From cd7f6ad5cb56d1dd96556868812ff5b3100a199a Mon Sep 17 00:00:00 2001 From: dmarkdurrett <55758457+dmarkdurrett@users.noreply.github.com> Date: Thu, 27 Oct 2022 19:32:45 +0200 Subject: [PATCH] Update README.rst Updates converting Scirius => Stamus CE --- README.rst | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/README.rst b/README.rst index a01b2faf4..da91186f7 100644 --- a/README.rst +++ b/README.rst @@ -24,7 +24,7 @@ SELKS is comprised of the following major components: * E - Elasticsearch - https://www.elastic.co/products/elasticsearch * L - Logstash - https://www.elastic.co/products/logstash * K - Kibana - https://www.elastic.co/products/kibana -* S - Scirius - https://github.com/StamusNetworks/scirius +* S - Stamus Community Edition (formerly Scirius) - https://github.com/StamusNetworks/scirius * EveBox - https://evebox.org/ * Arkime - https://arkime.com/ * CyberChef - https://github.com/gchq/CyberChef @@ -52,7 +52,7 @@ SELKS is a showcase of what Suricata IDS/IPS/NSM can do and the network protocol Threat Hunting -------------- -The usage of Suricata data is further enhanced by Stamus' developed Scirius, a threat hunting interface. The interface is specifically designed for Suricata events and combines a drill down approach to pivot for quick exploration of alerts and NSM events. It includes predefined hunting filters and enhanced contextual views: +The usage of Suricata data is further enhanced by Stamus' developed Stamus Community Edition (Stamus CE), a threat hunting interface. The interface is specifically designed for Suricata events and combines a drill down approach to pivot for quick exploration of alerts and NSM events. It includes predefined hunting filters and enhanced contextual views: .. image:: doc/images/Hunt-context-1.png :alt: Stamus @@ -104,8 +104,8 @@ For air gapped environement or full OS installation, see `SELKS ISO Setup