Cybereason
About Cybereason
The Cybereason Defense Platform combines endpoint prevention, detection, and response all in one lightweight agent
The Data We Collect and How We Use It
The table below lists the fields we collect from Cybereason and how they map to the fields in our Aurora ASM platform. This data is only used internally; we do not share it with any parties outside of Arctic Wolf Networks. Refer to our privacy policy for details.
Cybereason Field | Aurora ASM Field |
|---|---|
|
|
|
|
|
|
|
|
|
|
Integrate Cybereason
- Add a source: Follow our instructions to add an Aurora ASM source.
- Provide credentials: You'll be asked to provide source credentials that Aurora ASM will use to connect to Cybereason:
Credential or Parameter | Description |
|---|---|
url | Cybereason Tenant URL (Example: https://org.cybereason.net:8443) |
username | Cybereason System Admin username |
password |
- Set permissions: In Cybereason, ensure that username has System Admin privileges.
If you encounter any errors, they are most likely related to incorrect credentials or insufficient permissions. Verify your work in steps 2 and 3.
Contact Us
If you're having problems configuring an Integration, or if you've found something wrong in this document, please email us at [email protected].
Updated 13 days ago
