Skip to content
PLATFORM
WHY US
Integrations
SOLUTIONS
LOG MANAGEMENT
SIEM
PRICING
RESOURCES
KNOWLEDGE BASE
BLOG
DARC NOTES
About Us
Contact
SCHEDULE A DEMO
SCHEDULE A DEMO
PLATFORM
WHY US
Integrations
SOLUTIONS
LOG MANAGEMENT
SIEM
PRICING
RESOURCES
KNOWLEDGE BASE
BLOG
DARC NOTES
About Us
Contact
Hello. How can we help you?
Search
DATA INGESTION
Windows Event Logs
Syslog (Data Ingestion)
EXTRACTORS
How Extractors work?
Custom Extractors
Extractor validator
View an Extractor
Understanding Extractors
Guidelines for Sanitizing Log Samples
ENRICHMENT
Define Custom Enrichment Bucket
Enrichment
View Enrichment
ENRICHMENT EXAMPLES
UBA: Coalescing User Identities
Flag matches with GreenSnow ThreatIntel
Enrich DevSrcIP with Asset Store
Flag Risky User Activities
Knowledge Base
DATA INGESTION
Category - DATA INGESTION
Articles
Windows Event Logs
Syslog (Data Ingestion)
Sub Categories
EXTRACTORS
How Extractors work?
Custom Extractors
Extractor validator
View an Extractor
Understanding Extractors
Guidelines for Sanitizing Log Samples
ENRICHMENT
Define Custom Enrichment Bucket
Enrichment
View Enrichment
ENRICHMENT EXAMPLES
UBA: Coalescing User Identities
Flag matches with GreenSnow ThreatIntel
Enrich DevSrcIP with Asset Store
Flag Risky User Activities
Loading Comments...
Write a Comment...
Email
Name
Website