Showing page 701 of 710 of 1750 results.

Partner
Automated Defense, Data can be forwarded in Syslog fixed position. Mandiant Automated Defense supports two variations of Syslog fixed position format.
Partner
Automated Defense, Data can be forwarded in Syslog fixed position. Mandiant Automated Defense supports two variations of Syslog fixed position format.
Partner
Security Validation, Return events generated by the security technology that match Mandiant Security Validation actions
Partner
Automated Defense, Mandiant recommends fetching of Sophos events in JSON format from Sophos Central.
Partner
Intel (API v4), Collects indicators and writes to a Splunk index that is then turned into a Splunk lookup. Also includes correlation features based on customer data that maps to the Splunk CIM, Security Validation, "Return events generated security technologies that write events to the SIEM and that match Mandiant Security Validation actions. Also in the Splunk App, information about Validation jobs is collected and made available for visualization and analysis", Automated Defense, Data can be fetched in raw format. Quering Splunk can return the raw events as sent to Splunk., Attack Surface Management, The Mandiant Advantage App uses the ASM API to push external assets and identified issues to Splunk Enterprise Security .
Partner
Security Validation, Return events generated security technologies that write events to the SIEM and that match Mandiant Security Validation actions, Automated Defense, Data can be fetched in Syslog format.
Partner
Automated Defense, Data can be fetched or forwarded in EVE, JSON, raw with or without Syslog header or Syslog EVE. Fetch from AlienVault supports two variations of JSON.
Partner
Automated Defense, Data can be fetched or forwarded in EVE, JSON, raw with or without Syslog header or Syslog EVE. Fetch from AlienVault supports two variations of JSON.
Partner
Security Validation, Return events generated by the security technology that match Mandiant Security Validation actions
Partner
Automated Defense, Data can be forwarded in Syslog or CEF Syslog format.