Deployment Overview Your appliance has been pre-configured based on the information provided at the time of your order for rapid deployment into your environment. The deployment consists of the following high level steps: Configure Firewall Rules ...
Purpose This document identifies the detections that are available to CyFlare clients from the identified managed security services. Filters & Definitions State - This represents whether the default mode for the detection. It may be On or Off by ...
Overview The Windows agent collects relevant security data from Windows event logs running. Forwarding Windows event logs provides necessary log data required for many compliance regulations and increases overall visibility within the organization. ...
Overview A Linux agent sensor is a managed background daemon that works as a network sensor, without log forwarding, that also monitors: process info command execution files file events The agent sensor converts that information to metadata and ...
Overview Office 365 is a critical part of your infrastructure. The Pulse Breach Detection platform provides API based integration with Office 365 & Azure AD to provide visibility into system changes, file sharing and authentication related events ...