<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Data Pipeline Management Setup Guides on SolCyber Knowledgebase</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/</link><description>Recent content in Data Pipeline Management Setup Guides on SolCyber Knowledgebase</description><generator>Hugo</generator><language>en</language><atom:link href="https://kb.solcyber.com/data-pipeline-management-setup-guides/index.xml" rel="self" type="application/rss+xml"/><item><title>DPM Log Ingestion Node</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/dpm-log-ingestion-node/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/dpm-log-ingestion-node/</guid><description>&lt;h2 id="specs-and-requirements"&gt;Specs and Requirements&lt;a class="anchor" href="#specs-and-requirements"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th width="198.6171875"&gt;Requirement Type&lt;/th&gt;&lt;th width="250.40234375"&gt;Requirement&lt;/th&gt;&lt;th&gt;Description&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;Server&lt;/td&gt;&lt;td&gt;CPU&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;strong&gt;Small:&lt;/strong&gt; 4x CPU&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Med:&lt;/strong&gt; 8x CPU&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Server&lt;/td&gt;&lt;td&gt;RAM&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;strong&gt;Small:&lt;/strong&gt; 8 GB&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Medium:&lt;/strong&gt; 24 GB&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Server&lt;/td&gt;&lt;td&gt;Disk 1&lt;/td&gt;&lt;td&gt;75 GB root HD&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Server&lt;/td&gt;&lt;td&gt;Disk 2&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;strong&gt;Small:&lt;/strong&gt; 200 GB unformatted HD&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Medium:&lt;/strong&gt; 600 GB unformatted HD&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Network&lt;/td&gt;&lt;td&gt;Reserved IP for each node&lt;/td&gt;&lt;td&gt;If deploying an ingestion mesh, please also reserve an IP for the software load balancer&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Firewall Ports&lt;/td&gt;&lt;td&gt;Remote Management&lt;/td&gt;&lt;td&gt;Please ensure that your firewall allows the Ingestion Appliance(s) to communicate &lt;em&gt;&lt;strong&gt;outbound&lt;/strong&gt;&lt;/em&gt; on UDP/9993&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Firewall Whitelisting&lt;/td&gt;&lt;td&gt;Node Health and Management&lt;/td&gt;&lt;td&gt;&lt;p&gt;Please allow the nodes access to the following FQDNs on TCP/443:&lt;br&gt;&lt;/p&gt;</description></item><item><title>Abnormal Email Security</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/abnormal-email-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/abnormal-email-security/</guid><description>&lt;h2 id="step-1-access-abnormal-security-platform"&gt;Step 1: Access Abnormal Security Platform &lt;a href="#step-1-access-abnormal-security-platform" id="step-1-access-abnormal-security-platform"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-1-access-abnormal-security-platform"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Log in to Abnormal Security Dashboard:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Navigate to your Abnormal Security Management Dashboard.&lt;/li&gt;
&lt;li&gt;Go to Settings &amp;gt; API Access.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enable API Access:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Ensure API access is enabled for your organization.&lt;/li&gt;
&lt;li&gt;Verify that you have the necessary permissions to create API tokens.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="step-2-generate-api-credentials"&gt;Step 2: Generate API Credentials &lt;a href="#step-2-generate-api-credentials" id="step-2-generate-api-credentials"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-2-generate-api-credentials"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Create API Token:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Navigate to Settings &amp;gt; API Access in your Abnormal Security dashboard.&lt;/li&gt;
&lt;li&gt;Click &amp;ldquo;Generate New Token&amp;rdquo; or &amp;ldquo;Create API Key&amp;rdquo;.&lt;/li&gt;
&lt;li&gt;Enter a descriptive name for the token (e.g., &amp;ldquo;SolCyber Integration&amp;rdquo;).&lt;/li&gt;
&lt;li&gt;Select the appropriate permissions for threat data access:
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;threats:read&lt;/code&gt; - Read access to threat data&lt;/li&gt;
&lt;li&gt;&lt;code&gt;threats:list&lt;/code&gt; - List threats&lt;/li&gt;
&lt;li&gt;&lt;code&gt;threats:get&lt;/code&gt; - Get individual threat details&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Note API Credentials:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Copy the &lt;strong&gt;API Base URL&lt;/strong&gt; and &lt;strong&gt;Access Token&lt;/strong&gt; from the API settings.&lt;/li&gt;
&lt;li&gt;These will be used in the SolCyber integration.&lt;/li&gt;
&lt;li&gt;Store the access token securely as it cannot be retrieved again. You will need to provide this information to SolCyber.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="step-3-configure-threat-data-access"&gt;Step 3: Configure Threat Data Access &lt;a href="#step-3-configure-threat-data-access" id="step-3-configure-threat-data-access"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-3-configure-threat-data-access"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Set up Threat Data Permissions:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Ensure your API token has access to the threat data you want to ingest.&lt;/li&gt;
&lt;li&gt;Verify that threat data is being generated and is accessible via the API.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Test API Connectivity:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Use &lt;strong&gt;Postman&lt;/strong&gt; or &lt;strong&gt;cURL&lt;/strong&gt; to test API requests to Abnormal Security.&lt;/li&gt;
&lt;li&gt;Verify that you can successfully retrieve threat data using your credentials.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="step-4-network-configuration"&gt;Step 4: Network Configuration &lt;a href="#step-4-network-configuration" id="step-4-network-configuration"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-4-network-configuration"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Whitelist Databahn IPs:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Add Databahn&amp;rsquo;s IP addresses to your Abnormal Security tenant&amp;rsquo;s allowed IPs if IP restrictions are enabled.&lt;/li&gt;
&lt;li&gt;Contact Databahn support for the specific IP ranges.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Configure Rate Limits:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Review and adjust API rate limits if necessary to accommodate your data ingestion needs.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;&lt;strong&gt;Abnormal Security Integration Reference&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>Cisco Duo</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/cisco-duo/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/cisco-duo/</guid><description>&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;Note that only administrators with the &lt;a href="https://duo.com/docs/admin-roles"&gt;Owner&lt;/a&gt; role can create or modify an Admin API application in the Duo Admin Panel.&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p&gt;Ingestion of the following types of DUO logs is supported:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Duo Security Administrator&lt;/li&gt;
&lt;li&gt;Duo Security Authentication&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Log in to the &lt;a href="https://admin.duosecurity.com/"&gt;Duo Admin Panel&lt;/a&gt; and navigate to &lt;strong&gt;Applications&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Protect an Application&lt;/strong&gt; and locate the entry for &lt;strong&gt;Admin API&lt;/strong&gt; in the applications list. Click &lt;strong&gt;Protect&lt;/strong&gt; to the far-right to configure the application and get your &lt;strong&gt;integration key, secret key, and API hostname&lt;/strong&gt;. You&amp;rsquo;ll need to provide these credentials to SolCyber via onetimesecret.com or other secure methods. &lt;/li&gt;
&lt;li&gt;The required permissions are:
&lt;ul&gt;
&lt;li&gt;Grant read log&lt;/li&gt;
&lt;li&gt;Grant read information&lt;/li&gt;
&lt;li&gt;Grant read resource&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;</description></item><item><title>Cisco Umbrella</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/cisco-umbrella/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/cisco-umbrella/</guid><description>&lt;p&gt;To facilitate log export to a SIEM, you must configure Umbrella logs to be stored in an AWS S3 bucket. We strongly recommend the use of your own S3 bucket, as the Cisco-managed option will have it&amp;rsquo;s token reset every 90-days.&lt;/p&gt;
&lt;h2 id="create-an-s3-bucket"&gt;Create an S3 Bucket&lt;a class="anchor" href="#create-an-s3-bucket"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;When you set up your Amazon S3 bucket, you must add a bucket policy which accept uploads from Umbrella. Copy the following preconfigured JSON and substitute your S3 bucket name for &lt;code&gt;bucketname&lt;/code&gt;. Then, paste the Umbrella S3 bucket policy into your Amazon S3 bucket policy.&lt;/p&gt;</description></item><item><title>Cisco Meraki Firewall</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/cisco-meraki-firewall/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/cisco-meraki-firewall/</guid><description>&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Go to &lt;strong&gt;Network-wide&lt;/strong&gt; &amp;gt; &lt;strong&gt;Configure&lt;/strong&gt; &amp;gt; &lt;strong&gt;General&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Add a syslog server&lt;/strong&gt; to define a new server. &lt;/p&gt;
&lt;p&gt;&lt;img src="https://documentation-be.securonix.com/bundle/securonix-cloud-user-guide/page/content/resources/images/imported/cisco_meraki/1.png?_LANG=enus" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Server IP&lt;/strong&gt;: The Datahan Collector IP address.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Port:&lt;/strong&gt; The SolCyber team will specify the port to use.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Roles:&lt;/strong&gt; The roles to send to the server.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Choose the type of events to export:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Event Log&lt;/strong&gt;: The messages from the dashboard under Monitor &amp;gt; Event Log.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Flows&lt;/strong&gt;: Inbound and outbound traffic flow-generated syslog messages that include the source, destination, and port numbers.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;URL:&lt;/strong&gt; HTTP GET requests generating syslog entries.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Fortinet Fortigate Firewall</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/fortinet-fortigate-firewall/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/fortinet-fortigate-firewall/</guid><description/></item><item><title>Microsoft Azure Security Center</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/microsoft-azure-security-center/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/microsoft-azure-security-center/</guid><description>&lt;ol&gt;
&lt;li&gt;Open the &lt;strong&gt;Azure Active Directory&lt;/strong&gt; resource in the Azure Portal.&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;App registrations&lt;/strong&gt; &amp;gt; &lt;strong&gt;New Registration&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/Defender_image_1.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Provide a name, and select the account scope to Single tenant.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Register&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click on the new application created on the App registration screen.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Copy the &lt;strong&gt;Client ID&lt;/strong&gt; and &lt;strong&gt;Tenant ID&lt;/strong&gt;, and then click &lt;strong&gt;View API permissions&lt;/strong&gt;.&lt;/p&gt;
&lt;figure&gt;&lt;img src="https://images.gitbook.com/__img/dpr=2,width=1168,onerror=redirect,format=auto,signature=-1575248681/https%3A%2F%2Fdocumentation-be.securonix.com%2Fbundle%2Fsecuronix-cloud-user-guide%2Fpage%2Fcontent%2Fresources%2Fimages%2Factive-deployment-guides%2Fmicrosoft%2Fazure-identity-protection-2.png%3F_LANG%3Denus" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Add a permission&lt;/strong&gt;, and then click the &lt;strong&gt;Microsoft Graph API&lt;/strong&gt;.&lt;/p&gt;
&lt;figure&gt;&lt;img src="https://images.gitbook.com/__img/dpr=2,width=1168,onerror=redirect,format=auto,signature=-996502312/https%3A%2F%2Fdocumentation-be.securonix.com%2Fbundle%2Fsecuronix-cloud-user-guide%2Fpage%2Fcontent%2Fresources%2Fimages%2Factive-deployment-guides%2Fmicrosoft%2Fazure-identity-protection-3.png%3F_LANG%3Denus" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Application permissions&lt;/strong&gt;, search for SecurityEvents, and then select &lt;strong&gt;SecurityEvents.Read.All&lt;/strong&gt;.&lt;/p&gt;</description></item><item><title>Microsoft EntraID Events</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/microsoft-entraid-events/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/microsoft-entraid-events/</guid><description>&lt;ul&gt;
&lt;li&gt;Login to &lt;strong&gt;Azure&lt;/strong&gt; portal.&lt;/li&gt;
&lt;li&gt;Locate &lt;strong&gt;App registrations&lt;/strong&gt; using the &lt;strong&gt;Search&lt;/strong&gt; bar from &lt;strong&gt;Dashboard&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%28188%29.png" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Click &lt;strong&gt;New Registration&lt;/strong&gt; from the &lt;strong&gt;App registrations&lt;/strong&gt; screen to register an application.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%2868%29.png" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Provide the following details in the &lt;strong&gt;Register an application&lt;/strong&gt; screen:&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Name&lt;/strong&gt;: SolCyber AzureAD Users&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Supported account Types&lt;/strong&gt;: Select the &lt;strong&gt;Accounts in this organizational directory only&lt;/strong&gt; option.&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Register&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Make a copy of &lt;strong&gt;Application (client ID)&lt;/strong&gt; and &lt;strong&gt;Directory (tenant ID)&lt;/strong&gt; for the application from the Application screen.&lt;/li&gt;
&lt;/ul&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/Gemini_Generated_Image_s8w124s8w124s8w1.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;ul&gt;
&lt;li&gt;Click &lt;strong&gt;API Permission&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/Gemini_Generated_Image_uurhv5uurhv5uurh.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;ul&gt;
&lt;li&gt;Click &lt;strong&gt;Add a permission&lt;/strong&gt;. A new &lt;strong&gt;Request API Permissions&lt;/strong&gt; screen is displayed.&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Microsoft Graph&lt;/strong&gt; from the &lt;strong&gt;Request API permissions&lt;/strong&gt; screen.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%28198%29.png" alt="" /&gt;&lt;/p&gt;</description></item><item><title>Office 365 (Azure AD, Exchange, SharePoint, General)</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/microsoft-office365/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/microsoft-office365/</guid><description>&lt;p&gt;Log in to the &lt;a href="https://portal.azure.com/"&gt;Azure portal&lt;/a&gt; as an admin and search for &lt;strong&gt;App registrations&lt;/strong&gt; in the top search bar.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://2315849798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-M_RDtNLnj4J3_rcbkr7%2Fuploads%2FDGec89J7JiRXcSmbr6xY%2Fimage.png?alt=media%5c&amp;amp;token=295f1a11-ea9b-46ad-950e-7103e8b7f8c0" alt="" /&gt;&lt;/p&gt;
&lt;p&gt;Click &lt;strong&gt;+ New registration&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://2315849798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-M_RDtNLnj4J3_rcbkr7%2Fuploads%2FWLRlyst59pmwinEPmOQQ%2Fimage.png?alt=media%5c&amp;amp;token=bd5b3e6b-6cf5-4044-88c6-2016ba7399df" alt="" /&gt;&lt;/p&gt;
&lt;p&gt;Enter the following details on the &lt;strong&gt;Register an application&lt;/strong&gt; page:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Name&lt;/strong&gt;: SolCyber-O365&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Supported account types&lt;/strong&gt;: Accounts in this organizational directory only (Single Tenant)&lt;/li&gt;
&lt;/ul&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/O365_image_2.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;p&gt;Click &lt;strong&gt;Register&lt;/strong&gt;. You will be redirected to the new application overview screen.&lt;/p&gt;
&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;Copy the Application (client) ID and Directory (tenant) ID. You will need to provide these to SolCyber.&lt;/p&gt;</description></item><item><title>Palo Alto Firewall</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/palo-alto-firewall/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/palo-alto-firewall/</guid><description>&lt;h2 id="step-1-create-a-syslog-server-profile"&gt;Step 1. Create a Syslog Server Profile &lt;a href="#step-1-create-a-syslog-server-profile" id="step-1-create-a-syslog-server-profile"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-1-create-a-syslog-server-profile"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Navigate to:&lt;br&gt;
&lt;strong&gt;Device &amp;gt; Server Profiles &amp;gt; Syslog&lt;/strong&gt;&lt;/p&gt;
&lt;figure&gt;&lt;img src="https://app.cp-us01-prod01-aws.databahn.app/help/assets/images/palo_1-008fdb5350c985a052853d964349a4d0.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Configure the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Syslog Name&lt;/strong&gt;:&lt;br&gt;
Enter a name for the syslog profile (up to 31 characters).&lt;br&gt;
The name is case-sensitive and must be unique. Use only letters, numbers, spaces, hyphens, and underscores.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Name&lt;/strong&gt;:&lt;br&gt;
Click &lt;strong&gt;Add&lt;/strong&gt; and enter a name for the syslog server (up to 31 characters).&lt;br&gt;
The name is case-sensitive and must be unique. Use only letters, numbers, spaces, hyphens, and underscores.&lt;/p&gt;</description></item><item><title>Qualys Vulnerability Management</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/qualys-vulnerability-management/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/qualys-vulnerability-management/</guid><description>&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Log into Qualys Console:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Navigate to your Qualys Security Operations Center (SOC)&lt;/li&gt;
&lt;li&gt;Sign in with your administrative credentials&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Create Service Account:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Go to &lt;strong&gt;Users&lt;/strong&gt; &amp;gt; &lt;strong&gt;Users&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;New&lt;/strong&gt; &amp;gt; &lt;strong&gt;User&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Provide username and strong password&lt;/li&gt;
&lt;li&gt;While creating the new user:
&lt;ul&gt;
&lt;li&gt;Assign the user a &lt;strong&gt;Manager&lt;/strong&gt; role.&lt;/li&gt;
&lt;li&gt;Open the User Role side tab.&lt;/li&gt;
&lt;li&gt;From the role drop-down, select &lt;strong&gt;Manager&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Enable the option for API access so the role supports API usage.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Complete the user creation process and save the user.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;You will need to provide the following information to SolCyber:&lt;/p&gt;</description></item><item><title>Sailpoint</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/sailpoint/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/sailpoint/</guid><description>&lt;h2 id="step-1-create-sailpoint-application"&gt;Step 1: Create Sailpoint Application &lt;a href="#step-1-create-sailpoint-application" id="step-1-create-sailpoint-application"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-1-create-sailpoint-application"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Log in to Sailpoint IdentityNow:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Navigate to your Sailpoint IdentityNow tenant.&lt;/li&gt;
&lt;li&gt;Go to Admin &amp;gt; Applications.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Create New Application:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Click &amp;ldquo;Create Application&amp;rdquo;.&lt;/li&gt;
&lt;li&gt;Enter a name for your application (e.g., &amp;ldquo;SolcyberIntegration&amp;rdquo;).&lt;/li&gt;
&lt;li&gt;Select &amp;ldquo;OAuth Client&amp;rdquo; as the application type.&lt;/li&gt;
&lt;li&gt;Click &amp;ldquo;Create&amp;rdquo;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="step-2-configure-application-settings"&gt;Step 2: Configure Application Settings &lt;a href="#step-2-configure-application-settings" id="step-2-configure-application-settings"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-2-configure-application-settings"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Grant API Access:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;In the &amp;ldquo;OAuth Scopes&amp;rdquo; section of your application, enable the following scopes:
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;sp:scopes:default&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;sp:read:audit-events&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;sp:read:activity-events&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;sp:read:account-activity&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;sp:read:tenant-settings&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Note Application Credentials:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Copy the &lt;strong&gt;Client ID&lt;/strong&gt; and &lt;strong&gt;Client Secret&lt;/strong&gt; from the application settings.&lt;/li&gt;
&lt;li&gt;Note your &lt;strong&gt;Base URL&lt;/strong&gt; (e.g., &lt;code&gt;https://your-tenant.identitynow.com&lt;/code&gt;).&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;strong&gt;You will need to provide this information to SolCyber&lt;/strong&gt;&lt;/em&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="step-3-configure-log-collection"&gt;Step 3: Configure Log Collection &lt;a href="#step-3-configure-log-collection" id="step-3-configure-log-collection"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-3-configure-log-collection"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Enable Audit Logging:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Go to Admin &amp;gt; Audit Configuration in your Sailpoint IdentityNow tenant.&lt;/li&gt;
&lt;li&gt;Ensure audit logging is enabled for the following events:
&lt;ul&gt;
&lt;li&gt;Authentication events&lt;/li&gt;
&lt;li&gt;Authorization events&lt;/li&gt;
&lt;li&gt;User management events&lt;/li&gt;
&lt;li&gt;Role and permission changes&lt;/li&gt;
&lt;li&gt;Access reviews and certifications&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Configure Activity Logging:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Go to Admin &amp;gt; Activity Configuration.&lt;/li&gt;
&lt;li&gt;Enable activity logging for:
&lt;ul&gt;
&lt;li&gt;User login/logout events&lt;/li&gt;
&lt;li&gt;Application access events&lt;/li&gt;
&lt;li&gt;Data access events&lt;/li&gt;
&lt;li&gt;Administrative actions&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Configure Account Activity Logging:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Go to Admin &amp;gt; Account Activity Configuration.&lt;/li&gt;
&lt;li&gt;Enable account activity logging for:
&lt;ul&gt;
&lt;li&gt;Account provisioning and deprovisioning events&lt;/li&gt;
&lt;li&gt;Account attribute changes&lt;/li&gt;
&lt;li&gt;Account status changes&lt;/li&gt;
&lt;li&gt;Account access and modification events&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="step-4-network-configuration"&gt;Step 4: Network Configuration &lt;a href="#step-4-network-configuration" id="step-4-network-configuration"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-4-network-configuration"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Whitelist Databahn IPs:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Add Databahn&amp;rsquo;s IP addresses to your Sailpoint tenant&amp;rsquo;s allowed IPs if IP restrictions are enabled:
&lt;ul&gt;
&lt;li&gt;3.229.112.66&lt;/li&gt;
&lt;li&gt;3.223.27.127&lt;/li&gt;
&lt;li&gt;52.201.54.124&lt;/li&gt;
&lt;li&gt;52.203.151.207&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Configure CORS (if needed):&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;If using web-based authentication flows, ensure CORS is properly configured.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;&lt;strong&gt;Sailpoint Integration Reference&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>Zscaler ZPA</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/zscaler-zpa/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/zscaler-zpa/</guid><description>&lt;ul&gt;
&lt;li&gt;Go to &lt;strong&gt;Configuration &amp;amp; Control&lt;/strong&gt; &amp;gt; &lt;strong&gt;Private Infrastructure&lt;/strong&gt; &amp;gt; &lt;strong&gt;Log Streaming Service&lt;/strong&gt; &amp;gt; &lt;strong&gt;Log Receivers&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Add Log Receiver&lt;/strong&gt;. The Add Log Receiver window appears.&lt;/li&gt;
&lt;li&gt;In the Add Log Receiver window, configure the following tabs:&lt;/li&gt;
&lt;/ul&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/unknown.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;p&gt;&lt;strong&gt;Log Receiver&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the Log Receiver tab:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Name:&lt;/strong&gt; Enter a name for the log receiver. The name cannot contain special characters, with the exception of periods (.), hyphens (-), and underscores ( _ ).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Description:&lt;/strong&gt; Optional.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Domain or IP Address:&lt;/strong&gt; Enter IP address for the log receiver.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;TCP Port:&lt;/strong&gt; Enter the TCP port number provided by SolCyber.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;TLS Encryption:&lt;/strong&gt; Select DISABLED.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;App Connector Groups:&lt;/strong&gt; Choose the App Connector groups that can forward logs to the receiver, and click &lt;strong&gt;Done&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Click &lt;strong&gt;Next&lt;/strong&gt;.&lt;/p&gt;</description></item></channel></rss>