Recently Updated Pages
Google Workspace Integrations
Introduction Google Workspace (formerly G Suite) is a suite of cloud computing, productivity an...
GitLab Integrations
Introduction Introduced in GitLab Starter 8.4. Support for Amazon Elasticsearch was introduced ...
GCP Integrations
Introduction This document shows information related to GCP Integration. The Google Cloud in...
F5 Integrations
Introduction This document shows information related to F5 Integration. The F5 BIG-IP integr...
Dropbox Integrations
Introduction Connecting Dropbox Use the Workplace Search Dropbox connector to automatically c...
Crowdstrike Integrations
Introduction This integration is for CrowdStrike products. It includes the following datasets f...
Cloudflare Integration
Introduction Cloudflare integration uses Cloudflare's API to retrieve audit logs and traffic lo...
AWS Integrations
Introduction This document shows information related to AWS Integration. The AWS integration...
AWS Security Hub Integrations
Introduction The AWS Security Hub integration collects and parses data from AWS Security Hub RE...
AWS GuardDuty Integrations
Introduction The Amazon GuardDuty integration collects and parses data from Amazon GuardDuty Fi...
AWS Cloudtrails Integrations
Introduction The AWS CloudTrail integration allows you to monitor AWS CloudTrail Reference: h...
Atlassian Bitbucket Integrations
Introduction The Bitbucket integration collects audit logs from the audit log files or the audi...
Add Windows Integrations
Introduction The Windows integration allows you to monitor the Windows OS, services, applicatio...
1 Password Integrations
Introduction With 1Password Business, you can send your account activity to your security infor...
Sysmon for Linux
Introduction The Sysmon for Linux integration allows you to monitor the Sysmon for Linux, which...
GitHub
Introduction The GitHub integration collects events from the GitHub API. https://docs.g...
Cyber Incident Monitoring Integration Procedure
Go to > Cyber Incident Monitoring
Source Destination Map
This section provides a visual representation of the geographical locations from which attackers ...
Social Engineering
This section offers a comprehensive overview of your organization's resilience against social eng...
Security & Privacy Compliance
This section provides a comprehensive overview of your organization's current status regarding se...