Skip to main content

LME Security Dashboard

The LME Security Dashboard is a web application that gives you a single place to view security alerts, analyze them with AI, track vulnerabilities, manage detection rules, and configure your LME AI stack.

Accessing the Dashboard

Open your browser and go to:

https://<your-lme-server-ip>:8502

You will see a certificate warning because LME uses self-signed TLS certificates. Click through the warning to proceed.

Dashboard Layout

Header Bar

The header bar is always visible at the top and shows:

  • Health pills — real-time status of:
    • ES — Elasticsearch cluster health (green/yellow/red)
    • LLM — LiteLLM proxy status (ok/error)
    • pgvector — vector database status (ok/error)
  • Active model pill — shows the name of the AI model currently in use
    • Purple background = local model (running on your server)
    • Blue background = cloud model (uses an API key)
    • Click the model pill to jump to model settings
  • Refresh button — reloads alerts and health status

Four main tabs below the header:

TabWhat it Contains
AlertsSecurity alerts from Kibana, Wazuh, Sysmon, and Windows Defender
VulnerabilitiesPer-host vulnerability breakdown with KEV enrichment
Detection EngineeringElastAlert2 rules, Kibana rules, Sigma conversion, KEV stats
SettingsAI model management, KEV configuration, Document Ingestion, General Settings

Alerts View

The Alerts view lets you view Kibana alerts, Wazuh alerts, Sysmon alerts, and Windows Defender alerts.

Filtering Alerts

Above the alert list, you have several filters:

  1. Search bar — type to filter alerts by any field (name, host, user, IP, etc.). Results update automatically as you type.
  2. Time range dropdown — choose from: Last 15 min, 1 hour, 4 hours, 12 hours, 24 hours (default), 3 days, 7 days, 30 days, or 90 days.
  3. Machine filter dropdown — appears when alerts come from multiple hosts. Select a specific host or "All machines".

Alert Source Tabs

  • Kibana Alerts — alerts from Elasticsearch detection rules. Has a "Min severity" filter (Critical, High, Medium+, Low+).
  • Wazuh Alerts — alerts from the Wazuh HIDS. Has a "Min level" filter (5 through 12).
  • Sysmon — Windows Sysmon events. Automatically filtered to high-value event IDs (8, 10, 25, 6, 9, 15, 17-21, 255).
  • Windows Defender — antivirus/antimalware alerts. Has a "Min severity" filter.

Reading Alert Cards

Each alert card shows:

  • Severity badge — color-coded (red = critical, orange = high, yellow = medium, green = low)
  • Rule name or description
  • Timestamp — when the alert fired
  • Host/agent name — which machine triggered it
  • User — which user account was involved (if applicable)
  • Source/destination IP — network connection details (if applicable)
  • Command line — the process that triggered the alert (if applicable)

Analyzing an Alert

For an LLM summary of an alert:

  1. Find the alert you want to investigate
  2. Click the "Analyze" button on the alert card
  3. The LLM reads the full alert JSON and returns three sections:
    • What happened — plain-English explanation
    • Risk — how serious this is
    • Action — what you should do next
  4. The analysis appears in a colored box below the alert

Click the "Details" button on any alert card to expand it and see the full raw JSON data. Click "Hide" to collapse it.

Infinite Scroll

As you scroll down the alert list, more alerts load automatically. You will see "Loading more..." at the bottom, and "All alerts loaded" when you reach the end.


Vulnerabilities View

Click the Vulnerabilities tab to see a risk-ranked view of all your monitored hosts and their known vulnerabilities.

Overview

The top shows:

  • Total number of monitored machines
  • Total vulnerability count across all machines
  • A Refresh button

Host Cards

Each Wazuh agent is shown as a card ranked by risk score (most vulnerable first). The top 3 are highlighted with red, orange, and gray rank badges. Each card shows:

  • Agent name, ID, and OS
  • Severity breakdown pills (Critical, High, Medium, Low counts)
  • Total CVE count and maximum CVSS score
  • A proportional color bar showing severity distribution

Drilling into a Host

  1. Click anywhere on a host card to expand it
  2. A severity filter appears: All, Critical, High, Medium, Low
  3. A table of CVEs appears with columns:
    • CVE — linked to the NVD entry (opens in new tab)
    • Severity — color-coded badge
    • CVSS score
    • Package — affected software name and version
    • Description
    • Detected date
  4. CVEs that appear in the CISA KEV catalog show a red "KEV" badge, plus the CISA due date and a "Ransomware" label if applicable
  5. Scroll down to load more CVEs (50 at a time)

Detection Engineering

View the detection engineering page.