A re-engineered detection framework to identify true threats smarter and faster by cutting through low-priority, noisy alerts

This page summarizes the latest updates to ManageEngine Log360. The core focus centers on a completely rebuilt detection framework that transforms how security teams identify, analyze, and respond to threats. This release focuses on unifying detection capabilities, improving accuracy, and offering the scalability needed to meet the demands of modern security operations.

Core improvements

One of the significant challenges of modern SOCs is to handle the massive influx of false positives effectively on critical alerts. The time spent in toggling between siloed consoles to piece together threat context further slows down response in acting against real threats.

Log360's re-engineered solution addresses both to facilitate high-quality detections easier than ever.

  • Unify security analytics by viewing and managing the entire detection logic from one place.
  • Precision targeting by zeroing in on high-value assets through filters at AD-object levels.
  • Intelligent tuning by acting on specific recommendations on reducing false positives.
  • Enterprise scalability with horizontally distributed architecture that grows alongside your enterprise.

What's new

Log360's latest build unifies fragmented capabilities, addresses alert fatigue, and includes features that previously required add-on purchases. Let's break down what's changed:

 

Enhanced Microsoft 365 monitoring

Get detailed reports on activities across Exchange, Teams, SharePoint, OneDrive, and Entra ID, expanding your detection pipeline with pre-built detection rules targeting M365-specific threats including brute force attempts, excessive account lockouts, and more.

 

Unified detection console

An unified console combining MITRE ATT&CK® mapped rules, correlation logic, anomaly detection, and threat-intelligence feeds to view your complete detection strategy at a glance and investigate faster across every possible threat vector.

 

Extensive library of security rules

Start detecting threats immediately with a rich library of cloud-delivered, deployment-ready rules from Sigma HQ mapped to MITRE ATT&CK® TTPs, continuously updated to stay ahead of the evolving threat landscape.

 

No-code rule creation and management

Build detection rules at scale intuitively with a guided interface that requires no complex query languages like KQL, SPL, or AQL, to identify known threats, behavioral deviations, or complex attack chains.

 

Object-level filtering

Scope detection to user, group, or OU to focus on high-value targets while avoiding noisy alerts from low-risk groups.

 

Scalable architecture

Log360's new scalable architecture enables seamless, high-availability log management across distributed enterprise environments. It ensures rapid log ingestion, workload distribution, and improved performance with multi-tier clustering, queue-based processing, and multiple storage layers.

 

Rule tuning insights

Detect noisy rules using real-time analytics on alert volume and rule hit frequency and get recommendations to deal with such cases for optimized performance.

Start responding to true threats
before the damage is done.

Make every second count with Log360's threat detection engine that reduces alert fatigue, excludes benign events, and scopes detection to sensitive assets, to keep your business resilient at all times.