Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

13 total results found

AQUILA NG SIEM

Welcome to the AQUILA NG SIEM Agent-Based and Agentless Integration Guide!This guide is designed to help you understand and implement both agent-based and agentless integrations with ease. Whether you’re deploying local agents for deeper system visibility or c...

Integration
Guide

AQUILA - Integration Manual

Welcome to the AQUILA Integration Manual!We’re excited to have you here as you begin connecting AQUILA with your systems and tools. This guide is designed to walk you through every step of the integration process — from initial setup and configuration to advan...

Manual
Guide
Integration

Agent-less Integration

Integrate AQUILA seamlessly across your infrastructure without installing local agents. Using secure network connections and APIs, AQUILA collects data, monitors activity, and delivers real-time insights with minimal system impact. Simplify deployment, reduce ...

Integration

Agent-based Integration

Integration

System Integrations

Can't find your integration? No worries, if your desired integration isn't listed, you can create a support ticket and let us know what you need. Our team will check your request and get back to you with updates or alternatives. Tip: Share details like the i...

Integration
Guide

AQUILA - Zyxel USG Flex 200 SIEM Integration

System Integrations

AQUILA - Zyxel USG Flex 200 Integration The Zyxel USG Flex 200 is a unified security gateway that provides comprehensive network security and management capabilities. It generates syslog events that can be collected, analyzed, and monitored for security insig...

Guide
Manual
Benjie Janlay
zyxel
Integration

Whitelist in Google Workspacege

System Integrations

Whitelisting Simulated Phishing in Google Workspace (Gmail) For Secure Practice Simulation Emails This step-by-step guide is intended for Google Workspace administrators to allow simulated phishing emails from Secure Practice by properly configuring Gmail to...

Whitelisting
Phishing
Google Workspace
Benjie Janlay
Integration
Manual

AQUILA - Cisco Meraki Integration

System Integrations

Cisco Meraki provides a centralized cloud management platform for devices like MX Security Appliances, MR Access Points, and more. Its cloud-based architecture enables secure, scalable networks manageable from anywhere via the Meraki Dashboard or Mobile App. E...

Guide
Integration
Manual
cisco meraki
Meraki
Benjie Janlay

AQUILA - Cato Network Integration(Windows)

System Integrations

Cato Networks provides a cloud-native SASE (Secure Access Service Edge) platform that converges networking and security into a global cloud service. The platform generates security and connectivity events that can be collected, analyzed, and monitored for netw...

Benjie Janlay
Guide
Integration
Manual
cato network
nssm

AQUILA - Atlassian Confluence Integration through Oauth 2.0(3LO) and API Key(File Path)

System Integrations

What are API Token Scopes? Scopes define what actions an API token is allowed to perform in Atlassian apps such as Jira and Confluence. They enhance security by limiting permissions to only what's needed (e.g., read-only access to audit logs). Always use scop...

Guide
Integration
Manual
Benjie Janlay
File Path
Atlassian Confluence

AQUILA - Atlassian Jira Integration through Oauth 2.0(3LO) and API Key

System Integrations

What are API Token Scopes? Scopes define what actions an API token is allowed to perform in Atlassian apps such as Jira and Confluence. They enhance security by limiting permissions to only what's needed (e.g., read-only access to audit logs). Always use scop...

Oauth2.0(3LO)
Benjie Janlay
Guide
Integration
Manual
Atlassian Jira
Jira Integrations

AQUILA - Cato Network Integration(Linux)

System Integrations

Cato Networks provides a cloud-native SASE (Secure Access Service Edge) platform that converges networking and security into a global cloud service. The platform generates security and connectivity events that can be collected, analyzed, and monitored for netw...

Benjie Janlay
Guide
Integration
Manual
cato network

AQUILA - SalesForce Integration Using JWT Authentication

System Integrations

Salesforce requires secure communication protocols for authorization and data exchange between external applications and Salesforce orgs. This involves creating digital certificates, configuring external client apps, and establishing secure authentication meth...

Guide
Integration
Manual
Salesforce
JWT
Benjie Janlay