Skip to main content
Unlisted page
This page is unlisted. Search engines will not index it, and only users having a direct link can access it.

Key Concepts

This guide explains the key concepts and terminology used throughout Superna 5.x to help you understand the platform's capabilities and components.

Core Platform Components

TermDefinition
DashboardCentralized monitoring interface showing security status, active threats, system health, and activity metrics with interactive widgets
Threat DetectionMachine learning-powered security engine that monitors for suspicious activities and potential attacks using behavioral analysis
InventoryDevice and asset management system that catalogs all protected storage systems, tracks licenses, and identifies coverage gaps
JobsAutomated task execution system for scheduled or on-demand operations including device management and security scanning
SettingsConfiguration management interface for platform-wide and feature-specific options including onboarding mode and notifications

Security and Threat Detection

TermDefinition
Active ThreatsCurrent security incidents requiring attention, categorized by severity level (Critical, High, Medium, Low)
Behavioral AnalysisMachine learning system that learns normal environment patterns and alerts on deviations to catch zero-day threats
BaselineNormal activity patterns established during the learning phase to identify anomalous behavior
Detection TypesThreat categories including Data Encryption, Suspicious Extension, Mass Delete, and other security indicators
Honeypot ActivityInteraction with decoy files serving as tripwires to detect unauthorized access attempts
Learned ThresholdsDynamically adjusted detection parameters based on environment patterns, automatically tuned during onboarding
LockoutAutomatic user access restriction when suspicious activity is detected to prevent damage during active threats
RansomwareMalicious software that encrypts data, detected through multiple patterns including encryption and file renaming
Security GuardAutomated security scanning system that monitors system health with percentage-based health indicators
Suspicious ExtensionFile operations with extensions associated with malware (e.g., .blacksuit, .locky, .encrypted)
Threat Severity LevelsPriority classification system: Critical (red), High (orange), Medium (yellow), Low (blue)

System Management and Operations

TermDefinition
Auditing DevicesStorage systems configured for security monitoring and data protection with comprehensive audit capabilities
API TokensAuthentication credentials for programmatic access to platform features, enabling third-party integrations
Health CheckSystem monitoring that verifies proper operation of platform components with remediation actions
Job Status TypesCurrent state indicators for automated tasks: Queued, Running, Finished, Errors (with timestamps)
Job TypesCategories of automated tasks: Configuration, General, Threat Detection, Security Guard, Robo Audit
Onboarding ModeInitial learning phase where system establishes baseline behavior patterns with restricted features
Regular ModeFull operational state with all security features enabled after sufficient data collection
Robo AuditAutomated self-test system for permissions and access patterns with continuous vulnerability scanning
SyslogSystem logging protocol for collecting audit events from devices, critical for forensic analysis
WebhooksHTTP callbacks for real-time event notifications to external systems enabling automated workflows
WorkflowsAutomated response procedures triggered by specific events with customizable sequences for handling incidents

User Management and Access Control

TermDefinition
Access ControlRole-based permission system controlling user capabilities with Admin and Viewer roles
Audit LoggingTracking and recording of user activities within the platform for accountability and compliance
Team ManagementOrganizational structure for grouping users and managing access with scalable permission management

Device Management

TermDefinition
Device ServicesPlatform services managing communication with storage systems: Audit (Online) and Control (Online)
Managed DeviceStorage system under Superna platform control and monitoring, added through device addition wizard
QumuloScale-out NAS storage platform supported by Superna 5.x, requiring IP address, credentials, and syslog configuration

Data Protection and Recovery

TermDefinition
Snapshots (Files)Point-in-time copies of files used for data recovery, supported on Vast, Qumulo, PowerScale, Pure FB FA systems
Versioning (Objects)Feature maintaining multiple versions of objects for recovery, supported on AWS, VAST, Pure FB, S3, Qumulo, PowerScale, ObjectScale

Integration and Automation

TermDefinition
Forensic WorkflowsEstablished investigation procedures for systematic incident analysis and evidence collection
Query ManagementAdvanced search capabilities for finding specific events or patterns during forensic investigations
Remediation ActionsAutomated or manual steps to resolve identified issues as part of the health check system
Understanding the Platform

These concepts form the foundation of Superna 5.x. Familiarizing yourself with these terms will help you navigate the platform more effectively and make the most of its security and data management capabilities.