Required Configuration Steps
The chart below lists the configuration steps that are required in order for New-Scale Analytics to begin the work of detecting and analyzing anomalous behaviors. Follow the links to detailed instructions.
Step | Component for Setup | Description |
---|---|---|
Context Management → Internal Domains table | Populate the Internal Domains context table with your organization's internal domains to prevent them from being monitored as external domains. | |
Log Stream → Event Filtering tab | Define an event filter and route events to the New-Scale Analytics engine in order to process against baseline behavior and to detect anomalies. | |
Log Stream → Event Filtering tab | Define an event filter and route events to Attack Surface Insights in order to merge common identities across entities. | |
Context Management | Create the filtered context tables that are necessary to support certain enrichment rules in Log Stream. | |
Threat Detection Management | Enable the analytics rules in Threat Detection Manager and begin training the New-Scale Analytics engine to process events against baseline behavior and to detect anomalies. |