Advanced Search
Search Results
47 total results found
GitHub Integration - Elastic
GitHub Integration The GitHub integration collects events from the GitHub API(external, opens in a new tab or window). Logs Audit The GitHub audit log records all events related to the GitHub organization. See Audit log actions(external, opens in a new tab...
Log Collector Hardware Requirements Guide
What is a Log Collector? A log collector is a tool or software component designed to gather log data from various sources within an IT environment, including servers, applications, network devices, and other infrastructure components. The primary purpose is t...
Log Collector Installation - Linux Manual
Log Collector Installation in CyTech - AQUILA This guide outlines the step-by-step process for deploying the Elastic Agent as a log collector within the CyTech - AQUILA environment. Following these instructions will establish a secure and automated mechanism ...
Log Collector Installation - Mac Manual
Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for deploying the Elastic Agent as a log collector within the CyTech - Aquila environment. Following these instructions will establish a secure and automated mechanism ...
Log Collector Installation - Onboarding "Let's Go"
Log Collector Installation in CyTech - AQUILA This guide outlines the step-by-step process for deploying the Elastic Agent as a log collector within the CyTech - AQUILA environment. Following these instructions will establish a secure and automated mechanism ...
Log Collector - Common Questions
Common Questions Is it difficult to set up a log collector? Basic setup is moderately complex. Most organizations can get started in a few days with some IT expertise, though fine-tuning takes longer. How much will this cost? A basic setup can be a...
What is a Log Source?
What is a Log Source? A log source refers to any system, application, or device that generates log data. Logs are records of events that occur within these systems, and they provide valuable information for monitoring, troubleshooting, and analyzing the perfo...
Log Sources vs. Log Collectors
Log Sources vs. Log Collectors Log Sources: Definition: Log sources are the origin points where log data is generated. These can be operating systems, applications, network devices, cloud services, and more. Examples: Windows Event Logs, Apache Web Se...
Log Collector Installation - Windows Automatic
Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for deploying the Elastic Agent as a log collector within the CyTech - Aquila environment. Following these instructions will establish a secure and automated mechanism ...
How to uninstall Elastic Agent - Windows
Uninstall Elastic Agent There are two primary methods to uninstall the Elastic Agent on Windows: Manual Uninstallation via the Windows GUI – Navigate through the Control Panel or directly to the installation directory to initiate the uninstaller. Un...
Log Collector Installation - Windows Manual
Log Collector Installation in CyTech - Aquila This guide outlines the step-by-step process for deploying the Elastic Agent as a log collector within the CyTech - Aquila environment. Following these instructions will establish a secure and automated mechanism ...
CyTech AQUILA - Cloud Security Posture Management (CSPM) Module
Overview: CSPM helps secure your cloud infrastructure by discovering and evaluating cloud services (e.g., storage, compute, IAM) against CIS benchmarks to identify and remediate configuration risks that may affect data confidentiality, integrity, and availabi...
GCP and CSPM-GCP Integration
This Google Cloud integration collects and analyzes a wide range of logs and metrics to provide comprehensive visibility into your cloud environment. It ingests Firewall Logs, VPC Flow Logs, DNS Logs, and Load Balancing Logs exported from Cloud Logging via a P...
GCP - How to enable Cloud Asset API
Please refer to these instructions to enable Cloud Asset API. To enable the Cloud Asset API for your Google Cloud project, follow these steps: Go to the Google Cloud Console: Navigate to Google Cloud Console. Select Your Project: ...
GCP - How to Add a Role
Go to the Google Cloud Console. Navigate to IAM. Click on "IAM & Admin" in the left navigation menu. Select "IAM" from the submenu. Find your service account. In the IAM permissions list, locate your existing service accoun...
GCP - Setup a Log Sink
Setup Log Sink Using Google Cloud Console Navigate to "Logging" > "Log Router" > "Create Sink". Provide a Sink name and description. For Sink destination, select "Cloud Pub/Sub topic". Choose an existing topic "cytech-elasticsearch". Unde...
Phishing Campaign - Setting Up Microsoft o365
Why Whitelist in Office 365? Whitelisting ensures the CyTech - AQUILA Phishing Simulation(PS) Module functions without issue and prevents PS emails from being automatically moved to the spam folder or notifying users about potential phishing emails. The Conne...
Whitelist in Google Workspace
Whitelisting Simulated Phishing in Google Workspace (Gmail) For Secure Practice Simulation Emails This step-by-step guide is intended for Google Workspace administrators to allow simulated phishing emails from Secure Practice by properly configuring Gmail to...
Restart Log Collector Agent - Windows
Brief DescriptionThe Log Collector Agent is a single, unified tool that simplifies adding monitoring capabilities to yoursystems. It can collect various data types, including logs, metrics, and securityinformation, from your hosts. Locating Log Collector Agen...
Whitelist Microsoft Office 365
Why Whitelist in Office 365? Whitelisting ensures the CyTech - AQUILA Phishing Simulation(PS) Module functions without issue and prevents PS emails from being automatically moved to the spam folder or notifying users about potential phishing emails. The Conne...