Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

215 total results found

CISCO Secure Endpoint - Secure Endpoint API

System Integrations

Authentication  The Secure Endpoint API requires access via an authenticated and authorized account. Only authorized accounts are able to submit requests to API operations. All operations must communicate over a secure HTTPS connection.  To authenticate and ...

AQUILA - Microsoft Office 365 Integration

System Integrations

Overview This integration with Microsoft Office 365 supports the ingestion of user, administrator, system, and policy-related events. It leverages the Office 365 Management Activity API to retrieve activity logs from both Office 365 and Azure Active Directory...

AQUILA - Azure Logs Integration

System Integrations

The Azure Logs integration enables you to collect logs from specific Azure services such as: Microsoft Entra ID (Sign-in, Audit, Identity Protection, Provisioning logs) Azure Spring Apps Azure Firewall Microsoft Graph Activity Activity...

Azure Integration -Blob Storage Leasing

System Integrations

 Here are the necessary steps to resolve the issue. Step 1: Go to your Azure Portal and log in >go to Storage Account  dedicated for Elastic Integration. Step 2: Maneuver to Data Storage > Containers. Step 3: Check all the Blob Storage dedicated for every...

CSPM-AWS Integration

System Integrations

Get started with CSPM for AWS Overview This page explains how to get started monitoring the security posture of your cloud assets using the Cloud Security Posture Management (CSPM) feature. Requirements Minimum privileges vary depending o...

Cato Networks - Using Cato API for ELK Stack Integration

System Integrations

To fully integrate the Cato Networks API with the Elastic Stack (ELK Stack), you can follow this comprehensive process. This guide will cover the necessary steps to collect, transform, and visualize data from Cato Networks using the Elastic Stack. Step 1: Und...

Log Collector Installation - Ciso Workplace(old)

Log Collector Installations

Please follow the steps below to manually add a Log Collector using Windows Environment. Step 1: Log in to your CISO Workplace and click the rectangular dots. Step 2: Click "Cyber Monitoring". Step 3: Go to "Cyber Incident Management (SIEM and XDR)". S...

AQUILA - Fortinet FortiGate Integration

System Integrations

Please follow these instructions: Step 1: Log in to your Fortinet FortiGate Admin portal and navigate to CLI console. Please refer to the images below.   Step 2: In your CLI Console execute these commands. To configure FortiGate to send log...

Azure Application Insights Integration

System Integrations

The Application Insights Integration allows users to collect metrics from Azure Application Insights. Key Configuration Options: Application ID: The ID of the application from the API Access settings in the Azure portal. API Key: A generated key for authe...

AQUILA CSPM - AWS Integration

System Integrations

Overview This page explains how to get started monitoring the security posture of your cloud assets using the Cloud Security Posture Management (CSPM) feature. Set up cloud account access The CSPM integration requires access to AWS’s built-in Security...

Google Cloud Platform (GCP) Audit Logs Integration - using Pub/Sub

System Integrations

Requirements   To integrate with Google Cloud Platform (GCP), you need to set up the following: Service Account with a Role.  Service Account Key to access data on your GCP project.  Service Accounts   A Service Account (SA) is a special t...

Endpoint Detection and Response (EDR) - Manual Installation (OLD)

AQUILA EDR Installation

Endpoint Detection and Response (EDR) Endpoint Detection and Response (EDR), is a cybersecurity technology that focuses on detecting, investigating, and responding to suspicious activities and threats on endpoints, such as workstations, laptops, and servers. ...

Azure Application Insights Integration

System Integrations

Overview The Application Insights Integration allows users to retrieve application insights metrics from specified applications. Integration level configuration options Application ID: ID of the application. This is Application ID from the API Access sett...

GitHub Integration

System Integrations

GitHub Integration The GitHub integration collects events from the GitHub API. Logs Audit The GitHub audit log records all events related to the GitHub organization. See Audit log actions for more details. To use this integration, the following prerequisi...

Log Collector Hardware Requirements Guide

Log Collector Installations

What is a Log Collector? A log collector is a tool or software component designed to gather log data from various sources within an IT environment, including servers, applications, network devices, and other infrastructure components. The primary purpose is t...

Log Collector Installation - Linux Manual

Log Collector Installations

Log Collector Installation in CyTech - AQUILA This guide outlines the step-by-step process for deploying the Elastic Agent as a log collector within the CyTech - AQUILA environment. Following these instructions will establish a secure and automated mechanism ...

Log Collector Installation - Mac Manual

Log Collector Installations

Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for deploying the Elastic Agent as a log collector within the CyTech - Aquila environment. Following these instructions will establish a secure and automated mechanism ...

Log Collector Installation - Onboarding "Let's Go"

Log Collector Installations

Log Collector Installation in CyTech - AQUILA This guide outlines the step-by-step process for deploying the Elastic Agent as a log collector within the CyTech - AQUILA environment. Following these instructions will establish a secure and automated mechanism ...

Log Collector - Common Questions

Log Collector Installations

Common Questions Is it difficult to set up a log collector? Basic setup is moderately complex. Most organizations can get started in a few days with some IT expertise, though fine-tuning takes longer. How much will this cost? A basic setup can be a...

What is a Log Source?

Log Collector Installations

What is a Log Source? A log source refers to any system, application, or device that generates log data. Logs are records of events that occur within these systems, and they provide valuable information for monitoring, troubleshooting, and analyzing the perfo...