Working with Pass through Content

Signature based threat detection always works as a one hit wonder for the organizations due to its ease in determining the presence of malicious entities in our network or systems. DNIF captures all the signature based threats from various security devices like firewall, IPS,Email Gateway, web filter and many more, segregate them based on valuable information like the suspicious origin, targeted host, malicious file, its path, name of the malware and correlates them with different attacks taking place in the organization.

How to work with Pass through Content?

Threat Alert Workbooks are at the core of the ‘Pass Through Content’ mechanism.

image 1-Dec-20-2023-12-15-01-7738-PM

One needs to simply ingest the logs to DNIF and with no manual efforts required to write any detection rule, DNIF’s pass through workbooks will ensure seamless inclusion threat signals with rest other signals that are generated by DNIF.