KNOWLEDGE BASE
Visit dnif.it
Go to Customer Portal
Sign in
DATA INGESTION
START YOUR TRIAL
DEVICE INTEGRATION
CISCO
FORTINET
MICROSOFT
SYMANTEC
CONNECTORS
Supported connectors
DATA INGESTION
EXTRACTORS
ENRICHMENT
ENRICHMENT EXAMPLES
HUNTING WITH WORKBOOKS
GETTING STARTED
VISUALIZATION
ANALYZE IN STYLE
PIPES
FUNCTIONS
DQL (LEGACY)
SECURITY MONITORING
INVESTIGATE SIGNALS
MANAGING CASES
OPERATIONS
MANAGE DASHBOARDS
MANAGE REPORTS
MANAGE USERS AND ACCESS
BILLING
MANAGING YOUR COMPONENTS
PICO
GETTING STARTED
INSTALLATION
SOLUTION DESIGN
AUTOMATION
SUPPORTED AUTOMATION
SUPPORTED AUTOMATION - SSH
TROUBLESHOOTING AND DEBUGGING
TROUBLESHOOTING CONNECTORS
LICENSE MANAGEMENT
RELEASE NOTES
API
POLICIES
SECURITY BULLETINS
Back to home
KNOWLEDGE BASE
DATA INGESTION
START YOUR TRIAL
DEVICE INTEGRATION
CISCO
FORTINET
MICROSOFT
SYMANTEC
CONNECTORS
Supported connectors
DATA INGESTION
EXTRACTORS
ENRICHMENT
ENRICHMENT EXAMPLES
HUNTING WITH WORKBOOKS
GETTING STARTED
VISUALIZATION
ANALYZE IN STYLE
PIPES
FUNCTIONS
DQL (LEGACY)
SECURITY MONITORING
INVESTIGATE SIGNALS
MANAGING CASES
OPERATIONS
MANAGE DASHBOARDS
MANAGE REPORTS
MANAGE USERS AND ACCESS
BILLING
MANAGING YOUR COMPONENTS
PICO
GETTING STARTED
INSTALLATION
SOLUTION DESIGN
AUTOMATION
SUPPORTED AUTOMATION
SUPPORTED AUTOMATION - SSH
TROUBLESHOOTING AND DEBUGGING
TROUBLESHOOTING CONNECTORS
LICENSE MANAGEMENT
RELEASE NOTES
API
POLICIES
SECURITY BULLETINS
DATA INGESTION
Ingesting data originating from multiple sources for further processing and analysis
Windows Event Logs
Syslog
EXTRACTORS
How Extractors work?
Custom Extractors
View an Extractor
Understanding Extractors
ENRICHMENT
Enrichment
View Enrichment
Define Custom Enrichment Bucket
ENRICHMENT EXAMPLES
Flag matches with GreenSnow ThreatIntel
Enrich DevSrcIP with Asset Store
UBA: Coalescing User Identities
Flag Risky User Activities