Integrations: Log Sources
![](https://panther.com/wp-content/uploads/2021/11/1password-logo-70x70.png)
1Password
Monitor your password management platform for suspicious activity.
![](https://panther.com/wp-content/uploads/apache-logo-70x70.png)
Apache
Inspect all web activity for signs of suspicious behavior.
![](https://panther.com/wp-content/uploads/2024/06/appomni-logo-white-70x70.png)
AppOmni
Monitor your Software as a Service security posture.
![](https://panther.com/wp-content/uploads/2022/03/Asana-Logo-Icon-70x70.png)
Asana
Monitor Asana audit logs to identify suspicious activity in real-time.
![](https://panther.com/wp-content/uploads/2022/01/Atlassian-icon-blue-onecolor@2x-70x70.png)
Atlassian
Monitor Atlassian audit logs to identify suspicious activity in real-time.
![](https://panther.com/wp-content/uploads/2023/07/linux-70x70.png)
Auditd
Monitor system-level activities in your Linux environment.
![](https://panther.com/wp-content/uploads/2023/07/auth0-in-70x70.png)
Auth0
Monitor user authentication and authorization activities in Auth0.
![](https://panther.com/wp-content/uploads/Elastic-Load-Balancing-ELB-70x70.png)
AWS ALB
Monitor requests sent to your load balancer for suspicious activity.
![](https://panther.com/wp-content/uploads/2023/06/aws-aurora-70x78.png)
AWS Aurora
Monitor and detect any suspicious database events.
![](https://panther.com/wp-content/uploads/2021/01/AWS-CloudTrail-70x70.png)
AWS CloudTrail
Identify any suspicious activity within your AWS infrastructure.
![](https://panther.com/wp-content/uploads/Amazon-CloudWatch-70x70.png)
AWS CloudWatch
Monitor any resource changes within your AWS environment.
![](https://panther.com/wp-content/uploads/AWS-Config-70x70.png)
AWS Config
Monitor the configuration of your AWS resources.
![](https://panther.com/wp-content/uploads/2023/06/aws-eks-70x70.png)
AWS EKS
Monitor your Kubernetes environment for suspicious activity.
![](https://panther.com/wp-content/uploads/Amazon-GuardDuty_light-bg-70x70.png)
AWS GuardDuty
Monitor your AWS environment for malicious activity and unauthorized behavior.
![](https://panther.com/wp-content/uploads/Amazon-Simple-Storage-Service-S3-70x70.png)
AWS S3
Monitor all requests made to AWS S3 buckets.
![](https://panther.com/wp-content/uploads/2023/11/aws-security-hub-logo-70x70.png)
AWS Security Hub
Correlate AWS Security Hub findings.
![](https://panther.com/wp-content/uploads/2023/06/aws-transit-gateway-70x69.png)
AWS Transit Gateway
Monitor the IP traffic flowing through your transit gateway.
![](https://panther.com/wp-content/uploads/Amazon-VPC-70x70.png)
AWS VPC
Monitor the IP traffic going to and from network interfaces in your VPC.
![](https://panther.com/wp-content/uploads/AWS-WAF-70x70.png)
AWS WAF
Investigate traffic that is analyzed by your web Access Control Lists (ACLs).
![](https://panther.com/wp-content/uploads/2023/08/azure-70x70.png)
Azure
Continuously monitor your Azure account.
![](https://panther.com/wp-content/uploads/2023/05/bitwarden-70x70.png)
Bitwarden
Identify any abnormal user activity in your organization's Bitwarden account.
![](https://panther.com/wp-content/uploads/box-logo-70x33.png)
Box
Gain complete visibility into your organization’s content management and file sharing.
![](https://panther.com/wp-content/uploads/2023/08/carbon-black-70x80.png)
Carbon Black
Monitor endpoint activity for suspicious behavior.
![](https://panther.com/wp-content/uploads/cisco-logo-70x70.png)
Cisco Umbrella
Identify any suspicious or malicious domain addresses or DNS requests.
![](https://panther.com/wp-content/uploads/Cloudflare-logo-70x70.png)
Cloudflare
Inspect network traffic for signs of suspicious behavior.
![](https://panther.com/wp-content/uploads/2020/09/crowdstrike-logo-1-70x70.png)
CrowdStrike
Gain complete visibility into your managed endpoints.
![](https://panther.com/wp-content/uploads/2023/08/docker-icon-1-70x70.png)
Docker
Gain complete visibility into your Docker system events.
![](https://panther.com/wp-content/uploads/2022/08/Dropbox-Logo-70x70.png)
Dropbox
Identify any suspicious file-sharing activity within your organization.
![](https://panther.com/wp-content/uploads/Duo-Security-70x70.png)
Duo
Monitor your access management tools for suspicious activity.
![](https://panther.com/wp-content/uploads/2023/08/envoy-logo-70x70.png)
Envoy
Monitor network activity for suspicious behavior.
![](https://panther.com/wp-content/uploads/Fastly-logo-70x70.png)
Fastly
Monitor network traffic for signs of suspicious behavior.
![](https://panther.com/wp-content/uploads/fluentd-logo-70x70.png)
Fluentd
Inspect application activity for any signs of suspicious behavior.
![](https://panther.com/wp-content/uploads/gcp-logo-70x70.png)
GCP
Gain complete visibility into activity across your cloud service.
![](https://panther.com/wp-content/uploads/2021/08/github-transparent-70x70.png)
GitHub
Identify any vulnerabilities within your GitHub repositories.
![](https://panther.com/wp-content/uploads/Gitlab-logo-70x67.png)
GitLab
Identify any suspicious behavior within your GitLab environment.
![](https://panther.com/wp-content/uploads/gworkspaceicon-70x70.png)
Google Workspace
Identify any suspicious activity within your Google Workspace applications.
![](https://panther.com/wp-content/uploads/2023/07/heroku-logo-solid-white-transparent-70x70.png)
Heroku
Monitor your Heroku applications, infrastructure, and admin actions.
![](https://panther.com/wp-content/uploads/2022/08/JAMF-Pro-Logo-70x70.png)
Jamf Pro
Monitor Jamf Pro login events for suspicious activity.
![](https://panther.com/wp-content/uploads/juniper-70x28.png)
Juniper
Monitor network traffic for attack attempts or probes.
![](https://panther.com/wp-content/uploads/lacework-logo-70x70.png)
Lacework
Gain complete visibility into your cloud and container environments.
![](https://panther.com/wp-content/uploads/2021/08/365-transparent-70x84.png)
Microsoft 365
Monitor your team’s communication and collaboration tools for suspicious activity.
![](https://panther.com/wp-content/uploads/2022/09/Microsoft-Graph-Logo-70x70.png)
Microsoft Graph
Monitor security alerts across Microsoft products, services, and partners.
![](https://panther.com/wp-content/uploads/2022/10/image1-70x70.png)
MongoDB Atlas
Monitor events within your MongoDB Atlas organization or project.
![](https://panther.com/wp-content/uploads/2023/07/Netskope-70x70.png)
Netskope
Identify any suspicious cloud-based app or service activity.
Nginx
Monitor Nginx access logs and gain complete visibility into web server activity.
![](https://panther.com/wp-content/uploads/2023/10/Notion_app_logo-70x70.png)
Notion
Continuously monitor your Notion workspace.
![](https://panther.com/wp-content/uploads/okta-logo-70x70.png)
Okta
Monitor Okta logs to gain complete visibility into your IdP activity.
![](https://panther.com/wp-content/uploads/Onelogin-logo-70x70.png)
OneLogin
Monitor your IdP for suspicious activity.
![](https://panther.com/wp-content/uploads/osquery-logo-70x70.png)
Osquery
Gain complete visibility into your operating system activity.
![](https://panther.com/wp-content/uploads/ossec-70x70.png)
OSSEC
Monitor OSSEC logs to gain complete security visibility into host activity.
![](https://panther.com/wp-content/uploads/2024/06/push-security-logo-v1-70x70.png)
Push Security
Defend against identity attacks.
Salesforce
Monitor your sales operations data for suspicious activity.
![](https://panther.com/wp-content/uploads/2023/01/sentinelone-logo-70x70.png)
SentinelOne
Monitor your endpoint data, network activity, and DNS requests.
![](https://panther.com/wp-content/uploads/Slack-logo-70x70.png)
Slack
Monitor your team’s communication platform for suspicious activity.
![](https://panther.com/wp-content/uploads/2022/07/snyk-logo-light-70x70.png)
Snyk
Monitor for any changes within your Snyk Organization.
![](https://panther.com/wp-content/uploads/Sophos-logo-70x70.png)
Sophos
Monitor endpoint policy violations and data loss prevention events.
![](https://panther.com/wp-content/uploads/suricata-logo-70x70.png)
Suricata
Identify any suspicious traffic or domain activity.
![](https://panther.com/wp-content/uploads/2023/03/Sysdig-Logo-1-70x70.png)
Sysdig
Gain complete visibility into Sysdig platform activity.
![](https://panther.com/wp-content/uploads/2023/07/linux-70x70.png)
Syslog
Monitor machine and network activity for suspicious behavior.
![](https://panther.com/wp-content/uploads/2023/07/tailscale-70x70.png)
Tailscale
Monitor your team’s Tailscale network.
![](https://panther.com/wp-content/uploads/teleport-icon-integrations.png)
Teleport
Inspect all SSH access activity for signs of suspicious behavior.
![](https://panther.com/wp-content/uploads/2023/08/tenable-logo-70x70.png)
Tenable
Gain complete visibility into your network assets.
![](https://panther.com/wp-content/uploads/Tines-70x70.png)
Tines
Monitor any changes within your Tines tenant.
![](https://panther.com/wp-content/uploads/2023/07/windows-70x70.png)
Windows Event
Monitor application, system, and security notifications from Windows machines.
![](https://panther.com/wp-content/uploads/zeek-logo-70x67.png)
Zeek
Inspect network traffic and DNS protocols for suspicious activity.
![](https://panther.com/wp-content/uploads/2022/06/Zendesk-solo-z-1-70x70.png)
Zendesk
Monitor unusual activity within your Zendesk account.
![](https://panther.com/wp-content/uploads/2021/11/zoom-70x70.png)
Zoom
Monitor abnormal user activity within your Zoom account.