Data Source Integrations for Netsurion Essentials
- Barracuda NG Firewall
- Carbon Black Cloud Endpoint Standard
- Check Point Firewall
- Cisco ASA
- Cisco Meraki
- Cisco Umbrella OpenDNS
- CrowdStrike Falcon
- Deep Instinct 1
- Fortinet Fortigate NG Firewall
- Juniper Junos
- Linux
- macOS
- Microsoft 365
- Microsoft Active Directory
- Microsoft Defender Antivirus
- Microsoft Windows DFS
- Palo Alto NG Firewall
- SAINT Security Suite 2
- SentinelOne
- SonicWall UTM
- Sophos UTM/Firewall
- Trend Micro Apex One
- Trend Micro Deep Security
- WatchGuard XTM
- Webroot SecureAnywhere
- Windows OS
- Requires Netsurion Managed Endpoint Security subscription
- Requires Netsurion Vulnerability Management subscription
Alerts for Netsurion Essentials
- Anomalous login detected: critical threshold exceeded
- Netsurion Application Control: Unsafe dormant process detected
- Netsurion Application Control: Unsafe process found
- Netsurion Endpoint Security: Threat detected
- Netsurion Endpoint Security: Threat prevented
- Netsurion: A process connected to an unsafe IP address
- Netsurion: A process has been terminated by Netsurion
- Netsurion: Active Directory Enumeration attempt detected
- Netsurion: Critical potential breach from an unsafe IP address
- Netsurion: New Windows network process activity
- Netsurion: PowerShell connecting to new IP address
- Netsurion: Suspicious exploit tool detected
- Geographically improbable access detected
- Inhibit system recovery – backup deletion
- Linux: Sudoers configuration file has been changed or modified
- Login activity from blacklisted location
- Microsoft 365 suspicious login activity
- PowerShell running suspicious commands
- Stopping anomalous login activity by adding to block list
- Successful login after anomalous login failure attempts
- Trend Micro Apex: A potential threat could not be quarantined
- Trend Micro Deep Security: Anti-malware action failed
- Trend Micro Deep Security: No action taken on malware
- Windows: Audit log cleared