5.3. Overview of the Kibana GUI
5.3.1. Overview of the Kibana GUI : presentation
Come from analyzes on the GCap side (alerts and metadata reported by the Sigflow detection engine)
Come from analyzes on the GCenter side (alerts by the other detection engines)
Important
This section describes the graphic elements accessible to members of the operator group.
5.3.2. Configuration of the Kibana GUI
Users who are members of the group operator can view the data present in the detection event dashboards
Users who are members of the group administrator can view the data present in the system dashboards (System logs Overview)
Note
Kibana interface access is available:
For members of the operator group, by clicking on the
`Hunting`
button on the navigation barFor members of the administrator group, by clicking on the command
`System logs`
from the menu`Administration - Maintenance`
`Dashboards`
button (1) enables to display and to select the existing dashboards.`Alerts - Overview`
(2) is the default dashboard for members of the operator group.5.3.3. Main tabs
There are main tabs:
`Alerts`
tab (3) : displays the Alert dashboards created by the detection engines (see Native dashboards of the `Alerts` tab)The native dashboards (6) of the`Alerts`
tab (3) are displayed below.`Network Metadata`
tab (4) : displays the network dashboards (see Native dashboards of the `Network Metadata` tab)`Administration`
(5): displays the Administration dashboards (see Native dashboards of the `Administration` tab)
5.3.4. Native dashboards of the `Alerts`
tab
The `Alerts`
information of the different engines is grouped in the Kibana interface as tabs (6):
Tab |
Displays all alerts generated by the |
---|---|
|
GCenter |
|
Sigflow engine |
|
Malcore engine |
|
Malicious Powershell detect engine |
|
Shellcode detect engine |
|
DGA detect engine |
|
Beacon detect engine |
|
Ransomware detect engine |
|
Active CTI engine |
|
Retro hunt engine |
Note
For most dashboards, the following pages are available:
`Overview`
`Messages`
a graph showing the number of alerts per engine over time
a counter displaying the number of alerts per engine, the number of metadata and the number of files scanned
a top 10 source IP addresses by type of alert
a top 10 destination IP addresses by type of alert
a graph showing the proportion of the different severity of Sigflow alerts
a graph showing the number of unique signatures that escalated alerts over time
a list of Malcore alerts identified by the solution (in the form of a message)
a top 10 alerts
a top in the distribution of DGA domain names
Top 10 Machine Learning Alerts
`Overview`
shows different graphs and statistics for the selected time slot.It also contains an explanatory paragraph on Malicious Powershell alerts.Click on`Messages`
to display the list of alerts.The secondary view`Messages`
shows a histogram and the list of alerts.The histogram shows the distribution of alerts over the selected time range.It can notably reveal a certain periodicity of alerts, or a particularly active time of day.The list of alerts can be modified by deleting or adding certain columns.Click on the «double arrow» icon at the beginning of the line to display all the alert fields.It is then possible to filter on certain values for, for example:
Do not display healthy machines (filter false positives)
Show only alerts from a particular IP
Do not display alerts from a specific GCap
5.3.5. Native dashboards of the `Network Metadata`
tab
`Network Metadata`
displays, in sub-tabs, the metadata for the different protocols analyzed by the probe:
Overview synthesizes all metadata
Relations synthesizes all metadata into visualizations in chart form
DHCP, DHCP metadata details
DNS, DNS metadata details
File Transaction, details of the metadata related to the file reconstructed by the probe
HTTP, HTTP metadata details
IKEv2, IKEv2 metadata details
KRB5, KRB5 metadata details
NFS, NFS protocol metadata details
SMB, SMB metadata details
SMTP, SMTP metadata details
SSH, SSH metadata details
TFTP, TFTP metadata details
TLS, TLS metadata details
Attention
Some protocols do not have a native dashboard despite the fact that they can generate metadata.These metadata are still indexed and usable in Kibana.
5.3.6. Native dashboards of the `Administration`
tab
The native dashboards are grouped in the Kibana interface as tabs:
`Administration`
displays, in sub-tabs, the information grouped by theme:
`System Logs`
displays the solution’s syslog system events`Users History`
displays the Users history events`Metrics`
displays the Administration metrics
5.3.7. Data exploitation
Filter by changing the time interval (top right of page)
Filter by searching using the
`Search`
bar (top left)Filter by creating a filter on a specific field of the desired events (button
`+ Add filter`
below the search bar)