How BluScout works, what it monitors, and what your team gets access to.
BluScout is a unified security operations platform that combines SIEM and endpoint detection capabilities into a single interface.
It ingests, parses, and analyzes data from endpoints, network devices, and log sources to detect threats in real time — whether you're monitoring a single laptop or thousands of servers.
The platform is built around five core pillars: endpoint visibility, an advanced detection engine, forensic investigation tools, centralized log collection, and analytics with capacity forecasting.
The five pillars of BluScout's security operations platform.
Granular insight into every device — process trees, network connections, system health, and resource usage in real time.
Stateful and stateless detection rules, IOC matching against global threat feeds, and behavioral analysis for anomalies like C2 beaconing.
Search millions of log events instantly, perform deep packet inspection across OSI layers, and reconstruct attack timelines.
Virtual Log Collectors aggregate logs from isolated subnets, firewalls, and switches before securely transmitting to the platform.
Monitor events per second, track data usage trends, and predict monthly capacity to prevent storage issues before they happen.
Automatic ingestion from ThreatFox and AlienVault OTX, plus custom IOC uploads (IPs, domains, URLs, hashes) with real-time matching.
From deployment to investigation — the path your data takes through BluScout.
Install lightweight agents on endpoints or configure network devices to send logs to a collector.
Data is securely transmitted to the BluScout Manager over encrypted channels.
The Log Decoder parses raw data into structured, searchable fields using built-in and custom parsers.
The Detection Engine evaluates parsed data against alert rules and threat intelligence feeds in real time.
Alerts surface in the dashboard. Analysts use the Explorer to search logs, packets, and endpoints with full context.
What your team gets access to inside the platform.
Real-time KPIs, alert severity breakdown, threat map, and top traffic sources at a glance.
Per-host details including processes, disks, network connections, interfaces, and system performance.
Chronological alert inbox with severity levels, raw log drill-down, and a dedicated IOC hits view.
Network session analysis, deep packet inspection across all OSI layers, beacon detection, and scan analysis.
Full-text log search with interactive filtering, saved queries, event normalization, and error replay.
Beacon detection with statistical scoring, scan detection with confidence levels, and miscellaneous protocol inspection (ARP, ICMP, STP).
Stateless and stateful rule builder with boolean logic, threshold windows, MITRE tagging, and custom matchers.
Daily event volume, EPS monitoring, storage consumption tracking, and month-end capacity forecasting.
Detailed setup guides, configuration references, and admin documentation are provided to customers during deployment.
Get started