Agenda:
LogPoint fundamentals: How to utilize dashboards
Learn how to use and create dashboards to view your organisations critical infrastructure from a single pane of glass.
Logpoint for BCS: Responding to threats in your SAP systems
Advanced analytics and innovative orchestration capabilities are unified in a centralized security platform allowing you to effectively detect and manage incidents compromising the security of your SAP systems.
Learn concepts and use cases that will increase your security coverage by including SAP data in your centralized security operations platform.
Advanced Queries and Pattern finding
Get more value out of searches in Logpoint with real-life examples and explanations on patterns to look for. It is a primer for performing forensics post attack or performing blue team tasks such as proactive threat hunting.
Learn how to utilize the different functions in Logpoint search query for fast, efficient and effective results
LogPoint fundamentals: How to collect basic logs
Learn how to setup log collection on common endpoints and how to normalize the ingested logs.
Faster detection and response with playbooks and automation
Learn about automation, what SIEM use cases you can you automate to vastly increase efficiency. We will dive into how you decrease threat response time due to automated triage and analysis to empower you with more time to focus on critical cases.
LogPoint fundamentals: How to use the query language for basic use cases
Get a fundamental understanding of LogPoint query language and how to use it for solving end-to-end security use cases.
How do I get my Logpoint deployment delivered as SaaS
How do you migrate your existing solution to Logpoint Cloud/SaaS? Learn about architecture, existing logs and ingestion
Learn how to migrate from an existing on-prem platform to a Logpoint SaaS solution
How to utilize information security frameworks effectively
Utlizing cybersecurity framework SANS 18 Cyber Security Controls (CIS18) to strengthen the cybersecurity posture through tools, processes and automation. Learn how to bridge the gap between technical security and business outcomes to drive conversations about security on a strategic level in your organization
LogPoint fundamentals: Using alerts to create incidents
Learn how to setup alerts on specific triggers that notifies your incident and response team
AgentX: Endpoint observability and security
Logpoint’s new agent, AgentX is a lightweight application that transports logs and telemetry from endpoints (all servers, workstations, and applications) to the SIEM, and performs automated real-time investigation and remediation to threats.
LogPoint fundamentals: Enriching logs
Learn how to ingest reports and CVE’s to enrich your logs
Find your way getting logs from all your Cloud Applications
Universal REST API Fetcher provides a generic interface to fetch logs from cloud sources via REST APIs.
Learn how to install and configure the Universal Rest API Fetcher
Threat Hunting with Logpoint
Designing, building and operating an inventory of security capabilities relies not only on building and operating the capability but needs constant testing to validate the efficiency and efficacy.
Listen in on ways to actively perform threat hunting. For further value, doing so while being attacked by a red team.
LogPoint fundamentals: Getting started with SOAR & Automation
Get introduced to the concepts and objectives of security automation with Logpoint SOAR. We will cover how to build foundational playbooks and how to get started with out of the box content.