Skip to content

Latest commit

 

History

History
284 lines (281 loc) · 931 KB

Exabeam Data Sources.md

File metadata and controls

284 lines (281 loc) · 931 KB

Exabeam Data Sources

Content Version:

The following list are the out-of-the-box supported Data Sources. This list is auto-generated by Vendor/Product fields of the Exabeam Content Parser Config Files.

Vendor Product
Abnormal Security Abnormal Security
Absolute Absolute SIEM Connector
Accellion Accellion
Kiteworks
AccessIT Universal.NET
Adaxes Adaxes
Airlock Airlock
Airlock Web Application Firewall
Akamai Akamai Siem
Cloud Akamai
Alert Logic Alert Logic
AlgoSec Firewall Analyzer
AMAG Symmetry Access Control
Amazon AWS Bastion
AWS CloudTrail
AWS CloudWatch
AWS GuardDuty
Anywhere365 Anywhere365
Apache Apache
Apache Guacamole
Apache Subversion Apache Subversion
APC APC
Apex One Apex One
AppSense Application Manager AppSense Application Manager
Arbor Arbor
Armis Armis
AssetView AssetView
ASUPIM ASUPIM
Atlassian Atlassian BitBucket
Attivo BOTsink
Avaya Avaya Ethernet Routing Switch
Avaya VPN Avaya VPN
AVI Networks Load Balancer
Axway Axway SFTP
Azure Advanced Threat Protection Azure Advanced Threat Protection
Azure Security Center Azure Security Center
Badge Badge
Badgepoint Badgepoint
Barracuda Barracuda Email Security Gateway
Barracuda Firewall
BeyondTrust BeyondTrust
BeyondTrust PasswordSafe
BeyondTrust PowerBroker
BeyondTrust Privilege Management
BeyondTrust Privileged Identity
BIND BIND
Bitdefender Bitdefender
Bitdefender GravityZone
Bitglass Bitglass CASB
BlackBerry BlackBerry Protect
BlueCat Networks BlueCat Networks Adonis
BlueCat Networks DHCP
Box Box Cloud Content Management
Brivo Brivo
Bromium Bromium Advanced Endpoint Security
Bromium Secure Platform
CatoNetworks Cato Cloud
Centrify Centrify Audit and Monitoring Service
Centrify Authentication Service
Centrify Infrastructure Services
Centrify Zero Trust Privilege Services
Check Point Software Check Point Endpoint Security
Check Point Identity Awareness
Check Point NGFW
Check Point Security Gateway
Check Point Security Gateway Virtual Edition (vSEC)
Check Point Threat Prevention
Cisco ACI
Adaptive Security Appliance
AnyConnect
Cisco
Cisco ACS
Cisco Adaptive Security Appliance
Cisco ADC
Cisco Advance Malware Protection (AMP)
Cisco Airespace
Cisco Call Manager
Cisco Cloud Web Security
Cisco CloudLock
Cisco Console
Cisco DHCP
Cisco Firepower
Cisco ISE
Cisco Meraki MX appliances
Cisco Netflow
Cisco NPE
Cisco Secure Email
Cisco Secure Network Analytics
Cisco Secure Web Appliance
Cisco TACACS
Cisco Umbrella
Duo Access Security
IronPort Email
IronPort Web Security
Proxy Umbrella
Citrix Citrix AppFW
Citrix Endpoint Management
Citrix Gateway ActiveSync Connector
Citrix Netscaler
Citrix Netscaler VPN
Citrix ShareFile
Citrix XenApp
Citrix XenDesktop
Netscaler WAF
Web Logging
Clearswift SEG Clearswift SEG
Cloud Application Cloud Application
Cloudflare Cloudflare CDN
Cloudflare Insights
Cloudflare WAF
Code42 Code42 Incydr
Cofense Phishme
Cognitas CrossLink Cognitas CrossLink
Contrast Security Contrast Security
CrowdStrike Falcon
CyberArk CyberArk Endpoint Privilege Management
CyberArk Vault
Privileged Session Manager
Privileged Threat Analytics
Cybereason Cybereason
Damballa Failsafe
Darktrace Darktrace
Darktrace Enterprise Immune System
Datawatch Systems DataWatch
Deep Security Agent Deep Security Agent
Defender ATP Defender ATP
Dell Dell EMC Isilon
One Identity Manager
RSA Authentication Manager
SonicWALL Aventail
Digital Arts Digital Arts i-FILTER for Business
Digital Guardian Digital Guardian Endpoint Protection
Digital Guardian Network DLP
Dropbox Dropbox
DTEX InTERCEPT DTEX InTERCEPT
Dtex Systems DTEX InTERCEPT
Duo Access Security Duo Access Security
EdgeWave EdgeWave iPrism
eDocs eDocs
Egnyte Egnyte
EMP EMP
Endgame Endgame EDR
EndPoint EndPoint
EnSilo EnSilo
Entrust IdentityGuard
Epic Epic SIEM
ESector ESector DEFESA
ESET ESET Endpoint Security
Exabeam Exabeam DL
Extrahop Reveal(x)
Sonicwall
Extreme Networks Zebra wireless LAN management
F-Secure F-Secure Client Security
F5 BIG-IP DNS
F5 Advanced Web Application Firewall (WAF)
F5 BIG-IP
F5 BIG-IP Access Policy Manager (APM)
F5 BIG-IP Advanced Firewall Module (AFM)
F5 BIG-IP Application Security Manager (ASM)
F5 IP Intelligence
F5 Silverline
WebSafe
Fast Enterprises Fast Enterprises GenTax
Fidelis Fidelis Network
Fidelis XPS
FireEye FireEye Email Gateway
FireEye Email Security (EX)
FireEye Email Threat Prevention (ETP)
FireEye Endpoint Security (CM)
FireEye Endpoint Security (HX)
FireEye Helix
FireEye Network Security (Helix)
FireEye Network Security (NX)
Forcepoint Forcepoint CASB
Forcepoint DLP
Forcepoint Email Security
Forcepoint Insider Threat
Forcepoint NGFW
Websense ESG
Websense Secure Gateway
Forescout Forescout CounterACT
Fortinet FortiAuthenticator
Fortinet Enterprise Firewall
Fortinet FortiWeb
Fortinet UTM
Fortinet VPN
FTP FTP
Galaxy Galaxy
Gamma Gamma
Gemalto Gemalto MFA
Generic Badge Access Generic Badge Access
GitHub GitHub
GoAnywhere GoAnywhere MFT
Google GCP Squid Proxy
Google
Google Calendar
Google Cloud Platform
Google Drive
Virtual Private Cloud
GTB GTBInspector
HashiCorp HashiCorp Vault
Terraform
HelpSystems Powertech Identity Access Manager (BoKs)
Honeywell Honeywell Pro-Watch
honeywell siama
Honeywell WIN-PAK
HP Aruba ClearPass Access Control and Policy Management
Aruba Wireless controller
HP
HP Comware
HP LaserJet Printer
HP SafeCom
HP Virtual Connect Enterprise Manager
IronPort Web Security
Print Server
Huawei Enterprise Network Firewall
Unified Security Gateway
IBM Guardium
IBM
IBM DB2
IBM Endpoint Manager
IBM Lotus Notes
IBM Racf
IBM Sametime
IBM Security Access Manager
IBM Sense
IBM Sterling B2B Integrator
Infosphere Guardium
Lotus Mobile Connect
Proventia Network IPS
QRadar Network Security
ICDB ICDB
ICPAM ICPAM
Illumio Illumio
iManage iManage
Imperva CounterBreach
Imperva File Activity Monitoring (FAM)
Imperva SecureSphere
Incapsula
IMSVA IMSVA
Infoblox BloxOne
InfoWatch InfoWatch
Inky Inky Anti-Phishing
Ipswitch IPswitch MoveIt
MoveIt DMZ
IPTables IPTables
IronPort Web Security IronPort Web Security
IXIA IXIA ThreatArmor
JH JH
Johnson Controls Aruba Wireless controller
Johnson Controls P2000
jSONAR SonarG
Juniper Networks Juniper Networks
Juniper Networks ATP
Juniper Networks Pulse Secure
Juniper OWA
Juniper SRX
Juniper VPN
KABA EXOS KABA EXOS
Kaspersky Kaspersky AV
Kaspersky Endpoint Security for Business
Kemp Kemp LoadMaster
Load Balancer
Kiteworks Kiteworks
LanScope LanScope Cat
LanScope Cat LanScope Cat
Lastline Lastline
LastPass LastPass
LEAP IMSS
LEAP
Lenel Lenel OnGuard
OnGuard
Lexmark Lexmark
Linux Linux CentOs
Linux DHCP
SSH
LOGBinder SharePoint
LogMeIn RemotelyAnywhere
LogRhythm LogRhythm
Lumension Lumension
Lyrix Lyrix
Malwarebytes Malwarebytes Endpoint Protection
MariaDB MariaDB
McAfee McAfee Advanced Threat Defense
McAfee DLP
McAfee Email Protection
McAfee Endpoint Security
McAfee Enterprise Security Manager
Mcafee EPO
McAfee IDPS
McAfee Network Security Platform (IPS)
McAfee NSM
McAfee Solidifier
McAfee Web Gateway
MDAM
Skyhigh Networks CASB
Microsoft Advanced Threat Analytics (ATA)
AppLocker
Azure
Azure Active Directory
Azure AD Identity Protection
Azure MFA
Azure Security Center
Azure Sentinel
Cloud App Security (MCAS)
Defender ATP
Exchange
IIS
Microsoft Azure Advanced Threat Protection
Microsoft Azure Security Center
Microsoft Cloud App Security (MCAS)
Microsoft Defender ATP
Microsoft Office 365
Microsoft SQL Server
Microsoft Windows
Microsoft Windows PrintService
Network Policy Server
Office 365
OneDrive
Routing and Remote Access Service
ScanMail
SQL Server
Sysmon
Web Application Proxy
Web Application Proxy-TLS Gateway
Windows
Windows Defender
Windows DNSServer
Windows PrintService
Mimecast Mimecast
Mimecast Email Security
Targeted Threat Protection - URL
MobileIron MobileIron
Morphisec Morphisec EPTP
MSDHCP MSDHCP
Mvision Mvision
Mysql Mysql
N3K N3K
Namespace rDirectory Namespace rDirectory
NCP NCP
NetApp NetApp
NetDocs NetDocs
NetIQ NetIQ
NetMotion Wireless NetMotion Wireless
Netskope Netskope Security Cloud
Netwrix Netwrix Auditor
Nexthink Nexthink
NNT NNT ChangeTracker
Nokia VitalQIP Nokia VitalQIP
Nortel Contivity Nortel Contivity VPN
ObserveIT ObserveIT
Office 365 Office 365
Okta Okta Adaptive MFA
Onapsis Onapsis
OneLogin OneLogin
OneSpan OneSpan
OpenDJ OpenDJ LDAP
Oracle Oracle
Oracle Access Manager
Oracle AVDF
Oracle DB
Oracle Public Cloud
Oracle Solaris
Ordr Ordr SCE
Osirium Osirium
OSSEC OSSEC
oVirt oVirt
Palo Alto Networks Cortex XDR
GlobalProtect
Magnifier
NGFW
Palo Alto Aperture
Prisma Cloud
Traps
WildFire
Password Manager Pro Password Manager Pro
Paxton NET2DOOR
Perforce Perforce
pfSense pfSense
Phantom Phantom
Pharos Pharos
PicturePerfect PicturePerfect
Ping Identity Ping Identity
PingID
PingOne
Portnox Portnox CLEAR
PostgreSQL PostgreSQL
PostScript PostScript
PowerSentry PowerSentry
Procad Pro.File DMS
Proofpoint Proofpoint Enterprise Protection
Proofpoint TAP
Proofpoint TAP/POD
ProtectWise NDR
ProxySG ProxySG
Qualys Qualys
Quest InTrust Quest InTrust
Quest Software Change Auditor
Radius Radius
RangerAudit RangerAudit
Rapid7 InsightVM
Nexpose
Red Canary Red Canary
RedCloud RedCloud
Ricoh Ricoh
RS2 RS2
RS2 Technologies
RSA RSA
RSA Authentication Manager
RSA DLP
RSA ECAT
RSA NetWitness
SecurID
RUID RUID
Safend Data Protection Suite (DPS)
SafeSend SafeSend
Sailpoint IdentityNow
SecurityIQ
Salesforce Salesforce
Sangfor NGAF
SAP SAP
Secure Computing Secure Computing SafeWord
Secure Envoy Secure Envoy
SecureAuth SecureAuth Login
SecureLink SecureLink
SecureNet SecureNet
SecureWorks iSensor IPS
SecurityExpert SecurityExpert
Sensormatik Sensormatik
SentinelOne SentinelOne
ServiceNow ServiceNow
Shibboleth Shibboleth IdP
Shibboleth SSO
Siemens Siemens
SIGSCI SIGSCI
Silverfort Silverfort
SiteMinder SiteMinder
SkySea ClientView
Slack BeyondTrust Secure Remote Access
Epic SIEM
Exabeam Advanced Analytics
Slack
Snort Snort
Snowflake Snowflake
Sonicwall Sonicwall
Sophos Sophos Endpoint Protection
Sophos Firewall
Sophos Invincea
Sophos SafeGuard
Sophos UTM
Sophos XG Firewall
Specops Specops Password Reset
Splunk Splunk Stream
Squid Squid
SSL Open VPN Nasuni
SSL Open VPN
StealthBits StealthIntercept
Sun One LDAP
Suricata Suricata
Suricata IDS
Swift Swift
Swipes Sonicwall
Swipes
Swivel Swivel
Sybase Sybase
Symantec Symantec
Symantec Advanced Threat Protection
Symantec Blue Coat Content Analysis System
Symantec Blue Coat ProxySG Appliance
Symantec Brightmail
Symantec CloudSOC
Symantec Critical System Protection
Symantec DLP
Symantec EDR
Symantec Email Security.cloud
Symantec Endpoint Protection
Symantec Fireglass
Symantec Managed Security Services
Symantec VIP
Symantec WSS
Synology NAS Synology NAS
Tanium Endpoint Platform
Threat Response
Tenable.io Tenable.io
Teradata Teradata RDBMS
Thycotic Secret Server Thycotic Secret Server
TimeLox Honeywell Pro-Watch
TimeLox
TrapX TrapX
Trend Micro Apex One
Cloud App Security
Deep Discovery Email Inspector
Deep Discovery Inspector
Deep Security Agent
OfficeScan
TippingPoint NGIPS
Trend Micro
Tripwire Enterprise Tripwire Enterprise
Tufin SecureTrack
Tyco CCURE Building Management System
Symmetry Access Control
Unix Auditbeat
CDS
FTP
Unix
Unix Auditd
Unix dhcpd
Unix Privilege Management
USB USB
Vanderbilt Vanderbilt
Varonis Data Security Platform
Vectra Vectra Cognito Detect
Virtru Virtru
Viscount Viscount
Visma Megaflex
VMware NSX FW
VMware Carbon Black App Control
VMware Carbon Black Cloud Endpoint Standard
VMware Carbon Black EDR
VMware ESXi
VMware Horizon
VMWare ID Manager (VIDM)
VMware NSX
VMware VCenter
VMware View
Vormetric Vormetric
Watchguard Malwarebytes Incident Response
Watchguard
Weblogin NetApp
Weblogin
Websense Secure Gateway Websense Secure Gateway
Workday Workday
Xceedium Xceedium
Xerox Xerox
XPS XPS
xsuite xsuite
Zeek Zeek Network Security Monitor
Zlock Zlock
Zoom Zoom
Zscaler Zscaler Internet Access
Zscaler Private Access