Skip to content

RhythmX

Behavioral Threat Detection Platform Powered by Machine Learning

Version 3.0


RhythmX is a high-performance behavioral threat detection platform powered by Sigma-based detection and machine learning. It ingests logs in near real-time, applies community and custom RhythmX rules, and surfaces threats across Windows and Linux environments. RhythmX integrates with LogRhythm for log forwarding and case synchronization.

What It Does

RhythmX provides an independent detection and analytics layer powered by the open RhythmX rule standard and machine learning. It integrates with LogRhythm's Log Distribution Services for log ingestion, delivering flexible, community-driven threat detection at scale.

  • Integrates with LogRhythm via Log Distribution Services for seamless log ingestion
  • Ingests logs from multiple sources including LogRhythm-forwarded events
  • Supports multiple log sources — Windows Event Logs, Linux Sysmon, and Linux Auditd
  • Runs detections against every log batch in near real-time
  • Correlates alerts across 23 threat use cases including APT chains, lateral movement, and Kerberos attacks
  • Manages incidents with automated risk scoring, SLA tracking, and external ticket integration
  • Outputs structured alerts in a format compatible with LogRhythm and other SIEM platforms
  • Accepts custom RhythmX rules so teams can rapidly author and deploy new detections

Why RhythmX

Capability What RhythmX Delivers
RhythmX rule support Runs the full RhythmX rule standard against forwarded logs
Machine learning Adds ML-driven detection alongside rule-based analysis
7-factor risk scoring Composite risk model combining MITRE coverage, ML signals, privilege context, and behavioral volume
23 correlation use cases Automated detection of complex attack patterns including Kerberos, APT, and ransomware
Incident management Automated incident creation, SLA tracking, Jira/ServiceNow integration
MSSP multi-tenancy Full multi-tenant support with entity-aware data across all integrations
Rapid detection authoring Drop in a .yml RhythmX rule — detections are live on the next cycle
Cross-platform coverage Native support for Windows, Linux Sysmon, and Linux Auditd
External feed API Read-only API for customer SOCs and SOAR platforms to pull incident data
Performance at scale Optimized for 20,000–25,000 events per second sustained throughput
Open detection logic RhythmX rules are open, portable, and community-driven

Quick Overview

flowchart TD
    A["LogRhythm<br><i>Log Sources</i>"] --> B["Log Distribution Services"]
    B --> C["RhythmX Engine"]
    D["RhythmX Rules + ML<br><i>Built-in + Custom</i>"] --> C
    C --> E["Structured Detections<br><i>SIEM-compatible</i>"]

    style A fill:#4a148c,stroke:#7c43bd,color:#fff
    style B fill:#1a237e,stroke:#534bae,color:#fff
    style C fill:#b71c1c,stroke:#f05545,color:#fff
    style D fill:#e65100,stroke:#ff9d3f,color:#fff
    style E fill:#1b5e20,stroke:#4c8c4a,color:#fff

Explore the Architecture page for a detailed look at how logs flow through the system.