Skip to content

Commit

Permalink
Merge pull request #1854 from SEKOIA-IO/feat/DasprenParadDoc
Browse files Browse the repository at this point in the history
Daspren: add documentation for Daspren Parad
  • Loading branch information
squioc authored Jul 1, 2024
2 parents 9f94eb0 + 50dca1e commit da40b3c
Show file tree
Hide file tree
Showing 2 changed files with 47 additions and 0 deletions.
46 changes: 46 additions & 0 deletions docs/xdr/features/collect/integrations/endpoint/daspren_parad.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
uuid: 23813540-b658-48dd-b030-e9b92168bbf4
name: Daspren Parad
type: intake

## Overview

Daspren is the only Data Detection and Response (DDR) that integrates detection and blocking of cyber attacks.
Daspren goes deep, using our patented data-centric AI to meticulously dissect and analyze every data access. It seamlessly intercepts and scrutinizes these access requests, ensuring that only legitimate, authorized applications can access your data, keeping it secure and protected.

!!! warning
Important note - This format is currently in beta. We highly value your feedback to improve its performance.

Parad is the data protection solution from Daspren. It monitors data activity and use AI to prevent data breaches coming from both the inside and the outside of your organization :

- File created, opened, deleted, moved or modified,
- Access rules breach attempts,
- Malicious processes detected.

## Supported events

This integration supports the following events:

- File monitoring events
- Malicious detection events

{!_shared_content/operations_center/detection/generated/suggested_rules_23813540-b658-48dd-b030-e9b92168bbf4_do_not_edit_manually.md!}

{!_shared_content/operations_center/integrations/generated/23813540-b658-48dd-b030-e9b92168bbf4.md!}

## Configure

### Create the intake

Go to the [intake page](https://app.sekoia.io/operations/intakes) and create a new intake from the format `Daspren - Parad`. Copy the intake key.

### Setup a Sink

To set up the integration:

1. Open the Parad CLI
2. Create a Sink from the CLI
1. Go to `Sinks > Add Sink`
2. Select the Sekoia Sink Variant
3. Type a name and paste the intake key
3. Create a Reporter from the CLI with `Reporters > Add Reporter`
4. Create a Link between the previously created Sink and Reporter
1 change: 1 addition & 0 deletions mkdocs.yml
Original file line number Diff line number Diff line change
Expand Up @@ -192,6 +192,7 @@ nav:
- Cybereason MalOp: xdr/features/collect/integrations/endpoint/cybereason_malop.md
- Cybereason MalOp activity: xdr/features/collect/integrations/endpoint/cybereason_malop_activity.md
- Darktrace Threat Visualizer: xdr/features/collect/integrations/endpoint/darktrace_threat_visualizer.md
- Daspren Parad: xdr/features/collect/integrations/endpoint/daspren_parad.md
- ESET Protect: xdr/features/collect/integrations/endpoint/eset_protect.md
- HarfangLab: xdr/features/collect/integrations/endpoint/harfanglab.md
- IBM AIX: xdr/features/collect/integrations/endpoint/ibm_aix.md
Expand Down

0 comments on commit da40b3c

Please sign in to comment.