• Getting Started with InsightIDR
    • InsightIDR Overview
    • Essential | Quick Start Guide
    • Advanced | Quick Start Guide
    • Ultimate | Quick Start Guide
  • Setup and Deployment
    • System Requirements
      • Setting Up a Service Account
    • Network and Environment Audit
      • Core Event Sources
      • Log Data Collection and Storage
      • Data Archiving
      • Non-Admin Domain Controller Account
      • Read-Only Domain Controllers
    • Ports Used by InsightIDR
    • Collector Overview
      • Collector Requirements
      • Collector Installation and Deployment
      • Collector Troubleshooting
      • Collector Proxy Configuration
    • Insight Agent
      • Configure the Insight Agent to Send Additional Logs
      • Microsoft Windows Defender Antivirus
      • Velociraptor Integration
    • FIM Recommendations
    • Other Deployment Options
  • Automation
    • Get Started with Automation
    • Get Started with Automation for Legacy Detection Rules and Basic Detection Rules
      • Triggers for Legacy Detection Rules and Basic Detection Rules
    • Insight Orchestrator Overview
      • Configure Connections For Automation
      • Automation Workflow Templates
    • Automation Workflows
      • Kill a Process
      • Suspend or Disable a User
      • Quarantine an Asset
      • Create a ServiceNow or JIRA Ticket
    • Automated Enrichment Workflows
      • Enrich Alert Data with Open Source Plugins
    • Get Started with On Demand Response Actions
    • Automation Troubleshooting
    • Send InsightConnect Events to InsightIDR
  • How To
    • Manage Credentials
    • Search Your Logs
    • Transform Logs to Universal Event Format
    • Delete and Reinstall a Collector
    • Deploy Deception Technology
    • Investigate an Asset or User
    • Manage Event Sources
      • Edit Event Sources
      • Copy Event Sources to a New Collector
    • Export Data
    • Access AWS Resources with EC2 IAM Roles
    • Monitor Your Security Operations Activities
  • Concepts and Usage
    • Rapid7 Resource Names
    • Detection Rules
      • Modify Detection Rules
      • Modify Legacy Detection Rules
      • Custom Detection Rules
      • Custom Detection Rules FAQ
      • Detection Library
      • Detection Rule Exceptions
      • Create and Manage Basic Detection Rules
      • Basic Detection Rule Details
      • Basic Detection Rules and InsightConnect
    • Notable Events
    • Alerts
      • Take Action on an Alert
      • Anatomy of an Alert
    • Investigations
      • Create an investigation
      • Analyze an investigation
      • Schedule endpoint queries
      • Close an investigation
      • Multi-Customer Investigations
    • Investigate Threat Command Alerts
    • Velociraptor
    • Assets on Your Domain
      • Mark an asset as restricted
      • Manage your Processes and Hashes
      • Exploitable Vulnerabilities
      • Lateral Movement
    • Dashboards and Reports
      • R7 Managed: Endpoint Visibility Validation Dashboard
    • Deception Technology
      • Honeypot
      • Honey Users
      • Honey Files
      • Honey Credentials
      • Honey Alerts
      • Troubleshooting Honeypots
      • AWS Honeypots
    • File Access Activity Monitoring
    • File Integrity Monitoring
      • File Integrity Monitoring for Linux
      • Search Logs for FIM Events
    • Log Search
      • Log Sets You Can Search
      • Components for Building a Query
      • Keys to Use in Your Queries
      • Example Queries
      • Use Variables in Queries
      • Tips and Tricks for Building Queries
      • Leverage Enhanced Endpoint Telemetry Data
      • Create Custom Parsing Rules
      • Legacy Log Search
      • Glossary
    • Network Rules
      • Network zones and policies
      • Owned and Ignored Domains
      • Firewall Rules
      • IP Addresses
    • Network Traffic Analysis
    • Threats
      • Utilize Existing Threats
      • Add and Manage Threats
    • Users and Accounts
      • Admin Users
      • Non-Expiring and Service Accounts
      • Shared and Linked Accounts
      • Watchlist and Risky Users
      • User Tags
      • Audit Logging
      • User Attribution
    • Quick Actions
    • Data Storage and Retention FAQs
  • Detection Library
    • Overview
    • Rules by Rule Set
      • Agrius
      • Antlion
      • APT Groups
      • BAHAMUT
      • Balikbayan Foxes
      • Bax 026 of Iran
      • BlackOasis
      • Blackshadow
      • BlackTech
      • Blind Eagle
      • BRONZE BUTLER
      • CactusPete APT
      • Carbanak
      • Chamelgang
      • Cloud Service Activity
      • Cobalt Group
      • Cosmic Lynx
      • CrouchingYeti
      • Current Events
      • Dark Basin
      • Dark Caracal
      • Darkhotel
      • DarkHydrus
      • Deep Panda
      • Desert Falcons
      • Domestic Kitten
      • DragonOK
      • DustSquad
      • Dust Storm
      • Elderwood
      • Elephant Beetle
      • Energetic Bear
      • Epic Manchego
      • Evil Corp
      • Evilnum
      • FIN Groups
      • FunnyDream
      • Gallmaker
      • Gamaredon Group
      • Gaza Hacker Team
      • GCMAN
      • GhostEmperor
      • Gorgon Group
      • Greenbug
      • Group 5
      • Group 72
      • Hafnium
      • Harvester
      • Hexane
      • Hidden Lynx
      • Hive Ransomware
      • Honeybee
      • Indra
      • IronHusky
      • KeyBoy
      • KilllSomeOne
      • Kimsuky
      • Lazarus Group
      • Leafminer
      • Lebanese Cedar
      • Lotus Blossom
      • Machete
      • Magnat
      • Malsmoke
      • Migrated Legacy Rules
      • ModifiedElephant
      • Mofang
      • Molerats
      • Moses Staff
      • Muddywater
      • Mustang Panda
      • Mythic Leopard
      • Naikon
      • NEODYMIUM
      • Network Traffic Analysis
      • Night Dragon
      • North Korean State-Sponsored Actor
      • OldGremlin
      • Orangeworm
      • Patchwork
      • PLATINUM
      • Poseidon Group
      • Promethium
      • Pyxie
      • Rancor
      • RedCurl
      • Roaming Mantis
      • Rocke
      • RTM
      • Rocket Kitten
      • Sandworm Team
      • SCADAfence
      • Scarlet Mimic
      • SideCopy
      • Silence
      • Silent Librarian
      • SilverTerrier
      • Soft Cell
      • Sowbug
      • Spring Dragon APT
      • Stealth Falcon
      • Stolen Pencil
      • Strider
      • StrongPity
      • Suckfly
      • Suspicious Ingress Authentications
      • Suspicious Network Activity
      • Suspicious Network Connections
      • Suspicious Process Access
      • Suspicious Registry Events
      • Suspicious User Behavior
      • Suspicious Web Requests
      • SWEED
      • TA459
      • TA505
      • Taidoor
      • TeamTNT
      • The Mabna Hackers
      • The White Company
      • Threat Command
      • Threat Group-1314
      • Thrip
      • Tropic Tropper
      • Turbine Panda
      • Turla
      • UAC-0056
      • UNC1151
      • UNC1945
      • Velvet Chollima
      • Whitefly
      • Windshift
      • WIRTE
      • Wizard Spider
      • XDSpy
      • Yalishanda
    • Rules by Endpoint
      • Windows Suspicious Process
      • Windows Suspicious Services
      • Mac Suspicious Process
      • Linux Suspicious Process
      • Visibility Monitoring
      • Velociraptor
    • Legacy Detection Rules
  • InsightIDR REST APIs
    • InsightIDR REST APIs
  • Event Source Configuration
    • InsightIDR Event Sources
    • Data Collection Methods
    • Advanced Event Source Settings
    • Monitor Event Source Health
    • Event Source Troubleshooting
    • Auto Configure
    • Rapid7 Products
      • InsightVM
      • Metasploit
      • InsightCloudSec
    • Active Directory
      • Microsoft Active Directory Security Logs
      • Troubleshooting Active Directory
    • Advanced Malware
      • FireEye NX
    • Cloud Services
      • 1Password
      • Auth0
      • Amazon Security Lake
      • AWS AppFabric
      • AWS CloudTrail API
      • AWS CloudTrail SQS
      • Box.com
      • Centrify
      • Cisco AMP
      • Cloudflare
      • Duo Security
      • Google Apps
      • Google Cloud Platform
      • Idaptive
      • Imperva WAF
      • Microsoft Azure
      • Mimecast API 2.0
      • Office 365 (plus GCC and GCC High)
      • Okta.com
      • OneLogin
      • Palo Alto Cortex Data Lake
      • Ping Identity PingOne
      • Proofpoint Targeted Attack Protection
      • Salesforce.com
      • Workday
      • Zoom
    • Data Exporter
      • HP ArcSight
      • Splunk
      • ServiceNow
      • Universal Webhook
      • Resilient Systems
    • Database
      • Microsoft SQL Database Audit Logs
    • DHCP
      • Microsoft DHCP
      • Cisco IOS
      • Infoblox Trinzic
      • ISC dhcpd
      • DHCP Troubleshooting
    • DNS
      • Microsoft DNS
      • Cisco Umbrella
      • ISC Bind9
      • DNS Troubleshooting
    • Email and ActiveSync
      • Microsoft ActiveSync and Outlook Web Access
    • Firewall
      • Arista Next Generation Firewall
      • Cato Networks
      • Barracuda Firewall
      • Check Point
      • Cisco ASA
      • Cisco FirePower Threat Defense
      • Cisco Meraki Firewall/VPN
      • Forcepoint Firewall
      • Fortinet Firewall
      • Juniper Networks ScreenOS
      • Palo Alto Networks Firewall and VPN (plus Wildfire)
      • pfSense Firewall
      • SilverPeak SD WAN
      • SonicWALL Firewall
      • Sophos UTM
      • Sophos XG Firewall
      • Versa Networks
      • WatchGuard XTM
    • IDS
      • Cisco Firepower (Sourcefire IDS, Cisco FireSIGHT)
      • F5 Networks BIG-IP Local Traffic Manager
      • McAfee IDS
      • Security Onion
      • Sentinel IPS
      • Snort
      • Network Sensor
    • Ingress Authentication
      • Zscaler LSS
    • LDAP
      • LDAP Troubleshooting
      • AWS Managed Microsoft AD
    • Universal Event Sources
      • Rapid7 Universal DHCP
      • Rapid7 Universal Antivirus
      • Rapid7 Universal Ingress Authentication
      • Rapid7 Universal VPN
    • Raw Data
      • Generic Windows Event Log
      • Custom Logs
      • AWS SQS
      • NXLog
      • Syslog Logging
    • Log Aggregators
      • LogRhythm
      • Splunk
      • IBM QRadar
    • Third Party Alerts
      • AWS GuardDuty
      • Carbon Black EDR
      • Claroty xDome
      • Code42
      • Crowdstrike Falcon
      • CyberArk Vault
      • Cybereason
      • CylancePROTECT Cloud
      • Darktrace
      • Google Cloud Platform Security Command Center
      • Microsoft Defender for Endpoint
      • Microsoft Security
      • Netskope
      • Palo Alto Networks Cortex XDR
      • Palo Alto Networks Traps ESM
      • Salesforce Threat Detection
      • SCADAfence
      • Varonis DatAdvantage
      • Vectra Networks
    • Virus Scan
      • BitDefender
      • Carbon Black Cloud
      • CylancePROTECT
      • ESET Antivirus
      • Kaspersky Anti-Virus
      • MalwareBytes Endpoint Protection
      • McAfee ePO
      • Palo Alto Networks Traps TSM
      • SentinelOne Endpoint Detection and Response
      • Sophos Central
      • Sophos Enduser Protection
      • Sophos Intercept X
      • Symantec Endpoint Protection
      • Trend Micro Apex One
      • Trend Micro Deep Security
      • Trend Micro OfficeScan
    • VPN
      • Barracuda SSL VPN
      • Cisco ACS
      • Cisco ISE
      • Microsoft IAS (RADIUS)
      • Microsoft Remote Web Access
      • NetScaler VPN
      • Pulse Connect Secure
      • OpenVPN
    • Web Proxy
      • Barracuda Web Security Gateway
      • Blue Coat Proxy
      • McAfee Web Gateway
      • Sophos Secure Web Gateway
      • Websense
      • Zscaler NSS
    • Web Server Access
      • Microsoft IIS
  • Administration
    • Monthly Data Usage
    • Browser Settings
    • Email Notifications
    • User Management
    • Single Sign-On
  • Release Notes
    • Command Platform Release Notes
  • Support
    • Contact the Rapid7 Support team
    • Share an idea with Rapid7
    • Rapid7 IDR AI Usage
    • API
      • InsightIDR | © Rapid7
      • InsightIDR | © Rapid7
    • InsightIDR | © Rapid7

Third Party Alerts
Copy link

Rapid7 can integrate with the following third party vendors to generate alerts in InsightIDR and the Insight Platform:

  • AWS GuardDuty
  • Carbon Black EDR
  • Claroty xDome
  • Code42
  • Crowdstrike Falcon
  • CyberArk Vault
  • Cybereason
  • CylancePROTECT Cloud
  • Darktrace
  • Google Cloud Platform Security Command Center
  • Microsoft Defender for Endpoint
  • Microsoft Security
  • Netskope
  • Palo Alto Networks Cortex XDR
  • Palo Alto Networks Traps ESM
  • Salesforce Threat Detection
  • SCADAFence
  • Varonis DatAdvantage
  • Vectra Networks

  • © Rapid7
    • Legal Terms
    • Privacy Policy
    • Export Notice
    • Trust