LME Security Dashboard
The LME Security Dashboard is a web application that gives you a single place to view security alerts, analyze them with AI, track vulnerabilities, manage detection rules, and configure your LME AI stack.
Accessing the Dashboard
Open your browser and go to:
https://<your-lme-server-ip>:8502
You will see a certificate warning because LME uses self-signed TLS certificates. Click through the warning to proceed.
Dashboard Layout
Header Bar
The header bar is always visible at the top and shows:
- Health pills — real-time status of:
- ES — Elasticsearch cluster health (green/yellow/red)
- LLM — LiteLLM proxy status (ok/error)
- pgvector — vector database status (ok/error)
- Active model pill — shows the name of the AI model currently in use
- Purple background = local model (running on your server)
- Blue background = cloud model (uses an API key)
- Click the model pill to jump to model settings
- Refresh button — reloads alerts and health status
Navigation Bar
Four main tabs below the header:
| Tab | What it Contains |
|---|---|
| Alerts | Security alerts from Kibana, Wazuh, Sysmon, and Windows Defender |
| Vulnerabilities | Per-host vulnerability breakdown with KEV enrichment |
| Detection Engineering | ElastAlert2 rules, Kibana rules, Sigma conversion, KEV stats |
| Settings | AI model management, KEV configuration, Document Ingestion, General Settings |
Alerts View
The Alerts view lets you view Kibana alerts, Wazuh alerts, Sysmon alerts, and Windows Defender alerts.
Filtering Alerts
Above the alert list, you have several filters:
- Search bar — type to filter alerts by any field (name, host, user, IP, etc.). Results update automatically as you type.
- Time range dropdown — choose from: Last 15 min, 1 hour, 4 hours, 12 hours, 24 hours (default), 3 days, 7 days, 30 days, or 90 days.
- Machine filter dropdown — appears when alerts come from multiple hosts. Select a specific host or "All machines".
Alert Source Tabs
- Kibana Alerts — alerts from Elasticsearch detection rules. Has a "Min severity" filter (Critical, High, Medium+, Low+).
- Wazuh Alerts — alerts from the Wazuh HIDS. Has a "Min level" filter (5 through 12).
- Sysmon — Windows Sysmon events. Automatically filtered to high-value event IDs (8, 10, 25, 6, 9, 15, 17-21, 255).
- Windows Defender — antivirus/antimalware alerts. Has a "Min severity" filter.
Reading Alert Cards
Each alert card shows:
- Severity badge — color-coded (red = critical, orange = high, yellow = medium, green = low)
- Rule name or description
- Timestamp — when the alert fired
- Host/agent name — which machine triggered it
- User — which user account was involved (if applicable)
- Source/destination IP — network connection details (if applicable)
- Command line — the process that triggered the alert (if applicable)
Analyzing an Alert
For an LLM summary of an alert:
- Find the alert you want to investigate
- Click the "Analyze" button on the alert card
- The LLM reads the full alert JSON and returns three sections:
- What happened — plain-English explanation
- Risk — how serious this is
- Action — what you should do next
- The analysis appears in a colored box below the alert
Click the "Details" button on any alert card to expand it and see the full raw JSON data. Click "Hide" to collapse it.
Infinite Scroll
As you scroll down the alert list, more alerts load automatically. You will see "Loading more..." at the bottom, and "All alerts loaded" when you reach the end.
Vulnerabilities View
Click the Vulnerabilities tab to see a risk-ranked view of all your monitored hosts and their known vulnerabilities.
Overview
The top shows:
- Total number of monitored machines
- Total vulnerability count across all machines
- A Refresh button
Host Cards
Each Wazuh agent is shown as a card ranked by risk score (most vulnerable first). The top 3 are highlighted with red, orange, and gray rank badges. Each card shows:
- Agent name, ID, and OS
- Severity breakdown pills (Critical, High, Medium, Low counts)
- Total CVE count and maximum CVSS score
- A proportional color bar showing severity distribution
Drilling into a Host
- Click anywhere on a host card to expand it
- A severity filter appears: All, Critical, High, Medium, Low
- A table of CVEs appears with columns:
- CVE — linked to the NVD entry (opens in new tab)
- Severity — color-coded badge
- CVSS score
- Package — affected software name and version
- Description
- Detected date
- CVEs that appear in the CISA KEV catalog show a red "KEV" badge, plus the CISA due date and a "Ransomware" label if applicable
- Scroll down to load more CVEs (50 at a time)
Detection Engineering
View the detection engineering page.