Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

35 total results found

Vulnerability Assessment and Management

Attack Surface Management

Overview Welcome to the Vulnerability Assessment and Management module. In this section, you'll be guided through the process of using our vulnerability assessment and management tool. You'll learn how to: Access the module interface. Create and configure...

Virtual Penetration Testing

Attack Surface Management

Overview Welcome to the Virtual Penetration Testing module. In this section, you'll be guided through the process of using our virtual penetration testing tool. You'll learn how to: Navigate through the module interface. Create and initiate a penetration ...

Security Assessment Questionnaires

Cyber Governance

Overview A Security Assessment Questionnaire (SAQ) is a tool used by organizations to evaluate the security posture of their vendors, partners, or internal departments. It typically consists of a structured set of questions designed to assess how well the ent...

SentinelOne Integrations

System Integrations

The SentinelOne integration collects and parses data from SentinelOne REST APIs. This integration also offers the capability to perform response actions on SentinelOne hosts directly through the Elastic Security interface  Compatibility This module has been ...

How to Whitelist by IP Address in Office 365 and by Domain in Microsoft Defender for Office 365 Portal

O365 FAQs

Why Whitelist in Office 365? Whitelisting ensures the CyTech phishing simulation (PS) functions without issue and prevents PS emails from being automatically moved to the spam folder or notifying users about potential phishing emails. The Connection Filter Po...

Sophos Integration

System Integrations

Overview The Sophos Central integration allows you to monitor Alerts and Events logs. Sophos Central is a cloud-native application with high availability. It is a cybersecurity management platform hosted on public cloud platforms. Each Sophos Central account ...

Log Collector Installation - Windows

Log Collector Installations

Log Collector Installation in CISO Workplace This guide provides step-by-step instructions for installing the Elastic Agent as a log collector in the CISO Workplace environment. By following these steps, you’ll set up a secure, automated method for gathering ...

Atlassian Bitbucket Integrations (New)

System Integrations

Introduction  The Bitbucket integration collects audit logs from the audit log files or the audit API.  Reference:  https://developer.atlassian.com/server/bitbucket/reference/rest-api/   Assumptions  The procedures described in Section 3 assume that a Log ...

Palo Alto Cortex XDR Integration

System Integrations

Palo Alto Cortex XDR Integration Using the Cortex XDR APIs, you can integrate Cortex XDR with third-party apps or services to ingest alerts and to leverage alert stitching and investigation capabilities. The APIs allows you to manage incidents in a ticketing ...

Microsoft SQL Server Integration

System Integrations

The Microsoft SQL Server integration package allows you to search, observe, and visualize the SQL Server audit logs, as well as performance and transaction log metrics. Requirements Microsoft SQL Server is installed and has connectivity with the CyTech Log...

Azure Logs Integration

System Integrations

Introduction This document shows information related to Azure Active Directory Integration.The Azure Logs integration retrieves different types of log data from Azure. Assumptions The procedures described in the Requirements section assumes that a Log Col...

ESET Protect Integration

System Integrations

ESET PROTECT allows you to efficiently manage ESET products across workstations and servers within a networked environment, supporting up to 50,000 devices from a single centralized platform. Through the ESET PROTECT Web Console, you can seamlessly deploy ESET...

ESET Threat Intelligence Integrations

System Integrations

ESET Threat Intelligence provides advanced, real-time insights into global cybersecurity threats, empowering you to proactively defend your network and systems. By leveraging a vast database of threat data, it enables you to detect and respond to emerging thre...

CSPM for Azure Integration

System Integrations

This manual explains how to get started monitoring the security posture of your Azure CSP using the Cloud Security Posture Management (CSPM) feature. Requirements The user who gives the CSPM integration permissions in Azure must be an Azure subscription ...

Resource Manager Endpoint Integration

System Integrations

The Azure Resource Manager (ARM) endpoint is the primary entry point for interacting with the Azure platform's resource management services. It allows users to deploy, manage, and organize resources like virtual machines, storage accounts, and networks within ...

CISCO Secure Email Gateway Integrations

System Integrations

The Cisco Email Security Appliance (ESA) integration is a comprehensive solution for managing and securing email traffic within an organization's network. It provides various functionalities, such as spam filtering, virus scanning, policy enforcement, and data...

CISCO Nexus Integrations

System Integrations

Overview The Cisco Nexus integration allows users to monitor Errors and System Messages. The Cisco Nexus series switches are modular and fixed port network switches designed for the data center. All switches in the Nexus range run the modular NX-OS firmware/o...

BitDefender Integrations

System Integrations

BitDefender GravityZone supports SIEM integration using "push notifications", which are JSON messages sent via HTTP POST to a HTTP or HTTPS endpoint, which this integration can consume. This integration additionally provides: Collection of push notificatio...

Bitwarden Integrations

System Integrations

Overview The Bitwarden integration allows users to monitor collections, events, groups, members and policies. Bitwarden is a free and open-source password management service that stores sensitive information such as website credentials in an encrypted vault. ...

Whitelist in CISCO Secure Email Gateway

Culture and Awareness Whitelisting

If you're using Cisco Secure Email Gateway spam filtering, you can whitelist CyTech to allow our simulated phishing test emails and training notifications through to your end users. The instructions below include information from the Cisco whitelisting articl...