Recently Updated Pages
AQUILA CSPM - AWS Integration
Overview This page explains how to get started monitoring the security posture of your cloud ass...
AQUILA GCP Integration
This Google Cloud integration collects and analyzes a wide range of logs and metrics to provide c...
CrowdStrike to SIEM alerts and ruling
Introduction This guide explains how to send security alerts from CrowdStrike Falcon to your Sec...
Cisco AMP for Endpoints API Integration
To integrate Cisco AMP for Endpoints (now part of Cisco Secure Endpoint) with Elastic, follow the...
Set Up Integration from SonarQube
SonarQube Introduction SonarQube is a self-hosted or cloud-enabled tool that scans source code ...
Automatically Fetch User Accounts without Manually Importing for OneLogin (via SCIM)
OneLogin (via SCIM) Introduction: OneLogin gives users the ability to access the applications...
Automatically Fetch User Accounts without Manually Importing for JumpCloud
JumpCloud Intoduction JumpCloud allows you to automate user account creation and syncing withou...
Automation on fetching user accounts for Azure
To automatically fetch user accounts into Azure (e.g., for Azure Active Directory / Microsoft Ent...
Automation on fetching user accounts for Okta
To automatically fetch user accounts into Okta without needing to manually import them, you shoul...
Automatically fetch user accounts ( Google IAM )
STEP 1: Enable APIs You’ll need access to one of the following APIs: Cloud Identity API (fo...
Troubleshooting Log Collector Installation Issues
STEP 1: Identify Your Log Collector Determine which Elastic component you're using for log colle...
How to Whitelist by IP Address in Office 365 and by Domain in Microsoft Defender for Office 365 Portal - OLD
Why Whitelist in Office 365? Whitelisting ensures the CyTech phishing simulation (PS) functions ...
CrowdStrike Integration - using API
Steps to Get Client ID and Client Secret in CrowdStrike Falcon Log in to the Falcon Console ...
Phishing Campaign - Setting Up Microsoft o365
Why Whitelist in Office 365? Whitelisting ensures the CyTech - AQUILA Phishing Simulation(PS) Mo...
AQUILA - Microsoft Office 365 Integration
Overview This integration with Microsoft Office 365 supports the ingestion of user, administrato...
Restart Log Collector Agent - Windows
Brief DescriptionThe Log Collector Agent is a single, unified tool that simplifies adding monitor...
Log Sources vs. Log Collectors
Log Sources vs. Log Collectors Log Sources: Definition: Log sources are the origin points...
What is a Log Source?
What is a Log Source? A log source refers to any system, application, or device that generates l...
Log Collector - Common Questions
Common Questions Is it difficult to set up a log collector? Basic setup is moderately compl...
Log Collector Hardware Requirements Guide
What is a Log Collector? A log collector is a tool or software component designed to gather log ...