KNOWLEDGE BASE
Visit dnif.it
Go to Customer Portal
OPERATIONS
START YOUR TRIAL
DEVICE INTEGRATION
CISCO
FORTINET
MICROSOFT
SYMANTEC
CONNECTORS
Supported connectors
DATA INGESTION
EXTRACTORS
ENRICHMENT
ENRICHMENT EXAMPLES
HUNTING WITH WORKBOOKS
GETTING STARTED
VISUALIZATION
DNIF Query Language (DQL Language)
OVERVIEW
DQL RIGHT FROM START
BASIC SYNTAX
DQL CHEATSHEET
PIPES
FUNCTIONS
DQL (LEGACY)
SCHEMA ON READ
SECURITY MONITORING
INVESTIGATE SIGNALS
MANAGING CASES
OPERATIONS
MANAGE DASHBOARDS
MANAGE REPORTS
USER MANAGEMENT & ACCESS CONTROL
Manage Organization and Users
Manage Tenants and Access
BILLING
MANAGING YOUR COMPONENTS
PICO
GETTING STARTED
INSTALLATION
SOLUTION DESIGN
AUTOMATION
SUPPORTED AUTOMATION
SUPPORTED AUTOMATION - SSH
TROUBLESHOOTING AND DEBUGGING
TROUBLESHOOTING CONNECTORS
LICENSE MANAGEMENT
RELEASE NOTES
API
POLICIES
SECURITY BULLETINS
BEST PRACTICES
DNIF AI
Getting Started with DNIF AI
Extractor Generator
DNIF LEGAL AND SECURITY COMPLIANCE
DNIF End-user License Agreement
Data Privacy Policy
Back to home
KNOWLEDGE BASE
OPERATIONS
START YOUR TRIAL
DEVICE INTEGRATION
CISCO
FORTINET
MICROSOFT
SYMANTEC
CONNECTORS
Supported connectors
DATA INGESTION
EXTRACTORS
ENRICHMENT
ENRICHMENT EXAMPLES
HUNTING WITH WORKBOOKS
GETTING STARTED
VISUALIZATION
DNIF Query Language (DQL Language)
OVERVIEW
DQL RIGHT FROM START
BASIC SYNTAX
DQL CHEATSHEET
PIPES
FUNCTIONS
DQL (LEGACY)
SCHEMA ON READ
SECURITY MONITORING
INVESTIGATE SIGNALS
MANAGING CASES
OPERATIONS
MANAGE DASHBOARDS
MANAGE REPORTS
USER MANAGEMENT & ACCESS CONTROL
Manage Organization and Users
Manage Tenants and Access
BILLING
MANAGING YOUR COMPONENTS
PICO
GETTING STARTED
INSTALLATION
SOLUTION DESIGN
AUTOMATION
SUPPORTED AUTOMATION
SUPPORTED AUTOMATION - SSH
TROUBLESHOOTING AND DEBUGGING
TROUBLESHOOTING CONNECTORS
LICENSE MANAGEMENT
RELEASE NOTES
API
POLICIES
SECURITY BULLETINS
BEST PRACTICES
DNIF AI
Getting Started with DNIF AI
Extractor Generator
DNIF LEGAL AND SECURITY COMPLIANCE
DNIF End-user License Agreement
Data Privacy Policy
OPERATIONS
Working the platform for the best outcomes, with administrator guides.
Managing Streams
LDAP Authentication
Two - Factor Authentication (2FA)
Slow Queries
Manage Token
Event Stores
Collection Status
Geo Enrichment
Setup SAML Auth with OKTA
Change Task Timeouts
Machine Learning