-
DEVICE INTEGRATION
- Palo Alto (Device Integration)
- Dell Cylance Endpoint
- McAfee Web Gateway
- Imperva WAF
- Darktrace
- Forescout CounterACT
- Juniper Cortex Threat
- Zscaler
- Sophos
- Sophos Endpoint
- Trend Micro
- Sophos Cyberoam Firewall
- Radware-WAF
- NetScaler WAF
- Ubuntu
- Juniper SRX
- Forcepoint Websense
- FireEye
- Forcepoint DLP
- F5 BIG-IP ASM
- CyberArk PIM
- CheckPoint
- Bluecoat Proxy
- Accops Hyworks
- Barracuda WAF Syslog
- Forwarding F5 Distributed Cloud Services Logs to DNIF over TLS
- JIRA CLOUD
- Aruba ClearPass
- Show Remaining Articles (13) Collapse Articles
-
CONNECTORS
-
- 1Password Connector
- Abnormal Security
- Akamai Netstorage
- Atlassian
- Auth0 Connector
- AWS CloudTrail
- AWS Kinesis
- AWS S3
- AWS S3 (Optimized)
- AWS S3 Optimized Cross Account Connector
- Azure Blob Storage Connector
- Azure Event Hub
- Azure NSG
- Beats
- Box
- Cisco Duo
- Cloudflare Logpull Connector Setup Guide
- CloudWatch Connector
- Cortex XDR
- CrowdStrike
- Cyble Vision
- Device42
- Dropbox Connector
- GCP
- GCP PUB/SUB
- GitHub
- Google Workspace
- Haltdos
- HTTP Connector
- Hub Spot Connector
- Indusface
- Jira Connector
- Microsoft Graph Security API
- Microsoft Intune
- Mimecast
- Netflow
- Netskope Connector
- Network Traffic Analysis
- NextDLP Reveal
- Office 365
- Okta
- OneLogin
- Orca
- PICO Legacy Connector
- Prisma Alerts
- Prisma Incidents
- Salesforce
- Salesforce Pub/Sub Connector
- Shopify Connector
- Slack
- Snowflake
- Snyk Connector
- Syslog
- TCP
- Tenable Vulnerability Management Connector
- TLS
- Trend Micro Audit Logs
- Workday HCM Connector
- Zendesk
- Zoom
- Jumpcloud Connector
- Sophos connector
- Tenable Security Center Connector
- AWS GuardDuty Connector
- Trend Micro Vision One Connector
- RediffMail Pro Connector
- Microsoft Sentinel
- Microsoft Exchange Online Connector
- Show Remaining Articles (53) Collapse Articles
-
-
DATA INGESTION
-
HUNTING WITH WORKBOOKS
-
- Your first FIND with the HYPERCLOUD
- Create a Search Block
- Create a Signal Block
- Create a Text Block
- Create an Outlier Block
- Create a DQL Block
- Create an SQL Block
- Create a Code Block
- Create a Visual Block
- Create a Call Block
- Create a Return Block
- Create a Notification Block
- Schedule a Workbook
- Native Workbook
- Workbook Functions
- How to view Workbooks?
- Add Parameters to Workbook
- Working with Pass through Content
- How to create a Workbook?
- Workbooks
- Show Remaining Articles (5) Collapse Articles
-
-
DNIF Query Language (DQL Language)
-
SECURITY MONITORING
- Streamline Alert Analysis with Signal Tagging
- Workbook Versioning: Track, Collaborate, and Restore with Ease
- What is Security Monitoring?
- Creating Signal Suppression Rules
- Why EBA
- Signal Suppression Rule
-
- What are signals?
- View Signal Context Details
- Suspect & Target
- Source Stream
- Signal Filters
- Signal Data export
- Signal Context Details
- Signal Confidence Levels
- Raise and View Signals
- Investigate Anywhere
- How to add a signal to a case?
- Graph View for Signals
- Global Signals
- False Positives
- Add Multiple Signals to a Case
- Add comment to the signal
- Show Remaining Articles (1) Collapse Articles
-
OPERATIONS
-
MANAGE DASHBOARDS
-
MANAGE REPORTS
-
USER MANAGEMENT & ACCESS CONTROL
-
BILLING
-
MANAGING YOUR COMPONENTS
-
GETTING STARTED
-
INSTALLATION
-
SOLUTION DESIGN
-
AUTOMATION
-
- Active Directory
- AlienVault
- Asset Store
- ClickSend
- Domain Tools
- Fortigate
- GreenSnow
- JiraServiceDesk
- Microsoft Teams Channel
- New Relic
- Opsgenie
- PagerDuty
- Palo Alto
- ServiceNow
- Slack Configuration
- TAXII
- Trend Micro
- URLhaus
- User Store
- Virustotal
- Webhook
- Show Remaining Articles (6) Collapse Articles
-
-
TROUBLESHOOTING AND DEBUGGING
-
- TLS ( Troubleshooting Procedure)
- TCP (Troubleshooting Procedure)
- Syslog (Troubleshooting Procedure)
- Salesforce ( Troubleshooting Procedure)
- PICO
- Office 365 (Troubleshooting Procedure)
- GSuite
- GCP (Troubleshooting Procedure)
- Beats (Troubleshooting Procedure)
- Azure NSG ( Troubleshooting Procedure)
- Azure Eventhub
- AWS S3 (Troubleshooting Procedure)
-
-
LICENSE MANAGEMENT
-
RELEASE NOTES
- January 19,2026 - Content Update
- December 23, 2025 - Application Update
- December 4,2025 - Content Update
- November 27, 2025 - Application Update
- October 28, 2025 - Content Update
- August 20, 2025 - Content Update
- August 5, 2025 - Application Update
- July 15, 2025 - Content Update
- June 13, 2025 - Content Update
- May 21, 2025 - Content Update
- April 17, 2025- Content Update
- March 25, 2025- Content Update
- March 18, 2025 - Application Update
- March 5, 2025 - Application Update
- January 27, 2025 - Application Update
- January 29, 2025 - Content update
- December 30, 2024 - Content Update
- December 12, 2024 - Content Update
- December 3, 2024 - Application Update
- November 15, 2024 - Content Update
- October 26, 2024- Application Update
- October 23, 2024 - Content Update
- October 16, 2024 - Application Update
- September 04, 2024 - Application Update
- September 04, 2024 - Content Update
- August 27, 2024 - Application Update
- July 30, 2024 - Application Update
- June 04, 2024- Application Update
- April 24, 2024- Application Update
- March 26, 2024 - Application Update
- February 19, 2024 - Application Update
- January 09, 2024 - Content Update
- January 09, 2024 - Application Update
- November 27, 2023 - Content Update
- November 27, 2023 - Application Update
- October 05, 2023 - Application Update (Release Notes v9.3.3)
- May 30, 2023 - Application Update (Release Notes v9.3.2)
- November 29, 2022 - Application Update (Release Notes v9.3.0)
- Show Remaining Articles (23) Collapse Articles
-
API
-
POLICIES
-
SECURITY BULLETINS
-
BEST PRACTICES
-
DNIF AI
-
DNIF LEGAL AND SECURITY COMPLIANCE
Key Metrics – MTTD,MTTA & MTTR
Mean Time to Detect (MTTD)
Mean Time to Detect (MTTD) is the average time taken to identify a security incident by generating a signal or alert after the raw log event is ingested. In DNIF, Time to Detect (TTD) is calculated for each signal as the difference between the time the signal is created and the ingestion time of the earliest raw log event that contributed to generating the signal. MTTD is then determined by summing all TTDs across signals and dividing this total by the number of signals.
MTTD helps in the following:
- Early Threat Identification: MTTD allows security teams to assess how quickly they can identify potential security incidents. A lower MTTD means quicker detection, reducing the time attackers have to cause damage.
- Reducing Incident Impact: Faster incident detection leads to quicker responses, which can limit the scope of damage, data loss, or disruption. A low MTTD minimizes the window for attackers to exploit vulnerabilities.
- Improving Security Posture: MTTD is a key metric in continuous improvement processes. Tracking it over time helps organizations refine detection mechanisms, rules, and policies in their SIEM system to reduce detection times further.
- Compliance and Reporting: Many industries have regulations requiring that incidents be detected and reported within a certain timeframe. MTTD ensures that organizations comply with these requirements by providing a measurable way to track detection speed.
Note: The Time to Detect (TTD) will be calculated daily at midnight for each region. TTD values will be calculated for signals generated on or after the feature release date.
MTTA – Mean Time to Acknowledge
Mean Time to Acknowledge (MTTA) is the average time it takes to acknowledge a security alert after it has been generated. In DNIF, the Time to Acknowledge (TTA) is calculated for each case as the time difference between the creation of the case and the generation of the earliest signal within that case. If a new, older signal is added, the TTA is recalculated to reflect the time of the oldest signal. MTTA is determined by adding up all the TTAs across cases and dividing by the total number of cases.
MTTA helps in the following:
- Responsiveness Tracking: MTTA helps monitor how quickly the security team responds to alerts, indicating the effectiveness of alert handling and initial response. A shorter MTTA suggests that potential threats are being acted upon quickly, reducing the window of exposure.
- Incident Prioritization: By tracking MTTA, teams can identify whether alerts are being acknowledged in a timely manner and whether the most critical incidents are getting the attention they need first.
- Early Intervention: A fast acknowledgment time means that the security team is quickly aware of potential threats, allowing for early-stage containment before incidents escalate into major security breaches.
- Process Optimization: High MTTA values can reveal inefficiencies in alerting workflows or indicate alert fatigue. This helps teams identify areas for process improvement, such as better alert prioritization or automation.
- Resource Management: MTTA offers insight into whether the security team is properly staffed or equipped to handle the volume of alerts. Longer acknowledgment times might indicate the need for more resources or automation tools to assist with triage.
MTTR – Mean Time to Resolve
Mean Time to Resolve (MTTR) is the average time taken to fully resolve a security incident, starting from when it’s acknowledged. In DNIF, Time to Resolve (TTR) is calculated for each case by measuring the time difference between when the case was created and when it was closed. If the case is reopened, the TTR is updated based on the new closure time. If a case status is changed to On-Hold, the TTR calculation is paused. It resumes when the case status is changed to In-Progress. MTTR is determined by adding up all the TTRs across cases and dividing the total by the number of cases.
MTTR helps in the following:
- Incident Response Efficiency: MTTR provides insights into how quickly your security team can address and mitigate threats. A lower MTTR means quicker resolution of incidents, reducing potential damage.
- Evaluating Security Effectiveness: By tracking MTTR, organizations can evaluate the efficiency of their incident response processes, tools, and workflows, helping identify areas for improvement.
- Minimizing Downtime: Faster resolution times ensure that disruptions to business operations or IT services caused by security incidents are kept to a minimum.
- Resource Planning: Monitoring MTTR helps in allocating the right resources, such as staffing or automation tools, to speed up the resolution process.
Note: TTA and TTR values will be calculated on cases that have been created on or after the feature release date.
