Skip to content

Commit

Permalink
Merge pull request #1939 from SEKOIA-IO/migrate_missing_doc
Browse files Browse the repository at this point in the history
Migrate missing doc
  • Loading branch information
pbivic authored Aug 2, 2024
2 parents 710e8f2 + d2461fb commit 756527c
Show file tree
Hide file tree
Showing 11 changed files with 11 additions and 11 deletions.
2 changes: 1 addition & 1 deletion _shared_content/intelligence_center/integrations/splunk.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ Sekoia is providing an application for Splunk to detect threats in your logs bas

## Prerequisites

- An operational Splunk instance with administrator privileges (**Enterprise** for OnPrem or **Cloud** for the Saas version)
- An operational Splunk instance with administrator privileges (**Enterprise** for OnPrem or **Cloud** for the SaaS version)
- An active Sekoia.io license with access to the CTI
- An access to Sekoia.io User Center with the role that contains the permission to [create an API key](https://docs.sekoia.io/getting_started/manage_api_keys/) (e.g. Built-in [Analyst Role](https://docs.sekoia.io/getting_started/roles/#functionality-of-built-in-roles) or create a custom role with [ic_viewer permissions](https://docs.sekoia.io/getting_started/roles/#legacy-roles) <a name="api_key"></a>

Expand Down
2 changes: 1 addition & 1 deletion docs/integration/categories/email/vade.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ type: intake
Vade for M365 offers AI-based protection against dynamic, email-borne cyberattacks targeting Microsoft 365.
It improves user experience and catches 10x more advanced threats than Microsoft.

In this documenation we will explain how to collect and send Vade for M365 logs to Sekoia.io.
In this documentation we will explain how to collect and send Vade for M365 logs to Sekoia.io.

- **Vendor**: Vade
- **Plan**: Defend Prime
Expand Down
2 changes: 1 addition & 1 deletion docs/integration/categories/endpoint/cybereason_malop.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ Cybereason offers a set of Endpoint Detection and Response (EDR) solutions. Thro

- **Vendor**: Cybereason
- **Plan**: Defend Core & Defend Prime
- **Supported environment**: Saas
- **Supported environment**: SaaS
- **Detection based on**: Alert

!!! warning
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ Cybereason offers a set of Endpoint Detection and Response (EDR) solutions. Thro

- **Vendor**: Cybereason
- **Plan**: Defend Prime
- **Supported environment**: Saas
- **Supported environment**: SaaS
- **Detection based on**: Telemetry

Please find below information available in MalOp activities:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ Bitsight Security Performance Management enables organizations to continuously m

- **Vendor**: BitSight Technologies
- **Plan**: Defend Core & Defend Prime
- **Supported environment**: Saas
- **Supported environment**: SaaS
- **Detection based on**: Alert

!!! warning
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ Digital Shadows SearchLight continuously searches and identifies any unwanted ex

## Step-by-Step Configuration Procedure

In this documenation we will explain how to collect and send SearchLight logs to Sekoia.io.
In this documentation we will explain how to collect and send SearchLight logs to Sekoia.io.

### Instructions on the 3rd Party Solution

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ type: intake

## Overview

ExtraHop Reveal(x) 360 is a cloud-based network detection and response platform offering protection and detections for on-premises and cloud environments. In this documenation we will explain how to collect and send Reveal(x) 360 events to Sekoia.io.
ExtraHop Reveal(x) 360 is a cloud-based network detection and response platform offering protection and detections for on-premises and cloud environments. In this documentation we will explain how to collect and send Reveal(x) 360 events to Sekoia.io.

- **Vendor**: ExtraHop
- **Plan**: Defend Core & Defend Prime
Expand Down
2 changes: 1 addition & 1 deletion docs/integration/categories/network_security/ubika_waap.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ Ubika WAAP Gateway detect and prevent threats against your web applications and

- **Vendor**: Ubika
- **Plan**: Prime
- **Supported environment**: Saas
- **Supported environment**: SaaS
- **Detection based on**: Alert, Telemetry
- **Supported application or feature**: Web application firewall logs

Expand Down
2 changes: 1 addition & 1 deletion docs/integration/categories/network_security/vectra.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ Vectra provides AI-powered incident detection and resolution support for native

- **Vendor**:
- **Plan**: Defend Core & Defend Prime
- **Supported environment**: Saas
- **Supported environment**: SaaS
- **Detection based on**: Telemetry
- **Supported application or feature**: Authentication logs

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ Zscaler Internet Access is a cloud-native security platform that delivers secure

- **Vendor**: Zscaler
- **Plan**: Defend Core & Defend Prime
- **Supported environment**: Saas
- **Supported environment**: SaaS
- **Detection based on**: Telemetry
- **Supported application or feature**: File monitoring, Process monitoring, Process use of network

Expand Down
2 changes: 1 addition & 1 deletion docs/integration/ingestion_methods/cloud_saas/overview.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Retrieved logs from a Cloud provider or a Saas platform
# Retrieved logs from a Cloud provider or a SaaS platform

In addition to the previously documented push modes (HTTPS, Syslog, Relp), Sekoia.io also possesses the capability to ingest data using a pulling mode.

Expand Down

0 comments on commit 756527c

Please sign in to comment.