Quick Start: Administrators

Stellar Cyber Academy icon Learn more at Stellar Cyber Academy.

The following link takes you to a course on the Stellar Cyber Academy technical training portal where you can learn more about this topic by watching the suggested lessons.

(2024) ADMIN - Admin Essentials for Tenants Users and System (03h:46m)

The first time you access a link on the portal during a session, you must log in to access content.

Each user's function working with Stellar Cyber can vary. In many deployments, the administrator will have a different perspective than an analyst. During initial setup and on an ongoing basis, you will use the Stellar Cyber user interface to integrate data sources, configure dashboards and automations, and manage the server and users. Those configuration settings are spread throughout the Stellar Cyber interface.

After reviewing the main Getting Started topic, you may find this section helpful to familiarize yourself with the location of configuration pages you may need.

  • When you install your Stellar Cyber components, you may follow a sequence similar to below. Use this as a guide while you review the links for configuration and administration.

    1. Install and license your Data Processor.

    2. Configure Stellar Cyber Server.

      • Web server, certificates, SSO / 2FA

      • Mail server / SMTP 

      • Users, Tenants, Tenant Groups

      • Backup and storage

    3. Add / customize Data Analyzer configurations.

    4. Install sensors and parsers.

    5. Add connectors and parsers with their associated profiles.

    6. Configure Automated Threat Hunting playbooks.

  • This list highlights settings for the server itself, mail, users, tenants, and other general configuration options.

  • The following list highlights configurations related to data integration and response, which you begin to use after the fundamental aspects of the server are configured.

    • In the System | DATA MANAGEMENT section, you'll find configurations for storage, analytics and other resources for the data processor itself.

    • Take a look at the Ports list so you are familiar with the ingoing and outgoing ports that are required for your deployment plan.

    • External sources for ingestion and response (Connectors and Sensors and Custom Parsers) are added and configured from the System | DATA SOURCE MANAGEMENT and System | INTEGRATIONS sections.

    • Windows and Linux server sensors are deployed from the System | DATA SOURCE MANAGEMENT section. 

    • Each sensor must be associated with a sensor profile, which in turn must be associated with a specific receiver. Receivers are also configured from the Collection section. Use the receiver configuration to specify which data analyzer the receiver is associated with, the port, and nature of the incoming data (json or packet), then add the receiver to a sensor profile.

    • To manage the volume of data ingested from sensors, you can also set up traffic and log filters; these are accessed from the Collection section.

    • Dashboards are configured from the Dashboards menu. You can use these dashboards to configure and schedule reports Reporting functions are accessible from the Reporting menu.

    • Either you or an analyst can configure custom, automated threat hunting actions from the Automation menu. These automated playbooks based on specific data and conditions are configured to perform a response action. The System section includes options to configure recipients on the server, scripts, and other settings to support playbooks and other general functions.