Samurai XDR Integrations facilitate the ingestion of data sources from a wide range of third party vendors. Our Integrations are updated regularly as new and emerging technologies are released.
Each Integration typically requires a configuration guide outlining steps you must follow to integrate your data source to Samurai XDR.
For details such as transport methods and logs collected please refer to each supporting vendor configuration guide by clicking the link in the table or browsing directly to Product Integration Guides.
If you cannot locate an Integration Guide, please reach out to your NTT contact for further information.
Available configuration guides
In the pipeline
Vendor | Product |
Amazon | Web Services Management Plane |
Amazon | Web Services VPC Flow Logs |
Apache | Tomcat Web Server |
Apache | Web Server |
Aruba Networks | Aruba Wireless Access Points |
Barracuda | Spam and Virus Firewall |
Barracuda | Web Application Firewall |
Barracuda | Web Security Gateway |
Cisco | AMP for Networks |
Cisco | Edge routers |
Cisco | Email Security Appliance (ESA) |
Cisco | Identity Services Engine |
Cisco | Nexus Switch |
Cisco | Secure Access by Duo |
Cisco | Wireless LAN Controller - Syslog |
Cisco | Secure Endpoint |
Citrix | Application Delivery Switch (ADX) |
Cloudflare | Cloudflare One (SASE) |
Crowdstrike | Falcon Insight |
Crowdstrike | Falcon Prevent |
Dell | Dell Quest InTrust Windows Event Log Management |
Eclipse | Jetty |
F5 Networks | BIG-IP Application Security Manager (ASM) |
F5 Networks | BIG-IP Local Traffic Manager (LTM) |
FireEye | Email Security |
FireEye | Endpoint Security |
FireEye | Network Security |
Forcepoint | Firewall Enterprise |
Forcepoint | Web Security Cloud |
Forcepoint | Web Security Gateway |
Fortinet | FortiWeb Web Application Firewall |
Workspace | |
HP | WLAN Controller |
IBM | Websphere |
Imperva | Database Activity Monitoring |
Imperva | Directory Services Monitoring |
Imperva | File Activity Monitoring |
Imperva | SharePoint |
Imperva | Web Application Firewall |
Infoblox | DNS |
Juniper Networks | Switch or Router |
Juniper Networks | JunOS Firewall |
Juniper Networks | ScreenOS Firewall |
McAfee | Application Control |
McAfee | Database Activity Monitoring |
McAfee | DLP Endpoint Protection |
McAfee | Endpoint Security (ENS) |
McAfee | Host Intrusion Prevention |
McAfee | IPS |
McAfee | Network Security Platform |
McAfee | Web Gateway |
Microsoft | Azure - Active Directory |
Microsoft | Azure - NSG Flow Logs |
Microsoft | Azure Application Gateway |
Microsoft | Azure Firewall |
Microsoft | Azure Log Analytics |
Microsoft | Azure Sentinel |
Microsoft | Defender for Cloud Apps (CASB) |
Microsoft | SQL Server |
Microsoft | Windows Domain Controller |
Microsoft | Windows DHCP |
Mimecast | Email Security |
Nokia | Vital QIP DNS |
Okta | IDM |
Oracle | Database |
Oracle | WebLogic |
Palo Alto Networks | Prisma Access Panorama-Managed for mobile users |
Palo Alto Networks | Prisma Access Panorama-Managed for remote networks |
Palo Alto Networks | Traps ESM Agent |
ProofPoint | Targeted Attack Protection |
Pulse Secure | Pulse Policy Secure |
RSA | Authentication Manager |
Salesforce | Audit |
Skyhigh Security | Cloud Access Security Broker |
SonicWALL | Firewall |
SonicWALL | SonicWALL SSL-VPN 2000 |
Sophos | Endpoint Security and Control |
Sophos | Intercept-X (via Smart Central) |
Sophos | SG Series UTM |
SourceFire | Defense Center |
Splunk | Enterprise |
Squid | Proxy |
Symantec | Advanced Security Gateway |
Symantec | Data Loss Prevention |
Symantec | End-Point Protection (SEP) |
Symantec | Web Proxy (Proxy SG) |
Symantec | Web Security Service |
Thinkst | Canary |
Trend Micro | ApexOne |
Trend Micro | Deep Discovery Analyzer |
Trend Micro | Deep Discovery Inspector |
Trend Micro | Deep Security |
Trend Micro | IPS - directly from sensor |
Trend Micro | IPS - via Security Management System |
Trend Micro | OfficeScan |
Trend Micro | Trend Micro InterScan Web Security Virtual Appliance |
Trend Micro | Vulnerability Protection Manager |
Tripwire | Enterprise |
UNIX/Linux | Syslogd or Syslog-ng, rsyslog |
Vectra | Vectra |
VMware | VMWare vCenter Console |
VMware Carbon Black | App Control |
VMware Carbon Black | Cloud Endpoint Standard |
VMware Carbon Black | EDR |
Zscaler | Private Access (ZPA) |
Comments
0 comments
Article is closed for comments.