This repository provides a baseline template for organizations deploying osquery in a production environment, including query packs tailored to specific environments such as unwanted-chrome-extensions and windows-attacks, emphasizing careful consideration of datasets and use-cases for optimal osquery operation.
Common questions about Palantir osquery Configuration including features, pricing, alternatives, and user reviews.
Palantir osquery Configuration is Companion repository for deploying osquery in a production environment with tailored query packs. It is a Security Operations solution designed to help security teams with Osquery.
Palantir osquery Configuration is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/palantir/osquery-configuration/ for download and installation instructions.
Popular alternatives to Palantir osquery Configuration include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
Palantir osquery Configuration is for security teams and organizations that need Osquery. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Managed Agentic Threat Hunting Service (IOC sweeps and hypothesis based hunting)
A managed security service that uses hypothesis-based threat hunting to proactively discover hidden threats, create new detection rules, and improve overall security posture.