Supported Security Products
Vendor | Product | Critical Security Controls | Guide | |
---|---|---|---|---|
![]() | AT&T | AT&T Arris Gateway | 9 ,12 | |
![]() | Actifio | Actifio | 1 ,2 ,3 ,5 ,11 | |
![]() | Akamai | Akamai SIEM Integration | 12 | |
![]() | Amazon Web Services | Cloudwatch | Guide | |
![]() | Amazon Web Services | Cloudtrail | ||
![]() | Amazon Web Services | Guard Duty | 9 ,12 | |
![]() | Amazon Web Services | AWS VPC Security | 9 ,12 | |
![]() | Amazon Web Services | AWS Instance Backup | 10 | |
![]() | Apache | Apache Web Server | ||
![]() | Apache | Apache Tomcat | ||
![]() | AudioCodes | Mediant Media Gateway | 9 ,12 | |
![]() | Automox | Automox | 1 ,3 ,8 | |
![]() | BRO IDS | BRO IDS | ||
![]() | Barracuda | Barracuda WAF | 12 | |
![]() | Barracuda | Barracuda CloudGen Firewall | 9 ,12 | |
![]() | Barracuda | Barracuda ESS | 7 | |
![]() | Beyond Trust | Beyond Trust | 4 ,16 | |
![]() | Carbon Black | Carbon Black Protect/Defend | 1 ,8 | |
![]() | Centrify | Centrify | 4 ,16 | |
![]() | Checkpoint | Checkpoint FW | 9 ,12 | Guide |
![]() | Cisco | Stealthwatch | 8 | Guide |
![]() | Cisco | Advanced Malware Protection (AMP) | 1 ,8 ,3 | Guide |
![]() | Cisco | Firepower | 9 ,12 | Guide |
![]() | Cisco | ASA Firewall | 9 ,12 | Guide |
![]() | Cisco | Meraki | 9 ,12 ,15 | Guide |
![]() | Cisco | Cisco Ironport | 7 | |
![]() | Cisco | Umbrella | 1 ,7 | Guide |
![]() | Cisco | Cisco Threat Response | 1 ,8 | Guide |
![]() | Cisco | Cisco Wireless | 15 | |
![]() | Cisco | Cisco ISE | 1 ,4 ,9 ,14 | |
![]() | Cisco | Cisco Network Operating System | 11 | |
![]() | Cisco | Web Security Appliance (WSA) | 1 ,8 | |
![]() | Cisco | Access Control Server (ACS) | 1 ,4 ,6 ,9 ,11 ,14 | |
![]() | Cisco | Cisco Meraki Firewall | 9 ,12 | |
![]() | Cisco | PIX Firewall | 9 ,12 | |
![]() | Citrix | Netscaler | 9 ,12 | |
![]() | Crowdstrike | Falcon | 1 ,2 ,8 ,3 | Guide |
![]() | Cubro | Cubro Network Visibility | ||
![]() | CyberArk | CyberArk EPM | 4 | Guide |
![]() | CyberArk | CyberArk Vault | 4 | Guide |
![]() | Cybereason | Cybereason | 1 ,8 | |
![]() | Cylance | Cylance Protect | 1 ,8 | Guide |
![]() | Datto | Datto RMM | 1 ,8 | Guide |
![]() | Deep Instinct | Advanced Endpoint Security | 1 ,8 | |
![]() | ESET | ESET Antivirus | 1 ,8 | |
![]() | Ericsson | Security Manager | 1 ,8 | |
![]() | F5 | ASM | 7 ,9 ,12 | Guide |
![]() | FireEye | FireEye Email Security (EX Series) | 7 | |
![]() | FireEye | FireEye Network Security (NX Series) | 1 ,8 | |
![]() | FireEye | FireEye Endpoint Security (HX Series) | 1 ,8 | Guide |
![]() | FireEye | FireEye Malware Analysis (AX Series) | 1 ,8 | |
![]() | FireEye | FireEye File Protect (FX Series) | 13 | |
![]() | FireEye | FireEye Central Management (CM Series) | 1 ,8 | |
![]() | Fortinet | Fortigate | 9 ,12 | |
![]() | Fortinet | Fortimail | 9 ,12 | |
![]() | Gigamon | Gigamon GigaVUE | ||
![]() | Gin | Gin Access Log | ||
![]() | HAProxy | HAProxy Load Balancer | ||
![]() | HPE | HPE Nimble | 13 | |
![]() | HPE | HPE EFS | 13 | |
![]() | IBM | QRadar | 6 ,16 | Guide |
![]() | IBM | IBM i Powertech SIEM Agent | 4 ,5 ,14 | |
![]() | Imperva | SecureSphere | 13 | |
![]() | InfoBlox | InfoBlox | 1 ,7 | |
![]() | Infocyte | Infocyte Hunt | 1 ,8 | |
![]() | JavaMelody Project | JavaMelody | ||
![]() | Juniper | Juniper FW | 9 ,12 | |
![]() | Linux | NameD | ||
![]() | Linux | SSHD | ||
![]() | Linux | fail2ban | 4 | |
![]() | Linux | Auditd Logs | 4 ,5 ,14 | |
![]() | Linux | Linux PAM | 4 | |
![]() | Malwarebytes | Malwarebytes Anti-Malware | 1 ,8 | |
![]() | ManageEngine | ManageEngine ADManager | 4 ,14 ,16 | |
![]() | McAfee | McAfee Web Gateway | 9 ,12 | |
![]() | McAfee | McAfee ePolicy Orchestrator | 1 ,8 | Guide |
![]() | McAfee | McAfee Network Security | 9 ,12 | |
![]() | McAfee | McAfee Endpoint Security | 1 ,8 | |
![]() | Microsoft | Windows Logs | 4 ,5 ,14 | Guide |
![]() | Microsoft | Windows Active Directory | 4 ,5 ,14 | Guide |
![]() | Microsoft | Advanced Threat Analytics | 1 ,8 | |
![]() | Microsoft | DHCP | ||
![]() | Microsoft | Azure Security | 2 ,4 ,5 ,9 ,13 ,14 ,16 | Guide |
![]() | Microsoft | Graph | 2 ,4 ,5 ,9 ,13 ,14 ,16 | Guide |
![]() | Mimecast | Mimecast | 7 | |
![]() | Mist | Mist Wireless | 15 | Guide |
![]() | Mojo | Mojo Wireless | 15 | |
![]() | Multiple | NetFlow v5, v7, v9 | Guide | |
![]() | Multiple | IPFIX | ||
![]() | Multiple | Common Event Format (CEF) | ||
![]() | Multiple | Log Event Extended Format (LEEF) | ||
![]() | NXLog | NXLog | ||
![]() | Netscout | Netscout | ||
![]() | Netwrix | Stealthbits | 4 ,13 ,16 | |
![]() | Nokia | NetGuard | 9 ,12 | |
![]() | Noname Security | Noname Security | ||
![]() | OPNSense | OPNsense Firewall | 9 ,12 | Guide |
![]() | OSSEC | OSSEC | 1 ,8 | |
![]() | Okta | Okta | 4 ,16 | |
![]() | OpenVPN | OpenVPN | 9 ,12 | |
![]() | POSTFIX | POSTFIX | ||
![]() | Paessler | PRTG Network Monitor | 1 ,6 | |
![]() | Palo Alto | PAN NGFW | 9 ,12 | Guide |
![]() | Palo Alto | Cortex XDR | 1 ,2 ,8 | Guide |
![]() | ProofPoint | ProofPoint Protect | 7 | |
![]() | ProofPoint | ProofPoint CASB | 7 | |
![]() | Pulse | Pulse Secure | 4 ,16 | |
![]() | Qualys | Qualys VA | 1 ,2 ,3 ,5 ,11 | Guide |
![]() | Radware | Radware Appwall | 12 | |
![]() | Roqos | Roqos Core | 9 ,12 | |
![]() | SSSD Project | System Security Services Daemon (sssd) | 4 | |
![]() | SecureCircle | SecureCircle | 5 ,13 ,14 | |
![]() | Secureworks | Taegis VDR | 1 ,8 | |
![]() | Security Onion Solutions, LLC | Security Onion | 1 ,6 ,16 ,19 | |
![]() | Senhasegura | Senhasegura PAM | 4 | |
![]() | SentinelOne | SentinelOne | 1 ,8 | |
![]() | Shibboleth | Shibboleth IDP | 4 ,16 | |
![]() | Solarwinds | N-Central | 1 ,8 | |
![]() | SonicWall | SonicWall Firewall | 9 ,12 | Guide |
![]() | Sophos | Sophos Central | 1 ,8 | |
![]() | Suricata | Suricata IDS | ||
![]() | Symantec | Symantec Endpoint Protection | 1 ,8 | Guide |
![]() | Symantec | Symantec Data Loss Prevention | 13 | |
![]() | Symantec | ProxySG | 1 ,7 | |
![]() | Tanium | Tanium | 1 ,8 | |
![]() | Taxii | STIX/Taxii | Guide | |
![]() | Tenable | Tenable Vulnerability Management | 1 ,2 ,3 ,5 ,11 | Guide |
![]() | Threatmetrix | Threatmetrix | ||
![]() | Thycotic | Secret Server | 4 ,16 | Guide |
![]() | Tippingpoint | Tippingpoint IPS | 9 ,12 | |
![]() | Titan | SpamTitan | 7 | |
![]() | TrapX | TrapX | ||
![]() | Trend Micro | Trend Deep Security | 1 ,8 | |
![]() | Tufin | Tufin SecureTrack | 9 ,11 | |
![]() | Ubiquity | Unify Security Gateway | 9 ,12 | |
![]() | VMWare | VMWare VCenter | 2 | |
![]() | VMWare | VMWare NSX Firewall | 9 ,12 | |
![]() | Varonis | DatAdvantage | 13 | |
![]() | Vectra Networks | Cognito | 8 | |
![]() | VyOS | VyOS | 9 ,12 | |
![]() | Wazuh | Wazuh | 1 ,8 | Guide |
![]() | Websense | Websense | 7 ,9 ,12 | |
![]() | WitFoo | Precinct | 1 ,6 ,16 ,19 | |
![]() | WitFoo | WitFoo IOC Feed | ||
![]() | Zix | Zix Email | 7 | |
![]() | carson_saint | Carson & Saint | 1 ,2 ,3 ,5 ,11 | Guide |
![]() | linux | Uncomplicated Firewall (UFW) | 9 ,12 | |
![]() | linux | Kernel | 5 ,6 | |
![]() | linux | Netfilter ulogd | 9 ,12 | |
![]() | pfSense | pfSense Firewall | 9 ,12 | Guide |
![]() | zScaler | zScaler NSS | 7 ,9 ,12 | Guide |