T-Guard Official Documentation
  • Introduction
    • About T-Guard
    • Architecture
  • Installation
    • Prerequisites
    • Installation Steps
    • Integration Steps
    • Use Case
  • User Manual
    • Wazuh (SIEM)
      • Accessing Wazuh Dashboard
      • Deploying Wazuh Agents
      • Wazuh Fields Description
      • Decoders and Rulers
      • Threat Detection and Response
    • DFIR-IRIS
      • DFIR-IRIS (Digital Forensic Incident Response - IRIS)
      • Accessing DFIR-IRIS Dashboard
      • Using IRIS
  • Demo Testing
    • Brute-force Attacks
    • Malware Detection
    • File Integrity Monitoring
Powered by GitBook
On this page

Demo Testing

In this chapter, we will demonstrate the capabilities of our security operations center (SOC) through a proof of concept. Some of the examples used will be real attacks that have occurred, while others will be simulated scenarios.

The objective of this demonstration is to showcase the potential and severity of attacks and how they can be recorded and monitored by the SOC. By demonstrating how attacks can be detected, recorded, and analyzed, we aim to highlight the importance of having a robust SOC in place to prevent and mitigate security incidents.

PreviousUsing IRISNextBrute-force Attacks

Last updated 1 year ago