maintain the folder structure per tool).Public Repositories: You can host the logs in a public repository of your own and share the link here.
GitHub Gists: If you prefer sharing specific snippets, you can upload them as a GitHub Gist and paste the link here, indicating which technology each one corresponds to.
Any volume of events is a huge help in improving threat visibility and detection for all UTMStack users.
We greatly appreciate your time and contribution.
Best regards,
UTMStack Development Team
Beta Was this translation helpful? Give feedback.
All reactions