Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

7 total results found

Palo Alto Firewall Syslog Filter Documentation

System Integrations

Introduction This guide outlines how to configure Syslog filters on Palo Alto Networks firewalls to control which logs are sent to external Syslog servers. Proper filtering reduces noise, focuses on relevant events, and improves SIEM performance. Syslog Over...

CrowdStrike to SIEM alerts and ruling

System Integrations

Introduction This guide explains how to send security alerts from CrowdStrike Falcon to your Security Information and Event Management (SIEM) system and how to create rules for alert filtering and correlation (ruling). This helps detect threats faster and red...

Varonis (DLP)

System Integrations

Purpose This document outlines the procedure to integrate Varonis DatAlert or DatAdvantage with a SIEM platform using Syslog (CEF). The integration provides visibility into sensitive data access, permissions changes, and threat alerts. Prerequisites Adm...

KnowBe4

System Integrations

1. Overview This document explains how to integrate KnowBe4 with a SIEM solution using the KnowBe4 REST API. This allows ingestion of phishing simulation logs for monitoring, alerting, and reporting.  2. Requirements Admin access to KnowBe4 API acc...

CATO Networks API Integration

System Integrations

1. Overview Cato Networks is a cloud-native Secure Access Service Edge (SASE) platform that converges networking and security into a single, unified service. It provides SD-WAN, secure internet access, zero-trust network access, and advanced threat protection...

AQUILA - Salesforce Integration

System Integrations

Overview The Salesforce integration enables you to monitor your Salesforce instance. Salesforce is a customer relationship management (CRM) platform that supports businesses in managing marketing, sales, commerce, service, and IT teams from a unified platform...

AQUILA EDR - MacOS Issues

System Integrations

Overview To properly install and configure Elastic Defend manually without a Mobile Device Management (MDM) profile, there are additional permissions that must be enabled on the host before Elastic Endpoint—the installed component that performs Elastic Defend...