KNOWLEDGE BASE
Visit dnif.it
Go to Customer Portal
DATA INGESTION
START YOUR TRIAL
DEVICE INTEGRATION
CISCO
FORTINET
MICROSOFT
SYMANTEC
CONNECTORS
Supported connectors
DATA INGESTION
EXTRACTORS
ENRICHMENT
ENRICHMENT EXAMPLES
HUNTING WITH WORKBOOKS
GETTING STARTED
VISUALIZATION
DNIF Query Language (DQL Language)
OVERVIEW
DQL RIGHT FROM START
BASIC SYNTAX
DQL CHEATSHEET
PIPES
FUNCTIONS
DQL (LEGACY)
SCHEMA ON READ
SECURITY MONITORING
INVESTIGATE SIGNALS
MANAGING CASES
OPERATIONS
MANAGE DASHBOARDS
MANAGE REPORTS
USER MANAGEMENT & ACCESS CONTROL
Manage Organization and Users
Manage Tenants and Access
BILLING
MANAGING YOUR COMPONENTS
PICO
GETTING STARTED
INSTALLATION
SOLUTION DESIGN
AUTOMATION
SUPPORTED AUTOMATION
SUPPORTED AUTOMATION - SSH
TROUBLESHOOTING AND DEBUGGING
TROUBLESHOOTING CONNECTORS
LICENSE MANAGEMENT
RELEASE NOTES
API
POLICIES
SECURITY BULLETINS
BEST PRACTICES
DNIF AI
Getting Started with DNIF AI
Extractor Generator
DNIF LEGAL AND SECURITY COMPLIANCE
DNIF End-user License Agreement
Data Privacy Policy
Back to home
KNOWLEDGE BASE
DATA INGESTION
START YOUR TRIAL
DEVICE INTEGRATION
CISCO
FORTINET
MICROSOFT
SYMANTEC
CONNECTORS
Supported connectors
DATA INGESTION
EXTRACTORS
ENRICHMENT
ENRICHMENT EXAMPLES
HUNTING WITH WORKBOOKS
GETTING STARTED
VISUALIZATION
DNIF Query Language (DQL Language)
OVERVIEW
DQL RIGHT FROM START
BASIC SYNTAX
DQL CHEATSHEET
PIPES
FUNCTIONS
DQL (LEGACY)
SCHEMA ON READ
SECURITY MONITORING
INVESTIGATE SIGNALS
MANAGING CASES
OPERATIONS
MANAGE DASHBOARDS
MANAGE REPORTS
USER MANAGEMENT & ACCESS CONTROL
Manage Organization and Users
Manage Tenants and Access
BILLING
MANAGING YOUR COMPONENTS
PICO
GETTING STARTED
INSTALLATION
SOLUTION DESIGN
AUTOMATION
SUPPORTED AUTOMATION
SUPPORTED AUTOMATION - SSH
TROUBLESHOOTING AND DEBUGGING
TROUBLESHOOTING CONNECTORS
LICENSE MANAGEMENT
RELEASE NOTES
API
POLICIES
SECURITY BULLETINS
BEST PRACTICES
DNIF AI
Getting Started with DNIF AI
Extractor Generator
DNIF LEGAL AND SECURITY COMPLIANCE
DNIF End-user License Agreement
Data Privacy Policy
DATA INGESTION
Ingesting data originating from multiple sources for further processing and analysis
Windows Event Logs
Syslog (Data Ingestion)
EXTRACTORS
How Extractors work?
Custom Extractors
View an Extractor
Understanding Extractors
Extractor validator
Guidelines for Sanitizing Log Samples
See more
ENRICHMENT
Define Custom Enrichment Bucket
Enrichment
View Enrichment
ENRICHMENT EXAMPLES
UBA: Coalescing User Identities
Flag matches with GreenSnow ThreatIntel
Enrich DevSrcIP with Asset Store
Flag Risky User Activities