Quick Start: Administrators

Each user's function working with Stellar Cyber can vary. In many deployments, the administrator will have a different perspective than an analyst. During initial setup and on an ongoing basis, you will use the Stellar Cyber user interface to integrate data sources, configure dashboards and automations, and manage the server and users. Those configuration settings are spread throughout the Stellar Cyber interface.

After reviewing the main Getting Started topic, you may find this section helpful to familiarize yourself with the location of configuration pages you may need.

  • When you install your Stellar Cyber components, you may follow a sequence similar to below – use this as a guide while you review the links for configuration and administration.

    1. Install and license your Data Processor.

    2. Configure Stellar Cyber Server.

      • Web server, certificates, SSO / 2FA

      • Mail server / SMTP 

      • Users, Tenants, Tenant Groups

      • Backup and storage

    3. Add / customize Data Analyzer configurations.

    4. Install sensors and parsers.

    5. Add connectors and parsers with their associated profiles.

    6. Configure Automated Threat Hunting playbooks.

  • This list highlights configurations for the server itself, mail, users, tenants, and other general settings.

  • The following list highlights configurations related to data integration and response, which you begin to use after the fundamental aspects of the server are configured.

    • The System | Data Processor menu includes configurations for storage, analytics and other resources for the data processor itself.

    • Take a look at the Ports list so you are familiar with which ingoing and outgoing ports are required for your deployment plan.

    • External sources for ingestion and response (Connectors and Sensors and Custom Parsers) are added and configured from the System | Collection and System | Integration menus.

    • Windows and Linux server sensors are deployed from the System | Deployment | Agents menu. 

    • Each sensor must be associated with a sensor profile, which in turn must be associated with a specific receiver. Receivers are also configured from the Collection menu. Use the receiver configuration to specify which data analyzer the receiver is associated with, the port, and nature of the incoming data (json or packet), then add the receiver to a sensor profile.

    • To manage the volume of data ingested from sensors, you can also set up traffic and log filters; these are accessed from the Collection menu.

    • Dashboards are configured from the Visualize menu. You can use these dashboards to configure and schedule reports Reporting functions are accessible from the Respond menu.

    • Either you or an analyst can configure custom, automated threat hunting actions from the RespondAutomation menu. These automated playbooks based on specific data and conditions are configured to perform a response action. The System | Configuration menu includes options to configure recipients on the server, scripts, and other settings to support playbooks and other general functions.