Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Migrate missing doc #1939

Merged
merged 2 commits into from
Aug 2, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion _shared_content/intelligence_center/integrations/splunk.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ Sekoia is providing an application for Splunk to detect threats in your logs bas

## Prerequisites

- An operational Splunk instance with administrator privileges (**Enterprise** for OnPrem or **Cloud** for the Saas version)
- An operational Splunk instance with administrator privileges (**Enterprise** for OnPrem or **Cloud** for the SaaS version)
- An active Sekoia.io license with access to the CTI
- An access to Sekoia.io User Center with the role that contains the permission to [create an API key](https://docs.sekoia.io/getting_started/manage_api_keys/) (e.g. Built-in [Analyst Role](https://docs.sekoia.io/getting_started/roles/#functionality-of-built-in-roles) or create a custom role with [ic_viewer permissions](https://docs.sekoia.io/getting_started/roles/#legacy-roles) <a name="api_key"></a>

Expand Down
2 changes: 1 addition & 1 deletion docs/integration/categories/email/vade.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ type: intake
Vade for M365 offers AI-based protection against dynamic, email-borne cyberattacks targeting Microsoft 365.
It improves user experience and catches 10x more advanced threats than Microsoft.

In this documenation we will explain how to collect and send Vade for M365 logs to Sekoia.io.
In this documentation we will explain how to collect and send Vade for M365 logs to Sekoia.io.

- **Vendor**: Vade
- **Plan**: Defend Prime
Expand Down
2 changes: 1 addition & 1 deletion docs/integration/categories/endpoint/cybereason_malop.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ Cybereason offers a set of Endpoint Detection and Response (EDR) solutions. Thro

- **Vendor**: Cybereason
- **Plan**: Defend Core & Defend Prime
- **Supported environment**: Saas
- **Supported environment**: SaaS
- **Detection based on**: Alert

!!! warning
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ Cybereason offers a set of Endpoint Detection and Response (EDR) solutions. Thro

- **Vendor**: Cybereason
- **Plan**: Defend Prime
- **Supported environment**: Saas
- **Supported environment**: SaaS
- **Detection based on**: Telemetry

Please find below information available in MalOp activities:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ Bitsight Security Performance Management enables organizations to continuously m

- **Vendor**: BitSight Technologies
- **Plan**: Defend Core & Defend Prime
- **Supported environment**: Saas
- **Supported environment**: SaaS
- **Detection based on**: Alert

!!! warning
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ Digital Shadows SearchLight continuously searches and identifies any unwanted ex

## Step-by-Step Configuration Procedure

In this documenation we will explain how to collect and send SearchLight logs to Sekoia.io.
In this documentation we will explain how to collect and send SearchLight logs to Sekoia.io.

### Instructions on the 3rd Party Solution

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ type: intake

## Overview

ExtraHop Reveal(x) 360 is a cloud-based network detection and response platform offering protection and detections for on-premises and cloud environments. In this documenation we will explain how to collect and send Reveal(x) 360 events to Sekoia.io.
ExtraHop Reveal(x) 360 is a cloud-based network detection and response platform offering protection and detections for on-premises and cloud environments. In this documentation we will explain how to collect and send Reveal(x) 360 events to Sekoia.io.

- **Vendor**: ExtraHop
- **Plan**: Defend Core & Defend Prime
Expand Down
2 changes: 1 addition & 1 deletion docs/integration/categories/network_security/ubika_waap.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ Ubika WAAP Gateway detect and prevent threats against your web applications and

- **Vendor**: Ubika
- **Plan**: Prime
- **Supported environment**: Saas
- **Supported environment**: SaaS
- **Detection based on**: Alert, Telemetry
- **Supported application or feature**: Web application firewall logs

Expand Down
2 changes: 1 addition & 1 deletion docs/integration/categories/network_security/vectra.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ Vectra provides AI-powered incident detection and resolution support for native

- **Vendor**:
- **Plan**: Defend Core & Defend Prime
- **Supported environment**: Saas
- **Supported environment**: SaaS
- **Detection based on**: Telemetry
- **Supported application or feature**: Authentication logs

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ Zscaler Internet Access is a cloud-native security platform that delivers secure

- **Vendor**: Zscaler
- **Plan**: Defend Core & Defend Prime
- **Supported environment**: Saas
- **Supported environment**: SaaS
- **Detection based on**: Telemetry
- **Supported application or feature**: File monitoring, Process monitoring, Process use of network

Expand Down
2 changes: 1 addition & 1 deletion docs/integration/ingestion_methods/cloud_saas/overview.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Retrieved logs from a Cloud provider or a Saas platform
# Retrieved logs from a Cloud provider or a SaaS platform

In addition to the previously documented push modes (HTTPS, Syslog, Relp), Sekoia.io also possesses the capability to ingest data using a pulling mode.

Expand Down
Loading