Mimecast
Azure AD Event Hubs
Cisco Umbrella
Duo Security
Google G Suite
Infoblox
Okta
Microsoft Intune
LastPass
Microsoft 365 Defender
Microsoft 365
Microsoft Defender for Cloud Apps
AWS: Getting Started Guide
AWS: Kinesis Data Stream and IAM
AWS: CloudWatch
AWS: GuardDuty
AWS: CloudTrail
AWS: VPC Flow Logs
Webroot
SentinelOne
Malwarebytes
Malwarebytes Nebula
Blackberry Cylance
CrowdStrike Falcon Endpoint Protection
ESET Endpoint Protection
Sophos Central
Symantec Endpoint Security
Trend Micro Apex One
VMware Carbon Black EDR (formerly Carbon Black Response)
VMware Carbon Black Cloud Endpoint Standard (formerly Carbon Black Defense)
VMware Carbon Black App Control (formerly CB Protection)
Automating Windows log collection with Poshim
Advanced Microsoft Logging (GPO Template)
System Monitor (Sysmon)
Microsoft Windows Firewall
Microsoft Windows PowerShell
Microsoft Windows IIS
Microsoft Active Directory
Microsoft Windows Server
Microsoft Security Modules
Check Point Next-Gen Firewall
Cisco ASA Firewall
Cisco FTD FirePower Threat Defense
Cisco Meraki Firewall
Citrix Netscaler ADC
F5 Big-IP
Fortinet Fortigate Firewall
Palo Alto Next-Gen Firewall
Palo Alto Networks Panorama
SonicWall Next-Gen Firewall
Sophos XG Firewall
WatchGuard Firebox Firewall
Osquery
Apache Web Server
Forescout
KnowBe4 – PhishER
Linux Auditd File Integrity Monitoring
Linux Journald
Linux Servers
Nginx Web Server
Proofpoint Advanced Threat Protection
VMware VSphere/VCenter
Judy Security Logs
WinLogBeat Forwarding