Retraced Logo

Retraced

0
Free
Visit Website

Retraced Audit Log Retraced is the easiest way to integrate a compliant audit log into your application. It provides a searchable, exportable record of read/write events. Client libraries are available for Go and Javascript. Documentation Please head to https://boxyhq.com/docs/retraced/overview for detailed documentation on how to get started with Retraced. Step by step tutorial video Running with docker-compose docker-compose up -d or npm run dev Note: ADMIN_ROOT_TOKEN has been set to dev so you can test the setup locally. Please remember to change this (and other relevant sensitive env vars/secrets) in production. Run an example to see how Retraced works Git checkout the Logs Viewer repo and run npm i followed by npm run dev to start an example which uses Retraced to show you some auto generated events. Refresh the UI a few times for the auto-generated audit logs to kick in. You can also ingest a few custom logs using the following curl command:- curl -X POST -H "Content-Type: application/json" -H "Authorization: token=dev" -d '{ "action": "some.record.created", "teamId": "boxyhq", "group": { "id": "dev", "name": "dev" }, "crud": "c", "created": "2023-01-16T15:48:44.573Z",

FEATURES

ALTERNATIVES

A framework for generating log events without the need for infrastructure, allowing for simple, repeatable, and randomized log event creation.

Free

HoneyView is a tool for analyzing honeyd logfiles graphically and textually.

Free

Open source security data lake for AWS with real-time log normalization and Detection-as-Code capabilities.

Free

SysmonSearch makes event log analysis more effective by aggregating Microsoft Sysmon logs and providing detailed analysis through Elasticsearch and Kibana.

Free

Tool for deleting logs on Linux/Windows servers.

Free

Python application to translate Zeek logs into ElasticSearch's bulk load JSON format with detailed instructions and features.

Free

Investigate malicious logons by visualizing and analyzing Windows Active Directory event logs with LogonTracer.

Free

A method for log volume reduction without losing analytical capability.

Free
CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved