From e29c7c8de7911c57c8a397a7cdab500e0e02a936 Mon Sep 17 00:00:00 2001 From: Bivic Date: Fri, 2 Aug 2024 11:22:55 +0200 Subject: [PATCH 1/2] Change Saas to SaaS --- _shared_content/intelligence_center/integrations/splunk.md | 2 +- docs/integration/categories/endpoint/cybereason_malop.md | 2 +- .../categories/endpoint/cybereason_malop_activity.md | 2 +- docs/integration/categories/network_security/bitsight_spm.md | 2 +- docs/integration/categories/network_security/ubika_waap.md | 2 +- docs/integration/categories/network_security/vectra.md | 2 +- docs/integration/categories/network_security/zscaler_zia.md | 2 +- docs/integration/ingestion_methods/cloud_saas/overview.md | 2 +- 8 files changed, 8 insertions(+), 8 deletions(-) diff --git a/_shared_content/intelligence_center/integrations/splunk.md b/_shared_content/intelligence_center/integrations/splunk.md index d39c25c986..de143c2692 100644 --- a/_shared_content/intelligence_center/integrations/splunk.md +++ b/_shared_content/intelligence_center/integrations/splunk.md @@ -4,7 +4,7 @@ Sekoia is providing an application for Splunk to detect threats in your logs bas ## Prerequisites -- An operational Splunk instance with administrator privileges (**Enterprise** for OnPrem or **Cloud** for the Saas version) +- An operational Splunk instance with administrator privileges (**Enterprise** for OnPrem or **Cloud** for the SaaS version) - An active Sekoia.io license with access to the CTI - An access to Sekoia.io User Center with the role that contains the permission to [create an API key](https://docs.sekoia.io/getting_started/manage_api_keys/) (e.g. Built-in [Analyst Role](https://docs.sekoia.io/getting_started/roles/#functionality-of-built-in-roles) or create a custom role with [ic_viewer permissions](https://docs.sekoia.io/getting_started/roles/#legacy-roles) diff --git a/docs/integration/categories/endpoint/cybereason_malop.md b/docs/integration/categories/endpoint/cybereason_malop.md index dc711b24ff..a2162b081b 100644 --- a/docs/integration/categories/endpoint/cybereason_malop.md +++ b/docs/integration/categories/endpoint/cybereason_malop.md @@ -8,7 +8,7 @@ Cybereason offers a set of Endpoint Detection and Response (EDR) solutions. Thro - **Vendor**: Cybereason - **Plan**: Defend Core & Defend Prime -- **Supported environment**: Saas +- **Supported environment**: SaaS - **Detection based on**: Alert !!! warning diff --git a/docs/integration/categories/endpoint/cybereason_malop_activity.md b/docs/integration/categories/endpoint/cybereason_malop_activity.md index 230bf3209b..f239a50e9d 100644 --- a/docs/integration/categories/endpoint/cybereason_malop_activity.md +++ b/docs/integration/categories/endpoint/cybereason_malop_activity.md @@ -8,7 +8,7 @@ Cybereason offers a set of Endpoint Detection and Response (EDR) solutions. Thro - **Vendor**: Cybereason - **Plan**: Defend Prime -- **Supported environment**: Saas +- **Supported environment**: SaaS - **Detection based on**: Telemetry Please find below information available in MalOp activities: diff --git a/docs/integration/categories/network_security/bitsight_spm.md b/docs/integration/categories/network_security/bitsight_spm.md index 7c6ae954ac..6289d17d7a 100644 --- a/docs/integration/categories/network_security/bitsight_spm.md +++ b/docs/integration/categories/network_security/bitsight_spm.md @@ -8,7 +8,7 @@ Bitsight Security Performance Management enables organizations to continuously m - **Vendor**: BitSight Technologies - **Plan**: Defend Core & Defend Prime -- **Supported environment**: Saas +- **Supported environment**: SaaS - **Detection based on**: Alert !!! warning diff --git a/docs/integration/categories/network_security/ubika_waap.md b/docs/integration/categories/network_security/ubika_waap.md index 258fe736cb..783afd3c2c 100644 --- a/docs/integration/categories/network_security/ubika_waap.md +++ b/docs/integration/categories/network_security/ubika_waap.md @@ -7,7 +7,7 @@ Ubika WAAP Gateway detect and prevent threats against your web applications and - **Vendor**: Ubika - **Plan**: Prime -- **Supported environment**: Saas +- **Supported environment**: SaaS - **Detection based on**: Alert, Telemetry - **Supported application or feature**: Web application firewall logs diff --git a/docs/integration/categories/network_security/vectra.md b/docs/integration/categories/network_security/vectra.md index 42002ddb6a..3b8eff60c5 100644 --- a/docs/integration/categories/network_security/vectra.md +++ b/docs/integration/categories/network_security/vectra.md @@ -8,7 +8,7 @@ Vectra provides AI-powered incident detection and resolution support for native - **Vendor**: - **Plan**: Defend Core & Defend Prime -- **Supported environment**: Saas +- **Supported environment**: SaaS - **Detection based on**: Telemetry - **Supported application or feature**: Authentication logs diff --git a/docs/integration/categories/network_security/zscaler_zia.md b/docs/integration/categories/network_security/zscaler_zia.md index ed1d66a98e..c3ad2b29bd 100644 --- a/docs/integration/categories/network_security/zscaler_zia.md +++ b/docs/integration/categories/network_security/zscaler_zia.md @@ -7,7 +7,7 @@ Zscaler Internet Access is a cloud-native security platform that delivers secure - **Vendor**: Zscaler - **Plan**: Defend Core & Defend Prime -- **Supported environment**: Saas +- **Supported environment**: SaaS - **Detection based on**: Telemetry - **Supported application or feature**: File monitoring, Process monitoring, Process use of network diff --git a/docs/integration/ingestion_methods/cloud_saas/overview.md b/docs/integration/ingestion_methods/cloud_saas/overview.md index f95803e50b..568cb38593 100644 --- a/docs/integration/ingestion_methods/cloud_saas/overview.md +++ b/docs/integration/ingestion_methods/cloud_saas/overview.md @@ -1,4 +1,4 @@ -# Retrieved logs from a Cloud provider or a Saas platform +# Retrieved logs from a Cloud provider or a SaaS platform In addition to the previously documented push modes (HTTPS, Syslog, Relp), Sekoia.io also possesses the capability to ingest data using a pulling mode. From d2461fb8b18530407cd41daa80e15585d468e8d2 Mon Sep 17 00:00:00 2001 From: Bivic Date: Fri, 2 Aug 2024 11:24:41 +0200 Subject: [PATCH 2/2] fix typo on "documentation" word --- docs/integration/categories/email/vade.md | 2 +- docs/integration/categories/network_security/digital_shadows.md | 2 +- .../categories/network_security/extrahop_revealx_360.md | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/docs/integration/categories/email/vade.md b/docs/integration/categories/email/vade.md index c327e4ae3b..eb5410fd84 100644 --- a/docs/integration/categories/email/vade.md +++ b/docs/integration/categories/email/vade.md @@ -7,7 +7,7 @@ type: intake Vade for M365 offers AI-based protection against dynamic, email-borne cyberattacks targeting Microsoft 365. It improves user experience and catches 10x more advanced threats than Microsoft. -In this documenation we will explain how to collect and send Vade for M365 logs to Sekoia.io. +In this documentation we will explain how to collect and send Vade for M365 logs to Sekoia.io. - **Vendor**: Vade - **Plan**: Defend Prime diff --git a/docs/integration/categories/network_security/digital_shadows.md b/docs/integration/categories/network_security/digital_shadows.md index 7cf5ff00d1..9c5d119b2a 100644 --- a/docs/integration/categories/network_security/digital_shadows.md +++ b/docs/integration/categories/network_security/digital_shadows.md @@ -14,7 +14,7 @@ Digital Shadows SearchLight continuously searches and identifies any unwanted ex ## Step-by-Step Configuration Procedure -In this documenation we will explain how to collect and send SearchLight logs to Sekoia.io. +In this documentation we will explain how to collect and send SearchLight logs to Sekoia.io. ### Instructions on the 3rd Party Solution diff --git a/docs/integration/categories/network_security/extrahop_revealx_360.md b/docs/integration/categories/network_security/extrahop_revealx_360.md index ad92e14d56..be4744182e 100644 --- a/docs/integration/categories/network_security/extrahop_revealx_360.md +++ b/docs/integration/categories/network_security/extrahop_revealx_360.md @@ -4,7 +4,7 @@ type: intake ## Overview -ExtraHop Reveal(x) 360 is a cloud-based network detection and response platform offering protection and detections for on-premises and cloud environments. In this documenation we will explain how to collect and send Reveal(x) 360 events to Sekoia.io. +ExtraHop Reveal(x) 360 is a cloud-based network detection and response platform offering protection and detections for on-premises and cloud environments. In this documentation we will explain how to collect and send Reveal(x) 360 events to Sekoia.io. - **Vendor**: ExtraHop - **Plan**: Defend Core & Defend Prime