<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SolCyber Knowledgebase</title><link>https://kb.solcyber.com/</link><description>Recent content on SolCyber Knowledgebase</description><generator>Hugo</generator><language>en</language><atom:link href="https://kb.solcyber.com/index.xml" rel="self" type="application/rss+xml"/><item><title>SolCyber Service Features</title><link>https://kb.solcyber.com/solcyber-customer-experience/solcyber-service-features/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/solcyber-customer-experience/solcyber-service-features/</guid><description>&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/SOL_ServiceFeatures.jpg" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;h2 id="advanced-email-protectionx20"&gt;Advanced Email Protection &lt;a class="anchor" href="#advanced-email-protectionx20"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Proactive blocking of malicious emails including SPAM, Phishing and BEC &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Assist in integration with mail platform &lt;/li&gt;
&lt;li&gt;Migration and maintenance of white list and black lists &lt;/li&gt;
&lt;li&gt;Monitoring of high risk users against BEC &lt;/li&gt;
&lt;li&gt;SOC triage on quarantine release to reduce risk &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="endpoint-detection-and-responsex20"&gt;Endpoint Detection and Response &lt;a class="anchor" href="#endpoint-detection-and-responsex20"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Prevention, detection and response capabilities at the endpoint. &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Remote assist in roll out of agent and associated troubleshooting&lt;/li&gt;
&lt;li&gt;Management of security policies including enabling blocking mode &lt;/li&gt;
&lt;li&gt;Detection, mitigation and quarantining of malware and behavioral detections.&lt;/li&gt;
&lt;li&gt;Collect detailed telemetry used in alert triage and incident investigations:
&lt;ul&gt;
&lt;li&gt;ex. network connections, registry modifications, file creation and modification, DNS requests, processes, etc&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Ability to network quarantine devices, when necessary&lt;/li&gt;
&lt;li&gt;Remote command line access for containment and additional triage&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="phishing-simulation-and-trainingx20"&gt;Phishing Simulation and Training &lt;a class="anchor" href="#phishing-simulation-and-trainingx20"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Harden your weakest link, your employees. Service is designed to be practical so users actually learn and don’t treat it as another compliance exercise. &lt;/p&gt;</description></item><item><title>Roles and Responsibilities</title><link>https://kb.solcyber.com/solcyber-customer-experience/roles-and-responsibilities/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/solcyber-customer-experience/roles-and-responsibilities/</guid><description>&lt;h2 id="where-solcyber-helpsx20"&gt;Where SolCyber Helps &lt;a class="anchor" href="#where-solcyber-helpsx20"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Detect and respond to threats against the traditional IT infrastructure &lt;/li&gt;
&lt;li&gt;Visibility into security posture and continuous advice on how to improve your overtime &lt;/li&gt;
&lt;li&gt;Ensure all the bundled tools are working optimally and constantly adjusted based off threats &lt;/li&gt;
&lt;li&gt;Evaluate the performance of all tools regularly and update as needed based off changes in technology and threats &lt;/li&gt;
&lt;li&gt;Answer questions and provide advice around security best practices &lt;/li&gt;
&lt;li&gt;Support compliance efforts with included controls and communicate to auditors where needed &lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="where-to-focus-your-resourcesx20"&gt;Where to Focus Your Resources &lt;a class="anchor" href="#where-to-focus-your-resourcesx20"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Own security strategy and augment SolCyber’s capabilities &lt;/li&gt;
&lt;li&gt;Coordinate response with our analysts when needed &lt;/li&gt;
&lt;li&gt;Security architecture such as zero trust implementation &lt;/li&gt;
&lt;li&gt;Personalized security: &lt;/li&gt;
&lt;li&gt;Application security / Devsecops &lt;/li&gt;
&lt;li&gt;Anti fraud &lt;/li&gt;
&lt;li&gt;Supply chain risk &lt;/li&gt;
&lt;li&gt;Insider risk &lt;/li&gt;
&lt;li&gt;Compliance and other regulations &lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Onboarding Guide</title><link>https://kb.solcyber.com/solcyber-customer-experience/master/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/solcyber-customer-experience/master/</guid><description>&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/SOL_OnboardingGuide.jpg" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;h2 id="intro"&gt;Intro&lt;a class="anchor" href="#intro"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;This document serves as a high-level guide to help customers understand the SolCyber onboarding process.&lt;/p&gt;
&lt;h2 id="objectives"&gt;Objectives&lt;a class="anchor" href="#objectives"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Transition security operations to SolCyber​.&lt;/li&gt;
&lt;li&gt;Get to know your team​.&lt;/li&gt;
&lt;li&gt;Establish roles and responsibilities​.&lt;/li&gt;
&lt;li&gt;Understand the process and timelines.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="key-stakeholders"&gt;Key Stakeholders&lt;a class="anchor" href="#key-stakeholders"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Role&lt;/th&gt;
 &lt;th&gt;Customer/SolCyber&lt;/th&gt;
 &lt;th&gt;Main Responsibility&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;Customer Success​&lt;/td&gt;
 &lt;td&gt;SolCyber​&lt;/td&gt;
 &lt;td&gt;Ensure success of onboarding and point of contact for all non-security related queries​&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Lead Analyst&lt;/td&gt;
 &lt;td&gt;SolCyber&lt;/td&gt;
 &lt;td&gt;Primary security contact​&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Project Lead&lt;/td&gt;
 &lt;td&gt;Customer&lt;/td&gt;
 &lt;td&gt;Lead contact for on-boarding to help coordinate between the different parties​&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Security Lead&lt;/td&gt;
 &lt;td&gt;Customer&lt;/td&gt;
 &lt;td&gt;Lead contact to work with the SolCyber SOC​&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Email Admin&lt;/td&gt;
 &lt;td&gt;Customer&lt;/td&gt;
 &lt;td&gt;Assist with deployment of Advanced Email Protection​&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;IT Desktop Admin&lt;/td&gt;
 &lt;td&gt;Customer&lt;/td&gt;
 &lt;td&gt;Assist with deployment of Endpoint Persistence Agent​&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Network Admin&lt;/td&gt;
 &lt;td&gt;Customer&lt;/td&gt;
 &lt;td&gt;Assist with deployment of Lateral Movement Detection node​&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id="key-milestones-and-timeline"&gt;Key Milestones and Timeline&lt;a class="anchor" href="#key-milestones-and-timeline"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%2888%29.png" alt="" /&gt;&lt;/p&gt;</description></item><item><title>Supported Products and Platforms</title><link>https://kb.solcyber.com/solcyber-customer-experience/supported-product-list/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/solcyber-customer-experience/supported-product-list/</guid><description>&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/SOL_ProductsPlatforms.jpg" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;p&gt;In general, the SolCyber foundational technology stack supports the following:&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Operating Systems&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Windows 10/11&lt;/li&gt;
&lt;li&gt;Windows Server 2012/2016/2019&lt;/li&gt;
&lt;li&gt;MacOS Catalina/Big Sur/Monterey&lt;/li&gt;
&lt;li&gt;Linux (most distros)&lt;/li&gt;
&lt;li&gt;Limited Support for Windows 7/8&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Email Platforms&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Microsoft Exchange/Office 365&lt;/li&gt;
&lt;li&gt;Google Workspace&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="data-ingestion"&gt;Data Ingestion&lt;a class="anchor" href="#data-ingestion"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;SolCyber SOC Platform supports the ingestion of telemetry data from the following platforms. Please work with your Customer Success representative to onboard additional sources or contact sales to purchase additional EPS buckets.&lt;/p&gt;</description></item><item><title>Recommended Logs</title><link>https://kb.solcyber.com/solcyber-customer-experience/recommended-logs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/solcyber-customer-experience/recommended-logs/</guid><description>&lt;p&gt;Securonix is a powerful platform that enables our analysts to detect and triage incidents. It can collect data from a host of technologies to enable our SOC to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Provide additional context for a primary indicator &lt;/li&gt;
&lt;li&gt;Enable unique detection of threats &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;We’re solely focused on providing better security so we recommend only sending us logs that provide &lt;strong&gt;high security value&lt;/strong&gt;. If you have logs that you want to setup specific alerts for, that works as well. Here’s what we recommend sending over and why. &lt;/p&gt;</description></item><item><title>Log Ingestion Appliance - Virtual</title><link>https://kb.solcyber.com/log-ingestion-appliance-virtual/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/log-ingestion-appliance-virtual/</guid><description>&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/SOL_RIN.jpg" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;p&gt;SolCyber uses a log ingestion appliance to consume logs from your on-premise sources. We offer a virtual appliance or a &lt;a href="https://kb.solcyber.com/log-ingestion-appliance-hardware/"&gt;hardware appliance&lt;/a&gt;. &lt;/p&gt;
&lt;p&gt;Virtual log ingestion appliances can be deployed for most hypervisors:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;VMWare:&lt;/strong&gt; using a SolCyber-provide OVA file.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hyper-V and other hypervisors:&lt;/strong&gt; Using a SolCyber-provided deployment script that can be run after configuring a VM running a supported Operating System&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="log-ingestion-appliance-setup-guide---vmware"&gt;&lt;strong&gt;Log Ingestion Appliance Setup Guide - VMware&lt;/strong&gt;&lt;a class="anchor" href="#log-ingestion-appliance-setup-guide---vmware"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;h3 id="prerequisites"&gt;Prerequisites &lt;a href="#prerequisites" id="prerequisites"&gt;&lt;/a&gt;&lt;a class="anchor" href="#prerequisites"&gt;#&lt;/a&gt;&lt;/h3&gt;
&lt;p&gt;Ensure that the following prerequisites are met before you proceed:&lt;/p&gt;</description></item><item><title>Log Ingestion Appliance - Hardware</title><link>https://kb.solcyber.com/log-ingestion-appliance-hardware/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/log-ingestion-appliance-hardware/</guid><description>&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/SOL_RIN.jpg" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;h2 id="prerequisites"&gt;Prerequisites &lt;a href="#prerequisites" id="prerequisites"&gt;&lt;/a&gt;&lt;a class="anchor" href="#prerequisites"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Ensure that the following prerequisites are met before you proceed:&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Requirement Type&lt;/th&gt;
 &lt;th&gt;Requirement&lt;/th&gt;
 &lt;th&gt;Description&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;Server&lt;/td&gt;
 &lt;td&gt;Operating System&lt;/td&gt;
 &lt;td&gt;RHEL 8+, Ubuntu 22.04&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Firewall Ports&lt;/td&gt;
 &lt;td&gt;SNYPR Console&lt;/td&gt;
 &lt;td&gt;Please ensure that your firewall allows the Ingestion Appliance to communicate &lt;em&gt;&lt;strong&gt;outbound&lt;/strong&gt;&lt;/em&gt; on TCP/443&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Firewall Ports&lt;/td&gt;
 &lt;td&gt;KAFKA Brokers&lt;/td&gt;
 &lt;td&gt;Please ensure that your firewall allows the Ingestion Appliance to communicate &lt;em&gt;&lt;strong&gt;outbound&lt;/strong&gt;&lt;/em&gt; on TCP/9093&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Firewall Ports&lt;/td&gt;
 &lt;td&gt;Ingester Heartbeat and Management&lt;/td&gt;
 &lt;td&gt;Please ensure that your firewall allows the Ingestion Appliance to communicate &lt;em&gt;&lt;strong&gt;outbound&lt;/strong&gt;&lt;/em&gt; on TCP/9993&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Firewall Ports&lt;/td&gt;
 &lt;td&gt;Syslog sources&lt;/td&gt;
 &lt;td&gt;&lt;p&gt;SolCyber will instruct you as to which ports will be in use for data ingestion.&lt;/p&gt;</description></item><item><title>Securonix Hub (Legacy)</title><link>https://kb.solcyber.com/securonix-hub/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/securonix-hub/</guid><description>&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/SOL_RIN.jpg" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;&lt;strong&gt;The Securonix Hub&lt;/strong&gt; is Securonix&amp;rsquo;s new ingestion agent that replaces the existing Remote Ingestion Node (RIN). If the .tar file you received from us contains &amp;ldquo;&lt;strong&gt;SecuronixHubAgent&lt;/strong&gt;&amp;rdquo;, use the follow documentation to install the software.&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p&gt;Customers can set up their own Hubs using a VM/hardware &lt;strong&gt;or&lt;/strong&gt; purchase a Hub appliance from SolCyber.&lt;/p&gt;
&lt;h2 id="server-recommendation"&gt;Server Recommendation &lt;a href="#serverrecommendation" id="serverrecommendation"&gt;&lt;/a&gt;&lt;a class="anchor" href="#server-recommendation"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;The following table describes Securonix Hub sizing recommendations:&lt;/p&gt;</description></item><item><title>Privacy Policy</title><link>https://kb.solcyber.com/privacy-policy/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/privacy-policy/</guid><description>&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/SOL_Privacy.jpg" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;p&gt;Privacy Policy&lt;/p&gt;
&lt;p&gt;Last updated: May 13, 2021&lt;/p&gt;
&lt;p&gt;This Privacy Policy describes Our policies and procedures on the collection, use and disclosure of Your information when You use the Service and tells You about Your privacy rights and how the law protects You.&lt;/p&gt;
&lt;p&gt;We use Your Personal data to provide and improve the Service. By using the Service, You agree to the collection and use of information in accordance with this Privacy Policy.&lt;/p&gt;</description></item><item><title>1Password</title><link>https://kb.solcyber.com/supported-data-sources-categories/access-identity-management/1password/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/access-identity-management/1password/</guid><description>&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;You can set up Events Reporting if you’re an owner, administrator, or part of a group with the &lt;a href="https://support.1Password.com/groups/#appendix-default-permissions"&gt;View Administrative Sidebar permission&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;You must have at least a &lt;strong&gt;Business account&lt;/strong&gt; to export logs.&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;h2 id="create-events-reporting-integration"&gt;Create Events Reporting Integration&lt;a class="anchor" href="#create-events-reporting-integration"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Sign in to your 1Password account, click &lt;strong&gt;Integrations&lt;/strong&gt; in the sidebar, and choose &lt;strong&gt;Other.&lt;/strong&gt; &lt;/li&gt;
&lt;li&gt;Give the integration a name. We suggest &amp;ldquo;&lt;strong&gt;Securonix&lt;/strong&gt;&amp;rdquo;.&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Add Integration&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/1pass integration.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;ul&gt;
&lt;li&gt;Supply a name for the token. We suggest &amp;ldquo;&lt;strong&gt;Securonix token&lt;/strong&gt;&amp;rdquo;.&lt;/li&gt;
&lt;li&gt;Expires After - choose &lt;strong&gt;2 years&lt;/strong&gt;. (note the screenshot below shows &amp;ldquo;never&amp;rdquo;, we do not recommend this)&lt;/li&gt;
&lt;li&gt;Events to Report - select:
&lt;ul&gt;
&lt;li&gt;Sign-in attempts&lt;/li&gt;
&lt;li&gt;Item usage events&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Issue Token&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/1pass token (1).png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;ul&gt;
&lt;li&gt;Provide SolCyber with the token via an encrypted email or onetimesecret.com&lt;/li&gt;
&lt;/ul&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/1pass token2.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;</description></item><item><title>SentinelOne</title><link>https://kb.solcyber.com/supported-data-sources-categories/antivirus-malware-edr/sentinel-one/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/antivirus-malware-edr/sentinel-one/</guid><description>&lt;ul&gt;
&lt;li&gt;Log in to the SentinelOne &lt;strong&gt;Management Console&lt;/strong&gt; using the &lt;strong&gt;Administrator&lt;/strong&gt; username for the account.&lt;/li&gt;
&lt;li&gt;Copy and save the &lt;strong&gt;URL&lt;/strong&gt; of your login.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Note:&lt;/strong&gt; The host URL information will be similar to the following: &lt;a href="https://usa-partners.sentinelone.net/"&gt;https://usa-partners.sentinelone.net/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;In the &lt;strong&gt;Management Console&lt;/strong&gt;, click &lt;strong&gt;Settings&lt;/strong&gt; &amp;gt; &lt;strong&gt;USERS&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Select your admin user account and click &lt;strong&gt;Generate API token&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%28227%29.png" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Copy and save the token&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%28217%29.png" alt="" /&gt;&lt;/p&gt;
&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; You will need to provide this token to SolCyber.&lt;/p&gt;</description></item><item><title>Crowdstrike</title><link>https://kb.solcyber.com/supported-data-sources-categories/antivirus-malware-edr/crowdstrike/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/antivirus-malware-edr/crowdstrike/</guid><description>&lt;h2 id="crowdstrike-falcon-streaming-api"&gt;CrowdStrike Falcon Streaming API&lt;a class="anchor" href="#crowdstrike-falcon-streaming-api"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Log in to Crowdstrike and then navigate to the &lt;strong&gt;Support and Resources &amp;gt; API Clients and Keys&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/Screenshot 2024-06-21 at 4.40.27 PM.png" alt="" width="407"&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;ul&gt;
&lt;li&gt;Click &lt;strong&gt;Create new API Client&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Enter a name in &lt;strong&gt;Client Name&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt; Securonix_client.&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Select the &lt;strong&gt;Read&lt;/strong&gt; right for the following options:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Detections&lt;/li&gt;
&lt;li&gt;Incidents&lt;/li&gt;
&lt;li&gt;Event streams&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Create&lt;/strong&gt;. The API client is now created.&lt;/p&gt;</description></item><item><title>DUO Security</title><link>https://kb.solcyber.com/supported-data-sources-categories/authentication-single-sign-on-user-directory/duo-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/authentication-single-sign-on-user-directory/duo-security/</guid><description>&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;Note that only administrators with the &lt;a href="https://duo.com/docs/admin-roles"&gt;Owner&lt;/a&gt; role can create or modify an Admin API application in the Duo Admin Panel.&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p&gt;Securonix supports ingestion of the following types of DUO logs:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Duo Security Administrator&lt;/li&gt;
&lt;li&gt;Duo Security Authentication&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Log in to the &lt;a href="https://admin.duosecurity.com/"&gt;Duo Admin Panel&lt;/a&gt; and navigate to &lt;strong&gt;Applications&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Protect an Application&lt;/strong&gt; and locate the entry for &lt;strong&gt;Admin API&lt;/strong&gt; in the applications list. Click &lt;strong&gt;Protect&lt;/strong&gt; to the far-right to configure the application and get your &lt;strong&gt;integration key, secret key, and API hostname&lt;/strong&gt;. You&amp;rsquo;ll need to provide these credentials to SolCyber via onetimesecret.com or other secure methods. &lt;/li&gt;
&lt;li&gt;The required permissions are:
&lt;ul&gt;
&lt;li&gt;Grant read log&lt;/li&gt;
&lt;li&gt;Grant read information&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/duo.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;</description></item><item><title>EntraID (aka Azure Active Directory) User Import</title><link>https://kb.solcyber.com/supported-data-sources-categories/authentication-single-sign-on-user-directory/azure-active-directory-user-import/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/authentication-single-sign-on-user-directory/azure-active-directory-user-import/</guid><description>&lt;ul&gt;
&lt;li&gt;Login to &lt;strong&gt;Azure&lt;/strong&gt; portal.&lt;/li&gt;
&lt;li&gt;Locate &lt;strong&gt;App registrations&lt;/strong&gt; using the &lt;strong&gt;Search&lt;/strong&gt; bar from &lt;strong&gt;Dashboard&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%28188%29.png" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Click &lt;strong&gt;New Registration&lt;/strong&gt; from the &lt;strong&gt;App registrations&lt;/strong&gt; screen to register an application.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%2868%29.png" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Provide the following details in the &lt;strong&gt;Register an application&lt;/strong&gt; screen:&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;input disabled="" type="checkbox"&gt; &lt;strong&gt;Name&lt;/strong&gt;: Securonix AzureAD Users&lt;/li&gt;
&lt;li&gt;&lt;input disabled="" type="checkbox"&gt; &lt;strong&gt;Supported account Types&lt;/strong&gt;: Select the &lt;strong&gt;Accounts in this organizational directory only&lt;/strong&gt; option.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Click &lt;strong&gt;Register&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Make a copy of &lt;strong&gt;Application (client ID)&lt;/strong&gt; and &lt;strong&gt;Directory (tenant ID)&lt;/strong&gt; for the application from the Application screen.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%28175%29.png" alt="" /&gt;&lt;/p&gt;</description></item><item><title>EntraID (AzureAD) Risky Users and Detections</title><link>https://kb.solcyber.com/supported-data-sources-categories/authentication-single-sign-on-user-directory/entraid-azuread-risky-users-and-detections/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/authentication-single-sign-on-user-directory/entraid-azuread-risky-users-and-detections/</guid><description>&lt;blockquote class='book-hint warning' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;path d="M10.29 3.86 1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z"/&gt;&lt;path d="M12 9v4"/&gt;&lt;path d="M12 17h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;ul&gt;
&lt;li&gt;An &lt;strong&gt;Azure P1 or P2&lt;/strong&gt; license is required to ingest Azure Risky Users events. &lt;/li&gt;
&lt;li&gt;An &lt;strong&gt;Azure P2&lt;/strong&gt; license is required to ingest Azure Risky Detection events.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Logon to the &lt;a href="https://portal.azure.com/"&gt;Azure portal&lt;/a&gt; as an admin and search for &lt;strong&gt;Apps registration&lt;/strong&gt; from the top search bar.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%28145%29.png" alt="" /&gt;&lt;/p&gt;</description></item><item><title>EntraID (aka Azure Active Directory) Audit/Sign In</title><link>https://kb.solcyber.com/supported-data-sources-categories/authentication-single-sign-on-user-directory/entraid-aka-azure-active-directory-audit-sign-in/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/authentication-single-sign-on-user-directory/entraid-aka-azure-active-directory-audit-sign-in/</guid><description>&lt;h1 id="ms-entra-aka-azure-active-directory-auditsign-in"&gt;MS Entra (aka Azure Active Directory) Audit/Sign In&lt;a class="anchor" href="#ms-entra-aka-azure-active-directory-auditsign-in"&gt;#&lt;/a&gt;&lt;/h1&gt;
&lt;blockquote class='book-hint warning' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;path d="M10.29 3.86 1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z"/&gt;&lt;path d="M12 9v4"/&gt;&lt;path d="M12 17h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;You must have an &lt;strong&gt;MS Entra ID P1 or P2 license&lt;/strong&gt; in order to export Entra/Azure Active Directory Sign In logs. These logs provide us visibility into all authentication attempts to Azure AD accounts and are an important source of intel in the case of compromised accounts. We recommend that customers either move to a different M365 license or, at a minimum, purchase an &lt;strong&gt;Azure P1&lt;/strong&gt; license as an add on, &lt;em&gt;especially&lt;/em&gt; if the company uses AzureAD as an IDP for Single Sign On.&lt;/p&gt;</description></item><item><title>Google Directory</title><link>https://kb.solcyber.com/supported-data-sources-categories/authentication-single-sign-on-user-directory/google-directory/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/authentication-single-sign-on-user-directory/google-directory/</guid><description>&lt;p&gt;&lt;strong&gt;Follow the documentation for Google Workspace in the Cloud Services/SaaS category:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="kb-content-card" href="https://kb.solcyber.com/supported-data-sources-categories/cloud-services-saas/google-workspace/"&gt;&lt;span class="kb-card-body"&gt;&lt;span class="kb-card-title"&gt;Google Workspace&lt;/span&gt;&lt;span class="kb-card-desc"&gt;Complete the following steps to configure the Google Workspace connection using OAuth2.0&lt;/span&gt;&lt;/span&gt;&lt;span class="kb-card-arrow" aria-hidden="true"&gt;→&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;</description></item><item><title>JumpCloudSSO</title><link>https://kb.solcyber.com/supported-data-sources-categories/authentication-single-sign-on-user-directory/jumpcloudsso/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/authentication-single-sign-on-user-directory/jumpcloudsso/</guid><description>&lt;ul&gt;
&lt;li&gt;Log in to the JumpCloud SSO portal: &lt;a href="https://console.jumpcloud.com/"&gt;https://console.jumpcloud.com&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Click the circle in the top right corner of the screen.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%2875%29.png" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Click &lt;strong&gt;API Settings&lt;/strong&gt;. Your API key will appear.&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;&lt;strong&gt;Warning:&lt;/strong&gt; Because Jumpcloud has only one API key per site, any change will stop your JumpCloud datasource from ingesting data. Please communicate this impact with your SolCyber administrators.&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;</description></item><item><title>Okta System Authentication</title><link>https://kb.solcyber.com/supported-data-sources-categories/authentication-single-sign-on-user-directory/okta-system-authentication/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/authentication-single-sign-on-user-directory/okta-system-authentication/</guid><description>&lt;ul&gt;
&lt;li&gt;Navigate to the &lt;a href="https://login.okta.com/"&gt;Okta login screen&lt;/a&gt; and sign in with your credentials.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%2840%29.png" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Click &lt;strong&gt;API &amp;gt; Tokens&lt;/strong&gt; from the navigation menu. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%2819%29.png" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Click &lt;strong&gt;Create Token&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%2856%29.png" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Enter a name for your token, then click &lt;strong&gt;Create Token&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%28235%29.png" alt="" /&gt;&lt;/p&gt;
&lt;p&gt;The token name above will be used within SNYPR when you set up the Okta connector.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Make a note of the &lt;strong&gt;Token Value&lt;/strong&gt; then click &lt;strong&gt;OK, got it&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%28124%29.png" alt="" /&gt;&lt;/p&gt;</description></item><item><title>Dropbox</title><link>https://kb.solcyber.com/supported-data-sources-categories/business-collaboration-platforms/dropbox/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/business-collaboration-platforms/dropbox/</guid><description>&lt;ul&gt;
&lt;li&gt;Visit the &lt;a href="https://www.dropbox.com/developers/apps"&gt;App Console&lt;/a&gt; tab, then follow the directions.&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Full Dropbox&lt;/strong&gt; under the Choose the type of access you need section.&lt;/li&gt;
&lt;li&gt;Copy and save the App Key.&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Show&lt;/strong&gt; to copy and save the App secret. You will need to sen the App Key and App Secret to SolCyber.&lt;/li&gt;
&lt;li&gt;In the app console under Redirect URLs add the following: &lt;em&gt;&lt;a href="https://a1t1amos.securonix.net/Snypr/connectionType/generateOauthCode"&gt;https://a1t1amos.securonix.net/Snypr/connectionType/generateOauthCode&lt;/a&gt;&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Slack</title><link>https://kb.solcyber.com/supported-data-sources-categories/business-collaboration-platforms/slack/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/business-collaboration-platforms/slack/</guid><description>&lt;h2 id="create-an-app"&gt;Create an App&lt;a class="anchor" href="#create-an-app"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;You must be logged in as the &lt;strong&gt;Owner&lt;/strong&gt; of your organization and you must have at least an &lt;strong&gt;Enterprise&lt;/strong&gt; account.&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Log in to your Slack account using the following link: &lt;a href="https://api.slack.com/apps"&gt;https://api.slack.com/apps&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click Create New App.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Provide the appropriate app name in the search bar and then select the workspace.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://documentation-be.securonix.com/bundle/securonix-cloud-user-guide/page/content/resources/images/imported/slack/1.png?%5c_LANG=enus" alt="" /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;OAuth &amp;amp; Permissions&lt;/strong&gt; from the left navigation.&lt;/p&gt;</description></item><item><title>Google Workspace</title><link>https://kb.solcyber.com/supported-data-sources-categories/cloud-services-saas/google-workspace/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/cloud-services-saas/google-workspace/</guid><description>&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; The steps described in this section are specific to Google and the configuration steps can change. Please consult Google documentation for the latest information.&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Navigate to the Google Developers Console: &lt;a href="https://console.developers.google.com/"&gt;https://console.developers.google.com&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Logon using an account with admin privileges.&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Create Project&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Enter a project name (ex: &amp;ldquo;Securonix-Logs&amp;rdquo;), select the correct organization and location.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%28100%29.png" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Click &lt;strong&gt;Create&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Select the new project that you created from the top section of the screen.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%28139%29.png" alt="" /&gt;&lt;/p&gt;</description></item><item><title>Office 365 (Azure AD, Exchange, Sharepoint, General)</title><link>https://kb.solcyber.com/supported-data-sources-categories/cloud-services-saas/office-365-azure-ad-exchange-sharepoint-general/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/cloud-services-saas/office-365-azure-ad-exchange-sharepoint-general/</guid><description>&lt;ul&gt;
&lt;li&gt;Logon to the &lt;a href="https://portal.azure.com/"&gt;Azure portal&lt;/a&gt; as an admin and search for &lt;strong&gt;Apps registration&lt;/strong&gt; from the top search bar.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%28145%29.png" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Click &lt;strong&gt;+ New registration&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%28196%29.png" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Enter the following information on the &lt;strong&gt;Register an application&lt;/strong&gt; screen:
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Name&lt;/strong&gt;: Securonix-O365&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Supported account types&lt;/strong&gt;: Accounts in this organizational directory only (Single Tenant)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%28181%29.png" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Click &lt;strong&gt;Register&lt;/strong&gt;. You will be redirected to the newly created application screen.&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;Copy the Application (client) ID and Directory (tenant) ID. &lt;strong&gt;You will need to provide these to SolCyber.&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>Salesforce (Login and EventLog)</title><link>https://kb.solcyber.com/supported-data-sources-categories/cloud-services-saas/salesforce-login-and-eventlog/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/cloud-services-saas/salesforce-login-and-eventlog/</guid><description>&lt;blockquote class='book-hint warning' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;path d="M10.29 3.86 1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z"/&gt;&lt;path d="M12 9v4"/&gt;&lt;path d="M12 17h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;Customers with &lt;em&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;&lt;/em&gt;, &lt;em&gt;&lt;strong&gt;Unlimited&lt;/strong&gt;&lt;/em&gt;, or &lt;em&gt;&lt;strong&gt;Performance&lt;/strong&gt;&lt;/em&gt; Edition Salesforce organizations will be able to onboard &lt;strong&gt;Login&lt;/strong&gt; events, but not the Salesforce EventLog, unless the Event Monitoring Add-On is purchased.&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;h2 id="create-application"&gt;Create Application&lt;a class="anchor" href="#create-application"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Log in to your Salesforce account.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%28225%29.png" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Click &lt;strong&gt;Setup&lt;/strong&gt; on the top navigation menu.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%28155%29.png" alt="" /&gt;&lt;/p&gt;</description></item><item><title>Slack (Audit)</title><link>https://kb.solcyber.com/supported-data-sources-categories/cloud-services-saas/slack-audit/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/cloud-services-saas/slack-audit/</guid><description>&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;You must be logged in as the &lt;strong&gt;Owner of your Enterprise Grid&lt;/strong&gt; organization to install the app.&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Log in to your Slack account using the following link: &lt;a href="https://api.slack.com/apps"&gt;https://api.slack.com/apps&lt;/a&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Provide the appropriate app name in the search bar, and then select the workspace.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Create New App&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Provide an app name (ex: Securonix Connector) in the search bar and then select the workspace.&lt;/p&gt;</description></item><item><title>Zoom</title><link>https://kb.solcyber.com/supported-data-sources-categories/cloud-services-saas/zoom/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/cloud-services-saas/zoom/</guid><description>&lt;h2 id="verify-admin-permissions"&gt;Verify Admin Permissions&lt;a class="anchor" href="#verify-admin-permissions"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Ensure you are a Zoom &lt;strong&gt;account admin&lt;/strong&gt; or a developer with role-based permissions to:
&lt;ul&gt;
&lt;li&gt;View/edit Server-to-Server OAuth apps&lt;/li&gt;
&lt;li&gt;Add scopes to apps&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="create-a-server-to-server-oauth-app"&gt;Create a Server-to-Server OAuth App&lt;a class="anchor" href="#create-a-server-to-server-oauth-app"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Go to the &lt;a href="https://marketplace.zoom.us"&gt;Zoom App Marketplace&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Develop&lt;/strong&gt; (top-right dropdown) &amp;gt; &lt;strong&gt;Build Server-to-Server App&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Name your app and click &lt;strong&gt;Create&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/image (240).png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;h2 id="configure-app-credentials"&gt;Configure App Credentials&lt;a class="anchor" href="#configure-app-credentials"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Under &lt;strong&gt;App Credentials&lt;/strong&gt;, copy the:
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Account ID&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Client ID&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Client Secret&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;You will need to provide these credentials to SolCyber.&lt;/p&gt;</description></item><item><title>AWS Cloudtrail</title><link>https://kb.solcyber.com/supported-data-sources-categories/cloud-services-application/aws-cloudtrail/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/cloud-services-application/aws-cloudtrail/</guid><description>&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;If you already have your Cloud Trail configured, please skip to the &amp;ldquo;&lt;strong&gt;Creating a New SQS&lt;/strong&gt;&amp;rdquo; section.&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;h2 id="creating-a-cloud-trail-configuration"&gt;Creating a Cloud Trail configuration&lt;a class="anchor" href="#creating-a-cloud-trail-configuration"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Access your AWS Console and select the Cloud Trail service.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Create trail&lt;/strong&gt;&lt;/p&gt;
&lt;figure&gt;&lt;img src="https://documentation.securonix.com/onlinedoc/Content/Connectors/content/resources/images/imported/aws_cloudtrail/create%20cloudtrail_thumb_850_0.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Enter the name you want to provide for this trail in the Trail Name field.&lt;/p&gt;
&lt;figure&gt;&lt;img src="https://documentation.securonix.com/onlinedoc/Content/Connectors/content/resources/images/imported/aws_cloudtrail/create%20cloudtrail2_thumb_850_0.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select Enable for all accounts in my organization if you have multiple accounts.&lt;/p&gt;</description></item><item><title>Azure Monitor</title><link>https://kb.solcyber.com/supported-data-sources-categories/cloud-services-application/azure-monitor/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/cloud-services-application/azure-monitor/</guid><description>&lt;h2 id="register-an-azure-active-directory-application"&gt;Register an Azure Active Directory Application &lt;a href="#register_an_azure_active_directory_application" id="register_an_azure_active_directory_application"&gt;&lt;/a&gt;&lt;a class="anchor" href="#register-an-azure-active-directory-application"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Open Azure Active Directory in the Azure Portal.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click App registrations.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click New Registration.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://documentation-be.securonix.com/bundle/securonix-cloud-user-guide/page/content/resources/images/active-deployment-guides/microsoft/applocker-azureloganalytics1.png?_LANG=enus" alt="" /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Provide an appropriate name and select Single tenant as the account scope.&lt;/p&gt;
&lt;p&gt;Capture the Application Name, as it will be used in the next steps.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click Register.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click on the new application created in the App registration Page.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Copy Client ID and Tenant ID.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Create an API access key using the following steps:&lt;/p&gt;</description></item><item><title>Google Cloud Platform (GCP)</title><link>https://kb.solcyber.com/supported-data-sources-categories/cloud-services-application/google-cloud-platform-gcp/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/cloud-services-application/google-cloud-platform-gcp/</guid><description>&lt;h2 id="create-a-log-sink-destination"&gt;Create a Log Sink Destination&lt;a class="anchor" href="#create-a-log-sink-destination"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;h3 id="create-a-new-project-that-will-house-the-log-sink"&gt;Create a new project that will house the Log Sink&lt;a class="anchor" href="#create-a-new-project-that-will-house-the-log-sink"&gt;#&lt;/a&gt;&lt;/h3&gt;
&lt;p&gt;1. In the Google Cloud console, go to &lt;strong&gt;Menu&lt;/strong&gt; &amp;gt; &lt;strong&gt;IAM &amp;amp; Admin&lt;/strong&gt; &amp;gt; &lt;strong&gt;Create a Project&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;2. In the &lt;strong&gt;Project Name&lt;/strong&gt; field, enter a descriptive name for your project. We suggest &amp;ldquo;SolCyber Log Sink&amp;rdquo;&lt;/p&gt;
&lt;p&gt;3. In the &lt;strong&gt;Location&lt;/strong&gt; field, click &lt;strong&gt;Browse&lt;/strong&gt; to display potential locations for your project. Then, click &lt;strong&gt;Select&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;4. Click &lt;strong&gt;Create&lt;/strong&gt;. The Google Cloud console navigates to the Dashboard page and your project is created within a few minutes.&lt;/p&gt;</description></item><item><title>Data Loss Prevention</title><link>https://kb.solcyber.com/supported-data-sources-categories/data-loss-prevention/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/data-loss-prevention/</guid><description>&lt;ul&gt;
&lt;li&gt;Microsoft Office 365 DLP&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Cisco Umbrella (DNS)</title><link>https://kb.solcyber.com/supported-data-sources-categories/dns-dhcp/cisco-umbrella-dns/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/dns-dhcp/cisco-umbrella-dns/</guid><description>&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Log into Umbrella with the following URL: &lt;a href="https://dashboard.umbrella.com/"&gt;https://dashboard.umbrella.com/&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Obtain your organization ID directly from the Umbrella dashboard after you log in to that particular organization. &lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;Example:&lt;/strong&gt; If &lt;a href="https://dashboard.umbrella.com/o/1331454/#/overview"&gt;https://dashboard.umbrella.com/o/1331454/#/overview&lt;/a&gt; is the URL, then 1331454 is your organization ID .&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://documentation-be.securonix.com/bundle/securonix-cloud-user-guide/page/content/resources/images/cisco-umbella-v2-3.png?%5c_LANG=enus" alt="" /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Navigate to Admin &amp;gt; API Keys.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://documentation-be.securonix.com/bundle/securonix-cloud-user-guide/page/content/resources/images/cisco-umbella-v2-4.png?%5c_LANG=enus" alt="" /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select the Legacy keys tile section and, then click on the Umbrella Reporting section.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://documentation-be.securonix.com/bundle/securonix-cloud-user-guide/page/content/resources/images/cisco-umbella-v2-5.png?%5c_LANG=enus" alt="" /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select on Generate Token.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://documentation-be.securonix.com/bundle/securonix-cloud-user-guide/page/content/resources/images/cisco-umbella-v2-6.png?%5c_LANG=enus" alt="" /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Copy your Key &amp;amp; Secret and send to SolCyber via protected means such as an encrypted email or a tool like onetimesecret.com.&lt;/p&gt;</description></item><item><title>AWS Guard Duty</title><link>https://kb.solcyber.com/supported-data-sources-categories/ids-ips-utm-threat-detection/aws-guard-duty/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/ids-ips-utm-threat-detection/aws-guard-duty/</guid><description>&lt;h2 id="retrieve-the-detector-id"&gt;Retrieve the Detector ID &lt;a href="#retrieve_the_detector_id" id="retrieve_the_detector_id"&gt;&lt;/a&gt;&lt;a class="anchor" href="#retrieve-the-detector-id"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;To find the &lt;code&gt;detectorId&lt;/code&gt; in the current Region, see the &lt;em&gt;&lt;strong&gt;Settings&lt;/strong&gt;&lt;/em&gt; page in the GuardDuty console, or run the &lt;a href="https://docs.aws.amazon.com/guardduty/latest/APIReference/API_ListDetectors.html"&gt;ListDetectors&lt;/a&gt; API.&lt;/p&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/Screenshot 2025-08-21 at 11.54.05 AM.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;p&gt;You will need to provide the &lt;strong&gt;detectorID&lt;/strong&gt; to SolCyber.&lt;/p&gt;
&lt;h2 id="authorize-the-iam-user"&gt;Authorize the IAM User &lt;a href="#authoriz" id="authoriz"&gt;&lt;/a&gt;&lt;a class="anchor" href="#authorize-the-iam-user"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Create an IAM service account to user for Securonix log ingestion. You may already have one if you have previously configured CloudTrail logs for Securonix.&lt;/li&gt;
&lt;li&gt;Authorize the IAM User using the steps under &lt;a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_change-permissions.html"&gt;Change permissions for an IAM user&lt;/a&gt;. When prompted during the configuration, attach the &lt;code&gt;AmazonGuardDutyReadOnlyAccess&lt;/code&gt; AWS managed policies to the authorized user.&lt;/li&gt;
&lt;li&gt;Copy and save the &lt;strong&gt;Secret Key&lt;/strong&gt;, and &lt;strong&gt;Access ID&lt;/strong&gt; and provide these values to SolCyber.&lt;/li&gt;
&lt;/ol&gt;</description></item><item><title>Azure Security Center</title><link>https://kb.solcyber.com/supported-data-sources-categories/ids-ips-utm-threat-detection/azure-security-center/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/ids-ips-utm-threat-detection/azure-security-center/</guid><description>&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Open the &lt;strong&gt;Azure Active Directory&lt;/strong&gt; resource in the Azure Portal.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;App registrations&lt;/strong&gt; &amp;gt; &lt;strong&gt;New Registration&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://documentation-be.securonix.com/bundle/securonix-cloud-user-guide/page/content/resources/images/active-deployment-guides/microsoft/azure-identity-protection-1.png?_LANG=enus" alt="" /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Provide a name, and select the account scope to Single tenant.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Register&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click on the new application created on the App registration screen.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Copy the &lt;strong&gt;Client ID&lt;/strong&gt; and &lt;strong&gt;Tenant ID&lt;/strong&gt;, and then click &lt;strong&gt;View API permissions&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://documentation-be.securonix.com/bundle/securonix-cloud-user-guide/page/content/resources/images/active-deployment-guides/microsoft/azure-identity-protection-2.png?_LANG=enus" alt="" /&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Add a permission&lt;/strong&gt;, and then click the &lt;strong&gt;Microsoft Graph API&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://documentation-be.securonix.com/bundle/securonix-cloud-user-guide/page/content/resources/images/active-deployment-guides/microsoft/azure-identity-protection-3.png?_LANG=enus" alt="" /&gt;&lt;/p&gt;</description></item><item><title>Azure Firewall</title><link>https://kb.solcyber.com/supported-data-sources-categories/network/azure-firewall/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/network/azure-firewall/</guid><description>&lt;h2 id="create-an-azure-event-hub-namespace-and-event-hub"&gt;&lt;strong&gt;Create an Azure Event Hub Namespace and Event Hub&lt;/strong&gt;&lt;a class="anchor" href="#create-an-azure-event-hub-namespace-and-event-hub"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Azure Portal&lt;/strong&gt;: Navigate to the Azure Portal.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Create a Namespace&lt;/strong&gt;: Search for &amp;ldquo;Event Hubs&amp;rdquo; and create a new Event Hub namespace.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Create an Event Hub&lt;/strong&gt;: Within the namespace, create an Event Hub (e.g., &amp;ldquo;firewall-logs&amp;rdquo;).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="configure-azure-firewall-to-send-logs-to-event-hub"&gt;&lt;strong&gt;Configure Azure Firewall to Send Logs to Event Hub&lt;/strong&gt;&lt;a class="anchor" href="#configure-azure-firewall-to-send-logs-to-event-hub"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Azure Firewall Policy&lt;/strong&gt;: Go to the Azure Firewall policy associated with your firewall.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Diagnostic Settings&lt;/strong&gt;: Under &amp;ldquo;Diagnostics&amp;rdquo;, create a new diagnostic setting.&lt;/p&gt;</description></item><item><title>Cisco ASA</title><link>https://kb.solcyber.com/supported-data-sources-categories/network/cisco-asa/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/network/cisco-asa/</guid><description>&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;&lt;strong&gt;NOTE: Be sure to make a backup of your current ASA configuration before performing any changes.&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;h2 id="configure-logging-using-the-asdm-gui"&gt;Configure logging using the ASDM GUI&lt;a class="anchor" href="#configure-logging-using-the-asdm-gui"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Ensure logging is enabled. Visit &lt;strong&gt;Configuration &amp;gt; Features &amp;gt; Properties &amp;gt; Logging &amp;gt; Logging Setup&lt;/strong&gt;. Check the &lt;strong&gt;Enable logging&lt;/strong&gt; check box in order to enable syslog output.&lt;/li&gt;
&lt;/ul&gt;
&lt;figure&gt;&lt;img src="https://www.cisco.com/c/dam/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00-00.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;ul&gt;
&lt;li&gt;Configure the external Syslog Server: Choose &lt;strong&gt;Syslog Servers&lt;/strong&gt; under Logging and click &lt;strong&gt;Add&lt;/strong&gt; in order to add a syslog server. Enter the &lt;strong&gt;IP of your Remote Ingestion Node (RIN)&lt;/strong&gt;, choose &lt;strong&gt;UDP&lt;/strong&gt;, and enter &lt;strong&gt;1514 (or another port if instructed by SolCyber)&lt;/strong&gt; in the Add Syslog Server box and choose &lt;strong&gt;OK&lt;/strong&gt; when you are done. Be sure to leave &amp;ldquo;Log messages in Cisco EMBLEM format&amp;rdquo; unchecked.&lt;/li&gt;
&lt;/ul&gt;
&lt;figure&gt;&lt;img src="https://www.cisco.com/c/dam/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00-01.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;ul&gt;
&lt;li&gt;Enable Log Sending: choose &lt;strong&gt;Logging Filters&lt;/strong&gt; in the logging section. This presents you with each possible logging destination and the current level of logs that are sent to those destinations. Choose Syslog Servers and click &lt;strong&gt;Edit&lt;/strong&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;figure&gt;&lt;img src="https://www.cisco.com/c/dam/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00-06.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;ul&gt;
&lt;li&gt;Select &lt;strong&gt;Filter on Severity&lt;/strong&gt; and &lt;strong&gt;Informational&lt;/strong&gt;. Click OK.&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Apply&lt;/strong&gt; - this will apply the new settings. If you experience any issues with connectivity after applying the new config, revert to your backup config.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="configure-logging-using-the-cli"&gt;Configure Logging Using the CLI&lt;a class="anchor" href="#configure-logging-using-the-cli"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;div class="kb-code" data-lang="text"&gt;
 &lt;div class="kb-code-head"&gt;
 &lt;span class="kb-code-lang"&gt;text&lt;/span&gt;&lt;/div&gt;&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#e6edf3;background-color:#0d1117;-moz-tab-size:2;-o-tab-size:2;tab-size:2;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-text" data-lang="text"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;logging enable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;logging host &amp;lt;interface_name&amp;gt; &amp;lt;sensor_ip&amp;gt; udp
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;logging permit-hostdown
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;logging timestamp
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;logging device-id hostname
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;no logging emblem&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;
&lt;p&gt;The &amp;lt;interface_name&amp;gt; argument specifies the interface through which you access your Remote Ingestion Node (RIN). The sensor_ip argument specifies the IP address of the RIN.&lt;/p&gt;</description></item><item><title>Fortinet FortiGate</title><link>https://kb.solcyber.com/supported-data-sources-categories/network/fortinet-fortigate/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/network/fortinet-fortigate/</guid><description>&lt;blockquote class='' &gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;&lt;strong&gt;NOTE: Be sure to make a backup of your current FortiGate configuration before performing any changes.&lt;/strong&gt; From the GUI: &lt;strong&gt;System &amp;gt; Configuration &amp;gt; Backup&lt;/strong&gt;. From the CLI: &lt;code&gt;execute backup config flash &amp;lt;revision-comment&amp;gt;&lt;/code&gt;.&lt;/p&gt;

&lt;/div&gt;
&lt;/blockquote&gt;
&lt;h2 id="configure-logging-using-the-cli"&gt;Configure Logging Using the CLI&lt;a class="anchor" href="#configure-logging-using-the-cli"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;div class="kb-code" data-lang="text"&gt;
 &lt;div class="kb-code-head"&gt;
 &lt;span class="kb-code-lang"&gt;text&lt;/span&gt;&lt;/div&gt;&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#e6edf3;background-color:#0d1117;-moz-tab-size:2;-o-tab-size:2;tab-size:2;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-text" data-lang="text"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;config log syslogd setting
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set status enable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set server &amp;#34;&amp;lt;INGESTER_IP&amp;gt;&amp;#34;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set port &amp;lt;Solcyber will provide you with the specifc port to use&amp;gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set mode udp
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set facility local7
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set format cef
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set enc-algorithm disable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;end
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;config log syslogd filter
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set severity information
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set forward-traffic enable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set local-traffic enable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set multicast-traffic enable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set sniffer-traffic enable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set anomaly enable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set voip enable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set filter-type include
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;end
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;config log eventfilter
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set event enable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set system enable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set vpn enable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set user enable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set router enable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set wireless-activity enable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set endpoint enable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set ha enable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set compliance-check enable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt; set security-rating enable
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;end&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;
&lt;p&gt;To log allowed traffic on an existing firewall policy from the CLI:&lt;/p&gt;</description></item><item><title>SonicWall Firewall</title><link>https://kb.solcyber.com/supported-data-sources-categories/network/sonicwall-firewall/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/network/sonicwall-firewall/</guid><description>&lt;blockquote class='book-hint warning' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;path d="M10.29 3.86 1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z"/&gt;&lt;path d="M12 9v4"/&gt;&lt;path d="M12 17h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;&lt;strong&gt;Pre-requisites:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Must have GMS server or On-Prem Analytics server installed and configured.&lt;/li&gt;
&lt;li&gt;Have an Address Object Created on the Firewall for SonicWall Analytics system.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Navigate to &lt;strong&gt;Device &amp;gt; Log &amp;gt; Syslog&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;Syslog Servers&lt;/strong&gt; and Click &lt;strong&gt;Add&lt;/strong&gt;&lt;/p&gt;
&lt;figure&gt;&lt;img src="https://sonicwall.rightanswers.com/portal/app/portlets/results/onsitehypermedia/090210909738018.png?linkToken=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJpc3MiOiJzb25pY3dhbGwiLCJpYXQiOjE3NDE3MDg3ODksImV4cCI6MTc3MzI0NDc4OX0.OOycVRsZRZ414MC21NZIxQm7FHwaI__DvMripkeY-j8" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select the Name or IP address of the Syslog server from the dropdown. Enter the port provided by SolCyber.&lt;/p&gt;</description></item><item><title>Cisco Meraki Firewall Syslog</title><link>https://kb.solcyber.com/supported-data-sources-categories/network/cisco-meraki-firewall-syslog/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/network/cisco-meraki-firewall-syslog/</guid><description>&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Go to &lt;strong&gt;Network-wide&lt;/strong&gt; &amp;gt; &lt;strong&gt;Configure&lt;/strong&gt; &amp;gt; &lt;strong&gt;General&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Add a syslog server&lt;/strong&gt; to define a new server. &lt;/p&gt;
&lt;p&gt;&lt;img src="https://documentation-be.securonix.com/bundle/securonix-cloud-user-guide/page/content/resources/images/imported/cisco%5c_meraki/1.png?%5c_LANG=enus" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Server IP&lt;/strong&gt;: The Securonix Hub IP address.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Port:&lt;/strong&gt; generally, we will use udp port &lt;strong&gt;1514&lt;/strong&gt;. The SolCyber team may specify another port to use if 1514 is already in use on the Hub. &lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Roles:&lt;/strong&gt; The roles to send to the server.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Choose the type of events to export:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Event Log&lt;/strong&gt;: The messages from the dashboard under Monitor &amp;gt; Event Log.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Flows&lt;/strong&gt;: Inbound and outbound traffic flow-generated syslog messages that include the source, destination, and port numbers.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;URL:&lt;/strong&gt; HTTP GET requests generating syslog entries.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;</description></item><item><title>Microsoft Windows</title><link>https://kb.solcyber.com/supported-data-sources-categories/operating-system/microsoft-windows/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/operating-system/microsoft-windows/</guid><description>&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;&lt;strong&gt;Note 1:&lt;/strong&gt; A Remote Ingestion Node (RIN) is required to receive Windows logs. &lt;br&gt;
&lt;br&gt;
&lt;strong&gt;Note 2:&lt;/strong&gt; If you already have a Windows Event Forwarding infrastructure in place, please work with the SolCyber SOC to devise the best method to ship and ingest your Windows logs.&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;h2 id="install-nxlog"&gt;Install NXLog&lt;a class="anchor" href="#install-nxlog"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;NXLog is an open-source, lightweight log shipper. We will use NXlogs to send your Windows security logs to the RIN via syslog.&lt;/p&gt;</description></item><item><title>GitHub</title><link>https://kb.solcyber.com/supported-data-sources-categories/source-code-repository/github/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/source-code-repository/github/</guid><description>&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;SolCyber will provide you will a webhook URL to use.&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Login to Github and select your organization under which all the repositories are available.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Go to the &lt;strong&gt;Settings&lt;/strong&gt; page for the organization that needs to be monitored.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select &lt;strong&gt;Webhooks &amp;gt; Add Webhook&lt;/strong&gt; from the left section of the screen.&lt;br&gt;&lt;/p&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/image (36) (1).png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Enter the webhook URL, select &amp;ldquo;Enable SSL verification&amp;rdquo; and select &amp;ldquo;Send me everything.&amp;rdquo;&lt;/p&gt;</description></item><item><title>Web Application Firewall</title><link>https://kb.solcyber.com/supported-data-sources-categories/web-application-firewall/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/web-application-firewall/</guid><description>&lt;ul&gt;
&lt;li&gt;F5 Networks F5ASM Web Application Firewall&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Web Proxy</title><link>https://kb.solcyber.com/supported-data-sources-categories/web-proxy/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/web-proxy/</guid><description>&lt;ul&gt;
&lt;li&gt;Squid Proxy&lt;/li&gt;
&lt;li&gt;ZscalerProxy&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Web Server</title><link>https://kb.solcyber.com/supported-data-sources-categories/web-server/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/web-server/</guid><description>&lt;ul&gt;
&lt;li&gt;Apache Software Foundation Webserver&lt;/li&gt;
&lt;li&gt;Microsoft IIS Server&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Data Source Token Renewal</title><link>https://kb.solcyber.com/supported-data-sources-categories/data-source-token-renewal/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/supported-data-sources-categories/data-source-token-renewal/</guid><description>&lt;p&gt;During the onboarding process for your SolCyber service, authentication was set up to allow SolCyber to receive your identity provider logs. Theses tokens are usually set to expire two years after set up. In order to ensure that log ingestion does not lapse, you will need to provide SolCyber with a new token before the existing token expires.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h2 id="office365azure-active-directory"&gt;Office365/Azure Active Directory&lt;a class="anchor" href="#office365azure-active-directory"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Visit the &lt;a href="https://portal.azure.com/#view/Microsoft%5c_AAD%5c_IAM/ActiveDirectoryMenuBlade/%5c~/RegisteredApps"&gt;MS Entra App Registrations&lt;/a&gt; section of the Azure admin portal.&lt;/li&gt;
&lt;li&gt;Select All applications&lt;/li&gt;
&lt;li&gt;Search for the following apps:&lt;/li&gt;
&lt;/ol&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/Screenshot 2024-03-22 at 11.32.08 AM.png" alt=""&gt;&lt;figcaption&gt;&lt;p&gt;Note: the apps your org created may not have the exact same names, but they should be similar to this&lt;/p&gt;</description></item><item><title>Guide to DMARC, DKIM, and SPF</title><link>https://kb.solcyber.com/email-security-setup-guides/guide-to-dmarc-dkim-and-spf/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/email-security-setup-guides/guide-to-dmarc-dkim-and-spf/</guid><description>&lt;p&gt;This article aims to provide a complete guide to implementing SPF, DKIM, and DMARC for your organization, and suggest the best practices for doing so. It is written in hopes that this will clear up confusion about what steps to take to achieve an effective DMARC deployment to secure business email and improve email deliverability.&lt;/p&gt;
&lt;p&gt;A quick rundown on benefits of implementing SPF, DKIM, and DMARC:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;stops email spoofing/phishing from your domain;&lt;/li&gt;
&lt;li&gt;provides important information about the emails you sent, which can be used get all legitimate emails properly authenticated;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://dmarcly.com/blog/why-are-my-emails-going-to-spam-junk-instead-of-inbox-check-dmarc"&gt;improves sender reputation and email deliverability&lt;/a&gt;; your legitimate emails are more likely to reach the inbox.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Target audience: marketers, brand owners, domain owners, domain administrators, IT administrators, etc. and anyone who wants to prevent attackers from sending malicious emails using their domains.&lt;/p&gt;</description></item><item><title>O365 Email Security Deployment and Configuration Guide</title><link>https://kb.solcyber.com/email-security-setup-guides/o365-email-security-deployment-and-configuration-guide/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/email-security-setup-guides/o365-email-security-deployment-and-configuration-guide/</guid><description>&lt;p&gt;Phishing is the root cause of 95% of security breaches that lead to financial loss and brand damage. SolCyber uses Cloudflare Email Security (&lt;em&gt;formerly Area1&lt;/em&gt;), a cloud based service that stops phishing attacks, the #1 cybersecurity threat, across all traffic vectors - email, web and network.&lt;/p&gt;
&lt;p&gt;With globally distributed sensors &amp;amp; comprehensive attack analytics, Cloudflare Email Security proactively identifies phishing campaigns, attacker infrastructure, and attack delivery mechanisms during the earliest stages of a phishing attack cycle. Using flexible enforcement platforms, Cloudflare Email Security allows customers to take preemptive action against these targeted phishing attacks across all vectors - email, web and network; either at the edge or in the cloud.&lt;/p&gt;</description></item><item><title>Google Workspace Email Security Deployment and Configuration Guide</title><link>https://kb.solcyber.com/email-security-setup-guides/google-workspace-email-security-deployment-and-configuration-guide/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/email-security-setup-guides/google-workspace-email-security-deployment-and-configuration-guide/</guid><description>&lt;p&gt;Phishing is the root cause of 95% of security breaches that lead to financial loss and brand damage. SolCyber uses Cloudflare Email Security (&lt;em&gt;formerly Area1&lt;/em&gt;), a cloud based service that stops phishing attacks, the #1 cybersecurity threat, across all traffic vectors - email, web and network.&lt;/p&gt;
&lt;p&gt;With globally distributed sensors &amp;amp; comprehensive attack analytics, Cloudflare Email Security proactively identifies phishing campaigns, attacker infrastructure, and attack delivery mechanisms during the earliest stages of a phishing attack cycle. Using flexible enforcement platforms, Cloudflare Email Security allows customers to take preemptive action against these targeted phishing attacks across all vectors - email, web and network; either at the edge or in the cloud.&lt;/p&gt;</description></item><item><title>PhishArm Button Deployment: Office365</title><link>https://kb.solcyber.com/email-security-setup-guides/phisharm-button-deployment-office365/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/email-security-setup-guides/phisharm-button-deployment-office365/</guid><description>&lt;p&gt;The PhishArm button (provided by Right-Hand Cybersecurity) is used to report suspicious email directly to the SolCyber SOC. The reported email will be sent as an attachment to the SolCyber SOC. The email will also be moved to the user&amp;rsquo;s junk folder.&lt;/p&gt;
&lt;h2 id="admin-configuration"&gt;Admin Configuration&lt;a class="anchor" href="#admin-configuration"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Login to your domain &lt;strong&gt;Admin center&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Go to &lt;strong&gt;Settings&lt;/strong&gt; - Click &lt;strong&gt;Integrated Apps&lt;/strong&gt; and Choose &lt;strong&gt;Upload Custom apps&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/Screenshot_2021-03-24_at_4.48.37_PM%20%281%29.png" alt="" /&gt;&lt;/p&gt;
&lt;p&gt;Under &lt;strong&gt;Deploy New App&lt;/strong&gt; select &lt;strong&gt;Choose how to upload app&lt;/strong&gt; Upload manifest File(.xml) provided to you by SolCyber.&lt;/p&gt;</description></item><item><title>PhishArm Add-in Deployment: Google Workspace</title><link>https://kb.solcyber.com/email-security-setup-guides/phisharm-add-in-deployment-google-workspace/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/email-security-setup-guides/phisharm-add-in-deployment-google-workspace/</guid><description>&lt;p&gt;The PhishArm plug-in (provided by Right-Hand Cybersecurity) is used to report suspicious email directly to the SolCyber SOC. The reported email will be sent as an attachment to the SolCyber SOC. The email will also be moved to the user&amp;rsquo;s spam folder.&lt;/p&gt;
&lt;h2 id="install-phisharm-plug-in-for-entire-domain-or-specific-ous"&gt;Install Phisharm Plug-in For Entire Domain (or specific OUs)&lt;a class="anchor" href="#install-phisharm-plug-in-for-entire-domain-or-specific-ous"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Log in to the &lt;a href="https://admin.google.com"&gt;Google Workspace Admin portal&lt;/a&gt;. In the left-hand menu, click &lt;strong&gt;Apps &amp;gt; Google Workspace Marketplace Apps &amp;gt; Apps List.&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>Utilizing the BEC List</title><link>https://kb.solcyber.com/email-security-setup-guides/utilizing-the-bec-list/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/email-security-setup-guides/utilizing-the-bec-list/</guid><description>&lt;p&gt;Area1&amp;rsquo;s BEC (Business Email Compromise) list provides an additional layer of security to complement your email protection measures protects against these attacks by adding an attribute to any spoofed email messages matching the email addresses you provide. It serves as a valuable tool in identifying potential attackers attempting to impersonate high-level executives within an organization, with the intention of triggering malicious actions.&lt;/p&gt;
&lt;h2 id="what-is-business-email-compromise"&gt;What is Business Email Compromise?&lt;a class="anchor" href="#what-is-business-email-compromise"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;BEC emails are a major concern for most companies, as they employ sophisticated phishing techniques that &lt;strong&gt;do not rely on typical indicators of malicious messages such as links or attachments&lt;/strong&gt;. Instead, these emails &lt;strong&gt;exploit the power dynamics within a company by using the names of key individuals, esteemed customers, and even board members to deceive employees into carrying out fraudulent activities&lt;/strong&gt;, such as unauthorized money transfers.&lt;/p&gt;</description></item><item><title>Text Add-Ons for Spoofs</title><link>https://kb.solcyber.com/email-security-setup-guides/text-add-ons-for-spoofs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/email-security-setup-guides/text-add-ons-for-spoofs/</guid><description>&lt;p&gt;Sometimes, emails identified as suspicious can be legitimate. This is a common case for emails that are flagged as a &lt;strong&gt;SPOOF&lt;/strong&gt;. SolCyber does not quarantine emails labeled as &amp;ldquo;SPOOF&amp;rdquo;, however, we do recommend that customers add an extra layer of protection by enabling an optional add-on.&lt;/p&gt;
&lt;p&gt;These text add-ons display in the subject and/or body of an email when a user receives an email that has been determined to be a “classic” SPOOF by Area1. &lt;/p&gt;</description></item><item><title>Windows Agent Installation</title><link>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/windows-agent-installation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/windows-agent-installation/</guid><description>&lt;blockquote class='book-hint warning' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;path d="M10.29 3.86 1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z"/&gt;&lt;path d="M12 9v4"/&gt;&lt;path d="M12 17h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;Installation of Windows agent version &lt;strong&gt;23.4 and above&lt;/strong&gt; DOES NOT require a system reboot. &lt;/p&gt;
&lt;p&gt;If you are installing any agent version before 23.4, a system reboot is required to complete installation.&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;h2 id="install-with-interactive-gui-wizard"&gt;Install with interactive GUI wizard&lt;a class="anchor" href="#install-with-interactive-gui-wizard"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Run the installation package and enter the Site Token when prompted in the installation wizard.&lt;/p&gt;</description></item><item><title>MacOS - Manual Installation</title><link>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/macos-agent-installation/macos-manual-installation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/macos-agent-installation/macos-manual-installation/</guid><description>&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;No reboot is required for installation on macOS endpoints&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;h2 id="step-one-install-the-agent"&gt;Step One: Install the Agent&lt;a class="anchor" href="#step-one-install-the-agent"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;h3 id="option-1-install-using-the-command-line"&gt;Option 1: Install using the command line&lt;a class="anchor" href="#option-1-install-using-the-command-line"&gt;#&lt;/a&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Save the Site Token in a plain text file in a folder named &lt;code&gt;/tmp&lt;/code&gt; along with the Installer package.
&lt;ul&gt;
&lt;li&gt;Name the Token file: &lt;strong&gt;com.sentinelone.registration-token&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Run the installer. Example:
&lt;ul&gt;
&lt;li&gt;$ &lt;code&gt;sudo /usr/sbin/installer -pkg Desktop/tmp/SentinelXXXX.pkg -target /Library/&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="option-2-install-using-the-gui-wizard"&gt;Option 2: Install using the GUI Wizard&lt;a class="anchor" href="#option-2-install-using-the-gui-wizard"&gt;#&lt;/a&gt;&lt;/h3&gt;
&lt;p&gt;Run the installation package and enter Site Token when prompted in the installation wizard.&lt;/p&gt;</description></item><item><title>MacOS - Installation with MDM Tools</title><link>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/macos-agent-installation/macos-installation-with-mdm-tools/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/macos-agent-installation/macos-installation-with-mdm-tools/</guid><description>&lt;p&gt;SentinelOne officially tests the installation and management of the macOS Agent only with Jamf and Workspace ONE. If you use a different MDM solution, make sure that the MDM solution supports these features:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Deployment of macOS .pkg.&lt;/li&gt;
&lt;li&gt;Deployment of macOS system configuration profiles.&lt;/li&gt;
&lt;li&gt;Deployment of admin-configured tool/script.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="agent-installation"&gt;Agent Installation&lt;a class="anchor" href="#agent-installation"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;You will likely need to push a script to deploy the MacOS SentinelOne agent, since a site token is required. Please refer to your MDM documentation, or contact the vendor support for guidance on the best way to install the agent. Below is a sample script.&lt;/p&gt;</description></item><item><title>MacOS - Installation with Jamf</title><link>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/macos-agent-installation/macos-installation-with-jamf/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/macos-agent-installation/macos-installation-with-jamf/</guid><description>&lt;h2 id="installing-a-package-with-jamf"&gt;&lt;strong&gt;Installing a Package with Jamf&lt;/strong&gt;&lt;a class="anchor" href="#installing-a-package-with-jamf"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Launch Jamf and log in.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click Settings &amp;gt; &lt;strong&gt;Computer Management&lt;/strong&gt; &amp;gt; Packages.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click +New.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Upload the SentinelOne Agent PKG file to Jamf.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Set the Category to &lt;strong&gt;Packages&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click Save.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click Settings &amp;gt; &lt;strong&gt;Computer Management&lt;/strong&gt; &amp;gt; Scripts.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Enter these lines, with your values for the Site or Group &lt;em&gt;Token&lt;/em&gt; and &lt;em&gt;SentinelAgent_macos_version.pkg&lt;/em&gt;:&lt;/p&gt;
&lt;div class="kb-code" data-lang="text"&gt;
 &lt;div class="kb-code-head"&gt;
 &lt;span class="kb-code-lang"&gt;text&lt;/span&gt;&lt;/div&gt;&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#e6edf3;background-color:#0d1117;-moz-tab-size:2;-o-tab-size:2;tab-size:2;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-text" data-lang="text"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;sudo echo &amp;#34;token&amp;#34; &amp;gt; /Library/Application\ Support/JAMF/Waiting\ Room/com.sentinelone.registration-token
&lt;/span&gt;&lt;/span&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;sudo /usr/sbin/installer -pkg /Library/Application\ Support/JAMF/Waiting\ Room/SentinelAgent_macos_version.pkg -target /&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>Linux Agent Installation</title><link>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/linux-agent-installation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/linux-agent-installation/</guid><description>&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;&lt;em&gt;&lt;strong&gt;No reboot is required for installation on Linux endpoints&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;h2 id="option-1-deploy-agent-with-a-configuration-file"&gt;Option 1: Deploy Agent with a Configuration File&lt;a class="anchor" href="#option-1-deploy-agent-with-a-configuration-file"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;Version 21.5+ of the Linux Agent supports an easier deployment. Rather than run the commands to install, associate, activate, and then set a proxy (if applicable), you can set one configuration file to use these variables.&lt;/p&gt;
&lt;p&gt;1. Create a configuration file with the installation parameters, each on a separate line.&lt;/p&gt;</description></item><item><title>Supported Operating Systems</title><link>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/supported-operating-systems/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/supported-operating-systems/</guid><description>&lt;h2 id="windows"&gt;Windows&lt;a class="anchor" href="#windows"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;h3 id="microsoft-windows-operating-system-versions"&gt;Microsoft Windows Operating System Versions&lt;a class="anchor" href="#microsoft-windows-operating-system-versions"&gt;#&lt;/a&gt;&lt;/h3&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Windows OS&lt;/th&gt;
 &lt;th&gt;Details&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;Windows Server Core&lt;/td&gt;
 &lt;td&gt;2019, 2016, 2012&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Windows Server&lt;/td&gt;
 &lt;td&gt;2022, 2019, 2016, 2012 R2, 2012, 2008 R2 SP1&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Windows Storage Server&lt;/td&gt;
 &lt;td&gt;2016, 2012 R2, 2012&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Windows 7 SP1, 8, 8.1, 10, 11&lt;/td&gt;
 &lt;td&gt;32/64-bit&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 id="minimum-hardware-requirements"&gt;Minimum Hardware Requirements&lt;a class="anchor" href="#minimum-hardware-requirements"&gt;#&lt;/a&gt;&lt;/h3&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Minimum&lt;/th&gt;
 &lt;th&gt;Recommended&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;1 GHz CPU or better&lt;/td&gt;
 &lt;td&gt;Dual-core. You can install on a single-core CPU, but performance will not be optimal.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;1 GB RAM or more&lt;/td&gt;
 &lt;td&gt;3 GB recommended&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;2 GB free disk space on the Windows partition&lt;/td&gt;
 &lt;td&gt;If you are taking VSS snapshots, add an additional 10%.&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;blockquote class='book-hint warning' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;path d="M10.29 3.86 1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z"/&gt;&lt;path d="M12 9v4"/&gt;&lt;path d="M12 17h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;CPU micro-architectures such as x86_32, ARM, RISC, MIPS are not supported by SentinelOne components&lt;/p&gt;</description></item><item><title>Windows Agent Installer Command Line Options</title><link>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/windows-agent-installer-command-line-options/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/windows-agent-installer-command-line-options/</guid><description>&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;&lt;strong&gt;If you are installing an agent version 21.x or lower, please use the&lt;/strong&gt; &lt;a href="https://kb.solcyber.com/endpoint-setup-guides/sentinelone/windows-agent-installer-command-line-options/#legacy-installer-options"&gt;&lt;strong&gt;legacy command line options&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Example Usage:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;CMD&lt;/p&gt;
&lt;div class="kb-code" data-lang="text"&gt;
 &lt;div class="kb-code-head"&gt;
 &lt;span class="kb-code-lang"&gt;text&lt;/span&gt;&lt;/div&gt;&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#e6edf3;background-color:#0d1117;-moz-tab-size:2;-o-tab-size:2;tab-size:2;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-text" data-lang="text"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;SentinelOneInstaller.exe -q -b -t &amp;lt;site_token&amp;gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;
&lt;p&gt;Powershell&lt;/p&gt;
&lt;div class="kb-code" data-lang="text"&gt;
 &lt;div class="kb-code-head"&gt;
 &lt;span class="kb-code-lang"&gt;text&lt;/span&gt;&lt;/div&gt;&lt;div class="highlight"&gt;&lt;pre tabindex="0" style="color:#e6edf3;background-color:#0d1117;-moz-tab-size:2;-o-tab-size:2;tab-size:2;-webkit-text-size-adjust:none;"&gt;&lt;code class="language-text" data-lang="text"&gt;&lt;span style="display:flex;"&gt;&lt;span&gt;./SentinelOneInstaller.exe -q -t &amp;lt;site_token&amp;gt;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;-b, --reboot_on_need&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Optional. Automatically reboot the endpoint when required to continue with the installation.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;-t`` &lt;/code&gt;&lt;em&gt;&lt;code&gt;site_Token or group_Token&lt;/code&gt;&lt;/em&gt; is the site token or group token.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;-q, --qn&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Optional unless you use a deployment tool to install the Agent (then it is mandatory).&lt;/p&gt;</description></item><item><title>Interoperability Exclusions</title><link>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/interoperability-exclusions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/interoperability-exclusions/</guid><description>&lt;p&gt;The SentinelOne agent can sometimes present interoperability issues with other applications, either SentinelOne prevents another application from operating properly, or another application prevents the SentinelOne agent from operating properly. In the SentinelOne console, the SolCyber SOC can add exclusions that will prevent SentinelOne from interacting with certain files and directories to prevent such issues. &lt;/p&gt;
&lt;p&gt;The following list represents applications that SentinelOne provides some out-of-the-box interoperability exclusions for. Please let us know if you use any of the following applications on devices where you plan to install the S1 agent.&lt;/p&gt;</description></item><item><title>Uninstalling/Disabling SentinelOne</title><link>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/uninstalling-disabling-sentinelone/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/uninstalling-disabling-sentinelone/</guid><description>&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;Due to the tamper protection feature in the SentinelOne agent, the easiest way to uninstall or disable the agent is to open a ticket with the SolCyber SOC. We will send an &lt;code&gt;uninstall&lt;/code&gt;or &lt;code&gt;disable&lt;/code&gt; command to the device. In instances when the device in question is offline or otherwise unreachable by the SentinelOne console, local uninstalls/disable can be performed, but &lt;strong&gt;each device&amp;rsquo;s unique passphrase is required&lt;/strong&gt; to complete the action due to the tamper protection. The SolCyber SOC can provide you with the passphrase.&lt;/p&gt;</description></item><item><title>SentinelOne Data Collection List</title><link>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/sentinelone-data-collection-list/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/sentinelone-data-collection-list/</guid><description>&lt;h2 id="management-console-data-collection"&gt;Management Console Data Collection&lt;a class="anchor" href="#management-console-data-collection"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;The SentinelOne Agent collects these datasets:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Hardware data:
&lt;ul&gt;
&lt;li&gt;Machine type&lt;/li&gt;
&lt;li&gt;Architecture&lt;/li&gt;
&lt;li&gt;Memory&lt;/li&gt;
&lt;li&gt;CPU information&lt;/li&gt;
&lt;li&gt;Core count&lt;/li&gt;
&lt;li&gt;Mac address&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Solutions conﬁguration information: Customer instance settings (including users emails, phone numbers)&lt;/li&gt;
&lt;li&gt;User and device data:
&lt;ul&gt;
&lt;li&gt;Agent ID&lt;/li&gt;
&lt;li&gt;Endpoint Name&lt;/li&gt;
&lt;li&gt;Workgroup/domain&lt;/li&gt;
&lt;li&gt;User name&lt;/li&gt;
&lt;li&gt;Disk encryption state&lt;/li&gt;
&lt;li&gt;Installed applications - installation time, size, publisher and version.&lt;/li&gt;
&lt;li&gt;OS type&lt;/li&gt;
&lt;li&gt;OS version&lt;/li&gt;
&lt;li&gt;SentinelOne Agent version&lt;/li&gt;
&lt;li&gt;SMTP username&lt;/li&gt;
&lt;li&gt;User login/out time&lt;/li&gt;
&lt;li&gt;External devices control rules&lt;/li&gt;
&lt;li&gt;Firewall control rules, and event notiﬁcations (such as details of blocked application events)&lt;/li&gt;
&lt;li&gt;Notiﬁcation of interface connection (USB/Bluetooth) and hardware information&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Integrations to the Console and global conﬁguration of connected endpoints&lt;/li&gt;
&lt;li&gt;Process activity:
&lt;ul&gt;
&lt;li&gt;Time of machine activity&lt;/li&gt;
&lt;li&gt;Running processes (name, ID, CPU usage, memory)&lt;/li&gt;
&lt;li&gt;Full ﬁle path&lt;/li&gt;
&lt;li&gt;In cases of suspected threats, the SentinelOne Agent collects for each process:
&lt;ul&gt;
&lt;li&gt;File metadata&lt;/li&gt;
&lt;li&gt;Hash&lt;/li&gt;
&lt;li&gt;File type&lt;/li&gt;
&lt;li&gt;Certiﬁcate (for veriﬁed or not)&lt;/li&gt;
&lt;li&gt;Command-line arguments&lt;/li&gt;
&lt;li&gt;Network access metadata only: IP Address; protocol&lt;/li&gt;
&lt;li&gt;Registry: created keys; deleted keys; modiﬁed key names&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Network Data:
&lt;ul&gt;
&lt;li&gt;Internal network IP address&lt;/li&gt;
&lt;li&gt;Public IP address (if running cloud-based management)&lt;/li&gt;
&lt;li&gt;Inbound/Outbound connections, metadata only (source, target, port, and application)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Fetched Files:
&lt;ul&gt;
&lt;li&gt;Any ﬁle fetched by user (encrypted at rest, deleted after 72 hours)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="cloud-data"&gt;Cloud Data&lt;a class="anchor" href="#cloud-data"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;SentinelOne collects the data of the cloud service provider for each Linux and K8s Agent that is recognized as a server (Sentinels &amp;gt; Endpoints &amp;gt; &lt;strong&gt;Machine Type&lt;/strong&gt; = Server ).&lt;/p&gt;</description></item><item><title>Agent Troubleshooting</title><link>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/agent-troubleshooting/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/agent-troubleshooting/</guid><description>&lt;p&gt;When troubleshooting issues with SentinelOne agents, a SolCyber SOC engineer will usually open a ticket with SentinelOne support. To expedite resolution, we ask that some data or log collection be done on the device so that we can provide the details to SentinelOne support.&lt;/p&gt;
&lt;h2 id="windows"&gt;&lt;strong&gt;Windows&lt;/strong&gt;&lt;a class="anchor" href="#windows"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;h3 id="to-collect-installation-logs-from-windows-endpoints"&gt;To collect installation logs from Windows endpoints:&lt;a class="anchor" href="#to-collect-installation-logs-from-windows-endpoints"&gt;#&lt;/a&gt;&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;In File Explorer, enter:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;C:\Windows\Temp\&lt;/code&gt; &lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;code&gt;%temp%&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;This redirects to &lt;code&gt;C:\Users\&amp;lt;USER&amp;gt;\AppData\Local\Temp\&lt;/code&gt; where &amp;lt;USER&amp;gt; is the logged-in user.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In each of these file paths, look for &lt;code&gt;sentinelinstaller&lt;/code&gt; files. The file path can be different configuration of your operating system.&lt;/p&gt;</description></item><item><title>SentinelOne Endpoint Actions</title><link>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/sentinelone-endpoint-actions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/sentinelone-endpoint-actions/</guid><description>&lt;p&gt;In the SolCyber Customer Portal, you can run an Endpoint report to show any SentinelOne agents that are missing a necessary permission, or require an action (such as rebooting) to restore full functionality to the agent. Please use the chart below to find a description for the most common values found in the &amp;ldquo;&lt;strong&gt;Action Needed&lt;/strong&gt;&amp;rdquo; column of this report. If your report contains an action that is not listed here, please contact the SOC at &lt;a href="mailto:soc@SolCyber.com"&gt;soc@SolCyber.com&lt;/a&gt; so that we can assist.&lt;/p&gt;</description></item><item><title>VSS Writer Exclusions</title><link>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/vss-writer-exclusions/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/endpoint-setup-guides/sentinelone/vss-writer-exclusions/</guid><description>&lt;blockquote class='' &gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;⚠️ &lt;strong&gt;Important Security Notice&lt;/strong&gt;: Excluding VSS Writers removes SentinelOne protection from that data. Only exclude writers when absolutely necessary for backup compatibility.&lt;/p&gt;

&lt;/div&gt;
&lt;/blockquote&gt;
&lt;h2 id="overview"&gt;Overview&lt;a class="anchor" href="#overview"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;This guide shows you how to exclude specific VSS Writers from SentinelOne protection to resolve compatibility issues with backup software using the SentinelCtl command line method.&lt;/p&gt;
&lt;p&gt;The SentinelOne agent protects VSS shadow copies from malicious changes and deletion. However, some backup applications may require specific VSS Writers to be excluded from SentinelOne monitoring to function properly.&lt;/p&gt;</description></item><item><title>DNS Filter - Endpoint Deployment</title><link>https://kb.solcyber.com/endpoint-setup-guides/dns-filter/dns-filter-endpoint-deployment/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/endpoint-setup-guides/dns-filter/dns-filter-endpoint-deployment/</guid><description>&lt;blockquote class='book-hint warning' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;path d="M10.29 3.86 1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z"/&gt;&lt;path d="M12 9v4"/&gt;&lt;path d="M12 17h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;&lt;strong&gt;Testing Encouraged&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A standalone installation is recommended when initially testing the Roaming Client on your computers/network. DNSFilter recommends 1-2 days of testing with one or more computers to ensure smooth operation before performing a mass deployment. &lt;strong&gt;One area we strongly recommend testing is the resolution of&lt;/strong&gt; &lt;a href="https://help.dnsfilter.com/hc/en-us/articles/1500012794302-Local-Domains"&gt;&lt;strong&gt;local domains&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;.&lt;/strong&gt; &lt;/p&gt;</description></item><item><title>DNS Filter - Network Deployment</title><link>https://kb.solcyber.com/endpoint-setup-guides/dns-filter/dns-filter-network-deployment/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/endpoint-setup-guides/dns-filter/dns-filter-network-deployment/</guid><description>&lt;p&gt;Below you will find the basic steps to deploy DNS Filter to your Network. You can find more options and details in the &lt;a href="https://help.dnsfilter.com/hc/en-us/sections/1500001413321-Deploying-DNSFilter"&gt;official DNS Filter knowledge base&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id="step-one-provide-your-site-static-ips-to-solcyber"&gt;Step One: Provide Your Site Static IP(s) to SolCyber&lt;a class="anchor" href="#step-one-provide-your-site-static-ips-to-solcyber"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Before you make any changes to your network, please provide us with your static IP(s).&lt;/strong&gt; If this is not done first, DNS Filter will not expect traffic from your location and will deny DNS requests until the IP is added.&lt;/p&gt;</description></item><item><title>Uninstall Uptycs</title><link>https://kb.solcyber.com/endpoint-setup-guides/uninstall-uptycs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/endpoint-setup-guides/uninstall-uptycs/</guid><description>&lt;h2 id="windows"&gt;Windows&lt;a class="anchor" href="#windows"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;h3 id="option-1-uninstall-using-the-msi-installer"&gt;Option 1: Uninstall Using the MSI Installer&lt;a class="anchor" href="#option-1-uninstall-using-the-msi-installer"&gt;#&lt;/a&gt;&lt;/h3&gt;
&lt;p&gt;If you have the MSI installer file, run the following command to uninstall:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;msiexec /i &amp;lt;osquery msi file complete path&amp;gt;&lt;/code&gt;&lt;/p&gt;
&lt;h3 id="option-2-uninstall-using-the-product-code"&gt;Option 2: Uninstall Using the product code&lt;a class="anchor" href="#option-2-uninstall-using-the-product-code"&gt;#&lt;/a&gt;&lt;/h3&gt;
&lt;p&gt;If you do not have the MSI installer file, you can uninstall using the product code.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Obtain the product code: &lt;br&gt;
&lt;code&gt;Get-WmiObject Win32_Product | Select-Object Name, IdentifyingNumber | findstr -i osquery&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Run the following command:&lt;br&gt;
&lt;code&gt;msiexec /x &amp;lt;PRODUCT-CODE&amp;gt;&lt;/code&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 id="option-3"&gt;Option 3&lt;a class="anchor" href="#option-3"&gt;#&lt;/a&gt;&lt;/h3&gt;
&lt;blockquote class='book-hint warning' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;path d="M10.29 3.86 1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z"/&gt;&lt;path d="M12 9v4"/&gt;&lt;path d="M12 17h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;wmic is not installed in Windows 11 by default - use option 1 or 2 for Windows 11 devices&lt;/p&gt;</description></item><item><title>Attivo Removal</title><link>https://kb.solcyber.com/endpoint-setup-guides/attivo-removal/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/endpoint-setup-guides/attivo-removal/</guid><description>&lt;h2 id="uninstalling-the-attivo-agent"&gt;&lt;strong&gt;Uninstalling the Attivo Agent&lt;/strong&gt;&lt;a class="anchor" href="#uninstalling-the-attivo-agent"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;The following are the recommended steps to remove the Attivo agent from any Windows system.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Download the Attivo_Win32.zip binary file and transfer to the endpoint&lt;/li&gt;
&lt;li&gt;Open the downloaded zip file and extract all files&lt;/li&gt;
&lt;li&gt;Open Command Prompt as Administrator&lt;/li&gt;
&lt;li&gt;From the Command Prompt, change directory to the location of the unzipped folder that contains the files extracted&lt;/li&gt;
&lt;li&gt;Run the following command and press Enter:&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;em&gt;&lt;code&gt;windowssetup.exe /ua /force&lt;/code&gt;&lt;/em&gt;&lt;/p&gt;</description></item><item><title>Phishing Simulation Whitelisting - Office 365</title><link>https://kb.solcyber.com/phishing-simulation-ip-whitelisting-guides/phishing-simulation-whitelisting-office-365/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/phishing-simulation-ip-whitelisting-guides/phishing-simulation-whitelisting-office-365/</guid><description>&lt;p&gt;&lt;strong&gt;IPs to Whitelist:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;52.74.95.172 &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;SolCyber partners with a company named Right-Hand to run phishing simulations. The IP addresses you will be whitelisting will belong to Right-Hand, and the phishing campaigns will be run by SolCyber.&lt;/p&gt;
&lt;h2 id="step-1-setup-ip-allow-list"&gt;Step 1: Setup IP Allow List &lt;a href="#step1" id="step1"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-1-setup-ip-allow-list"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Visit &lt;a href="https://security.microsoft.com/antispam"&gt;https://security.microsoft.com/antispam&lt;/a&gt; and select &amp;ldquo;Connection filter policy (Default)&amp;rdquo;&lt;/li&gt;
&lt;/ul&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/Screen Shot 2022-11-29 at 4.54.34 PM.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;ul&gt;
&lt;li&gt;Click on &lt;strong&gt;Edit connection filter policy&lt;/strong&gt; and add the Right-Hand IP(s) listed above.&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Save&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="step-2-bypass-clutter--spam-filtering"&gt;Step 2: ByPass Clutter &amp;amp; Spam Filtering&lt;a class="anchor" href="#step-2-bypass-clutter--spam-filtering"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;To ensure our messages will bypass your Clutter folder as well as spam filtering within Microsoft&amp;rsquo;s EOP, follow the steps below.&lt;/p&gt;</description></item><item><title>Phishing Simulation Whitelisting - Google Workspace</title><link>https://kb.solcyber.com/phishing-simulation-ip-whitelisting-guides/right-hand-whitelisting-for-google/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/phishing-simulation-ip-whitelisting-guides/right-hand-whitelisting-for-google/</guid><description>&lt;p&gt;To ensure phishing simulation emails are delivered to your users&amp;rsquo; inboxes, please follow the following whitelisting steps.&lt;/p&gt;
&lt;h2 id="content-compliance-filter"&gt;Content Compliance Filter&lt;a class="anchor" href="#content-compliance-filter"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Navigate to Google Workspace Admin Console and, from the left menu navigate to Apps → Google Workspace → Gmail.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click on &lt;em&gt;Compliance&lt;/em&gt; Tab and then click on &lt;em&gt;Configure&lt;/em&gt; for &lt;strong&gt;Content compliance&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;A new tab will open and add the following values.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Set &lt;code&gt;Right Hand Spam Filter Bypass&lt;/code&gt; as the name for the rule or name it based on your choice or convention.&lt;/p&gt;</description></item><item><title>Active Directory Assessment Setup</title><link>https://kb.solcyber.com/active-directory-assessment-setup-guide/active-directory-assessment-setup/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/active-directory-assessment-setup-guide/active-directory-assessment-setup/</guid><description>&lt;p&gt;SolCyber will perform a bi-annual assessment of your Active Directory environment(s) and provide a report and analysis of critical findings. This documentation covers running the assessment tool for &lt;strong&gt;on-premise Active Directory&lt;/strong&gt;. If you have an Azure Active Directory environment that you would like assessed, please see the &lt;a href="https://kb.solcyber.com/active-directory-assessment-setup-guide/azure-active-directory-entraid-assessment-setup/"&gt;Azure Active Directory Assessment Setup&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id="system-requirements"&gt;System Requirements&lt;a class="anchor" href="#system-requirements"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;To facilitate assessment of Active Directory, the SentinelOne Identity Agent must be installed on a single domain-joined device that can communicate with the Domain Controller(s). The device is referred to as the &amp;ldquo;AD Connector&amp;rdquo;. &lt;strong&gt;It is not advised to install the Identity Agent on the Domain Controller itself.&lt;/strong&gt; The system requirements for the AD Connector are listed below:&lt;/p&gt;</description></item><item><title>Exposures Assessed - Azure AD Assessment</title><link>https://kb.solcyber.com/active-directory-assessment-setup-guide/azure-active-directory-entraid-assessment-setup/exposures-assessed-azure-ad-assessment/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/active-directory-assessment-setup-guide/azure-active-directory-entraid-assessment-setup/exposures-assessed-azure-ad-assessment/</guid><description>&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th width="537"&gt;Exposure&lt;/th&gt;&lt;th width="232"&gt;Required Azure AD License&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;Azure AD Tenant without User Risk Policies enabled&lt;/td&gt;&lt;td&gt;Premium P1&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Standard users without Multi Factor authentication&lt;/td&gt;&lt;td&gt;Premium P2&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;New Azure AD Local Admin Added to Azure AD Devices&lt;/td&gt;&lt;td&gt;Premium P2&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Subscription Admin Users without MFA enabled&lt;/td&gt;&lt;td&gt;Premium P2&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;High Number of Subscription Owners in the Tenant&lt;/td&gt;&lt;td&gt;Premium P2&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Tenant with Legacy Authentication Methods Enabled&lt;/td&gt;&lt;td&gt;Premium P2&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Azure AD Tenant without Sign-In Risk Policies enabled&lt;/td&gt;&lt;td&gt;Premium P2&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Privileged Users without Multi-Factor Authentication (MFA)&lt;/td&gt;&lt;td&gt;Premium P2&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Self Service Password Reset (SSPR) Is Disabled&lt;/td&gt;&lt;td&gt;Premium P2&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Guest Users Found in the Azure AD&lt;/td&gt;&lt;td&gt;Premium P2&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Custom Banned Password not configured for the Tenant&lt;/td&gt;&lt;td&gt;Premium P2&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Block Legacy Authentication with Conditional Access&lt;/td&gt;&lt;td&gt;Premium P2&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;On-Prem Active Directory Password Protection Disabled&lt;/td&gt;&lt;td&gt;Premium P2&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;New Classic Administrators Added Recently&lt;/td&gt;&lt;td&gt;Requires subscription&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;External Accounts with Dangerous Permissions on Subscription&lt;/td&gt;&lt;td&gt;Requires subscription&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;New Delegated Permissions Added Recently&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Global Administrator Role Must Be Assigned to at Least 3 Cloud-Only Accounts&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Restrict Access to Azure Portal with conditional access&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Password Sync feature is disabled for Tenant&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Usage of Smart Lockout in Azure AD&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;High Number of Users in Privileged Azure AD Roles&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Stale service principals with password credentials&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Active Directory Privileged users with Privileged roles in Azure&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Active Directory Privileged users synced to Azure&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Unlimited Sessions allowed for Portal Sessions&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Non Usage of Administrative Unit to delegate Tasks&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Standard Users Allowed to Invite External Users&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;New Azure AD Application registered&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;New App role Assignment Detected&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Standard Users Allowed to Create Apps&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Azure AD Trusted IP Configuration changes&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Security Defaults Disabled for Administrators and Users&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Users Are Allowed to Consent to Applications&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Microsoft Accounts in Administrator Roles&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Short Lived User Accounts found in Tenant&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Standard Users Allowed to Create Security Groups&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Admin Consent Workflow is Disabled for Enterprise Applications&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Stale Devices in Azure AD&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Recent Changes to Azure Administrator roles&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Non-Usage of Managed Identity for Azure Resources&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Service Principals with Azure AD admin Roles&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Azure AD Applications with Write Graph App Roles&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Azure AD User with Application Owner Permissions&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Non-Admin users Sign-in &amp;#x26; usage of Azure AD PowerShell&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Azure AD Users with Password Set to Never Expire&lt;/td&gt;&lt;td&gt;Free license&lt;/td&gt;&lt;/tr&gt;&lt;/tbody&gt;&lt;/table&gt;</description></item><item><title>AWS Cloud Security Configuration</title><link>https://kb.solcyber.com/cloud-security-setup-guides/aws-configuration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/cloud-security-setup-guides/aws-configuration/</guid><description>&lt;p&gt;According to Gartner, the #1 threat to cloud infrastructure is &lt;strong&gt;entitlements and permissions.&lt;/strong&gt; Identifying risky permissions and misconfigurations is difficult. SolCyber partners with Ermetic Security to monitor customer&amp;rsquo;s cloud security posture. Ermetic enables you to address the #1 risk to your cloud infrastructure – identities – by detecting and prioritizing risky entitlements and misconfigurations at scale. Ermetic allows SolCyber to continuously discover a customer&amp;rsquo;s cloud asset inventory and applies full-stack analytics to identify risk accurately and in context. SolCyber can help customers manage access permissions, ensure cloud compliance and shift left on least privilege, thereby reducing cloud attack surface.&lt;/p&gt;</description></item><item><title>Azure Cloud Security Configuration</title><link>https://kb.solcyber.com/cloud-security-setup-guides/azure-configuration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/cloud-security-setup-guides/azure-configuration/</guid><description>&lt;p&gt;According to Gartner, the #1 threat to cloud infrastructure is &lt;strong&gt;entitlements and permissions.&lt;/strong&gt; Identifying risky permissions and misconfigurations is difficult. SolCyber partners with Ermetic Security to monitor customer&amp;rsquo;s cloud security posture. Ermetic enables you to address the #1 risk to your cloud infrastructure – identities – by detecting and prioritizing risky entitlements and misconfigurations at scale. Ermetic allows SolCyber to continuously discover a customer&amp;rsquo;s cloud asset inventory and applies full-stack analytics to identify risk accurately and in context. SolCyber can help customers manage access permissions, ensure cloud compliance and shift left on least privilege, thereby reducing cloud attack surface.&lt;/p&gt;</description></item><item><title>Single Sign On Configuration</title><link>https://kb.solcyber.com/cloud-security-setup-guides/single-sign-on-configuration/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/cloud-security-setup-guides/single-sign-on-configuration/</guid><description>&lt;h2 id="azure-active-directory-saml"&gt;&lt;strong&gt;Azure Active Directory (SAML)&lt;/strong&gt;&lt;a class="anchor" href="#azure-active-directory-saml"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;In the Azure portal, navigate to &lt;strong&gt;Enterprise applications&lt;/strong&gt;, and then add a &lt;strong&gt;New application&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Create your own application&lt;/strong&gt;, and then enter a name for the app.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Select the default value of &lt;strong&gt;Integrate any other application you don’t find in the gallery (Non-Gallery)&lt;/strong&gt; and then click &lt;strong&gt;Create&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;On the app Overview page that displays, in the &lt;em&gt;Set up single sign on&lt;/em&gt; step, click &lt;strong&gt;Get started&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Choose &lt;strong&gt;SAML&lt;/strong&gt; as the SSO method.&lt;/p&gt;</description></item><item><title>iVerify Setup</title><link>https://kb.solcyber.com/mobile-mdr-setup-guides/iverify-setup/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/mobile-mdr-setup-guides/iverify-setup/</guid><description>&lt;p&gt;iVerify Elite offers comprehensive mobile device security for you and your organization, ensuring robust protection against known threats and uncovering indicators of compromise.&lt;/p&gt;
&lt;blockquote class='book-hint warning' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;path d="M10.29 3.86 1.82 18a2 2 0 0 0 1.71 3h16.94a2 2 0 0 0 1.71-3L13.71 3.86a2 2 0 0 0-3.42 0z"/&gt;&lt;path d="M12 9v4"/&gt;&lt;path d="M12 17h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;&lt;strong&gt;We recommend that iVerify be deployed in environments where all end user devices (computers and company-provided phones) are managed by an endpoint or mobile device management tool. This makes deployment and management of iVerify much easier.&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>DPM Log Ingestion Node</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/dpm-log-ingestion-node/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/dpm-log-ingestion-node/</guid><description>&lt;h2 id="specs-and-requirements"&gt;Specs and Requirements&lt;a class="anchor" href="#specs-and-requirements"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;table&gt;&lt;thead&gt;&lt;tr&gt;&lt;th width="198.6171875"&gt;Requirement Type&lt;/th&gt;&lt;th width="250.40234375"&gt;Requirement&lt;/th&gt;&lt;th&gt;Description&lt;/th&gt;&lt;/tr&gt;&lt;/thead&gt;&lt;tbody&gt;&lt;tr&gt;&lt;td&gt;Server&lt;/td&gt;&lt;td&gt;CPU&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;strong&gt;Small:&lt;/strong&gt; 4x CPU&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Med:&lt;/strong&gt; 8x CPU&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Server&lt;/td&gt;&lt;td&gt;RAM&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;strong&gt;Small:&lt;/strong&gt; 8 GB&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Medium:&lt;/strong&gt; 24 GB&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Server&lt;/td&gt;&lt;td&gt;Disk 1&lt;/td&gt;&lt;td&gt;75 GB root HD&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Server&lt;/td&gt;&lt;td&gt;Disk 2&lt;/td&gt;&lt;td&gt;&lt;p&gt;&lt;strong&gt;Small:&lt;/strong&gt; 200 GB unformatted HD&lt;/p&gt;&lt;p&gt;&lt;strong&gt;Medium:&lt;/strong&gt; 600 GB unformatted HD&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Network&lt;/td&gt;&lt;td&gt;Reserved IP for each node&lt;/td&gt;&lt;td&gt;If deploying an ingestion mesh, please also reserve an IP for the software load balancer&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Firewall Ports&lt;/td&gt;&lt;td&gt;Remote Management&lt;/td&gt;&lt;td&gt;Please ensure that your firewall allows the Ingestion Appliance(s) to communicate &lt;em&gt;&lt;strong&gt;outbound&lt;/strong&gt;&lt;/em&gt; on UDP/9993&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td&gt;Firewall Whitelisting&lt;/td&gt;&lt;td&gt;Node Health and Management&lt;/td&gt;&lt;td&gt;&lt;p&gt;Please allow the nodes access to the following FQDNs on TCP/443:&lt;br&gt;&lt;/p&gt;</description></item><item><title>Abnormal Email Security</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/abnormal-email-security/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/abnormal-email-security/</guid><description>&lt;h2 id="step-1-access-abnormal-security-platform"&gt;Step 1: Access Abnormal Security Platform &lt;a href="#step-1-access-abnormal-security-platform" id="step-1-access-abnormal-security-platform"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-1-access-abnormal-security-platform"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Log in to Abnormal Security Dashboard:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Navigate to your Abnormal Security Management Dashboard.&lt;/li&gt;
&lt;li&gt;Go to Settings &amp;gt; API Access.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enable API Access:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Ensure API access is enabled for your organization.&lt;/li&gt;
&lt;li&gt;Verify that you have the necessary permissions to create API tokens.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="step-2-generate-api-credentials"&gt;Step 2: Generate API Credentials &lt;a href="#step-2-generate-api-credentials" id="step-2-generate-api-credentials"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-2-generate-api-credentials"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Create API Token:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Navigate to Settings &amp;gt; API Access in your Abnormal Security dashboard.&lt;/li&gt;
&lt;li&gt;Click &amp;ldquo;Generate New Token&amp;rdquo; or &amp;ldquo;Create API Key&amp;rdquo;.&lt;/li&gt;
&lt;li&gt;Enter a descriptive name for the token (e.g., &amp;ldquo;SolCyber Integration&amp;rdquo;).&lt;/li&gt;
&lt;li&gt;Select the appropriate permissions for threat data access:
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;threats:read&lt;/code&gt; - Read access to threat data&lt;/li&gt;
&lt;li&gt;&lt;code&gt;threats:list&lt;/code&gt; - List threats&lt;/li&gt;
&lt;li&gt;&lt;code&gt;threats:get&lt;/code&gt; - Get individual threat details&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Note API Credentials:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Copy the &lt;strong&gt;API Base URL&lt;/strong&gt; and &lt;strong&gt;Access Token&lt;/strong&gt; from the API settings.&lt;/li&gt;
&lt;li&gt;These will be used in the SolCyber integration.&lt;/li&gt;
&lt;li&gt;Store the access token securely as it cannot be retrieved again. You will need to provide this information to SolCyber.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="step-3-configure-threat-data-access"&gt;Step 3: Configure Threat Data Access &lt;a href="#step-3-configure-threat-data-access" id="step-3-configure-threat-data-access"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-3-configure-threat-data-access"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Set up Threat Data Permissions:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Ensure your API token has access to the threat data you want to ingest.&lt;/li&gt;
&lt;li&gt;Verify that threat data is being generated and is accessible via the API.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Test API Connectivity:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Use &lt;strong&gt;Postman&lt;/strong&gt; or &lt;strong&gt;cURL&lt;/strong&gt; to test API requests to Abnormal Security.&lt;/li&gt;
&lt;li&gt;Verify that you can successfully retrieve threat data using your credentials.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="step-4-network-configuration"&gt;Step 4: Network Configuration &lt;a href="#step-4-network-configuration" id="step-4-network-configuration"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-4-network-configuration"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Whitelist Databahn IPs:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Add Databahn&amp;rsquo;s IP addresses to your Abnormal Security tenant&amp;rsquo;s allowed IPs if IP restrictions are enabled.&lt;/li&gt;
&lt;li&gt;Contact Databahn support for the specific IP ranges.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Configure Rate Limits:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Review and adjust API rate limits if necessary to accommodate your data ingestion needs.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;&lt;strong&gt;Abnormal Security Integration Reference&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>Cisco Duo</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/cisco-duo/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/cisco-duo/</guid><description>&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;Note that only administrators with the &lt;a href="https://duo.com/docs/admin-roles"&gt;Owner&lt;/a&gt; role can create or modify an Admin API application in the Duo Admin Panel.&lt;/p&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;p&gt;Ingestion of the following types of DUO logs is supported:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Duo Security Administrator&lt;/li&gt;
&lt;li&gt;Duo Security Authentication&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Log in to the &lt;a href="https://admin.duosecurity.com/"&gt;Duo Admin Panel&lt;/a&gt; and navigate to &lt;strong&gt;Applications&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Protect an Application&lt;/strong&gt; and locate the entry for &lt;strong&gt;Admin API&lt;/strong&gt; in the applications list. Click &lt;strong&gt;Protect&lt;/strong&gt; to the far-right to configure the application and get your &lt;strong&gt;integration key, secret key, and API hostname&lt;/strong&gt;. You&amp;rsquo;ll need to provide these credentials to SolCyber via onetimesecret.com or other secure methods. &lt;/li&gt;
&lt;li&gt;The required permissions are:
&lt;ul&gt;
&lt;li&gt;Grant read log&lt;/li&gt;
&lt;li&gt;Grant read information&lt;/li&gt;
&lt;li&gt;Grant read resource&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;</description></item><item><title>Cisco Umbrella</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/cisco-umbrella/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/cisco-umbrella/</guid><description>&lt;p&gt;To facilitate log export to a SIEM, you must configure Umbrella logs to be stored in an AWS S3 bucket. We strongly recommend the use of your own S3 bucket, as the Cisco-managed option will have it&amp;rsquo;s token reset every 90-days.&lt;/p&gt;
&lt;h2 id="create-an-s3-bucket"&gt;Create an S3 Bucket&lt;a class="anchor" href="#create-an-s3-bucket"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt;When you set up your Amazon S3 bucket, you must add a bucket policy which accept uploads from Umbrella. Copy the following preconfigured JSON and substitute your S3 bucket name for &lt;code&gt;bucketname&lt;/code&gt;. Then, paste the Umbrella S3 bucket policy into your Amazon S3 bucket policy.&lt;/p&gt;</description></item><item><title>Cisco Meraki Firewall</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/cisco-meraki-firewall/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/cisco-meraki-firewall/</guid><description>&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Go to &lt;strong&gt;Network-wide&lt;/strong&gt; &amp;gt; &lt;strong&gt;Configure&lt;/strong&gt; &amp;gt; &lt;strong&gt;General&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Add a syslog server&lt;/strong&gt; to define a new server. &lt;/p&gt;
&lt;p&gt;&lt;img src="https://documentation-be.securonix.com/bundle/securonix-cloud-user-guide/page/content/resources/images/imported/cisco_meraki/1.png?_LANG=enus" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Server IP&lt;/strong&gt;: The Datahan Collector IP address.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Port:&lt;/strong&gt; The SolCyber team will specify the port to use.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Roles:&lt;/strong&gt; The roles to send to the server.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Choose the type of events to export:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Event Log&lt;/strong&gt;: The messages from the dashboard under Monitor &amp;gt; Event Log.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Flows&lt;/strong&gt;: Inbound and outbound traffic flow-generated syslog messages that include the source, destination, and port numbers.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;URL:&lt;/strong&gt; HTTP GET requests generating syslog entries.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;</description></item><item><title>Fortinet Fortigate Firewall</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/fortinet-fortigate-firewall/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/fortinet-fortigate-firewall/</guid><description/></item><item><title>Microsoft Azure Security Center</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/microsoft-azure-security-center/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/microsoft-azure-security-center/</guid><description>&lt;ol&gt;
&lt;li&gt;Open the &lt;strong&gt;Azure Active Directory&lt;/strong&gt; resource in the Azure Portal.&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;App registrations&lt;/strong&gt; &amp;gt; &lt;strong&gt;New Registration&lt;/strong&gt;.&lt;/li&gt;
&lt;/ol&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/Defender_image_1.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Provide a name, and select the account scope to Single tenant.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Register&lt;/strong&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click on the new application created on the App registration screen.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Copy the &lt;strong&gt;Client ID&lt;/strong&gt; and &lt;strong&gt;Tenant ID&lt;/strong&gt;, and then click &lt;strong&gt;View API permissions&lt;/strong&gt;.&lt;/p&gt;
&lt;figure&gt;&lt;img src="https://images.gitbook.com/__img/dpr=2,width=1168,onerror=redirect,format=auto,signature=-1575248681/https%3A%2F%2Fdocumentation-be.securonix.com%2Fbundle%2Fsecuronix-cloud-user-guide%2Fpage%2Fcontent%2Fresources%2Fimages%2Factive-deployment-guides%2Fmicrosoft%2Fazure-identity-protection-2.png%3F_LANG%3Denus" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Add a permission&lt;/strong&gt;, and then click the &lt;strong&gt;Microsoft Graph API&lt;/strong&gt;.&lt;/p&gt;
&lt;figure&gt;&lt;img src="https://images.gitbook.com/__img/dpr=2,width=1168,onerror=redirect,format=auto,signature=-996502312/https%3A%2F%2Fdocumentation-be.securonix.com%2Fbundle%2Fsecuronix-cloud-user-guide%2Fpage%2Fcontent%2Fresources%2Fimages%2Factive-deployment-guides%2Fmicrosoft%2Fazure-identity-protection-3.png%3F_LANG%3Denus" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Click &lt;strong&gt;Application permissions&lt;/strong&gt;, search for SecurityEvents, and then select &lt;strong&gt;SecurityEvents.Read.All&lt;/strong&gt;.&lt;/p&gt;</description></item><item><title>Microsoft EntraID Events</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/microsoft-entraid-events/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/microsoft-entraid-events/</guid><description>&lt;ul&gt;
&lt;li&gt;Login to &lt;strong&gt;Azure&lt;/strong&gt; portal.&lt;/li&gt;
&lt;li&gt;Locate &lt;strong&gt;App registrations&lt;/strong&gt; using the &lt;strong&gt;Search&lt;/strong&gt; bar from &lt;strong&gt;Dashboard&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%28188%29.png" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Click &lt;strong&gt;New Registration&lt;/strong&gt; from the &lt;strong&gt;App registrations&lt;/strong&gt; screen to register an application.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%2868%29.png" alt="" /&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Provide the following details in the &lt;strong&gt;Register an application&lt;/strong&gt; screen:&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Name&lt;/strong&gt;: SolCyber AzureAD Users&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Supported account Types&lt;/strong&gt;: Select the &lt;strong&gt;Accounts in this organizational directory only&lt;/strong&gt; option.&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Register&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Make a copy of &lt;strong&gt;Application (client ID)&lt;/strong&gt; and &lt;strong&gt;Directory (tenant ID)&lt;/strong&gt; for the application from the Application screen.&lt;/li&gt;
&lt;/ul&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/Gemini_Generated_Image_s8w124s8w124s8w1.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;ul&gt;
&lt;li&gt;Click &lt;strong&gt;API Permission&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/Gemini_Generated_Image_uurhv5uurhv5uurh.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;ul&gt;
&lt;li&gt;Click &lt;strong&gt;Add a permission&lt;/strong&gt;. A new &lt;strong&gt;Request API Permissions&lt;/strong&gt; screen is displayed.&lt;/li&gt;
&lt;li&gt;Select &lt;strong&gt;Microsoft Graph&lt;/strong&gt; from the &lt;strong&gt;Request API permissions&lt;/strong&gt; screen.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;img src="https://kb.solcyber.com/assets/image%20%28198%29.png" alt="" /&gt;&lt;/p&gt;</description></item><item><title>Office 365 (Azure AD, Exchange, SharePoint, General)</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/microsoft-office365/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/microsoft-office365/</guid><description>&lt;p&gt;Log in to the &lt;a href="https://portal.azure.com/"&gt;Azure portal&lt;/a&gt; as an admin and search for &lt;strong&gt;App registrations&lt;/strong&gt; in the top search bar.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://2315849798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-M_RDtNLnj4J3_rcbkr7%2Fuploads%2FDGec89J7JiRXcSmbr6xY%2Fimage.png?alt=media%5c&amp;amp;token=295f1a11-ea9b-46ad-950e-7103e8b7f8c0" alt="" /&gt;&lt;/p&gt;
&lt;p&gt;Click &lt;strong&gt;+ New registration&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://2315849798-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-M_RDtNLnj4J3_rcbkr7%2Fuploads%2FWLRlyst59pmwinEPmOQQ%2Fimage.png?alt=media%5c&amp;amp;token=bd5b3e6b-6cf5-4044-88c6-2016ba7399df" alt="" /&gt;&lt;/p&gt;
&lt;p&gt;Enter the following details on the &lt;strong&gt;Register an application&lt;/strong&gt; page:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Name&lt;/strong&gt;: SolCyber-O365&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Supported account types&lt;/strong&gt;: Accounts in this organizational directory only (Single Tenant)&lt;/li&gt;
&lt;/ul&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/O365_image_2.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;p&gt;Click &lt;strong&gt;Register&lt;/strong&gt;. You will be redirected to the new application overview screen.&lt;/p&gt;
&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;Copy the Application (client) ID and Directory (tenant) ID. You will need to provide these to SolCyber.&lt;/p&gt;</description></item><item><title>Palo Alto Firewall</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/palo-alto-firewall/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/palo-alto-firewall/</guid><description>&lt;h2 id="step-1-create-a-syslog-server-profile"&gt;Step 1. Create a Syslog Server Profile &lt;a href="#step-1-create-a-syslog-server-profile" id="step-1-create-a-syslog-server-profile"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-1-create-a-syslog-server-profile"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;Navigate to:&lt;br&gt;
&lt;strong&gt;Device &amp;gt; Server Profiles &amp;gt; Syslog&lt;/strong&gt;&lt;/p&gt;
&lt;figure&gt;&lt;img src="https://app.cp-us01-prod01-aws.databahn.app/help/assets/images/palo_1-008fdb5350c985a052853d964349a4d0.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Configure the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Syslog Name&lt;/strong&gt;:&lt;br&gt;
Enter a name for the syslog profile (up to 31 characters).&lt;br&gt;
The name is case-sensitive and must be unique. Use only letters, numbers, spaces, hyphens, and underscores.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Name&lt;/strong&gt;:&lt;br&gt;
Click &lt;strong&gt;Add&lt;/strong&gt; and enter a name for the syslog server (up to 31 characters).&lt;br&gt;
The name is case-sensitive and must be unique. Use only letters, numbers, spaces, hyphens, and underscores.&lt;/p&gt;</description></item><item><title>Qualys Vulnerability Management</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/qualys-vulnerability-management/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/qualys-vulnerability-management/</guid><description>&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Log into Qualys Console:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Navigate to your Qualys Security Operations Center (SOC)&lt;/li&gt;
&lt;li&gt;Sign in with your administrative credentials&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Create Service Account:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Go to &lt;strong&gt;Users&lt;/strong&gt; &amp;gt; &lt;strong&gt;Users&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;New&lt;/strong&gt; &amp;gt; &lt;strong&gt;User&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Provide username and strong password&lt;/li&gt;
&lt;li&gt;While creating the new user:
&lt;ul&gt;
&lt;li&gt;Assign the user a &lt;strong&gt;Manager&lt;/strong&gt; role.&lt;/li&gt;
&lt;li&gt;Open the User Role side tab.&lt;/li&gt;
&lt;li&gt;From the role drop-down, select &lt;strong&gt;Manager&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Enable the option for API access so the role supports API usage.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Complete the user creation process and save the user.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;You will need to provide the following information to SolCyber:&lt;/p&gt;</description></item><item><title>Sailpoint</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/sailpoint/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/sailpoint/</guid><description>&lt;h2 id="step-1-create-sailpoint-application"&gt;Step 1: Create Sailpoint Application &lt;a href="#step-1-create-sailpoint-application" id="step-1-create-sailpoint-application"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-1-create-sailpoint-application"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Log in to Sailpoint IdentityNow:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Navigate to your Sailpoint IdentityNow tenant.&lt;/li&gt;
&lt;li&gt;Go to Admin &amp;gt; Applications.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Create New Application:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Click &amp;ldquo;Create Application&amp;rdquo;.&lt;/li&gt;
&lt;li&gt;Enter a name for your application (e.g., &amp;ldquo;SolcyberIntegration&amp;rdquo;).&lt;/li&gt;
&lt;li&gt;Select &amp;ldquo;OAuth Client&amp;rdquo; as the application type.&lt;/li&gt;
&lt;li&gt;Click &amp;ldquo;Create&amp;rdquo;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="step-2-configure-application-settings"&gt;Step 2: Configure Application Settings &lt;a href="#step-2-configure-application-settings" id="step-2-configure-application-settings"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-2-configure-application-settings"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Grant API Access:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;In the &amp;ldquo;OAuth Scopes&amp;rdquo; section of your application, enable the following scopes:
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;sp:scopes:default&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;sp:read:audit-events&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;sp:read:activity-events&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;sp:read:account-activity&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;&lt;code&gt;sp:read:tenant-settings&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Note Application Credentials:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Copy the &lt;strong&gt;Client ID&lt;/strong&gt; and &lt;strong&gt;Client Secret&lt;/strong&gt; from the application settings.&lt;/li&gt;
&lt;li&gt;Note your &lt;strong&gt;Base URL&lt;/strong&gt; (e.g., &lt;code&gt;https://your-tenant.identitynow.com&lt;/code&gt;).&lt;/li&gt;
&lt;li&gt;&lt;em&gt;&lt;strong&gt;You will need to provide this information to SolCyber&lt;/strong&gt;&lt;/em&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="step-3-configure-log-collection"&gt;Step 3: Configure Log Collection &lt;a href="#step-3-configure-log-collection" id="step-3-configure-log-collection"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-3-configure-log-collection"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Enable Audit Logging:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Go to Admin &amp;gt; Audit Configuration in your Sailpoint IdentityNow tenant.&lt;/li&gt;
&lt;li&gt;Ensure audit logging is enabled for the following events:
&lt;ul&gt;
&lt;li&gt;Authentication events&lt;/li&gt;
&lt;li&gt;Authorization events&lt;/li&gt;
&lt;li&gt;User management events&lt;/li&gt;
&lt;li&gt;Role and permission changes&lt;/li&gt;
&lt;li&gt;Access reviews and certifications&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Configure Activity Logging:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Go to Admin &amp;gt; Activity Configuration.&lt;/li&gt;
&lt;li&gt;Enable activity logging for:
&lt;ul&gt;
&lt;li&gt;User login/logout events&lt;/li&gt;
&lt;li&gt;Application access events&lt;/li&gt;
&lt;li&gt;Data access events&lt;/li&gt;
&lt;li&gt;Administrative actions&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Configure Account Activity Logging:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Go to Admin &amp;gt; Account Activity Configuration.&lt;/li&gt;
&lt;li&gt;Enable account activity logging for:
&lt;ul&gt;
&lt;li&gt;Account provisioning and deprovisioning events&lt;/li&gt;
&lt;li&gt;Account attribute changes&lt;/li&gt;
&lt;li&gt;Account status changes&lt;/li&gt;
&lt;li&gt;Account access and modification events&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id="step-4-network-configuration"&gt;Step 4: Network Configuration &lt;a href="#step-4-network-configuration" id="step-4-network-configuration"&gt;&lt;/a&gt;&lt;a class="anchor" href="#step-4-network-configuration"&gt;#&lt;/a&gt;&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Whitelist Databahn IPs:&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;Add Databahn&amp;rsquo;s IP addresses to your Sailpoint tenant&amp;rsquo;s allowed IPs if IP restrictions are enabled:
&lt;ul&gt;
&lt;li&gt;3.229.112.66&lt;/li&gt;
&lt;li&gt;3.223.27.127&lt;/li&gt;
&lt;li&gt;52.201.54.124&lt;/li&gt;
&lt;li&gt;52.203.151.207&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Configure CORS (if needed):&lt;/strong&gt;
&lt;ul&gt;
&lt;li&gt;If using web-based authentication flows, ensure CORS is properly configured.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;blockquote class='book-hint note' &gt;&lt;div class="kb-alert-icon" aria-hidden="true"&gt;&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2.2" stroke-linecap="round" stroke-linejoin="round"&gt;&lt;circle cx="12" cy="12" r="10"/&gt;&lt;path d="M12 16v-4"/&gt;&lt;path d="M12 8h.01"/&gt;&lt;/svg&gt;&lt;/div&gt;&lt;div class="kb-alert-body"&gt;
&lt;p&gt;&lt;strong&gt;Sailpoint Integration Reference&lt;/strong&gt;&lt;/p&gt;</description></item><item><title>Zscaler ZPA</title><link>https://kb.solcyber.com/data-pipeline-management-setup-guides/zscaler-zpa/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://kb.solcyber.com/data-pipeline-management-setup-guides/zscaler-zpa/</guid><description>&lt;ul&gt;
&lt;li&gt;Go to &lt;strong&gt;Configuration &amp;amp; Control&lt;/strong&gt; &amp;gt; &lt;strong&gt;Private Infrastructure&lt;/strong&gt; &amp;gt; &lt;strong&gt;Log Streaming Service&lt;/strong&gt; &amp;gt; &lt;strong&gt;Log Receivers&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Click &lt;strong&gt;Add Log Receiver&lt;/strong&gt;. The Add Log Receiver window appears.&lt;/li&gt;
&lt;li&gt;In the Add Log Receiver window, configure the following tabs:&lt;/li&gt;
&lt;/ul&gt;
&lt;figure&gt;&lt;img src="https://kb.solcyber.com/assets/unknown.png" alt=""&gt;&lt;figcaption&gt;&lt;/figcaption&gt;&lt;/figure&gt;
&lt;p&gt;&lt;strong&gt;Log Receiver&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;On the Log Receiver tab:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Name:&lt;/strong&gt; Enter a name for the log receiver. The name cannot contain special characters, with the exception of periods (.), hyphens (-), and underscores ( _ ).&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Description:&lt;/strong&gt; Optional.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Domain or IP Address:&lt;/strong&gt; Enter IP address for the log receiver.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;TCP Port:&lt;/strong&gt; Enter the TCP port number provided by SolCyber.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;TLS Encryption:&lt;/strong&gt; Select DISABLED.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;App Connector Groups:&lt;/strong&gt; Choose the App Connector groups that can forward logs to the receiver, and click &lt;strong&gt;Done&lt;/strong&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Click &lt;strong&gt;Next&lt;/strong&gt;.&lt;/p&gt;</description></item></channel></rss>