We use the data sent by your third-party security source to monitor your security posture and alert you to any potentially threatening events that have been observed.
- From your Red Canary homepage, click Integrations.
- From the Integrations section, locate and then click the third-party security source you want to integrate with Red Canary.
Note: If you do not see your security product listed, click See all integrations. - In the search bar, type and then select your third-party security source.
- Continue onto the next step by configuring your third-party security source in Red Canary.
Note: Your third-party security source may require that you contact Red Canary to configure.
Integration Table
Below the Integrations section there is an integration table.
Key | Displays |
1 | The Display Name shows the name of the product as it is displayed. |
2 | The Product Name provides the name of the Product. |
3 | The Ingest Type column displays how the data is ingested, for example, Streaming, Syslog, or API Poll. |
4 | The Data Is column describes the current status of your ingested data. This gives you better insight into what Red Canary does with your data after ingestion.
|
5 | Telemetry (1wk) ↑ displays the telemetry volume from the last seven days for this integration. |
6 | Alerts (1wk) displays the number of alerts from the last seven days. |
7 | The Status displays either Active or Inactive. |
For more information about Integrations, check out the Integrations section in the Red Canary Help Center.
Comments
0 comments
Please sign in to leave a comment.