Recently Updated Pages
Cyber Incident Management Module
Overview: Cyber Incident Management with Extended Detection and Response (XDR) and Managed Detec...
Cyber Monitoring Dashboard
Navigation to Cyber Monitoring Dashboard To navigate your way to the Cyber Monitoring Dashboard,...
CrowdStrike Integration - using API
Steps to Get Client ID and Client Secret in CrowdStrike Falcon Log in to the Falcon Console ...
Cyber Incident Management Module
Overview: Cyber Incident Management with Extended Detection and Response (XDR) and Managed Detec...
Whitelist Microsoft Office 365
Why Whitelist in Office 365? Whitelisting ensures the CyTech - AQUILA Phishing Simulation(PS) Mo...
Phishing Campaign - Setting Up Microsoft o365
Why Whitelist in Office 365? Whitelisting ensures the CyTech - AQUILA Phishing Simulation(PS) Mo...
AQUILA - Microsoft Office 365 Integration
Overview This integration with Microsoft Office 365 supports the ingestion of user, administrato...
Log Collector Installation - Windows Automatic
Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for d...
Restart Log Collector Agent - Windows
Brief DescriptionThe Log Collector Agent is a single, unified tool that simplifies adding monitor...
CyTech Aquila - Cloud Security Posture Management (CSPM) Module
Cloud Security Posture Management (CSPM) Overview: CSPM helps secure your cloud infrastructure ...
How to uninstall Elastic Agent - Windows
Uninstall Elastic Agent There are two primary methods to uninstall the Elastic Agent on Windows:...
Log Sources vs. Log Collectors
Log Sources vs. Log Collectors Log Sources: Definition: Log sources are the origin points...
What is a Log Source?
What is a Log Source? A log source refers to any system, application, or device that generates l...
Log Collector - Common Questions
Common Questions Is it difficult to set up a log collector? Basic setup is moderately compl...
Log Collector Installation - Mac Manual
Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for d...
Log Collector Installation - Linux Manual
Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for d...
Log Collector Hardware Requirements Guide
What is a Log Collector? A log collector is a tool or software component designed to gather log ...
Endpoint Detection and Responce (EDR) - Manual Installation
Endpoint Detection and Response (EDR) Endpoint Detection and Response (EDR), is a cybersecurity ...
Log Collector Installation - Ciso Workplace(old)
Please follow the steps below to manually add a Log Collector using Windows Environment. Step 1:...
Log Collector Installation Old - Windows
Log Collector Installation in CISO Workplace This guide provides step-by-step instructions for i...