Recently Updated Pages
Cloud Security Posture Management CSPM
Welcome to the Cloud Security Posture Management CSPM module. The Cloud Security Posture Dash...
Cyber Incident Management Module
Overview: Cyber Incident Management with Extended Detection and Response (XDR) and Managed Detec...
Whitelist Cisco IronPort (ESA)
Whitelist Cisco IronPort (ESA) for CyTech – AQUILA Phishing Simulation Why Whitelist in Cisco Ir...
Security Compliance
Overview The Security Compliance Module is an essential component of our Software-as-a-Service (...
CrowdStrike Integration - using API
Steps to Get Client ID and Client Secret in CrowdStrike Falcon Log in to the Falcon Console ...
Cyber Incident Management Module
Overview: Cyber Incident Management with Extended Detection and Response (XDR) and Managed Detec...
Whitelist Microsoft Office 365
Why Whitelist in Office 365? Whitelisting ensures the CyTech - AQUILA Phishing Simulation(PS) Mo...
Phishing Campaign - Setting Up Microsoft o365
Why Whitelist in Office 365? Whitelisting ensures the CyTech - AQUILA Phishing Simulation(PS) Mo...
AQUILA - Microsoft Office 365 Integration
Overview This integration with Microsoft Office 365 supports the ingestion of user, administrato...
Log Collector Installation - Windows Automatic
Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for d...
Restart Log Collector Agent - Windows
Brief DescriptionThe Log Collector Agent is a single, unified tool that simplifies adding monitor...
How to uninstall Elastic Agent - Windows
Uninstall Elastic Agent There are two primary methods to uninstall the Elastic Agent on Windows:...
Log Sources vs. Log Collectors
Log Sources vs. Log Collectors Log Sources: Definition: Log sources are the origin points...
What is a Log Source?
What is a Log Source? A log source refers to any system, application, or device that generates l...
Log Collector - Common Questions
Common Questions Is it difficult to set up a log collector? Basic setup is moderately compl...
Log Collector Hardware Requirements Guide
What is a Log Collector? A log collector is a tool or software component designed to gather log ...
Endpoint Detection and Responce (EDR) - Manual Installation
Endpoint Detection and Response (EDR) Endpoint Detection and Response (EDR), is a cybersecurity ...
Log Collector Installation - Ciso Workplace(old)
Please follow the steps below to manually add a Log Collector using Windows Environment. Step 1:...
Log Collector Installation Old - Windows
Log Collector Installation in CISO Workplace This guide provides step-by-step instructions for i...
SentinelOne Integrations
The SentinelOne integration collects and parses data from SentinelOne REST APIs. This integration...