DEPRECATED - MozDef: Mozilla Enterprise Defense Platform
Перейти к файлу
Brandon Myers d206fa157c Update slapd importer with local timezone
Signed-off-by: Brandon Myers <bmyers@mozilla.com>
2016-07-12 11:22:20 -05:00
alerts Merge pull request #348 from pwnbus/standardize_bro_intel 2016-06-28 12:24:34 -07:00
benchmarking averez-19-samples: move json2Mozdef.py to /benchmarking/workers/ 2014-04-22 09:15:41 -07:00
bot fix issue where long alert summaries cause mozdefbot to exit 2016-04-11 16:14:33 -05:00
cron Merge pull request #348 from pwnbus/standardize_bro_intel 2016-06-28 12:24:34 -07:00
docker revert to stable, closes #277 2015-05-29 12:32:46 -07:00
docs correct the settings file for the rest inteface 2016-03-08 08:05:56 -08:00
examples Merge pull request #348 from pwnbus/standardize_bro_intel 2016-06-28 12:24:34 -07:00
initscripts minor change to conf file location for supervisord/alerts 2015-01-15 15:31:00 -08:00
lib Update slapd importer with local timezone 2016-07-12 11:22:20 -05:00
loginput update uwsgi config to not allocate threads, closes #273 2015-05-14 15:49:31 -07:00
logs [meteor] gitignore and bug fix when empty ES 2014-03-07 10:25:54 -08:00
meteor Corrected Case in investigationAdd.html 2016-05-24 11:14:46 -05:00
mq Merge pull request #345 from pwnbus/remove_time_fluentdSqsFixup 2016-06-08 17:07:01 -07:00
rest update ldap search criteria to match case 2015-12-30 09:37:57 -08:00
tests initial tests for environment sanity and event processing, closes #338 2016-03-27 19:01:28 -07:00
utils source fqdn for netflow, add a whitelist of netflow senders to accept as an option 2014-09-26 11:15:47 -07:00
.gitignore Ignore the results/ directory in git 2014-08-11 21:21:11 +02:00
.gitmodules Support querying bugzilla for bugs (for example, incident/investigation bugs) 2015-03-25 16:45:52 -07:00
CONTRIBUTING.md averez-issue-23-contributing: add CONTRIBUTING.md 2014-04-14 08:53:42 -07:00
LICENSE Updated license file to conform with MPL 2014-02-25 09:55:02 -08:00
README.md updating the README to reflect production status (since Summer 2014) 2015-02-15 12:05:40 -08:00
analyze_code.sh averez-22-license: Fix license stuff (Closes #22) 2014-04-16 11:40:15 -07:00
requirements.txt sync requirements with actual 2016-02-20 16:24:38 -08:00

README.md

===================================== MozDef: The Mozilla Defense Platform

Why?

The inspiration for MozDef comes from the large arsenal of tools available to attackers. Suites like metasploit, armitage, lair, dradis and others are readily available to help attackers coordinate, share intelligence and finely tune their attacks in real time. Defenders are usually limited to wikis, ticketing systems and manual tracking databases attached to the end of a Security Information Event Management (SIEM) system.

The Mozilla Defense Platform (MozDef) seeks to automate the security incident handling process and facilitate the real-time activities of incident handlers.

Goals:

  • Provide a platform for use by defenders to rapidly discover and respond to security incidents.
  • Automate interfaces to other systems like bunker, banhammer, mig
  • Provide metrics for security events and incidents
  • Facilitate real-time collaboration amongst incident handlers
  • Facilitate repeatable, predictable processes for incident handling
  • Go beyond traditional SIEM systems in automating incident handling, information sharing, workflow, metrics and response automation

Status:

MozDef is in production at Mozilla where we are using it to process over 300 million events per day.

DOCS:

http://mozdef.readthedocs.org/en/latest/