Advanced Search
Search Results
262 total results found
AQUILA - Microsoft Office 365 Integration
Overview This integration with Microsoft Office 365 supports the ingestion of user, administrator, system, and policy-related events. It leverages the Office 365 Management Activity API to retrieve activity logs from both Office 365 and Azure Active Directory...
Azure Integration - Microsoft Entra ID Logs
Step 1: Create an Event Hub for Microsoft Entra ID Logs Go to Azure Portal > Event Hubs > Create Namespace Select Resource Group or create a new one. Choose a Region and a Pricing Tier (Standard or Premium). Click Review + Create → Create. Cre...
Azure Integration -Blob Storage Leasing
Here are the necessary steps to resolve the issue. Step 1: Go to your Azure Portal and log in >go to Storage Account dedicated for Elastic Integration. Step 2: Maneuver to Data Storage > Containers. Step 3: Check all the Blob Storage dedicated for every...
Cloud Security Posture Management - Google Cloud Platform Integration (CSPM-GCP)
Go to > Cyber Incident Monitoring Requirements Set Up Cloud Account Access Note: To set up CSPM for a GCP project, you need admin privileges for the project. Manual Authentication for GCP To authenticate manually and monitor a GCP organization, you must...
CSPM-AWS Integration
Get started with CSPM for AWS Overview This page explains how to get started monitoring the security posture of your cloud assets using the Cloud Security Posture Management (CSPM) feature. Requirements Minimum privileges vary depending o...
Cato Networks - Using Cato API for ELK Stack Integration
To fully integrate the Cato Networks API with the Elastic Stack (ELK Stack), you can follow this comprehensive process. This guide will cover the necessary steps to collect, transform, and visualize data from Cato Networks using the Elastic Stack. Step 1: Und...
Log Collector Installation - Ciso Workplace(old)
Please follow the steps below to manually add a Log Collector using Windows Environment. Step 1: Log in to your CISO Workplace and click the rectangular dots. Step 2: Click "Cyber Monitoring". Step 3: Go to "Cyber Incident Management (SIEM and XDR)". S...
Fortinet FortiGate - Syslog Setting and Syslog Filter
Please follow these instructions: Step 1: Log in to your Fortinet FortiGate Admin portal and navigate to CLI console. Please refer to the images below. Step 2: In your CLI Console execute these commands. To configure FortiGate to send log...
Azure Application Insights Integration
The Application Insights Integration allows users to collect metrics from Azure Application Insights. Key Configuration Options: Application ID: The ID of the application from the API Access settings in the Azure portal. API Key: A generated key for authe...
CSPM-AWS Integration using IAM Role
Overview This page explains how to get started monitoring the security posture of your cloud assets using the Cloud Security Posture Management (CSPM) feature. Set up cloud account access The CSPM integration requires access to AWS’s built-in Secu...
Google Cloud Platform (GCP) Audit Logs Integration - using Pub/Sub
Requirements To integrate with Google Cloud Platform (GCP), you need to set up the following: Service Account with a Role. Service Account Key to access data on your GCP project. Service Accounts A Service Account (SA) is a special t...
Endpoint Detection and Responce (EDR) - Manual Installation
Endpoint Detection and Response (EDR) Endpoint Detection and Response (EDR), is a cybersecurity technology that focuses on detecting, investigating, and responding to suspicious activities and threats on endpoints, such as workstations, laptops, and servers. ...
Azure Application Insights Integration
Overview The Application Insights Integration allows users to retrieve application insights metrics from specified applications. Integration level configuration options Application ID: ID of the application. This is Application ID from the API Access sett...
Google Workspace Integration - Elastic
Google Workspace Integration The Google Workspace integration collects and parses data from the different Google Workspace audit reports APIs(external, opens in a new tab or window). If you want to know more about how you can fully leverage the Google Worksp...
GitHub Integration - Elastic
GitHub Integration The GitHub integration collects events from the GitHub API(external, opens in a new tab or window). Logs Audit The GitHub audit log records all events related to the GitHub organization. See Audit log actions(external, opens in a new tab...
Log Collector Hardware Requirements Guide
What is a Log Collector? A log collector is a tool or software component designed to gather log data from various sources within an IT environment, including servers, applications, network devices, and other infrastructure components. The primary purpose is t...
Log Collector Installation - Linux Manual
Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for deploying the Elastic Agent as a log collector within the CyTech - Aquila environment. Following these instructions will establish a secure and automated mechanism ...
Log Collector Installation - Mac Manual
Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for deploying the Elastic Agent as a log collector within the CyTech - Aquila environment. Following these instructions will establish a secure and automated mechanism ...
Log Collector Installation - Onboarding "Let's Go"
Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for deploying the Elastic Agent as a log collector within the CyTech - Aquila environment. Following these instructions will establish a secure and automated mechanism ...
Log Collector - Common Questions
Common Questions Is it difficult to set up a log collector? Basic setup is moderately complex. Most organizations can get started in a few days with some IT expertise, though fine-tuning takes longer. How much will this cost? A basic setup can be a...