|
27 | 27 |
|
28 | 28 | ### What is Fibratus? |
29 | 29 |
|
30 | | -Fibratus is a tool for exploration and tracing of the **Windows** kernel. It lets you trap system-wide [events](https://www.fibratus.io/#/kevents/anatomy) such as process life-cycle, file system I/O, registry modifications or network requests among many other observability signals. In a nutshell, Fibratus allows for gaining deep operational visibility into the Windows kernel but also processes running on top of it. |
| 30 | +Fibratus is a tool for exploration and tracing of the **Windows** kernel. It lets you trap system-wide [events](https://www.fibratus.io/#/kevents/anatomy) such as process life-cycle, file system I/O, registry modifications or network requests among many other observability signals. In a nutshell, Fibratus allows for gaining deep operational visibility into the Windows kernel but also processes running on top of it. It requires no drivers nor third-party software. |
31 | 31 |
|
32 | | -Events can be shipped to a wide array of [output sinks](https://www.fibratus.io/#/outputs/introduction) or dumped to [capture](https://www.fibratus.io/#/captures/introduction) files for local inspection and forensics analysis. The powerful [filtering](https://www.fibratus.io/#/filters/introduction) engine permits drilling into the event flux entrails. |
| 32 | +Events can be shipped to a wide array of [output sinks](https://www.fibratus.io/#/outputs/introduction) or dumped to [capture](https://www.fibratus.io/#/captures/introduction) files for local inspection and forensics analysis. The powerful [filtering](https://www.fibratus.io/#/filters/introduction) engine permits drilling into the event flux entrails and the [rules engine](https://www.fibratus.io/#/filters/rules) is capable of detecting stealthy adversary attacks and sophisticated threats. |
33 | 33 |
|
34 | 34 | You can use [filaments](https://www.fibratus.io/#/filaments/introduction) to extend Fibratus with your own arsenal of tools and so leverage the power of the Python ecosystem |
35 | 35 |
|
@@ -69,7 +69,7 @@ fibratus run -f watch_files |
69 | 69 |
|
70 | 70 | - :zap: blazing fast |
71 | 71 | - :satellite: collects a wide spectrum of kernel events - from process to network observability signals |
72 | | -- :mag: super powerful filtering engine |
| 72 | +- :mag: super powerful filtering and rule engine |
73 | 73 | - :snake: running Python scriptlets on top of kernel event flow |
74 | 74 | - :minidisc: capturing event flux to **kcap** files and replaying anywhere |
75 | 75 | - :rocket: transporting events to Elasticsearch, RabbitMQ or console sinks |
@@ -100,7 +100,7 @@ fibratus run -f watch_files |
100 | 100 | * [**Network**](https://www.fibratus.io/#/kevents/network) |
101 | 101 | * [**Handle**](https://www.fibratus.io/#/kevents/handle) |
102 | 102 |
|
103 | | -### Filters |
| 103 | +### Filters and Rules |
104 | 104 |
|
105 | 105 | * [**Needle in the haystack**](https://www.fibratus.io/#/filters/introduction) |
106 | 106 | * [**Prefiltering**](https://www.fibratus.io/#/filters/prefiltering) |
@@ -131,6 +131,8 @@ fibratus run -f watch_files |
131 | 131 | * [**Null**](https://www.fibratus.io/#/outputs/null) |
132 | 132 | * [**RabbitMQ**](https://www.fibratus.io/#/outputs/rabbitmq) |
133 | 133 | * [**Elasticsearch**](https://www.fibratus.io/#/outputs/elasticsearch) |
| 134 | +* [**Eventlog**](https://www.fibratus.io/#/outputs/eventlog) |
| 135 | +* [**HTTP**](https://www.fibratus.io/#/outputs/http) |
134 | 136 |
|
135 | 137 |
|
136 | 138 | ### Transformers |
|
0 commit comments