Recently Updated Pages
Phishing Simulation
Overview Welcome to the Phishing Simulation module. In this section, you'll be guided through th...
Azure Application Insights Integration
The Application Insights Integration allows users to collect metrics from Azure Application Insig...
Fortinet FortiGate - Syslog Setting and Syslog Filter
Please follow these instructions: Step 1: Log in to your Fortinet FortiGate Admin portal and n...
Microsoft Office 365 - API Permissions
Integration Requirements Please saved and provide this values to Cytech Support Team. Directory...
CISCO Secure Endpoint - Secure Endpoint API
Authentication The Secure Endpoint API requires access via an authenticated and authorized acco...
Adding Log Collector in Windows
Please follow the steps below to manually add a Log Collector using Windows Environment. Step 1:...
Cato Networks - Using Cato API for ELK Stack Integration
To fully integrate the Cato Networks API with the Elastic Stack (ELK Stack), you can follow this ...
Cato Networks - Configuring Event Log Forwarding with Two Windows Servers
How to Configure Windows Event Forwarding for User Awareness Cato Networks’ User...
CSPM-AWS Integration
Get started with CSPM for AWS Overview This page explains how to get started monitoring t...
Cloud Security Posture Management Manual (Google Cloud Platform)
Go to > Cyber Incident Monitoring Requirements Set Up Cloud Account Access Note: To set up CSP...
Azure Integration -Blob Storage Leasing
Here are the necessary steps to resolve the issue. Step 1: Go to your Azure Portal and log in...
CISCO Meraki Integrations
Introduction Cisco Meraki offers a centralized cloud management platform for all Meraki devices...
CyberArk PAM
Configure the Vault to Forward syslog Messages to PTA The system logger of the Vault must be con...
Azure Integration - Microsoft Entra ID Logs
Step 1: Create an Event Hub for Microsoft Entra ID Logs Go to Azure Portal > Event Hubs > Cr...
Nutanix
How to Send Logs to a Remote Syslog Server Summary: This article briefly describes how to confi...
ManageEngine
Log Forwarder EventLog Analyzer's Syslog Forwarder transmits logs from various sources to a dest...
Cisco Meraki - Configuring a Syslog Server
Method 1: Using GUI Configure log forwarding Sign in to the Meraki Dashboard with adminis...
Palo Alto Next Generation Firewall
Configure Syslog Monitoring STEP 1 - Configure a Syslog server profile. Select Device-->...
Forescout
Method 1: Network logs forwarding The Network logs forwarding page ("Settings" > "System Setti...
CISCO Umbrella Integrations
Introduction Cisco Umbrella is a cloud security platform that provides an additional line of de...