Recently Updated Pages
Digital Guardian Integration
Requirements You Must Have Why You Need It Elastic Agent installed ...
Automatically Fetch User Accounts without Manually Importing for OneLogin (via SCIM)
OneLogin (via SCIM) Introduction: OneLogin gives users the ability to access the applications...
Palo Alto Firewall Syslog Filter Documentation
1. Introduction This guide outlines how to configure Syslog filters on Palo Alto Networks firewa...
Automatically Fetch User Accounts without Manually Importing for JumpCloud
JumpCloud Intoduction JumpCloud allows you to automate user account creation and syncing withou...
Automation on fetching user accounts for Azure
To automatically fetch user accounts into Azure (e.g., for Azure Active Directory / Microsoft Ent...
Automation on fetching user accounts for Okta
To automatically fetch user accounts into Okta without needing to manually import them, you shoul...
Automatically fetch user accounts ( Google IAM )
STEP 1: Enable APIs You’ll need access to one of the following APIs: Cloud Identity API (fo...
Troubleshooting Log Collector Installation Issues
STEP 1: Identify Your Log Collector Determine which Elastic component you're using for log colle...
Log Collector Installation - Windows Manual
Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for d...
Virtual Penetration Testing
Overview Welcome to the Virtual Penetration Testing module. In this section, you'll be guided th...
Cyber Incident Management (SIEM and XDR)
Welcome to the Cyber Incident Management Dashboard module. The Main Dashboard serves as the cent...
Cyber Monitoring Dashboard
Navigation to Cyber Monitoring Dashboard To navigate your way to the Cyber Monitoring Dashboard,...
How to Whitelist by IP Address in Office 365 and by Domain in Microsoft Defender for Office 365 Portal - OLD
Why Whitelist in Office 365? Whitelisting ensures the CyTech phishing simulation (PS) functions ...
Cloud Security Posture Management CSPM
Welcome to the Cloud Security Posture Management CSPM module. The Cloud Security Posture Dash...
Cyber Incident Management Module
Overview: Cyber Incident Management with Extended Detection and Response (XDR) and Managed Detec...
Whitelist Cisco IronPort (ESA)
Whitelist Cisco IronPort (ESA) for CyTech – AQUILA Phishing Simulation Why Whitelist in Cisco Ir...
Security Compliance
Overview The Security Compliance Module is an essential component of our Software-as-a-Service (...
CrowdStrike Integration - using API
Steps to Get Client ID and Client Secret in CrowdStrike Falcon Log in to the Falcon Console ...
Cyber Incident Management Module
Overview: Cyber Incident Management with Extended Detection and Response (XDR) and Managed Detec...
Whitelist Microsoft Office 365
Why Whitelist in Office 365? Whitelisting ensures the CyTech - AQUILA Phishing Simulation(PS) Mo...