# Connectors and data ingestion

### Connect Your Data

Radiant requires visibility across your security environment to triage alerts automatically. This section covers everything needed to establish and manage that visibility: how your security tools connect to Radiant, how ingested data flows through the platform, and how to configure storage for your security logs.

Before connecting your first data source, read [The Radiant Data Pipeline](/welcome-to-radiant/what-is-radiant-security/the-radiant-data-pipeline.md) to understand how data moves from ingestion through indexing and into alert triage. If you have multiple source types and are unsure which connection method to use, see [Choose the Right Connection Method](/radiant-connectors/connectors-and-data-ingestion/choose-the-right-connection-method.md).

### Data Connectors

The **Data Connectors** page in Radiant is where you add, manage, and monitor every active integration, including data connectors, action connectors, and threat intelligence feeds. For instructions on navigating the page and adding a connector, see [Data Connectors](/radiant-connectors/data-connectors.md).

### Phishing email forwarding

Radiant ingests user-reported phishing and business email compromise (BEC) reports through direct forwarding integrations with major email platforms and phishing reporting tools.

* [**Phishing email forwarding overview**](/radiant-connectors/connectors-and-data-ingestion/phishing-email-forwarding-overview.md): prerequisites, phishing configuration in Radiant, and how to choose a forwarding method for your environment.

### Storage and retention

Radiant Log Management stores all ingested security data with flexible retention options. You can store data in Radiant-managed infrastructure or in your own AWS S3 bucket (BYOB). Radiant recommends BYOB for all production environments.

* [**Storage and Retention**](/log-management/storage-and-retention.md): storage configuration options, retention policies, and how to choose between Radiant-managed storage and BYOB.
* [**Bring Your Own Bucket for Log Management**](/log-management/bring-your-own-bucket-byob/bring-your-own-bucket-for-log-management.md): configure an AWS S3 bucket as your primary log storage.
* [**Bring Your Own Bucket for Log Management with Terraform**](/log-management/bring-your-own-bucket-byob/bring-your-own-bucket-for-log-management-with-terraform.md): provision and configure your BYOB storage using Terraform.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://help.radiantsecurity.ai/radiant-connectors/connectors-and-data-ingestion.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
