Updated on 2024-07-18 GMT+08:00

How to Use Security Analysis

Table 1 shows the process of using the security analysis function.

Table 1 Process

Step

Description

Adding a Workspace

Add a workspace for resource isolation and control.

Integrating Data

Configure the source of security data you need to collect.

SecMaster can integrate log data of multiple products, such as storage, management and supervision, and security. After the integration, you can search for and analyze all collected logs.

(Optional) Adding a Data Space

Create a data space for storing collected log data.

For data accessed through the console, the system creates a default data space. You do not need to create a data space.

(Optional) Creating a Pipeline

Create pipelines for collecting, storing, and querying log data.

For data accessed through the console, the system creates a default data pipeline. You do not need to create a pipeline.

Configuring Indexes

Configure indexes to narrow down the query scope.

Querying and Analyzing Data

Query and analyze the accessed data.

Downloading Logs

Allows you to download raw logs or queried and analyzed logs.

Querying Analysis Results in Charts and Tables

After you run query and analysis statements, SecMaster can display the query and analysis results in charts and tables.

Currently, data can be displayed in tables, line charts, bar charts, and pie charts.