Recently Updated Pages
Automation on fetching user accounts for Azure
To automatically fetch user accounts into Azure (e.g., for Azure Active Directory / Microsoft Ent...
Automation on fetching user accounts for Okta
To automatically fetch user accounts into Okta without needing to manually import them, you shoul...
Automatically fetch user accounts ( Google IAM )
STEP 1: Enable APIs You’ll need access to one of the following APIs: Cloud Identity API (fo...
Troubleshooting Log Collector Installation Issues
STEP 1: Identify Your Log Collector Determine which Elastic component you're using for log colle...
Log Collector Installation - Windows Manual
Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for d...
Virtual Penetration Testing
Overview Welcome to the Virtual Penetration Testing module. In this section, you'll be guided th...
Cyber Incident Management (SIEM and XDR)
Welcome to the Cyber Incident Management Dashboard module. The Main Dashboard serves as the cent...
Cyber Monitoring Dashboard
Navigation to Cyber Monitoring Dashboard To navigate your way to the Cyber Monitoring Dashboard,...
How to Whitelist by IP Address in Office 365 and by Domain in Microsoft Defender for Office 365 Portal - OLD
Why Whitelist in Office 365? Whitelisting ensures the CyTech phishing simulation (PS) functions ...
Cloud Security Posture Management CSPM
Welcome to the Cloud Security Posture Management CSPM module. The Cloud Security Posture Dash...
Cyber Incident Management Module
Overview: Cyber Incident Management with Extended Detection and Response (XDR) and Managed Detec...
Security Compliance
Overview The Security Compliance Module is an essential component of our Software-as-a-Service (...
CrowdStrike Integration - using API
Steps to Get Client ID and Client Secret in CrowdStrike Falcon Log in to the Falcon Console ...
Cyber Incident Management Module
Overview: Cyber Incident Management with Extended Detection and Response (XDR) and Managed Detec...
Phishing Campaign - Setting Up Microsoft o365
Why Whitelist in Office 365? Whitelisting ensures the CyTech - AQUILA Phishing Simulation(PS) Mo...
AQUILA - Microsoft Office 365 Integration
Overview This integration with Microsoft Office 365 supports the ingestion of user, administrato...
Log Collector Installation - Windows Automatic
Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for d...
Restart Log Collector Agent - Windows
Brief DescriptionThe Log Collector Agent is a single, unified tool that simplifies adding monitor...
How to uninstall Elastic Agent - Windows
Uninstall Elastic Agent There are two primary methods to uninstall the Elastic Agent on Windows:...
Log Sources vs. Log Collectors
Log Sources vs. Log Collectors Log Sources: Definition: Log sources are the origin points...