Announcing Scanner for Jupyter: Response-as-Code and Advanced Threat Hunting
Scanner.dev
Scanner makes data lakes fast and easy to use. Schemaless log search indexing, all in the user’s S3 buckets.
We're excited to announce the release of Scanner for Jupyter, allowing users to analyze and visualize years of logs using Jupyter notebooks via the Scanner Python SDK.
?
Scanner for Jupyter is particularly helpful for unlocking two use cases:
?
Response-as-Code
For teams working on a Response-as-Code strategy to speed up investigations and response, Scanner for Jupyter can help.
Traditionally when a detection alert is triggered, DR engineers need to use internal documentation to figure out what steps to take to investigate the alert and decide how to respond. This can be a slow, manual process.
With Scanner for Jupyter, teams speed up their investigation and response with Jupyter notebooks, which serve as a kind of powerful, dynamic documentation that performs investigations and generates reports for you.
? When a detection alert is triggered, users execute the alert's corresponding Jupyter notebook, running Scanner queries to pull in context from historical logs and generate visualizations, like network graphs and charts. This automation can meaningfully speed up investigation and response from hours to minutes.??
Here are some example Response-as-Code use cases from teams using Scanner for Jupyter:
Advanced threat hunting on historical logs
?
Since Scanner provides fast search on years of historical logs, our customers are using advanced analysis features in Jupyter notebooks to look for trickier kinds of threats, like APTs (advanced persistent threats).
?
One aspect that makes APT threat hunting difficult is that a lot of APT activity can appear legitimate:
With Scanner for Jupyter, teams can quickly import ML libraries like scikit-learn to look for anomalies in these operations.
?
Here is a simple example showing how to use the IsolationForest classifier from scikit-learn in a Jupyter notebook to find anomalies in log events using properties like IP address, API call, time of day, and user role identifier: AnomalyDetection.ipynb.
?
Scanner for Jupyter makes it easy for teams to use the ML tools from the Jupyter ecosystem to detect APTs and other threats that are hard to find.
?
Since Scanner queries over years of historical logs are fast, this kind of advanced persistent threat hunting is now doable.
?
Usage
?
To use Scanner for Jupyter:
?
We're excited by these use cases and others that are unlocked when you can finally retain years of historical logs and search them at high speed.