Der Inhalt dieser Seite ist in der ausgewählten Sprache nicht verfügbar. Wir bei Elastic arbeiten daran, die bereitgestellten Inhalte in verschiedenen Sprachen anzubieten. Bis dahin bitten wir Sie um etwas Geduld und hoffen auf Ihr Verständnis!

Author

Articles by Aaron Jewitt

Principal Security Analyst, Elastic

Videos

How to detect malicious browser extensions using Elastic

Learn how the Elastic Infosec team created a full inventory of all browser extensions using osquery and Elastic Security with examples on building detections to alert the security team when a known bad browser extension is installed on a workstation.

Videos

Inventory to insight: How Elastic’s asset inventory powers InfoSec use cases

See how Elastic’s asset inventory has evolved into a critical tool for InfoSec, transforming from a basic inventory to a powerful solution that addresses real-world cybersecurity challenges.

Videos

Reducing false positives with automated SIEM investigations from Elastic and Tines

Discover how Elastic's InfoSec team saves thousands of hours per month by using Tines to automate SIEM alert investigations while reducing false positives and detect compromised accounts.

Videos

Detecting account compromise with UEBA detection packages

Detecting a compromised account is one of the most challenging detections to build. This blog shows one approach we are using internally at Elastic to create detections that alert when multiple new events are seen for a user.

Videos

Detection engineering — Maximizing analyst efficiency using Cardinality Threshold rules on your alerts

Using Threshold rules to create alerts on your alerts is a great way to maximize your analyst effectiveness without sacrificing visibility. By using these rules, security analysts spend less time investigating false positives.

Videos

Einrichten einer Sandbox für die Malware-Analyse mit Elastic Security

In diesem Blogpost zeigen wir, wie das InfoSec-Team von Elastic den Elastic Stack mit Elastic Endpoint Security und kostenloser Software nutzt, um eine vollständig instrumentierte Sandbox zur Malware-Analyse einzurichten.