Configuration requirements
To run this collector, there are some configurations detailed below that you need to consider.
Configuration | Details |
---|---|
Cylance APP | You need to run a Cylance app. |
Application ID | Once you create the App, it gives you an Application ID. |
Application Secret | Once you create the App, it gives you an Application Secret. |
Tenant ID | You can find it in your Cylance console. |
Refer to the Vendor setup section to know more about these configurations.
Overview
-
Devo collector features
Feature | Details |
---|---|
Allow parallel downloading ( |
|
Running environments |
|
Populated Devo events |
|
Flattening preprocessing |
|
Data sources
Data Source | Description | API Endpoint | Collector service name | Devo Table | Available from release |
---|---|---|---|---|---|
Access History | This topic provides concepts on the user access history in Snowflake. |
|
|
|
|
Login History | This topic is used to query login attempts by Snowflake users within the last 365 days (1 year). |
|
|
|
|
Sessions | This topic provides information on the session, including information on the authentication method to Snowflake and the Snowflake login event. |
|
|
|
|
Custom SQL | This topic provides the chance to perform a custom SQL query |
|
|
|
|
Data source | Description | API endpoint | Collector service name | Devo table | Available from release |
---|---|---|---|---|---|
Pulled source | Description and links if needed |
|
|
|
|
For more information on how the events are parsed, visit our page ← LINK TO THE PARSER ARTICLE IF EXISTS
Flattening preprocessing
Data source | Collector service | Optional | Flattening details |
---|---|---|---|
Source | Service |
| Flattening steps |
Vendor setup
-
Minimum configuration required for basic pulling
Although this collector supports advanced configuration, the fields required to retrieve data with basic configuration are defined below.
This minimum configuration refers exclusively to those specific parameters of this integration. There are more required parameters related to the generic behavior of the collector. Check setting sections for details.
Setting | Details |
---|---|
| - |
See the Accepted authentication methods section to verify what settings are required based on the desired authentication method.
Accepted authentication methods
-
Run the collector
Once the data source is configured, you can either send us the required information if you want us to host and manage the collector for you (Cloud collector), or deploy and host the collector in your own machine using a Docker image (On-premise collector).
Collector services detail
This section is intended to explain how to proceed with specific actions for services.
Events service
Collector operations
This section is intended to explain how to proceed with specific operations of this collector.
Change log for v1.x.x
Release | Released on | Release type | Details | Recommendations |
---|---|---|---|---|
| Jan 1, 1990 | NEW FEATURE BUG FIXVULNIMPROVEMENT | New features:
Improvements:
Bug Fixes:
Vulnerabilities Mitigation:
|
|