ThreatManagement

Discover the various features provided by Teiren Cloud.

Contact Us

Alerts

Feature Description

ThreatManagement 1

The Alerts tab is the core security operations screen for viewing and analyzing threat events detected in real-time by Teiren Cloud SIEM. When a security event matching configured detection rules occurs, an alert is immediately generated, allowing administrators to quickly understand key information such as attack time, service, user/host, rule trigger cause, and severity.

Main Features

  • 1. Detection Event Monitoring (Alert Table Overview)

    All detected security events are recorded in real-time. From single login failures to complex attack behavior flows, they are visually displayed to intuitively understand attack paths.

  • 2. Powerful Search and Filtering

    Search detection history with desired conditions through the left Filter panel. Supports AND operations between top categories like Rule Type, Status, Severity and OR operations between sub-options for multi-combination searches.

Key Benefits

CategoryContent
Real-time Threat AwarenessInstantly verify log-based detection results through alerts
Intelligent ClassificationSingle action and behavior chain detection through Static/Dynamic rules
Immediate ResponseEnable fast security decisions through Severity-based priority classification

Summary

CategoryContent
Detection TypesStatic (Single) / Dynamic (Correlated Behavior)
Filter StructureRule Type / Status / Severity / Service
Data RefreshReal-time updates

Rules

Feature Description

ThreatManagement 1

The Rules tab is the core page for creating, managing, and controlling threat detection policies in Teiren Cloud SIEM. Here you can define what behaviors the system detects as "threats" and see the operational status of detection policies at a glance. In addition to the provided Default Rules, administrators can create Custom Rules directly or build optimized detection policies through free customization services.

Main Features

  • 1. Rule Status Management (Rule Table Overview)

    View all registered detection policies at a glance including classification, type, applied service, description, and severity, and control them with On/Off switches.

  • 2. Security Policies (Static / Dynamic)

    Supports both Static Rules for capturing immediate anomalies (single event detection) and Dynamic Rules for detecting attack context based on temporal and behavioral correlations (correlated behavior detection).

Key Benefits

CategoryContent
Ready-to-Use Default RulesHundreds of detection rules automatically applied upon installation
Sophisticated Detection StructureComplex detection support based on Static + Dynamic rules
Free Custom Rule DevelopmentCustomized detection policies tailored to customer environments

Summary

CategoryContent
Detection Policy TypesStatic / Dynamic
Default Rule ConfigurationDefault Rules (Provided by Teiren)
Custom RulesCustom Rules (Create directly or request free development)

User Analysis

Feature Description

ThreatManagement 1
ThreatManagement 2
ThreatManagement 3

The User Analysis tab is a feature that enables integrated analysis of threat events from the user perspective. Unlike traditional SIEMs that provide information centered on logs and events, Teiren visualizes user-level activity flows in a graph-based format, enabling intuitive understanding of the context and relationships of threat behaviors.

Main Features

  • 1. User and Entity Behavior Graph

    When selecting a specific user, threat events from that account are visualized in a graph-based format (User → Date → Log → Rule flow). Not only single events but also correlated behavior-based detection records can be verified within user-level context.

Key Benefits

CategoryContent
User-Centric Threat VisibilityAnalysis by user, time, and behavior units rather than simple events
Behavior-Based AnalysisUnderstanding attack behavior chains rather than individual alerts
Multi-Service Integrated MonitoringIntegrated analysis of Windows, Linux, and Cloud account logs

Summary

CategoryContent
Analysis TargetUser-level threat analysis
Analysis MethodGraph-based behavior flow + Detailed log analysis
Primary PurposeUser behavior-based threat detection/investigation and incident response