LevelBlue Completes Acquisition of Cybereason. Learn more

LevelBlue Completes Acquisition of Cybereason. Learn more

Services
Cyber Advisory
Managed Cloud Security
Data Security
Managed Detection & Response
Email Security
Managed Network Infrastructure Security
Exposure Management
Security Operations Platforms
Incident Readiness & Response
SpiderLabs Threat Intelligence
Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Operational Technology
End-to-end OT security
Microsoft Security
Unlock the full power of Microsoft Security
Securing the IoT Landscape
Test, monitor and secure network objects
Why LevelBlue
About Us
Awards and Accolades
LevelBlue SpiderLabs
LevelBlue Security Operations Platforms
Security Colony
Partners
Microsoft
Unlock the full power of Microsoft Security
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
background-graphic-lb

LevelBlue USM Anywhere™ Sensors

Get started with Sensor deployment.

To deploy a sensor in your environment, you’ll need a valid Sensor Activation Code, which connects the sensor to your USM Anywhere instance.

screen-office-woman

Start investigating alarms in three steps.

Deploy the Sensor

Deploy the USM Anywhere Sensor virtual machine in your selected environment.

Connect the Sensor

Complete the Sensor setup and analyze the initial event data.

Investigate Your First Alarm

Within a day, you should be able to investigate the first alarms for your system.

Sensor Download
copy URL into a new browser tab

Deployment Guide

Quick Start Guide

AWS Sensor Template (VPC) https://s3.amazonaws.com/attdownloads.alienvault.cloud/usm-anywhere/sensor-images/usm-anywhere-sensor-aws-vpc.template Deployment Guide Quick Start
AWS Sensor For Gov. https://s3.amazonaws.com/attdownloads.alienvault.cloud/usm-anywhere/sensor-images/usm-anywhere-gov-sensor-aws-vpc.template Deployment Guide Quick Start
Azure Sensor https://portal.azure.com/#create/levelblue.unified-security-management-anywhereunified-security-management-anywhere Deployment Guide Quick Start
Azure Sensor for Gov. https://portal.azure.us/#create/levelblue.unified-security-management-anywhereunified-security-management-anywhere Deployment Guide Quick Start
VMware Sensor https://attdownloads.alienvault.cloud/usm-anywhere/sensor-images/usm-anywhere-sensor-vmware.zip Deployment Guide Quick Start
Hyper-V Sensor https://attdownloads.alienvault.cloud/usm-anywhere/sensor-images/usm-anywhere-sensor-hyperv.zip Deployment Guide Quick Start
GCP Template https://attdownloads.alienvault.cloud/usm-anywhere/sensor-images/usm-saas-gcp-sensor.zip Deployment Guide Quick Start
GCP Sensor Template for Gov. https://attdownloads.alienvault.cloud/usm-anywhere/sensor-images/usm-saas-gcp-gov-sensor.zip Deployment Guide Quick Start

Get started with Sensor deployment.

Secure OT environments from planning to protection.

Enhance operational visibility, fortify your security foundations, and proactively safeguard your OT environments against evolving threats.

  • Coordinate OT security priorities with business goals to baseline your security program
  • Exploit vulnerabilities in IT systems that could impact OT environments for proactive risk mitigation
  • Seamlessly integrate 24/7 IT and OT monitoring to unify analytics, workflows, and visibility
team-and-leader--reduced--pill

Globally CREST-Certified 

Trustwave SpiderLabs is CREST-certified for both Penetration Testing and Simulated Targeted Attack & Response (STAR) Penetration Testing, proving we invest in training to ensure our teams keep up with the latest techniques. We consistently help clients increase their cyber maturity through cutting edge penetration testing and modern attack-based simulations.

Logo_20167_crest-all6

Unlock the full power of Microsoft Security.

Get the best results from your Microsoft investment by partnering with Trustwave, no matter where you are in your journey. Optimize your enterprise with our custom Microsoft Security services.

  • Transition safely with expert migration to the Microsoft platform from legacy systems, or from E3 to E5
  • Realize value faster from your Microsoft Security investment
  • Includes support for your entire heterogenous ecosystem
Microsoft_logo

Security Configuration

Assess the configuration and security of your Azure cloud services setup

Plus icon

Security Controls Validation

Validate security controls following migration from legacy systems to Azure

Plus icon

Operational Best Practices

Optimize based on the CIS Microsoft Azure Foundations Benchmark

Plus icon

Excessive Privileges Testing

Test IAM within Azure Active Directory for excessive privileges

Plus icon

Strategic & Tactical Insights

Receive both strategic and tactical insights, including remediation plans

Plus icon

Cross-Technology Visibility

Identify security gaps across Microsoft products and third-party technologies

Plus icon
TRUSTWAVE SPIDERLABS
TESTING TIERS
OUR RISK-BASED APPROACH

Elite experts.
Renowned intelligence.

Stay ahead of disruption with Trustwave SpiderLabs. Our global team of 250+ security consultants, threat hunters, incident responders, forensic investigators, and researchers proactively protects our clients and delivers cutting-edge research.

Learn More
SpiderCrouch_Black_r1-lb

Billions of threat intelligence records

200k+ hours of pen tests annually

30k vulnerabilities discovered annually

2M+ new malicious URLs detected monthly

Four Tiers of Penetration Testing as a Service

We will help you choose the best option to meet your business needs.

globe2 Tier 1

Basic

  • Mostly automated
  • Free attack tools
  • Script-kiddie-like
diamond Tier 2

Opportunistic

  • Automated and human-led
  • Skilled attacker
  • Seeks easy targets
oval-rounded Tier 3

Targeted

  • Human-led
  • Targeted attack - specific
  • Skilled attacker over time
hexagon Tier 4

Advanced

  • Highly motivated skilled attacker
  • Well-funded
  • Exhausts all options to gain access
LevelBlue-Logo-reverse

Comprehensive Pen Testing

LevelBlue-Logo-reverse

Traditional Pen Testing

Conducts checks and scans (e.g., ports exposed to internet)
Assesses well-known/documented vulnerabilities (e.g., CVEs)
Incorporates compliance and industry requirements
Assesses full set of environments (e.g., production, development, test)
Accounts for business and workflow logic
Assesses privileged credential levels (e.g., standard, administrator)
Validates findings by experienced, senior testers
Provides a detailed report with recommendations

FAQs

What is a Sensor?

A sensor sends collected data over an encrypted connection to USM Anywhere in the cloud where it is aggregated, analyzed, correlated and archived.

Why do I need an activation code?

The activation code connects USM Anywhere to your account.

What if I have more than one environment?

This page will help you deploy your first sensor. After your first sensor is deployed, you can setup additional sensors within USM Anywhere by going to Settings and navigating to the Sensors section.

How long will it take for me to see my first alarm?

It varies depending on your environment and how much data you’re sending to USM Anywhere but typically, our users see their first alarm within one day.

Get Started


Learn more about how our specialists can tailor a security program to fit the needs of your organization.

compas-svg
img