Advanced Search
Search Results
215 total results found
AQUILA - Google Workspace Integration
Google Workspace Integration Overview The Google Workspace integration collects and parses data from various Google Workspace audit reports APIs using a service account authorized via the Admin SDK API. Requirements To ingest data from the Google Rep...
CATO Networks API Integration
1. Overview Cato Networks is a cloud-native Secure Access Service Edge (SASE) platform that converges networking and security into a single, unified service. It provides SD-WAN, secure internet access, zero-trust network access, and advanced threat protection...
AQUILA - Salesforce Integration
Overview The Salesforce integration enables you to monitor your Salesforce instance. Salesforce is a customer relationship management (CRM) platform that supports businesses in managing marketing, sales, commerce, service, and IT teams from a unified platform...
Microsoft 365 DLP Integration and Monitoring
Summary of Actions Required: Register an app in Microsoft Entra ID and configure API permissions for Microsoft Graph and Office 365 Management APIs. Grant admin consent and collect credentials (Application ID, Tenant ID, Client Secret). Ensure Unified Audit L...
AQUILA - Mimecast API v2 Integration
Mimecast Integration Guide Integrate Mimecast with your security platform via API to collect email threat data, archive logs, DLP events, and other security-related logs for centralized visibility and incident response. API 2.0 is the current standard - It's...
AQUILA - Setup Integration from Auth0
Auth0 Integration Guide Integrate Auth0 to ingest identity-related logs such as login attempts, user authentications, MFA usage, and blocked requests to support identity threat detection and correlation. Credentials & API Access Setup (Auth0) Before setting...
AQUILA - Digital Guardian Integration
Integrating Digital Guardian (DG) with AQUILA for security log ingestion typically involves exporting logs from DG and then parsing and ingesting them into AQUILA. Digital Guardian is a Data Loss Prevention (DLP) and endpoint protection tool. It logs: Da...
AQUILA - Endpoint Detection and Response (EDR) Manual Installation
Endpoint Detection and Response (EDR), is a cybersecurity technology that focuses on detecting, investigating, and responding to suspicious activities and threats on endpoints, such as workstations, laptops, and servers. EDR solutions provide visibility into e...
AQUILA - Oracle Audit Logs Integration
This integration is for ingesting Audit Trail logs and fetching performance, tablespace and sysmetric metrics from Oracle Databases. The integration expects an *.aud audit file that is generated from Oracle Databases by default. If this has been disabled, the...
AQUILA - Salesforce Integration via JWT Authentication
Overview With the OAuth 2.0 JWT bearer token flow, the client posts a JWT to the Salesforce OAuth token endpoint. Salesforce processes the JWT, which includes a digital signature, and issues an access token based on prior approval of the app. Check "View Eve...
Microsoft Audit Logs vs Compliance Alerts for SOC Monitoring
1. Overview This report outlines the key differences, advantages, disadvantages, and recommendations for using Microsoft Audit Logs and Microsoft Compliance Alerts in the context of Security Operations Center (SOC) monitoring. 2. Definition and Purpose...
AQUILA - SNIFF & Detect
Outlook Add-in for Microsoft 365 Overview AQUILA – SNIFF & Detect is a custom integration app within the AQUILA platform that enables Microsoft 365 environments to deploy advanced malicious email detection capabilities.The app is packaged as a manifest.xml...
AQUILA - Endpoint Detection and Response (EDR) Automatic Installation
Endpoint Detection and Response (EDR), is a cybersecurity technology that focuses on detecting, investigating, and responding to suspicious activities and threats on endpoints, such as workstations, laptops, and servers. EDR solutions provide visibility into e...
AQUILA EDR Deployment via GPO on Windows Server AD
This document provides a step-by-step guide for deploying AQUILA Endpoint Detection and Response (EDR) on Windows Server environments using Group Policy Objects (GPO). The purpose of this guide is to streamline the installation process, ensure consistent confi...
JWT For Kali
To create a JSON Web Token (JWT) for Salesforce on Kali Linux, you can follow the steps below. Kali Linux is a Debian-based Linux distribution, so the process is similar to other Linux environments. You will use tools like OpenSSL for key generation and a prog...
AQUILA - EDR MSI Aquila Agent
Aquila Agent MSI (EDR) - Manual Installation Endpoint Detection and Response (EDR) Endpoint Detection and Response (EDR), is a cybersecurity technology that focuses on detecting, investigating, and responding to suspicious activities and threats on endpoin...
How to Protect a Website with Cloudflare WAF
Introduction This guide explains how to protect your website using Cloudflare Web Application Firewall (WAF).Cloudflare sits in front of your website and filters all incoming traffic. By changing your DNS to go through Cloudflare, you get: Protection aga...
How to Use Sniff and Detect
Access the App Open Outlook and check the apps panel to ensure Sniff & Detect is listed and accessible. Users can launch it from More apps in Microsoft 365. A phishing email impersonating Netflix. An arrow points to the SNIFF & Detect ...
AQUILA - GitLab Integration
Purpose This document explains, in a clear and practical way, how to locate GitLab log files on the host (or in Kubernetes), confirm access, and connect those logs to AQUILA. It covers common GitLab installation types (Omnibus/Linux package, self‑compiled, an...
AQUILA - Atlassian Account Integration
What are API token scopes? Scopes define what actions an API token is allowed to perform in Atlassian apps such as Jira and Confluence. They provide security by limiting the permissions of the token. You can create tokens with scopes (recommended) or without ...