Welcome to DTonomy’s documentation!¶
- Getting Started
- Alerts and Detections
- Ingestion
- Existing Connectors
- Aruba ClearPass
- Aws
- Azure
- Agent-based collector
- Akamai Security Events
- Alientvault OTX
- Barracuda CloudGen Firewall
- Barracuda WAF
- Broadcom Symantec Data Loss Prevention(DLP)
- BlackBerry CylancePROTECT
- Cisco ASA Firewall
- Cisco Meraki
- Corelight Zeek
- Checkpoint Firewall
- Crowdstrike
- Database collector
- Datadog
- Elasticsearch
- Exabeam
- Extrahop
- Fidelis
- Fortinet FortiGate
- F5 Networks (ASM)
- Github
- HaveIbeenpwned
- Infoblox Network Identity Operating System (NIOS)
- Jira
- Juniper SRX
- Kace
- Kafka
- McAfee
- OPNSense
- Palo Alto Networks (PAN-OS)
- Proofpoint Targeted Attack Protection(TAP)
- Pulse Connect Secure
- Qradar
- Qualys
- Rapid7 AppSpider
- Rapid7 Nexpose
- SCCM
- ServiceNow
- SonicWall Firewall
- Sentry
- Shadowserver
- Shodan
- Signal Science
- Sumo Logic
- Splunk
- Syslog
- SSH
- Trend Micro Deep Security
- Trend Micro TippingPoint
- Tenable IO
- Tenable SC
- Vectra Cognito Detect
- VMware Carbon Black
- Wazuh
- Zscaler Cloud Firewall
- Artifacts Extraction (Normalize)
- Enrichment
- Pattern Discovery
- Response
- Automation
- Overview
- Create First Workflow
- Generic Nodes
- Third Party Nodes
- Analysis
- Alexa Ranking
- ASN
- AWS IAM
- AWS
- Carbon Black
- Crowd Strike
- Datadog
- DTonomy
- Duo
- Elasticsearch
- Filter
- GitHub
- Grouper
- Have I Been Pwned
- Hybrid Analysis
- InfoBlox
- Intelligence
- Jira
- Kace
- ldap
- Manageengine
- Microsoft Teams
- Network
- Active Directory
- Social Functions
- Storage
- VISEO REST
- NormShield
- Office365
- OTX
- Phishing Email
- Proofpoint
- Rapid7 AppSpider
- Rapid7 Nexpose
- Regular Expression
- Remedy
- SCCM
- Sentry
- ServiceNow
- Shodan
- Signal Science
- Splunk
- Sumo Logic
- SuspiciousIp
- Tenable io
- Tenable sc
- URLScan.io
- VirusTotal
- Wazuh
- Share Workflows
- Project History
- Playbooks
- SIEM
- Analysis-Enrich Sumologic with ThreatCrowd
- Analysis- Enrich Sumologic With VirusTotal
- Analysis-Sumologic Compromised Account
- Analysis-Sumologic Misuse Account
- Ingestion-Import Elastic Security Detections
- Ingestion-Import Wazuh Detections
- IR-Enrich Sumologic with VirusTotal and Export to Spreadsheet
- IR-Enrich Sumologic User Detection with Vulnerability Check
- Response-Compromised Account Alert
- Response-Misuse Account Alert
- Email
- Analysis-Phishing Email
- Analysis-Phishing Email with PDF Decryption
- Analysis-Comprehensive Phishing Response Workflow
- IR-Phishing Email Response with Yara
- IR-Comprehensive Phishing Response Workflow
- Response-Report Phish to Microsoft
- Response-Report Spam to Microsoft
- Utility-Delete Outlook Email
- Utility-Forward Email as Attachment
- Utility-Forward Email with Attachment
- Utility-Read Email Attachment
- Cloud
- Endpoint
- Network
- Analysis-Collect user Info From Pastebin
- Analysis-Enrich IP with Threatcrowd
- Analysis-Import CISCO Meraki Alert
- Analysis-Network Traffic Alert
- IR-Enrich Sumologic Network Alerts with Threat Intelligence and Vulnerability
- IR-Enrich Sumologic Network Attack with whois and Send Email
- Response-Block Ip and Log Actions to Sumologic
- Response-Network Alert Escalation
- Response-Block Ip Azure
- Vulnerability
- Other
- DLP-Data Leaking Protection Validation
- Intelligence-Build Intelligence
- Analysis-End To End User Alert
- Notifications-Microsoft Teams
- Report-Shadow Server
- Response-Auto Report To Microsoft
- Response-Create ServiceNow Ticket
- Response-Get Abuse Domains Whois
- Response-Report Abuse Whois
- Response-Warn User
- Utility-Alexa Ranking
- Utility-Automating Interactive Applications
- Utility-Create Ticket
- Utility-Install Python Module
- Utility-OTX Example
- Utility-Parallel Computation
- Utility-Perl Example
- Utility-Python Processor
- Utility-Update Ticket
- Utility-Wait For Actions
- Utility-Write To Google Sheet
- Utility-GSuite
- SIEM
- Report
- User Management
- API
- Authorization
- Alert
- Post an Alert (Legacy)
- Post an Alert
- Get Alerts
- Update an Existing Alert
- Get Alerts by Filter
- Delete an Alert
- Get Alerts’ Count
- Update an Alert List
- Build Artificial Intelligence
- Post a Comment
- Get Comments
- Create a Task
- Create a Task from a Workflow
- Get Tasks
- Update a Task
- Get a Pattern
- Get Similar Alerts
- Alert Schema
- User
- Workflow
- Workflow Activity
- Workflow AI Assistance
- Artifact