fbpx

Blumira SIEM+XDR Integrations

Cloud Services
  • Mimecast

    Mimecast

  • Azure AD Event Hubs

    Azure AD Event Hubs

  • Cisco Umbrella

    Cisco Umbrella

  • Duo Security

    Duo Security

  • Google G Suite

    Google G Suite

  • Infoblox

    Infoblox

  • Okta

    Okta

  • Microsoft Intune

    Microsoft Intune

  • LastPass

    LastPass

  • Microsoft 365 Defender

    Microsoft 365 Defender

  • Microsoft 365

    Microsoft 365

  • Microsoft Defender for Cloud Apps

    Microsoft Defender for Cloud Apps

AWS
  • AWS: Getting Started Guide

    AWS: Getting Started Guide

  • AWS: Kinesis Data Stream and IAM

    AWS: Kinesis Data Stream and IAM

  • AWS: CloudWatch

    AWS: CloudWatch

  • AWS: GuardDuty

    AWS: GuardDuty

  • AWS: CloudTrail

    AWS: CloudTrail

  • AWS: VPC Flow Logs

    AWS: VPC Flow Logs

Endpoint Security
  • Webroot

    Webroot

  • SentinelOne

    SentinelOne

  • Malwarebytes

    Malwarebytes

  • Malwarebytes Nebula

    Malwarebytes Nebula

  • Blackberry Cylance

    Blackberry Cylance

  • CrowdStrike Falcon Endpoint Protection

    CrowdStrike Falcon Endpoint Protection

  • ESET Endpoint Protection

    ESET Endpoint Protection

  • Sophos Central

    Sophos Central

  • Symantec Endpoint Security

    Symantec Endpoint Security

  • Trend Micro Apex One

    Trend Micro Apex One

  • VMware Carbon Black EDR (formerly Carbon Black Response)

    VMware Carbon Black EDR (formerly Carbon Black Response)

  • VMware Carbon Black Cloud Endpoint Standard (formerly Carbon Black Defense)

    VMware Carbon Black Cloud Endpoint Standard (formerly Carbon Black Defense)

  • VMware Carbon Black App Control (formerly CB Protection)

    VMware Carbon Black App Control (formerly CB Protection)

  • Microsoft Intune

    Microsoft Intune

Microsoft Windows
  • Automating Windows log collection with Poshim

    Automating Windows log collection with Poshim

  • Advanced Microsoft Logging (GPO Template)

    Advanced Microsoft Logging (GPO Template)

  • System Monitor (Sysmon)

    System Monitor (Sysmon)

  • Microsoft Windows Firewall

    Microsoft Windows Firewall

  • Microsoft Windows PowerShell

    Microsoft Windows PowerShell

  • Microsoft Windows IIS

    Microsoft Windows IIS

  • Microsoft Active Directory

    Microsoft Active Directory

  • Microsoft Windows Server

    Microsoft Windows Server

Microsoft Cloud
  • Automating Windows log collection with Poshim

    Automating Windows log collection with Poshim

  • Azure AD Event Hubs

    Azure AD Event Hubs

  • Microsoft Intune

    Microsoft Intune

  • Microsoft 365 Defender

    Microsoft 365 Defender

  • Microsoft 365

    Microsoft 365

  • Microsoft Defender for Cloud Apps

    Microsoft Defender for Cloud Apps

  • Microsoft Security Modules

Identity Management
  • Duo Security

    Duo Security

  • Okta

    Okta

  • LastPass

    LastPass

  • Microsoft Active Directory

    Microsoft Active Directory

Firewall
  • Check Point Next-Gen Firewall

    Check Point Next-Gen Firewall

  • Cisco ASA Firewall

    Cisco ASA Firewall

  • Cisco FTD FirePower Threat Defense

    Cisco FTD FirePower Threat Defense

  • Cisco Meraki Firewall

    Cisco Meraki Firewall

  • Citrix Netscaler ADC

    Citrix Netscaler ADC

  • F5 Big-IP

    F5 Big-IP

  • Fortinet Fortigate Firewall

    Fortinet Fortigate Firewall

  • Palo Alto Next-Gen Firewall

    Palo Alto Next-Gen Firewall

  • Palo Alto Networks Panorama

    Palo Alto Networks Panorama

  • SonicWall Next-Gen Firewall

    SonicWall Next-Gen Firewall

  • Sophos XG Firewall

    Sophos XG Firewall

  • WatchGuard Firebox Firewall

    WatchGuard Firebox Firewall

Other
  • Osquery

    Osquery

  • Apache Web Server

    Apache Web Server

  • Forescout

    Forescout

  • KnowBe4 – PhishER

    KnowBe4 – PhishER

  • Linux Auditd File Integrity Monitoring

    Linux Auditd File Integrity Monitoring

  • Linux Journald

    Linux Journald

  • Linux Servers

    Linux Servers

  • Nginx Web Server

    Nginx Web Server

  • Proofpoint Advanced Threat Protection

    Proofpoint Advanced Threat Protection

  • VMware VSphere/VCenter

    VMware VSphere/VCenter

  • Judy Security Logs

    Judy Security Logs

  • WinLogBeat Forwarding

    WinLogBeat Forwarding