Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

215 total results found

NG SIEM - CrowdStrike Integration

Agent-less Integration

CrowdStrike Integration The CrowdStrike Falcon integration allows you to easily connect your CrowdStrike Falcon platform to Elastic for seamless onboarding of alerts and telemetry from CrowdStrike Falcon and Falcon Data Replicator. Elastic Security can levera...

NG SIEM - Sophos Central Integration

Agent-less Integration

Sophos Central Integration The Sophos Central integration allows you to monitor Alerts and Events logs. Sophos Central is a cloud-native application with high availability. It is a cybersecurity management platform hosted on public cloud platforms. Each Sopho...

AQUILA - CISCO Umbrella Integration

System Integrations

Introduction Cisco Umbrella is a cloud-delivered security platform that provides an additional layer of defense against malicious threats on the internet using Cisco’s threat intelligence. It helps block access to: Malware Adware Botnets P...

AQUILA - Cisco Secure Endpoint Integration

System Integrations

Introduction Cisco Secure Endpoint is a cloud-delivered, advanced endpoint detection and response (EDR) solution. It provides visibility and protection across multiple control points, enabling organizations to rapidly detect, contain, and remediate advanced t...

Information Security Steering Committee (ISSC)

Cyber Governance

Overview The ISSC Meeting System is a centralized platform designed to help committees plan, manage, and track their meetings with ease. It provides users with a clear overview of upcoming sessions, assigned tasks, and important documents — all in one place. ...

AQUILA - Nginx Integration (Ubuntu or Linux Platform)

System Integrations

Overview The Nginx Integration provides comprehensive monitoring and observability for Nginx servers, enabling visibility into both logs and metrics data. This integration ensures effective tracking of server performance, user activity, and error occurrences,...

Cyber Risk Assessment Management (CRAM) / OUTDATED

CRAM™ Onboarding Guide

Overview The Cyber Risk Assessment Management (CRAM) framework is designed to provide a comprehensive and structured approach for organizations to evaluate, manage, and mitigate cyber risks. It is composed of multiple interconnected building blocks, each capt...

NG SIEM – LastPass Integration

Agent-less Integration

Overview The LastPass Elastic Integration allows the ingestion of data from the LastPass Admin Console for enhanced monitoring and reporting. This integration collects three main data streams: Detailed Shared Folder Data – provides detailed information ab...

AQUILA - Host Isolation

System Integrations

Overview Host Isolation Exception allows isolated endpoints to maintain connectivity to specific IP addresses while remaining isolated from the rest of the network. This feature is useful when you need to isolate potentially compromised hosts for security pur...

AQUILA - Host Isolation Exception

System Integrations

Overview Host isolation exceptions (also called endpoint isolation exclusions) are configurable rules in Endpoint Detection and Response (EDR) systems—such as Elastic Security, Microsoft Defender for Endpoint, or Cortex XDR—that allow specific IP addresses, p...

Log Collector - Network Connection

Common Encountered Issues

Windows Network Connection Issues On Windows, network problems frequently involve firewall rules, service refusals, or integration degradations that prevent agents from connecting to remote services like Fleet Server or Elasticsearch. Common Problems Flee...

Log Collector - Check OS Version

Common Encountered Issues

Windows OS Version Compatibility Issues Elastic Agent supports Windows Server versions (e.g., 2016+), Windows 10/11, but drops support for EOL versions like Windows 8 and Server 2012 from 7.17.19 onwards. It does not support 32-bit systems or ARM processors. ...

Log Collector - File Access Permissions

Common Encountered Issues

Windows File Access Permission Issues Common issues on Windows stem from strict file locking, UAC (User Account Control), and service account privileges. Elastic Agent/Filebeat often needs admin rights to read system logs or event logs, and problems arise whe...

AQUILA - TSR Guide

AQUILA EDR Installation

Overview Install the AQUILA Endpoint Agent (AEA) to start monitoring your device and strengthen your security posture. The AQUILA Endpoint Agent (AEA) helps you scan and monitor your endpoints for Endpoint Protection, Data Loss Prevention, and Vulnerability D...

NG SIEM - Apache Tomcat

Agent-less Integration