Official Announcement
The ALL-SOC V2.6 version has been updated on January 10, 2026! The update features are as follows:
* Introduced AI Confidence Score (ACS) for alerts
* Introduced AI Confidence Score (ACS) for alerts
You can click "AI Noise Reduction" on the [Work Order] page to enable this feature. Once enabled, the system will automatically perform multi-dimensional AI scoring for newly generated security work orders, assisting engineers in quickly assessing alarm risks.
* Introduced AI-based dynamic alert noise reduction
On the [Work Order - AI Noise Reduction] page, you can freely configure and combine alert rules and alert methods (immediate alert, aggregated alert, no alert). AI will dynamically adjust the alert rhythm of work orders based on your strategy, significantly reducing redundant alert interference and alleviating alert fatigue for engineers.
* Add a new customizable alert email template
You can manage your exclusive alert email templates on the [Settings - Email - Alert Email Template] page. New alerts will be automatically sent using the adapted template according to the rules. You can also check "Custom Content" in the alert content of [Security Operation Rules] to customize notifications for specific use cases, achieving professionalization and standardization of alerts.
* Newly added security intelligence and handling system
You can configure the API credentials for the intelligence system (Weibu) and the handling system (Fortigate, Azure) on the [Settings - Security System] page (which need to be applied for by the enterprise itself, and assistance can be obtained by contacting the Feiluo team). Additionally, you can quickly query security intelligence (IP analysis) and perform security handling (ban IP, ban account) in the [Work Order] details. In the future, support for more intelligence and handling systems will also be available.
* Add observation list management
You can create and manage multiple types of custom blacklists/whitelists (such as IP, MAC, accounts, etc.) on the [Data Management - Watchlist] page, and directly reference them in [Security Operation Rules, Search] (FNL syntax: index='watchlist name'; KQL syntax: _GetWatchlist('list name')) to facilitate batch management and application.
* Support for customizing views for work orders
On the "Work Orders" page, you can "Save as View" for commonly used filtering criteria, and efficiently query work orders in different scenarios through quick view switching, simplifying daily operation processes.
* Compatible with LA (Log Analytics) log sources and KQL (Kusto Query Language) queries
For customers who have already utilized LA, you can configure the parameters of the existing LA log source on the [Settings - System Settings] page (LA log source does not consume license capacity). Once configured, you can directly use KQL statements for querying and analysis in [Security Operation Rules, Search, Digital Dashboard], achieving integration with the existing log service.
* Added log backup function
You can click "Log Backup" on the "Data Management - Log Management" page to set backup policies, and perform manual or incremental backups to provide additional protection for important log data.
* Enhance system security strategy
In [Settings - System Settings], new configuration items such as "User Password Expiration Date", "Force Password Change on First Login", and "User Token Expiration Date" have been added to help you further enhance your account security and compliance control level.
* Optimize multilingual support and system experience
We have optimized the English and Japanese translations of the page, and comprehensively enhanced the fluency and stability of system operations, providing you with more reliable operational support.
ALL-SOC Main Function Modules
Log Ingestion / Collection
Smart Digital Dashboard
Use Case Library
Security Ticketing Management
AI assistant
Network Traffic Analytics (NTA)
AI+Security Analysis
Multi-language Support
Recommended Use Cases
2.0 Big Data Analysis
UEBA
More
Dual-channel Multi-environment Log Collection and Analysis
As a secure big data platform, ALL-SOC has comprehensive security operation capabilities for local, cloud, hybrid cloud environments, as well as business data. The platform can collect and process multiple log sources, monitor permission management, data flow, and business security based on log data, and ensure business continuity and operational health. Supporting dual-channel log analytics via ALL-SOC and Microsoft Azure, allowing enterprises to select the optimal deployment mode.
Out-of-the-box Threat Detection Case Library
The ALL-SOC use case library covers best practices from multiple industries, including covering not only security device monitoring but also business system oversight. Of course, we have also offering a comprehensive suite of correlated Use Cases to address complex security scenarios to help enterprises adapt to more complex security scenarios and cross log matching composite monitoring needs.
Intelligent generation of Security Use Case
Using the ALL-SOC AI intelligent generation capability, security engineers can quickly generate readable and usable Security Use Case recommendations based on log sources and scenarios, combined with operational needs. It supports multiple languages such as KQL and FNN, significantly reducing manual effort and accelerating threat detection deployment.
Work order alerts and centralized management
ALL-SOC has a built-in work order management system. When a security incident occurs, it generates a security incident work order and cooperates with flexible and customizable alarm rules. Empowering security teams to efficiently triaging, analyze, and remediate incidents within a centralized workflow.
ACS Security Incident Analysis
ALL-SOC AI combines enterprise specific log information and threat intelligence to intelligently analyze each threat event, evaluate ACS (Alert Confidence Score), providing remediation guidance to drastically reduce analysis overhead and alert fatigue (noise) while improving detection accuracy.
Introduction to UEBA and Machine Learning
Log Sources
Data pre-processing
Algorithm Model Training
Algorithm processing
Algorithm Results Presentation
UEBA User Behavior Analysis
For the security risk monitoring of internal users in the enterprise environment, ALL-SOC provides UEBA user behavior statistical analysis capabilities to help enterprises monitor and correlate user behavior in real time, revealing daily risk trends.
FNL2.0 Search Language
The independently developed FNL2.0 search language supports over 40 high-performance big data analysis functions and processes data through command chains and pipelines,optimized for high-velocity querying and analysis of massive event datasets. FNL2.0 is designed to be intuitive and maintainable, supporting seamless result storage and file association. It performs well in scenarios involving complex aggregation and multi function support, and supports expansion and deep development optimization.
AI Intelligent Interaction Center
Security engineers utilize the ALL-SOC AI Intelligent Center to quickly understand the current status of enterprise security, operations, and application data analysis through natural language, generate reports, and provide professional improvement suggestions based on AI capabilities.
AI SecOps Solution
By using AI SecOps (Artificial Intelligence Security Operations) solutions tailored for enterprises, they can further deploy AI-driven digital security agents to dramatically enhance incident response efficiency and automate remediation. achieving 7x24h AI security operations. For more information, please contact our expert: amateur_fan@flyingnets.com