Skip to main content

Recently Updated Pages

Automation on fetching user accounts for Azure

System Integrations

To automatically fetch user accounts into Azure (e.g., for Azure Active Directory / Microsoft Ent...

Updated 1 month ago by Jeff Saguing

Automation on fetching user accounts for Okta

System Integrations

To automatically fetch user accounts into Okta without needing to manually import them, you shoul...

Updated 1 month ago by Jeff Saguing

Automatically fetch user accounts ( Google IAM )

System Integrations

STEP 1: Enable APIs You’ll need access to one of the following APIs: Cloud Identity API (fo...

Updated 1 month ago by John Polestico

Troubleshooting Log Collector Installation Issues

Log Collector Installations

STEP 1: Identify Your Log Collector Determine which Elastic component you're using for log colle...

Updated 1 month ago by John Polestico

Log Collector Installation - Windows Manual

Log Collector Installations

Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for d...

Updated 1 month ago by John Polestico

Virtual Penetration Testing

Attack Surface Management

Overview Welcome to the Virtual Penetration Testing module. In this section, you'll be guided th...

Updated 1 month ago by Reynaldo Espinosa

Cyber Incident Management (SIEM and XDR)

Cyber Monitoring

Welcome to the Cyber Incident Management Dashboard module. The Main Dashboard serves as the cent...

Updated 1 month ago by Darryl Espancho

Cyber Monitoring Dashboard

Cyber Monitoring

Navigation to Cyber Monitoring Dashboard To navigate your way to the Cyber Monitoring Dashboard,...

Updated 1 month ago by Darryl Espancho

How to Whitelist by IP Address in Office 365 and by Domain in Microsoft Defender for Office 365 Portal - OLD

O365 FAQs

Why Whitelist in Office 365? Whitelisting ensures the CyTech phishing simulation (PS) functions ...

Updated 1 month ago by Richmond Abella

Cloud Security Posture Management CSPM

Cyber Monitoring

  Welcome to the Cloud Security Posture Management CSPM module. The Cloud Security Posture Dash...

Updated 1 month ago by Xavier Pasaylo

Cyber Incident Management Module

Cyber Monitoring

Overview: Cyber Incident Management with Extended Detection and Response (XDR) and Managed Detec...

Updated 1 month ago by John Polestico

Security Compliance

Cyber Governance

Overview The Security Compliance Module is an essential component of our Software-as-a-Service (...

Updated 1 month ago by John Carza

CrowdStrike Integration - using API

System Integrations

Steps to Get Client ID and Client Secret in CrowdStrike Falcon Log in to the Falcon Console ...

Updated 1 month ago by Richmond Abella

Cyber Incident Management Module

CIM Module- Let's Start

Overview: Cyber Incident Management with Extended Detection and Response (XDR) and Managed Detec...

Updated 1 month ago by Clifford Martil

Phishing Campaign - Setting Up Microsoft o365

System Integrations

Why Whitelist in Office 365? Whitelisting ensures the CyTech - AQUILA Phishing Simulation(PS) Mo...

Updated 1 month ago by Richmond Abella

AQUILA - Microsoft Office 365 Integration

System Integrations

Overview This integration with Microsoft Office 365 supports the ingestion of user, administrato...

Updated 1 month ago by Richmond Abella

Log Collector Installation - Windows Automatic

Log Collector Installations

Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for d...

Updated 1 month ago by Richmond Abella

Restart Log Collector Agent - Windows

Log Collector Installations

Brief DescriptionThe Log Collector Agent is a single, unified tool that simplifies adding monitor...

Updated 1 month ago by Richmond Abella

How to uninstall Elastic Agent - Windows

Log Collector Installations

Uninstall Elastic Agent There are two primary methods to uninstall the Elastic Agent on Windows:...

Updated 1 month ago by Richmond Abella

Log Sources vs. Log Collectors

Log Collector Installations

Log Sources vs. Log Collectors Log Sources: Definition: Log sources are the origin points...

Updated 1 month ago by Richmond Abella