Recently Updated Pages
Cyber Monitoring Dashboard
Navigation to Cyber Monitoring Dashboard To navigate your way to the Cyber Monitoring Dashboard,...
How to Whitelist by IP Address in Office 365 and by Domain in Microsoft Defender for Office 365 Portal - OLD
Why Whitelist in Office 365? Whitelisting ensures the CyTech phishing simulation (PS) functions ...
Cloud Security Posture Management CSPM
Welcome to the Cloud Security Posture Management CSPM module. The Cloud Security Posture Dash...
Cyber Incident Management Module
Overview: Cyber Incident Management with Extended Detection and Response (XDR) and Managed Detec...
Security Compliance
Overview The Security Compliance Module is an essential component of our Software-as-a-Service (...
CrowdStrike Integration - using API
Steps to Get Client ID and Client Secret in CrowdStrike Falcon Log in to the Falcon Console ...
Cyber Incident Management Module
Overview: Cyber Incident Management with Extended Detection and Response (XDR) and Managed Detec...
Phishing Campaign - Setting Up Microsoft o365
Why Whitelist in Office 365? Whitelisting ensures the CyTech - AQUILA Phishing Simulation(PS) Mo...
AQUILA - Microsoft Office 365 Integration
Overview This integration with Microsoft Office 365 supports the ingestion of user, administrato...
Log Collector Installation - Windows Automatic
Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for d...
Restart Log Collector Agent - Windows
Brief DescriptionThe Log Collector Agent is a single, unified tool that simplifies adding monitor...
Log Sources vs. Log Collectors
Log Sources vs. Log Collectors Log Sources: Definition: Log sources are the origin points...
What is a Log Source?
What is a Log Source? A log source refers to any system, application, or device that generates l...
Log Collector - Common Questions
Common Questions Is it difficult to set up a log collector? Basic setup is moderately compl...
Log Collector Hardware Requirements Guide
What is a Log Collector? A log collector is a tool or software component designed to gather log ...
Endpoint Detection and Responce (EDR) - Manual Installation
Endpoint Detection and Response (EDR) Endpoint Detection and Response (EDR), is a cybersecurity ...
Log Collector Installation - Ciso Workplace(old)
Please follow the steps below to manually add a Log Collector using Windows Environment. Step 1:...
Log Collector Installation Old - Windows
Log Collector Installation in CISO Workplace This guide provides step-by-step instructions for i...
SentinelOne Integrations
The SentinelOne integration collects and parses data from SentinelOne REST APIs. This integration...
Whitelist in Google Workspace
Whitelisting Simulated Phishing in Google Workspace (Gmail) For Secure Practice Simulation Email...