company logo
KNOWLEDGE BASE
  • Visit dnif.it
  • Go to Customer Portal
DATA INGESTION
  • START YOUR TRIAL
  • CONNECTORS
    • Supported connectors
  • ANALYZE IN STYLE
    • PIPES
    • FUNCTIONS
    • DQL (LEGACY)
  • DATA INGESTION
    • EXTRACTORS
    • ENRICHMENT
    • ENRICHMENT EXAMPLES
  • BILLING
  • SECURITY MONITORING
    • INVESTIGATE SIGNALS
    • MANAGING CASES
  • OPERATIONS
  • MANAGE DASHBOARDS
  • MANAGE REPORTS
  • HUNTING WITH WORKBOOKS
    • VISUALIZATION
  • DEVICE INTEGRATION
    • CISCO
    • FORTINET
    • MICROSOFT
    • SYMANTEC
  • MANAGE USERS AND ACCESS
  • MANAGING YOUR COMPONENTS
    • PICO
  • GETTING STARTED
  • INSTALLATION
  • SOLUTION DESIGN
  • AUTOMATION
    • SUPPORTED AUTOMATION
    • SUPPORTED AUTOMATION - SSH
  • TROUBLESHOOTING AND DEBUGGING
    • TROUBLESHOOTING CONNECTORS
  • LICENSE MANAGEMENT
  • RELEASE NOTES
  • API
  • POLICIES
  • SECURITY BULLETINS
      Back to home
      1. KNOWLEDGE BASE
      2. DATA INGESTION
      • START YOUR TRIAL
      • CONNECTORS
        • Supported connectors
      • ANALYZE IN STYLE
        • PIPES
        • FUNCTIONS
        • DQL (LEGACY)
      • DATA INGESTION
        • EXTRACTORS
        • ENRICHMENT
        • ENRICHMENT EXAMPLES
      • BILLING
      • SECURITY MONITORING
        • INVESTIGATE SIGNALS
        • MANAGING CASES
      • OPERATIONS
      • MANAGE DASHBOARDS
      • MANAGE REPORTS
      • HUNTING WITH WORKBOOKS
        • VISUALIZATION
      • DEVICE INTEGRATION
        • CISCO
        • FORTINET
        • MICROSOFT
        • SYMANTEC
      • MANAGE USERS AND ACCESS
      • MANAGING YOUR COMPONENTS
        • PICO
      • GETTING STARTED
      • INSTALLATION
      • SOLUTION DESIGN
      • AUTOMATION
        • SUPPORTED AUTOMATION
        • SUPPORTED AUTOMATION - SSH
      • TROUBLESHOOTING AND DEBUGGING
        • TROUBLESHOOTING CONNECTORS
      • LICENSE MANAGEMENT
      • RELEASE NOTES
      • API
      • POLICIES
      • SECURITY BULLETINS

      DATA INGESTION

      Ingesting data originating from multiple sources for further processing and analysis
      • Windows Event Logs
      • Syslog

      EXTRACTORS

      • How Extractors work?
      • Custom Extractors
      • View an Extractor
      • Understanding Extractors

      ENRICHMENT

      • View Enrichment
      • Define Custom Enrichment Bucket
      • Enrichment

      ENRICHMENT EXAMPLES

      • UBA: Coalescing User Identities
      • Enrich DevSrcIP with Asset Store
      • Flag matches with GreenSnow ThreatIntel
      • Flag Risky User Activities
      company logo
      dnif.it Help Center
      • Visit dnif.it
      • Go to Customer Portal