This integration utilizes Analyst1's system to enrich Demisto indicators with data provided by the Analyst1 REST API, such as actor and malware information, activity and reported dates, evidence and hit counts, and more. All of your data is stored on solid state disks (SSDs) and automatically replicated across multiple Availability Zones in an AWS region, providing built-in high availability and data durability. DynamoDB automatically spreads the data and traffic for your tables over a sufficient number of servers to handle your throughput and storage requirements, while maintaining consistent and fast performance. You can scale up or scale down your tables' throughput capacity without downtime or performance degradation, and use the AWS Management Console to monitor resource utilization and performance metrics. With DynamoDB, you can create database tables that can store and retrieve any amount of data, and serve any level of request traffic. DynamoDB lets you offload the administrative burdens of operating and scaling a distributed database, so that you don't have to worry about hardware provisioning, setup and configuration, replication, software patching, or cluster scaling. ![]() Retrieve alerts from the AlphaSOC Analytics EngineĭNS and IP threat intelligence via the AlphaSOC platformĪmazon DynamoDB Amazon DynamoDB is a fully managed NoSQL database service that provides fast and predictable performance with seamless scalability. Searches for and monitors alarms and events from AlienVault USM Anywhere. Use the AlienVault Reputation feed integration to fetch indicators from the feed. Query Indicators of Compromise in AlienVault OTX. This integration fetches indicators from AlienVault OTX using a TAXII client. Use the Akamai WAF SIEM integration to retrieve security events from Akamai Web Application Firewall (WAF) service.Īlexa provides website ranking information that can be useful in determining if the domain in question has a strong web presence.Īlexa provides website ranking information that can be useful when determining if a domain has a strong web presence.Īlibaba logs event collector integration for XSIAM. This is the modified version where a new command "akamai-update-network-list-elements" was added by the SA. Use the Akamai WAF integration to manage common sets of lists used by various Akamai security products and features. Use the Aha! integration to list and manage Cortex XSOAR features from Aha. The Active Directory Query integration enables you to access and manage Active Directory objects (users, contacts, and computers).Īgari Phishing Defense stops phishing, BEC, and other identity deception attacks that trick employees into harming your business. This Integration runs commands on an Active Directory server You can filter returned indicators by indicator type, indicator severity, threat type, confidence, and malware family (each of these are an integration parameter).ĪCTI provides intelligence regarding security threats and vulnerabilities. ![]() Use Accenture CTI Feed instead.įetches indicators from a ACTI feed. Check the Detailed Information section for more information on how to configure the integration.Īcalvio ShadowPlex is a comprehensive Autonomous Deception Platform that offers Advanced Threat Detection, Investigation and Response capabilities.ĭeprecated. The SSL IP Blacklist contains all hosts (IP addresses) that SSLBL has seen in the past 30 days and identified as being associated with a malicious SSL certificate.Ĭentral repository to report and identify IP addresses that have been associated with malicious activity online. To stop these advanced attacks, Abnormal leverages the industry’s most advanced behavioral data science to baseline known good behavior and detects anomalies.Ībnormal Security Event Collector integration for XSIAM.Ībsolute is an adaptive endpoint security solution that delivers device security, data security, and asset management of endpoints. Use the Inventa integration to generate DSAR reports within Inventa instance and retrieve DSAR data for the XSOARĪbnormal Security detects the whole spectrum of email attacks, from vendor email compromise and spear-phishing to unwanted email spam and graymail. Find reference documentation for Integrations, Automations, Playbooks and more.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |