Setting up Security Analytics

Before Security Analytics can begin generating findings and sending alerts, administrators must create detectors and make log data available to the system. Once detectors are able to generate findings, you can fine-tune your alerts to focus on specific areas of interest. The following steps outline the basic workflow for setting up components in Security Analytics.

  1. Create security detectors and alerts, and ingest log data. See Creating detectors for details.
  2. Inspect findings generated from detector output and create any additional alerts.
  3. If desired, create custom rules by duplicating and then modifying pre-packaged rules. See Customizing rules for details.

Navigate to Security Analytics

  1. To get started, select the top menu on the Dashboards home page and then select Security Analytics. The Overview page for Security Analytics is displayed.
  2. From the options on the left side of the page, select Detectors to begin creating a detector.

Navigating to create a detector page