System Integrations
Can't find your integration?
No worries, if your desired integration isn't listed, you can create a support ticket and let us know what you need. Our team will check your request and get back to you with updates or alternatives.
Tip: Share details like the integration name, platform, and how you plan to use it to help us assist you faster.
1 Password Integrations
Introduction With 1Password Business, you can send your account activity to your security infor...
Active Directory Integrations
Introduction Elastic Stack security features can be configured to authenticate users through Ac...
Add Windows Integrations
Introduction The Windows integration allows you to monitor the Windows OS, services, applicatio...
AQUILA - 1Password Integration
1Password Events Reporting Integration Manual With 1Password Business, you can forward account a...
AQUILA - Atlassian Account Integration
What are API token scopes? Scopes define what actions an API token is allowed to perform in Atla...
AQUILA - AWS Integration
Overview The AWS Integration enables the collection of logs and metrics from your Amazon Web Ser...
AQUILA - Azure Logs Integration
The Azure Logs integration enables you to collect logs from specific Azure services such as: ...
AQUILA - Cisco Meraki Integration
Cisco Meraki provides a centralized cloud management platform for devices like MX Security Applia...
AQUILA - Cisco Secure Endpoint Integration
Introduction Cisco Secure Endpoint is a cloud-delivered, advanced endpoint detection and respons...
AQUILA - CISCO Umbrella Integration
Introduction Cisco Umbrella is a cloud-delivered security platform that provides an additional l...
AQUILA - Cloudflare Integration
Introduction Cloudflare logs provide detailed insights into client connections, request paths th...
AQUILA - Digital Guardian Integration
Integrating Digital Guardian (DG) with AQUILA for security log ingestion typically involves expor...
AQUILA - Fortinet FortiGate Integration
Please follow these instructions: Step 1: Log in to your Fortinet FortiGate Admin portal and n...
AQUILA - GitLab Integration
Purpose This document explains, in a clear and practical way, how to locate GitLab log files on ...
AQUILA - Google Workspace Integration
Google Workspace Integration Overview The Google Workspace integration collects and parses...
AQUILA - Host Isolation
Overview Host Isolation Exception allows isolated endpoints to maintain connectivity to specific...
AQUILA - Host Isolation Exception
Overview Host isolation exceptions (also called endpoint isolation exclusions) are configurable ...
AQUILA - Microsoft Office 365 Integration
Overview This integration with Microsoft Office 365 supports the ingestion of user, administrato...
AQUILA - Mimecast API v2 Integration
Mimecast Integration Guide Integrate Mimecast with your security platform via API to collect ema...
AQUILA - Nginx Integration (Ubuntu or Linux Platform)
Overview The Nginx Integration provides comprehensive monitoring and observability for Nginx ser...
AQUILA - Oracle Audit Logs Integration
This integration is for ingesting Audit Trail logs and fetching performance, tablespace and sysme...
AQUILA - PostgreSQL Integration
Please find below the instructions required to set up this integration: To configure PostgreSQL ...
AQUILA - Salesforce Integration
Overview The Salesforce integration enables you to monitor your Salesforce instance. Salesforce ...
AQUILA - Salesforce Integration via JWT Authentication
Overview With the OAuth 2.0 JWT bearer token flow, the client posts a JWT to the Salesforce OAut...
AQUILA - Setup Integration from Auth0
Auth0 Integration Guide Integrate Auth0 to ingest identity-related logs such as login attempts, ...
AQUILA - SNIFF & Detect
Outlook Add-in for Microsoft 365 Overview AQUILA – SNIFF & Detect is a custom integration app...
AQUILA - SonicWall Firewall Integration
This integration collects syslog messages from SonicWall firewalls. It has been tested with Enhan...
AQUILA - Varonis (DLP) Integration
Purpose This document outlines the procedure to integrate Varonis DatAlert or DatAdvantage with ...
AQUILA CSPM - AWS Integration
Overview This page explains how to get started monitoring the security posture of your cloud ass...
AQUILA CSPM - Azure Integration
This manual explains how to get started monitoring the security posture of your Azure CSP using t...
AQUILA CSPM - GCP Integration
Authentication To use this CSPM Google Cloud Platform (GCP) integration, you need to set up a ...
AQUILA GCP Integration
This Google Cloud integration collects and analyzes a wide range of logs and metrics to provide c...
Atlassian Bitbucket Integrations
Introduction The Bitbucket integration collects audit logs from the audit log files or the audi...
Atlassian Bitbucket Integrations (New)
Introduction The Bitbucket integration collects audit logs from the audit log files or the audi...
Automatically fetch user accounts ( Google IAM )
STEP 1: Enable APIs You’ll need access to one of the following APIs: Cloud Identity API (fo...
Automatically Fetch User Accounts without Manually Importing for JumpCloud
JumpCloud Intoduction JumpCloud allows you to automate user account creation and syncing withou...
Automatically Fetch User Accounts without Manually Importing for OneLogin (via SCIM)
OneLogin (via SCIM) Introduction: OneLogin gives users the ability to access the applications...
Automation on fetching user accounts for Azure
To automatically fetch user accounts into Azure (e.g., for Azure Active Directory / Microsoft Ent...
Automation on fetching user accounts for Okta
To automatically fetch user accounts into Okta without needing to manually import them, you shoul...
AWS Cloudtrails Integrations
Introduction The AWS CloudTrail integration allows you to monitor AWS CloudTrail Reference: h...
AWS GuardDuty Integrations
Introduction The Amazon GuardDuty integration collects and parses data from Amazon GuardDuty Fi...
AWS Integrations
Introduction This document shows information related to AWS Integration. The AWS integration...
AWS Security Hub Integrations
Introduction The AWS Security Hub integration collects and parses data from AWS Security Hub RE...
Azure Application Insights Integration
The Application Insights Integration allows users to collect metrics from Azure Application Insig...
Azure Application Insights Integration
Overview The Application Insights Integration allows users to retrieve application insights metr...
Azure Integration -Blob Storage Leasing
Here are the necessary steps to resolve the issue. Step 1: Go to your Azure Portal and log in...
Azure Logs Integration
Introduction This document shows information related to Azure Active Directory Integration.The A...
BitDefender Integrations
BitDefender GravityZone supports SIEM integration using "push notifications", which are JSON mess...
Bitwarden Integrations
Overview The Bitwarden integration allows users to monitor collections, events, groups, members ...
Cato Networks - Configuring Event Log Forwarding with Two Windows Servers
How to Configure Windows Event Forwarding for User Awareness Cato Networks’ User...
Cato Networks - Using Cato API for ELK Stack Integration
To fully integrate the Cato Networks API with the Elastic Stack (ELK Stack), you can follow this ...
CATO Networks API Integration
1. Overview Cato Networks is a cloud-native Secure Access Service Edge (SASE) platform that conv...
Cisco AMP for Endpoints API Integration
To integrate Cisco AMP for Endpoints (now part of Cisco Secure Endpoint) with Elastic, follow the...
Cisco Meraki - Configuring a Syslog Server
Method 1: Using GUI Configure log forwarding Sign in to the Meraki Dashboard with adminis...
CISCO Meraki Integrations
Introduction Cisco Meraki offers a centralized cloud management platform for all Meraki devices...
Cisco Meraki via Syslog
Login to Cisco Meraki Dashboard: Go to the Meraki Dashboard and log in with your credentials...
CISCO Nexus Integrations
Overview The Cisco Nexus integration allows users to monitor Errors and System Messages. The Cis...
CISCO Secure Email Gateway Integrations
The Cisco Email Security Appliance (ESA) integration is a comprehensive solution for managing and...
CISCO Secure Endpoint - Secure Endpoint API
Authentication The Secure Endpoint API requires access via an authenticated and authorized acco...
CISCO Secure Endpoint Integrations
Introduction Secure Endpoint offers cloud-delivered, advanced endpoint detection and response a...
CISCO Umbrella Integrations
Introduction Cisco Umbrella is a cloud security platform that provides an additional line of de...
Cloudflare Integration
Introduction Cloudflare integration uses Cloudflare's API to retrieve audit logs and traffic lo...
CrowdStrike Integration - using API
Steps to Get Client ID and Client Secret in CrowdStrike Falcon Log in to the Falcon Console ...
Crowdstrike Integrations
Introduction This integration is for CrowdStrike products. It includes the following datasets f...
CrowdStrike to SIEM alerts and ruling
Introduction This guide explains how to send security alerts from CrowdStrike Falcon to your Sec...
CSPM-AWS Integration
Get started with CSPM for AWS Overview This page explains how to get started monitoring t...
Custom Windows Event Logs - Integration
Custom Windows Event Logs Collect and parse logs from any Windows event log channel with Elastic...
Cyber Incident Monitoring Integration Procedure
Go to > Cyber Incident Monitoring
CyberArk PAM
Configure the Vault to Forward syslog Messages to PTA The system logger of the Vault must be con...
Digital Guardian Integration
Requirements You Must Have Why You Need It Elastic Agent installed ...
Dropbox Integrations
Introduction Connecting Dropbox Use the Workplace Search Dropbox connector to automatically c...
Enable or Check Syslog/CEF on SonicWall
Log in to SonicWall UI Open a web browser Go to your SonicWall’s IP (e.g., https://192.168....
Enable Syslog on Port 514 and Allow via Firewall (Ubuntu)
Step 1: Install rsyslog1. Open terminal.2. Run the following commands: sudo apt update sudo apt...
ESET Protect Integration
ESET PROTECT allows you to efficiently manage ESET products across workstations and servers withi...
ESET Threat Intelligence Integrations
ESET Threat Intelligence provides advanced, real-time insights into global cybersecurity threats,...
F5 Integrations
Introduction This document shows information related to F5 Integration. The F5 BIG-IP integr...
Forescout
Method 1: Network logs forwarding The Network logs forwarding page ("Settings" > "System Setti...
Fortinet-Fortigate Integrations
Introduction This integration is for Fortinet FortiGate logs sent in the syslog format. Pre...
Forwarding logs from rsyslog client to a remote rsyslogs server
Introduction This guide will walk you through setting up Rsyslog for log forwarding between a cl...
GCP - How to Add a Role
Go to the Google Cloud Console. Navigate to IAM. Click on "IAM & Admin" in the left...
GCP - How to enable Cloud Asset API
Please refer to these instructions to enable Cloud Asset API. To enable the Cloud Asset API fo...
GCP - Setup a Log Sink
Setup Log Sink Using Google Cloud Console Navigate to "Logging" > "Log Router" > "Create Sin...
GCP and CSPM-GCP Integration
This Google Cloud integration collects and analyzes a wide range of logs and metrics to provide c...
GitHub
Introduction The GitHub integration collects events from the GitHub API. https://docs.g...
GitHub Integration
GitHub Integration The GitHub integration collects events from the GitHub API. Logs Audit The...
GitHub Integration
GitHub Integration Introduction Elastic’s GitHub integration allows you to ingest GitHub logs, ...
GitLab Integrations
Introduction Introduced in GitLab Starter 8.4. Support for Amazon Elasticsearch was introduced ...
Google Cloud Platform (GCP) Audit Logs Integration - using Pub/Sub
Requirements To integrate with Google Cloud Platform (GCP), you need to set up the following: ...
Google Workspace Integrations
Introduction Google Workspace (formerly G Suite) is a suite of cloud computing, productivity an...
How to Protect a Website with Cloudflare WAF
Introduction This guide explains how to protect your website using Cloudflare Web Application Fi...
How to Use Sniff and Detect
Access the App Open Outlook and check the apps panel to ensure Sniff & Detect is listed an...
Jumpcloud Integrations
Introduction The JumpCloud integration allows you to monitor events related to the JumpCloud Di...
JWT For Kali
To create a JSON Web Token (JWT) for Salesforce on Kali Linux, you can follow the steps below. Ka...
ManageEngine
Log Forwarder EventLog Analyzer's Syslog Forwarder transmits logs from various sources to a dest...
Microsoft 365
Microsoft Office 365 integration currently supports user, admin, system, and policy actions...
Microsoft 365 DLP Integration and Monitoring
Summary of Actions Required: Register an app in Microsoft Entra ID and configure API permissions...
Microsoft Audit Logs vs Compliance Alerts for SOC Monitoring
1. Overview This report outlines the key differences, advantages, disadvantages, and recomme...
Microsoft SQL Server Integration
The Microsoft SQL Server integration package allows you to search, observe, and visualize the SQL...
Mimecast Integrations
Introduction The Mimecast integration collects events from the Mimecast API. Assumpti...
MongoDB Integrations
Introduction This integration is used to fetch logs and metrics from MongoDB. Assumpt...
Nutanix
How to Send Logs to a Remote Syslog Server Summary: This article briefly describes how to confi...
OKTA Integrations
Introduction The Okta integration collects events from the Okta API, specifically reading from ...
Palo Alto Cortex XDR Integration
Palo Alto Cortex XDR Integration Using the Cortex XDR APIs, you can integrate Cortex XDR with th...
Palo Alto Firewall Syslog Filter Documentation
Introduction This guide outlines how to configure Syslog filters on Palo Alto Networks firewalls...
Palo Alto Next Generation Firewall
Configure Syslog Monitoring STEP 1 - Configure a Syslog server profile. Select Device-->...
Phishing Campaign - Setting Up Microsoft o365
Why Whitelist in Office 365? Whitelisting ensures the CyTech - AQUILA Phishing Simulation(PS) Mo...
Pulse Connect Secure Integrations
Introduction This integration is for Pulse Connect Secure. https://www.ivanti.com/pro...
Resource Manager Endpoint Integration
The Azure Resource Manager (ARM) endpoint is the primary entry point for interacting with the Azu...
SentinelOne Integrations
The SentinelOne integration collects and parses data from SentinelOne REST APIs. This integration...
Set Up Integration from SonarQube
SonarQube Introduction SonarQube is a self-hosted or cloud-enabled tool that scans source code ...
Setup Integration from Qualys
Qualys VMDR Integration Guide Integrate Qualys Vulnerability Management, Detection and Response...
Slack Integrations
Introduction Slack is used by numerous organizations as their primary chat and collaboration to...
Sophos Integration
Overview The Sophos Central integration allows you to monitor Alerts and Events logs. Sophos Cen...
Sysmon for Linux
Introduction The Sysmon for Linux integration allows you to monitor the Sysmon for Linux, which...
System Integrations
Introduction The System integration allows you to monitor servers, personal computers, and more...
Team Viewer Integrations
Remote File Copy via TeamViewer Identifies an executable or script file remotely downloaded vi...
VMware vSphere Integration
This integration periodically fetches logs and metrics from vSphere vCenter servers. Compatibi...
Whitelist Cisco IronPort (ESA)
Whitelist Cisco IronPort (ESA) for CyTech – AQUILA Phishing Simulation Why Whitelist in Cisco Ir...
Whitelist Microsoft Office 365
Why Whitelist in Office 365? Whitelisting ensures the CyTech - AQUILA Phishing Simulation(PS) Mo...
Windows Event Forwarding to Linux server using Nxlog
Introduction Windows Event Forwarding (WEF) allows the collection of event logs from multiple Wi...
Windows Event Forwarding to Linux server using Powershell script
Overview This PowerShell script forwards Windows event logs to a Linux server using the syslog p...
Z Scaler Integrations
Introduction This integration is for Zscaler Internet Access logs. It can be used to receive lo...