Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

106 total results found

CyTech - AQUILA EDR Full Installation

AQUILA EDR Installation

Endpoint Detection and Responce (EDR) - Manual Installation Endpoint Detection and Response (EDR) Endpoint Detection and Response (EDR), is a cybersecurity technology that focuses on detecting, investigating, and responding to suspicious activities and thr...

CyTech - AQUILA EDR Automatic

AQUILA EDR Installation

Endpoint Detection and Responce (EDR) - Automatic Installation Endpoint Detection and Response (EDR), is a cybersecurity technology that focuses on detecting, investigating, and responding to suspicious activities and threats on endpoints, such as workstation...

AQUILA EDR Connection Issues - Windows

AQUILA EDR Installation

When Elastic Agent installs Endpoint, they connect locally to share status and updates. If this connection fails, Elastic Agent shows as Unhealthy, and Endpoint won’t work properly. How to Check if There's a Problem Check Agent StatusOpen PowerShell as...

AQUILA CSPM - GCP Integration

System Integrations

Authentication To use this CSPM Google Cloud Platform (GCP) integration, you need to set up a Service Account with a Role and a Service Account Key to access data on your GCP project. 1. Service Account First, you need to create a Service Account. A Servi...

AQUILA GCP Integration

System Integrations

This Google Cloud integration collects and analyzes a wide range of logs and metrics to provide comprehensive visibility into your cloud environment. It ingests Firewall Logs, VPC Flow Logs, DNS Logs, and Load Balancing Logs exported from Cloud Logging via a P...

AQUILA - Cloudflare Integration

System Integrations

Introduction Cloudflare logs provide detailed insights into client connections, request paths through the Cloudflare network, and origin server responses. These logs help track activity, identify issues, and support security and performance analysis. Authe...

AQUILA - 1Password Integration

System Integrations

1Password Events Reporting Integration Manual With 1Password Business, you can forward account activity to your SIEM system using the 1Password Events API. This enables centralized monitoring, improved visibility, and enhanced response to security-related eve...

AQUILA - SonicWall Firewall Integration

System Integrations

This integration collects syslog messages from SonicWall firewalls. It has been tested with Enhanced Syslog logs from SonicOS versions 6.5 and 7.0, following the SonicWall Log Events reference guide. Configuration To set up the integration, configure a Sys...

AQUILA - Cisco Meraki Integration

System Integrations

Cisco Meraki provides a centralized cloud management platform for devices like MX Security Appliances, MR Access Points, and more. Its cloud-based architecture enables secure, scalable networks manageable from anywhere via the Meraki Dashboard or Mobile App. E...

Enable Syslog on Port 514 and Allow via Firewall (Ubuntu)

System Integrations

Step 1: Install rsyslog1. Open terminal.2. Run the following commands: sudo apt update sudo apt install rsyslog -y sudo systemctl enable rsyslog sudo systemctl start rsyslog Step 2: Enable Syslog Reception on Port 5141.Open the rsyslog configuration file:...

AQUILA - Google Workspace Integration

System Integrations

Google Workspace Integration Overview The Google Workspace integration collects and parses data from various Google Workspace audit reports APIs using a service account authorized via the Admin SDK API. Requirements  To ingest data from the Google Rep...

Microsoft 365 DLP Integration and Monitoring

System Integrations

Summary of Actions Required: Register an app in Microsoft Entra ID and configure API permissions for Microsoft Graph and Office 365 Management APIs. Grant admin consent and collect credentials (Application ID, Tenant ID, Client Secret). Ensure Unified Audit L...

AQUILA - Endpoint Detection and Response (EDR) Manual Installation

AQUILA EDR Installation

Endpoint Detection and Response (EDR), is a cybersecurity technology that focuses on detecting, investigating, and responding to suspicious activities and threats on endpoints, such as workstations, laptops, and servers. EDR solutions provide visibility into e...

Microsoft Audit Logs vs Compliance Alerts for SOC Monitoring

System Integrations

1. Overview This report outlines the key differences, advantages, disadvantages, and recommendations for using Microsoft Audit Logs and Microsoft Compliance Alerts in the context of Security Operations Center (SOC) monitoring. 2. Definition and Purpose...

AQUILA - SNIFF & Detect

System Integrations

Outlook Add-in for Microsoft 365 Overview AQUILA – SNIFF & Detect is a custom integration app within the AQUILA platform that enables Microsoft 365 environments to deploy advanced malicious email detection capabilities.The app is packaged as a manifest.xml...

JWT For Kali

System Integrations

To create a JSON Web Token (JWT) for Salesforce on Kali Linux, you can follow the steps below. Kali Linux is a Debian-based Linux distribution, so the process is similar to other Linux environments. You will use tools like OpenSSL for key generation and a prog...

How to Use Sniff and Detect

System Integrations

Access the App Open Outlook and check the apps panel to ensure Sniff & Detect is listed and accessible. Users can launch it from More apps in Microsoft 365. A phishing email impersonating Netflix. An arrow points to the SNIFF & Detect ...

AQUILA - GitLab Integration

System Integrations

Purpose This document explains, in a clear and practical way, how to locate GitLab log files on the host (or in Kubernetes), confirm access, and connect those logs to AQUILA. It covers common GitLab installation types (Omnibus/Linux package, self‑compiled, an...

AQUILA - Atlassian Account Integration

System Integrations

What are API token scopes? Scopes define what actions an API token is allowed to perform in Atlassian apps such as Jira and Confluence. They provide security by limiting the permissions of the token. You can create tokens with scopes (recommended) or without ...

AQUILA - PostgreSQL Integration

System Integrations

Please find below the instructions required to set up this integration: To configure PostgreSQL with the specified logging settings, you need to modify the postgresql.conf file, which is typically located in the PostgreSQL data directory. Here are the steps t...