Integrations: Log Sources
1Password
Monitor your password management platform for suspicious activity.
Apache
Inspect all web activity for signs of suspicious behavior.
AppOmni
Monitor your Software as a Service security posture.
Asana
Monitor Asana audit logs to identify suspicious activity in real-time.
Atlassian
Monitor Atlassian audit logs to identify suspicious activity in real-time.
Auditd
Monitor system-level activities in your Linux environment.
Auth0
Monitor user authentication and authorization activities in Auth0.
AWS ALB
Monitor requests sent to your load balancer for suspicious activity.
AWS Aurora
Monitor and detect any suspicious database events.
AWS CloudFront
Analyze CDN traffic for signs of unusual behavior.
AWS CloudTrail
Identify any suspicious activity within your AWS infrastructure.
AWS CloudWatch
Monitor any resource changes within your AWS environment.
AWS Config
Monitor the configuration of your AWS resources.
AWS EKS
Monitor your Kubernetes environment for suspicious activity.
AWS GuardDuty
Monitor your AWS environment for malicious activity and unauthorized behavior.
AWS S3
Monitor all requests made to AWS S3 buckets.
AWS Security Hub
Correlate AWS Security Hub findings.
AWS Transit Gateway
Monitor the IP traffic flowing through your transit gateway.
AWS VPC
Monitor the IP traffic going to and from network interfaces in your VPC.
AWS WAF
Investigate traffic that is analyzed by your web Access Control Lists (ACLs).
Azure
Continuously monitor your Azure account.
Bitwarden
Identify any abnormal user activity in your organization's Bitwarden account.
Box
Gain complete visibility into your organization’s content management and file sharing.
Carbon Black
Monitor endpoint activity for suspicious behavior.
Cisco Umbrella
Identify any suspicious or malicious domain addresses or DNS requests.
Cloudflare
Inspect network traffic for signs of suspicious behavior.
CrowdStrike
Gain complete visibility into your managed endpoints.
Docker
Gain complete visibility into your Docker system events.
Dropbox
Identify any suspicious file-sharing activity within your organization.
Duo
Monitor your access management tools for suspicious activity.
Envoy
Monitor network activity for suspicious behavior.
Fastly
Monitor network traffic for signs of suspicious behavior.
Fluentd
Inspect application activity for any signs of suspicious behavior.
GCP
Gain complete visibility into activity across your cloud service.
GitHub
Identify any vulnerabilities within your GitHub repositories.
GitLab
Identify any suspicious behavior within your GitLab environment.
Google Workspace
Identify any suspicious activity within your Google Workspace applications.
Heroku
Monitor your Heroku applications, infrastructure, and admin actions.
Jamf Pro
Monitor Jamf Pro login events for suspicious activity.
Juniper
Monitor network traffic for attack attempts or probes.
Lacework
Gain complete visibility into your cloud and container environments.
Material Security
Monitor threats in Google Workspace and M365.
Microsoft 365
Monitor your team’s communication and collaboration tools for suspicious activity.
Microsoft Graph
Monitor security alerts across Microsoft products, services, and partners.
MongoDB Atlas
Monitor events within your MongoDB Atlas organization or project.
Netskope
Identify any suspicious cloud-based app or service activity.
Nginx
Monitor Nginx access logs and gain complete visibility into web server activity.
Notion
Continuously monitor your Notion workspace.
Okta
Monitor Okta logs to gain complete visibility into your IdP activity.
OneLogin
Monitor your IdP for suspicious activity.
Osquery
Gain complete visibility into your operating system activity.
OSSEC
Monitor OSSEC logs to gain complete security visibility into host activity.
Proofpoint
Detect email attacks.
Push Security
Defend against identity attacks.
Salesforce
Monitor your sales operations data for suspicious activity.
SentinelOne
Monitor your endpoint data, network activity, and DNS requests.
Slack
Monitor your team’s communication platform for suspicious activity.
Snyk
Monitor for any changes within your Snyk Organization.
Sophos
Monitor endpoint policy violations and data loss prevention events.
Sublime Security
Monitor email threats.
Suricata
Identify any suspicious traffic or domain activity.
Sysdig
Gain complete visibility into Sysdig platform activity.
Syslog
Monitor machine and network activity for suspicious behavior.
Tailscale
Monitor your team’s Tailscale network.
Teleport
Inspect all SSH access activity for signs of suspicious behavior.
Tenable
Gain complete visibility into your network assets.
Thinkst Canary
Detect lateral movement in your environment.
Tines
Monitor any changes within your Tines tenant.
Windows Event
Monitor application, system, and security notifications from Windows machines.
Wiz
Protect your cloud security controls.
Zeek
Inspect network traffic and DNS protocols for suspicious activity.
Zendesk
Monitor unusual activity within your Zendesk account.
Zoom
Monitor abnormal user activity within your Zoom account.
Zscaler
Monitor application, network, and device access.