Advanced Search
Search Results
215 total results found
CISCO Secure Endpoint - Secure Endpoint API
Authentication The Secure Endpoint API requires access via an authenticated and authorized account. Only authorized accounts are able to submit requests to API operations. All operations must communicate over a secure HTTPS connection. To authenticate and ...
AQUILA - Microsoft Office 365 Integration
Overview This integration with Microsoft Office 365 supports the ingestion of user, administrator, system, and policy-related events. It leverages the Office 365 Management Activity API to retrieve activity logs from both Office 365 and Azure Active Directory...
AQUILA - Azure Logs Integration
The Azure Logs integration enables you to collect logs from specific Azure services such as: Microsoft Entra ID (Sign-in, Audit, Identity Protection, Provisioning logs) Azure Spring Apps Azure Firewall Microsoft Graph Activity Activity...
Azure Integration -Blob Storage Leasing
Here are the necessary steps to resolve the issue. Step 1: Go to your Azure Portal and log in >go to Storage Account dedicated for Elastic Integration. Step 2: Maneuver to Data Storage > Containers. Step 3: Check all the Blob Storage dedicated for every...
CSPM-AWS Integration
Get started with CSPM for AWS Overview This page explains how to get started monitoring the security posture of your cloud assets using the Cloud Security Posture Management (CSPM) feature. Requirements Minimum privileges vary depending o...
Cato Networks - Using Cato API for ELK Stack Integration
To fully integrate the Cato Networks API with the Elastic Stack (ELK Stack), you can follow this comprehensive process. This guide will cover the necessary steps to collect, transform, and visualize data from Cato Networks using the Elastic Stack. Step 1: Und...
Log Collector Installation - Ciso Workplace(old)
Please follow the steps below to manually add a Log Collector using Windows Environment. Step 1: Log in to your CISO Workplace and click the rectangular dots. Step 2: Click "Cyber Monitoring". Step 3: Go to "Cyber Incident Management (SIEM and XDR)". S...
AQUILA - Fortinet FortiGate Integration
Please follow these instructions: Step 1: Log in to your Fortinet FortiGate Admin portal and navigate to CLI console. Please refer to the images below. Step 2: In your CLI Console execute these commands. To configure FortiGate to send log...
Azure Application Insights Integration
The Application Insights Integration allows users to collect metrics from Azure Application Insights. Key Configuration Options: Application ID: The ID of the application from the API Access settings in the Azure portal. API Key: A generated key for authe...
AQUILA CSPM - AWS Integration
Overview This page explains how to get started monitoring the security posture of your cloud assets using the Cloud Security Posture Management (CSPM) feature. Set up cloud account access The CSPM integration requires access to AWS’s built-in Security...
Google Cloud Platform (GCP) Audit Logs Integration - using Pub/Sub
Requirements To integrate with Google Cloud Platform (GCP), you need to set up the following: Service Account with a Role. Service Account Key to access data on your GCP project. Service Accounts A Service Account (SA) is a special t...
Endpoint Detection and Response (EDR) - Manual Installation (OLD)
Endpoint Detection and Response (EDR) Endpoint Detection and Response (EDR), is a cybersecurity technology that focuses on detecting, investigating, and responding to suspicious activities and threats on endpoints, such as workstations, laptops, and servers. ...
Azure Application Insights Integration
Overview The Application Insights Integration allows users to retrieve application insights metrics from specified applications. Integration level configuration options Application ID: ID of the application. This is Application ID from the API Access sett...
GitHub Integration
GitHub Integration The GitHub integration collects events from the GitHub API. Logs Audit The GitHub audit log records all events related to the GitHub organization. See Audit log actions for more details. To use this integration, the following prerequisi...
Log Collector Hardware Requirements Guide
What is a Log Collector? A log collector is a tool or software component designed to gather log data from various sources within an IT environment, including servers, applications, network devices, and other infrastructure components. The primary purpose is t...
Log Collector Installation - Linux Manual
Log Collector Installation in CyTech - AQUILA This guide outlines the step-by-step process for deploying the Elastic Agent as a log collector within the CyTech - AQUILA environment. Following these instructions will establish a secure and automated mechanism ...
Log Collector Installation - Mac Manual
Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for deploying the Elastic Agent as a log collector within the CyTech - Aquila environment. Following these instructions will establish a secure and automated mechanism ...
Log Collector Installation - Onboarding "Let's Go"
Log Collector Installation in CyTech - AQUILA This guide outlines the step-by-step process for deploying the Elastic Agent as a log collector within the CyTech - AQUILA environment. Following these instructions will establish a secure and automated mechanism ...
Log Collector - Common Questions
Common Questions Is it difficult to set up a log collector? Basic setup is moderately complex. Most organizations can get started in a few days with some IT expertise, though fine-tuning takes longer. How much will this cost? A basic setup can be a...
What is a Log Source?
What is a Log Source? A log source refers to any system, application, or device that generates log data. Logs are records of events that occur within these systems, and they provide valuable information for monitoring, troubleshooting, and analyzing the perfo...