Impulse XDR 1.10 released: Real-time threat detection & integrity monitoring for Linux platforms


New Member
Mar 27, 2024
Reaction score

Deploying the next-generation of security telemetry technologies is hard, so I’m building Impulse, a fully automated XDR platform that leverages tools like Osquery and eBPF to provide real-time threat detection & integrity monitoring for servers and workstations.

It detects malware from behavioral patterns rather than signatures and enables deeper visibility than legacy tools. Impulse agents can be deployed on any device or VM running Linux such as cloud VMs in VPC networks, VPS servers or personal workstations and IoTs.

In terms architecture, it is organised around a self-hosted, manager-sensor model that provides traditional SIEM capabilities like centralized log storage, indexing and normalization, but also automated log-correlation and real-time threat detection via 2 open-source EDR sensors (one called “light” for host intrusion detection, and “heavy” sensor with network IDS capabilities).

It’s designed to be fast and easy to use, so it installs in 5 mins on as little as 1.5 gb RAM, 1-core VM.


Main features include:
  • Security Analytics: Ingests telemetry data from its fleet of monitoring sensors and provides security analytics & insights.
  • Integrity monitoring for every aspect of your environment - files, processes, connections, ports, users, authentications, installed packages, kernel modules, etc. every variable that could be an indicator of compromise is tracked and stored in “IOCs History” table.
  • Network Visibility & IDS: Monitors network flows, detects intrusion attempts and automatically blocks offenders with active response.
  • Security Policies: Monitors system configuration settings to ensure compliance with preset core security policies and provides CIS-benchmark reports.
  • Active Response: Blocks suspicious IPs, stops processes, closes ports and quarantines files.
  • Fleet Firewall: nftables-based fleet firewall blocks offenders across the fleet.
  • Threat Intel: Integrates with high-quality threat intelligence providers to enrich your context data.
  • Vulnerability Scanning: Discovers installed packages and associated CVEs.
  • Self-Hosted & Open-Core: Data never leaves you servers.
Please feel free to share any requests for further development, as this will be a community-driven project.

Roadmap: the next major iteration will have the option to create custom secure configuration checks.

Staff online