Advanced Search
Search Results
35 total results found
Vulnerability Assessment and Management
Overview Welcome to the Vulnerability Assessment and Management module. In this section, you'll be guided through the process of using our vulnerability assessment and management tool. You'll learn how to: Access the module interface. Create and configure...
Virtual Penetration Testing
Overview Welcome to the Virtual Penetration Testing module. In this section, you'll be guided through the process of using our virtual penetration testing tool. You'll learn how to: Navigate through the module interface. Create and initiate a penetration ...
Security Assessment Questionnaires
Overview A Security Assessment Questionnaire (SAQ) is a tool used by organizations to evaluate the security posture of their vendors, partners, or internal departments. It typically consists of a structured set of questions designed to assess how well the ent...
SentinelOne Integrations
The SentinelOne integration collects and parses data from SentinelOne REST APIs. This integration also offers the capability to perform response actions on SentinelOne hosts directly through the Elastic Security interface Compatibility This module has been ...
How to Whitelist by IP Address in Office 365 and by Domain in Microsoft Defender for Office 365 Portal
Why Whitelist in Office 365? Whitelisting ensures the CyTech phishing simulation (PS) functions without issue and prevents PS emails from being automatically moved to the spam folder or notifying users about potential phishing emails. The Connection Filter Po...
Sophos Integration
Overview The Sophos Central integration allows you to monitor Alerts and Events logs. Sophos Central is a cloud-native application with high availability. It is a cybersecurity management platform hosted on public cloud platforms. Each Sophos Central account ...
Log Collector Installation - Windows
Log Collector Installation in CISO Workplace This guide provides step-by-step instructions for installing the Elastic Agent as a log collector in the CISO Workplace environment. By following these steps, you’ll set up a secure, automated method for gathering ...
Atlassian Bitbucket Integrations (New)
Introduction The Bitbucket integration collects audit logs from the audit log files or the audit API. Reference: https://developer.atlassian.com/server/bitbucket/reference/rest-api/ Assumptions The procedures described in Section 3 assume that a Log ...
Palo Alto Cortex XDR Integration
Palo Alto Cortex XDR Integration Using the Cortex XDR APIs, you can integrate Cortex XDR with third-party apps or services to ingest alerts and to leverage alert stitching and investigation capabilities. The APIs allows you to manage incidents in a ticketing ...
Microsoft SQL Server Integration
The Microsoft SQL Server integration package allows you to search, observe, and visualize the SQL Server audit logs, as well as performance and transaction log metrics. Requirements Microsoft SQL Server is installed and has connectivity with the CyTech Log...
Azure Logs Integration
Introduction This document shows information related to Azure Active Directory Integration.The Azure Logs integration retrieves different types of log data from Azure. Assumptions The procedures described in the Requirements section assumes that a Log Col...
ESET Protect Integration
ESET PROTECT allows you to efficiently manage ESET products across workstations and servers within a networked environment, supporting up to 50,000 devices from a single centralized platform. Through the ESET PROTECT Web Console, you can seamlessly deploy ESET...
ESET Threat Intelligence Integrations
ESET Threat Intelligence provides advanced, real-time insights into global cybersecurity threats, empowering you to proactively defend your network and systems. By leveraging a vast database of threat data, it enables you to detect and respond to emerging thre...
CSPM for Azure Integration
This manual explains how to get started monitoring the security posture of your Azure CSP using the Cloud Security Posture Management (CSPM) feature. Requirements The user who gives the CSPM integration permissions in Azure must be an Azure subscription ...
Resource Manager Endpoint Integration
The Azure Resource Manager (ARM) endpoint is the primary entry point for interacting with the Azure platform's resource management services. It allows users to deploy, manage, and organize resources like virtual machines, storage accounts, and networks within ...
CISCO Secure Email Gateway Integrations
The Cisco Email Security Appliance (ESA) integration is a comprehensive solution for managing and securing email traffic within an organization's network. It provides various functionalities, such as spam filtering, virus scanning, policy enforcement, and data...
CISCO Nexus Integrations
Overview The Cisco Nexus integration allows users to monitor Errors and System Messages. The Cisco Nexus series switches are modular and fixed port network switches designed for the data center. All switches in the Nexus range run the modular NX-OS firmware/o...
BitDefender Integrations
BitDefender GravityZone supports SIEM integration using "push notifications", which are JSON messages sent via HTTP POST to a HTTP or HTTPS endpoint, which this integration can consume. This integration additionally provides: Collection of push notificatio...
Bitwarden Integrations
Overview The Bitwarden integration allows users to monitor collections, events, groups, members and policies. Bitwarden is a free and open-source password management service that stores sensitive information such as website credentials in an encrypted vault. ...
Whitelist in CISCO Secure Email Gateway
If you're using Cisco Secure Email Gateway spam filtering, you can whitelist CyTech to allow our simulated phishing test emails and training notifications through to your end users. The instructions below include information from the Cisco whitelisting articl...