Analyze logs, Windows components, and recent logon activities to identify the root cause. Receive instant notifications, detailed audit reports, and actionable insights into the specific events, processes, or activities that triggered the lockouts.
You can now scan the deep and dark web continuously for leaked credentials and personal information associated with your organization, employees, and third-party vendors in Log360 Cloud through our partnership with Constella Intelligence.
You can identify if your domains or other digital assets have been compromised in supply chain breaches through real-time alerts and investigate and respond to threats quickly and efficiently.
Learn moreYou can now import Sigma rules into Log360 Cloud as alert profiles and detect security threats.
Sigma is a widely adopted format for security signatures, allowing you to detect suspicious activities in your environment.
Incident Workbench
Log360 Cloud now introduces an exclusive threat investigation console for advanced contextual analytics. This console is called the 'Incident Workbench' and can be invoked from multiple dashboards of Log360 Cloud. The features include the following:
This analysis comprises process spawning with parent-child process trees available in multiple graphical formats.
This analysis is offered through the integration of Log360 Cloud's Advanced Threat Analytics for in-depth risk analysis of IPs, URLs, and Domains. Along with the threat analysis, the integration of VirusTotal, one of the largest live threat feeds, is also introduced in this release and will be available in the Incident Workbench
Users can add upto 20 analytical tabs in a single instance of the Incident Workbench and can save it to Incidents as Threat Evidences.
Device summary
Log360 Cloud now introduces an analytical console to view the overall device summary events. This console can be invoked from multiple dashboards of Log360 Cloud. Users can find event summary for the selected period,device severity events, and alerts summary.
Log360 Cloud now adds 50+ new predefined correlation rules complementing the new features released to level up threat detection. This new package includes rules for detecting suspicious process spawning, use of prevalent attacker tools like Mimikatz and Metasploit, and living off the land mechanisms with the exploitation of native binary tools and utilities.
These out-of-the-box compliance reports will help monitor the security posture of the network, and stay compliant to the respective compliance mandates.
Active Directory Reports:
Ticketing Tool Status:
Log360 Cloud MSSP is now available for managed security service providers.
Learn more.ManageEngine is a division of Zoho Corp.