{"version":1,"pages":[{"id":"N2acywC0nMa7tfsWwAak","title":"Platform Overview","pathname":"/","siteSpaceId":"sitesp_WUbDt","icon":"lightbulb","description":"A concise introduction to the Radiant AI SOC platform","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"WELCOME TO RADIANT"}]},{"id":"m479BMuVWzjQBhxwz2W6","title":"Key Differentiators","pathname":"/welcome-to-radiant/platform-overview/key-differentiators","siteSpaceId":"sitesp_WUbDt","icon":"asterisk","description":"How Radiant compares to other AI SOC platforms and legacy SIEM solutions","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"WELCOME TO RADIANT"},{"label":"Platform Overview","icon":"lightbulb"}]},{"id":"291d400d5e3dfb8a12450d0ab173c40f2b2014d5","title":"Get Started","pathname":"/welcome-to-radiant/get-started","siteSpaceId":"sitesp_WUbDt","icon":"rocket-launch","description":"Use this guide to find the right starting point based on your role.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"WELCOME TO RADIANT"}]},{"id":"8dyaoo3KAYBDvI7ekk1F","title":"Admin Quickstart","pathname":"/welcome-to-radiant/get-started/admin-quickstart","siteSpaceId":"sitesp_WUbDt","description":"Plan for approximately 30 minutes to complete all steps.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"WELCOME TO RADIANT"},{"label":"Get Started","icon":"rocket-launch"}]},{"id":"aGSZ8JxlbYnWHdcIiRuf","title":"User Quickstart","pathname":"/welcome-to-radiant/get-started/user-quickstart","siteSpaceId":"sitesp_WUbDt","description":"Get oriented in Radiant and start triaging alerts in minutes.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"WELCOME TO RADIANT"},{"label":"Get Started","icon":"rocket-launch"}]},{"id":"BaUpXJDtSf05DyAW6srW","title":"Key Concepts and Glossary","pathname":"/welcome-to-radiant/get-started/user-quickstart/key-concepts-and-glossary","siteSpaceId":"sitesp_WUbDt","description":"Key terms used throughout the Radiant Security platform and its documentation. Intended for security analysts, team leads, and administrators.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"WELCOME TO RADIANT"},{"label":"Get Started","icon":"rocket-launch"},{"label":"User Quickstart"}]},{"id":"hMS7v5cUT8vQRNhmEUhm","title":"Support","pathname":"/welcome-to-radiant/support","siteSpaceId":"sitesp_WUbDt","icon":"circle-info","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"WELCOME TO RADIANT"}]},{"id":"qql1guOOuvMk4NkyPP2X","title":"Get Help","pathname":"/welcome-to-radiant/support/get-help","siteSpaceId":"sitesp_WUbDt","description":"Available support channels for Radiant Security customers, including how to report issues, submit feature requests, and reach the right team quickly depending on the urgency","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"WELCOME TO RADIANT"},{"label":"Support","icon":"circle-info"}]},{"id":"4madDAaKBpMHHGSRlR7h","title":"Radiant Alerts","pathname":"/radiant-alerts/radiant-alerts","siteSpaceId":"sitesp_WUbDt","icon":"triangle-exclamation","description":"Understand how Radiant triages, enriches, and presents security alerts.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT ALERTS"}]},{"id":"ngN5MOVqM4DxSOyUqs8e","title":"Alert Deduplication","pathname":"/radiant-alerts/radiant-alerts/alert-deduplication","siteSpaceId":"sitesp_WUbDt","description":"Deduplicate repetitive alerts from noisy security tools and consolidate them into a single, primary alert.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT ALERTS"},{"label":"Radiant Alerts","icon":"triangle-exclamation"}]},{"id":"xmj6QuYcC5AGAOROEa1B","title":"Radiant Cases","pathname":"/radiant-cases/radiant-cases","siteSpaceId":"sitesp_WUbDt","icon":"folders","description":"Transition from alert triage to full incident management with dedicated Cases.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CASES"}]},{"id":"p7YYZ6WieoBhwJp98dg2","title":"Escalate and Manage Cases","pathname":"/radiant-cases/radiant-cases/escalate-and-manage-cases","siteSpaceId":"sitesp_WUbDt","description":"Create cases from alerts, assign ownership, and manage the investigation lifecycle.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CASES"},{"label":"Radiant Cases","icon":"folders"}]},{"id":"NAs11QF3Lu7XbPyrqZ8t","title":"Response Actions","pathname":"/radiant-cases/radiant-cases/response-actions","siteSpaceId":"sitesp_WUbDt","description":"Understand the response actions that appear in your cases.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CASES"},{"label":"Radiant Cases","icon":"folders"}]},{"id":"2QqJJWgFxXwFQTv2c41d","title":"Response Actions in Cases","pathname":"/radiant-cases/radiant-cases/response-actions-in-cases","siteSpaceId":"sitesp_WUbDt","description":"Execute coordinated remediation actions on specific artifacts within a case.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CASES"},{"label":"Radiant Cases","icon":"folders"}]},{"id":"FSgJ3SpijlZcjDJtNpaU","title":"Audit Response Actions","pathname":"/radiant-cases/radiant-cases/audit-response-actions","siteSpaceId":"sitesp_WUbDt","description":"Verify remediation steps and troubleshoot failures using Audit Logs.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CASES"},{"label":"Radiant Cases","icon":"folders"}]},{"id":"j0HewtLguazdHKhL9pz1","title":"Artifact Reference Guide","pathname":"/radiant-cases/radiant-cases/artifact-reference-guide","siteSpaceId":"sitesp_WUbDt","description":"Understand the artifacts and objects that appear in your alerts and cases.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CASES"},{"label":"Radiant Cases","icon":"folders"}]},{"id":"G3YwJXwV2GqLxtp7BsVI","title":"Section Overview","pathname":"/radiant-connectors/section-overview","siteSpaceId":"sitesp_WUbDt","icon":"circles-overlap","description":"Connect your security stack to Radiant, understand how data flows through the platform, and configure storage for your security logs.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"}]},{"id":"Dhcx5WfEbL6ur2JcPObw","title":"The Radiant Data Pipeline","pathname":"/radiant-connectors/section-overview/the-radiant-data-pipeline","siteSpaceId":"sitesp_WUbDt","description":"A comprehensive overview of how security data flows through Radiant.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Section Overview","icon":"circles-overlap"}]},{"id":"0y0QdSVCPYUOvIBPVvJ4","title":"Phishing Configuration","pathname":"/radiant-connectors/section-overview/phishing-configuration","siteSpaceId":"sitesp_WUbDt","description":"","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Section Overview","icon":"circles-overlap"}]},{"id":"9nTEGwqNPGcAJGjVPSPO","title":"Outlook Online Conditional Forwarding (Inbox Rules)","pathname":"/radiant-connectors/section-overview/phishing-configuration/outlook-online-conditional-forwarding-inbox-rules","siteSpaceId":"sitesp_WUbDt","description":"Set up conditional forwarding rules for Office 365.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Section Overview","icon":"circles-overlap"},{"label":"Phishing Configuration"}]},{"id":"TKNiHf30MPZZUSkreFOe","title":"Set up Gmail to Forward Phishing Emails to Radiant Security","pathname":"/radiant-connectors/section-overview/phishing-configuration/set-up-gmail-to-forward-phishing-emails-to-radiant-security","siteSpaceId":"sitesp_WUbDt","description":"Auto-forward Gmail phishing emails to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Section Overview","icon":"circles-overlap"},{"label":"Phishing Configuration"}]},{"id":"9U5LMbtoQKDn7B5QdZFo","title":"Set up KnowBe4 on Chrome to forward phishing emails to Radiant Security","pathname":"/radiant-connectors/section-overview/phishing-configuration/set-up-knowbe4-on-chrome-to-forward-phishing-emails-to-radiant-security","siteSpaceId":"sitesp_WUbDt","description":"Auto-forward KnowBe4 on Chrome phishing emails to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Section Overview","icon":"circles-overlap"},{"label":"Phishing Configuration"}]},{"id":"7UIKUnBWCPNSgd2vaCba","title":"Set up KnowBe4 on O365 to forward phishing emails to Radiant Security","pathname":"/radiant-connectors/section-overview/phishing-configuration/set-up-knowbe4-on-o365-to-forward-phishing-emails-to-radiant-security","siteSpaceId":"sitesp_WUbDt","description":"Auto-forward KnowBe4 on O365 phishing emails to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Section Overview","icon":"circles-overlap"},{"label":"Phishing Configuration"}]},{"id":"SrUTEK5X0ewEw8wtuFhD","title":"Set up O365 to Forward Phishing Emails to Radiant Security","pathname":"/radiant-connectors/section-overview/phishing-configuration/set-up-o365-to-forward-phishing-emails-to-radiant-security","siteSpaceId":"sitesp_WUbDt","description":"Auto-forward O365 phishing emails to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Section Overview","icon":"circles-overlap"},{"label":"Phishing Configuration"}]},{"id":"7ROTAzrRgelbahdAe9SZ","title":"Set up Proofpoint PhishAlarm to Forward Phishing Emails to Radiant Security","pathname":"/radiant-connectors/section-overview/phishing-configuration/set-up-proofpoint-phishalarm-to-forward-phishing-emails-to-radiant-security","siteSpaceId":"sitesp_WUbDt","description":"Auto-forward Proofpoint PhishAlarm emails to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Section Overview","icon":"circles-overlap"},{"label":"Phishing Configuration"}]},{"id":"rshSb10vW6Cwyk7nm7oT","title":"Data Connectors","pathname":"/radiant-connectors/data-connectors","siteSpaceId":"sitesp_WUbDt","icon":"plug","description":"Welcome to data connectors documentation.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"}]},{"id":"e5fE2oeP0W2Py2tk1pvB","title":"1Password","pathname":"/radiant-connectors/data-connectors/1password","siteSpaceId":"sitesp_WUbDt","description":"Configure the 1Password data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"mEVbepG7QyrA67oV2SgM","title":"Adaptive Shield","pathname":"/radiant-connectors/data-connectors/adaptive-shield","siteSpaceId":"sitesp_WUbDt","description":"Configure the Adaptive Shield data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"lvZR9yIjZLQs6U2xe2iL","title":"ADAudit Plus","pathname":"/radiant-connectors/data-connectors/adaudit-plus","siteSpaceId":"sitesp_WUbDt","description":"Set up ADAudit Plus to forward security events via HTTPS.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"bVgcUn34PS53ojkh1G63","title":"Airlock Digital","pathname":"/radiant-connectors/data-connectors/airlock-digital","siteSpaceId":"sitesp_WUbDt","description":"Configure the Airlock Digital data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"ufZjjBQFbz2d9HGPCWxC","title":"Aruba ClearPass (syslog)","pathname":"/radiant-connectors/data-connectors/aruba-clearpass-syslog","siteSpaceId":"sitesp_WUbDt","description":"Configure ClearPass Policy Manager to forward syslog logs to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"WOcr3XUfqcBluxFDMQp3","title":"Avanan Checkpoint Webhook","pathname":"/radiant-connectors/data-connectors/avanan-checkpoint-webhook","siteSpaceId":"sitesp_WUbDt","description":"Set Avanan Checkpoint to forward security events via HTTPS.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"ctofjETt3cg42r6u9geW","title":"AWS","pathname":"/radiant-connectors/data-connectors/aws","siteSpaceId":"sitesp_WUbDt","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"oibqJledYYBgdMiVfo1n","title":"AWS API","pathname":"/radiant-connectors/data-connectors/aws/aws-api","siteSpaceId":"sitesp_WUbDt","description":"Connect your AWS account to streamline alert triage and threat analysis.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"},{"label":"AWS"}]},{"id":"k5jf4o0u3ul063kj6XYI","title":"AWS CloudTrail and GuardDuty","pathname":"/radiant-connectors/data-connectors/aws/aws-cloudtrail-and-guardduty","siteSpaceId":"sitesp_WUbDt","description":"Set up AWS CloudTrail and GuardDuty connectors.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"},{"label":"AWS"}]},{"id":"EBNAfdpVgCBnOBhIaE33","title":"Test GuardDuty’s integration with Radiant","pathname":"/radiant-connectors/data-connectors/aws/aws-cloudtrail-and-guardduty/test-guarddutys-integration-with-radiant","siteSpaceId":"sitesp_WUbDt","description":"Test your AWS integration with a GuardDuty automation script.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"},{"label":"AWS"},{"label":"AWS CloudTrail and GuardDuty"}]},{"id":"DsTUNx0QYN383pcDvCEq","title":"Azure Activities","pathname":"/radiant-connectors/data-connectors/azure-activities","siteSpaceId":"sitesp_WUbDt","description":"Onboard the Azure Activities data feed.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"xW8qvvxZi6v1cf1XZftg","title":"Barracuda Email Gateway Defense","pathname":"/radiant-connectors/data-connectors/barracuda-email-gateway-defense","siteSpaceId":"sitesp_WUbDt","description":"Configure the Barracuda Email Gateway Defense data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"IrVLSFBHZ83Dn5P44CfO","title":"Check Point Firewall (syslog)","pathname":"/radiant-connectors/data-connectors/check-point-firewall-syslog","siteSpaceId":"sitesp_WUbDt","description":"Configure Check Point Firewall to forward syslog to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"LGn005VN5tkhfj8qFFKy","title":"Cisco ASA (syslog)","pathname":"/radiant-connectors/data-connectors/cisco-asa-syslog","siteSpaceId":"sitesp_WUbDt","description":"Configure Cisco ASA for syslog forwarding to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"54OeasTcW5RRKr7yBc3o","title":"Cisco Duo","pathname":"/radiant-connectors/data-connectors/cisco-duo","siteSpaceId":"sitesp_WUbDt","description":"Configure the Cisco Duo data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"NPsdtYjfdcFvpjPu1rHK","title":"Cisco FTD (syslog)","pathname":"/radiant-connectors/data-connectors/cisco-ftd-syslog","siteSpaceId":"sitesp_WUbDt","description":"Configure Cisco FTD for syslog forwarding to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"SpSTzCEq9U1vvAHVqA03","title":"Cisco Identity Services Engine","pathname":"/radiant-connectors/data-connectors/cisco-identity-services-engine","siteSpaceId":"sitesp_WUbDt","description":"Configure the Cisco Identity Services Engine (ISE) data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"Apep9YKwqQOAawX9LvUb","title":"Cisco Meraki (syslog)","pathname":"/radiant-connectors/data-connectors/cisco-meraki-syslog","siteSpaceId":"sitesp_WUbDt","description":"Configure the Cisco Meraki syslog data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"8hgoarvKMjcPC6oNDMpZ","title":"Configure Amazon S3 to forward logs to Radiant Security","pathname":"/radiant-connectors/data-connectors/configure-amazon-s3-to-forward-logs-to-radiant-security","siteSpaceId":"sitesp_WUbDt","description":"Ingest any type of logs into Radiant Security through our S3 data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"MfCAmsr1HaWLbpGuXu0G","title":"Cribl FireEye HX/Trellix","pathname":"/radiant-connectors/data-connectors/cribl-fireeye-hx-trellix","siteSpaceId":"sitesp_WUbDt","description":"Add the Cribl FireEye HX data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"SDCFnQ5opdGHRwu7WtVo","title":"CrowdStrike Falcon CSPM","pathname":"/radiant-connectors/data-connectors/crowdstrike-falcon-cspm","siteSpaceId":"sitesp_WUbDt","description":"Configure Radiant Security to sync CrowdStrike CSPM alerts.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"36ULVYDW6UQBXpRSLaZU","title":"Generate CrowdStrike Falcon CSPM Read-Only Credentials","pathname":"/radiant-connectors/data-connectors/crowdstrike-falcon-cspm/generate-crowdstrike-falcon-cspm-read-only-credentials","siteSpaceId":"sitesp_WUbDt","description":"Create CrowdStrike Falcon CSPM read-only credentials and forward them to Radiant Security securely.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"},{"label":"CrowdStrike Falcon CSPM"}]},{"id":"MbjbmFK2muy0n9BmYMQu","title":"CrowdStrike OAuth2","pathname":"/radiant-connectors/data-connectors/crowdstrike-oauth2","siteSpaceId":"sitesp_WUbDt","description":"Configure Radiant Security to sync CrowdStrike data.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"A3EUpJRQCILuxoBXEuDG","title":"Execute Response Actions with Crowdstrike OAuth2","pathname":"/radiant-connectors/data-connectors/crowdstrike-oauth2/execute-response-actions-with-crowdstrike-oauth2","siteSpaceId":"sitesp_WUbDt","description":"Configure the action connector for Crowdstrike OAuth2.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"},{"label":"CrowdStrike OAuth2"}]},{"id":"9sx3NWADvpQ2NLFSOSKv","title":"CrowdStrike Falcon Next-Gen SIEM Events","pathname":"/radiant-connectors/data-connectors/crowdstrike-falcon-next-gen-siem-events","siteSpaceId":"sitesp_WUbDt","description":"Configure Radiant Security to sync CrowdStrike Next-Gen SIEM Events.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"n097aiTJs5bXYWOGYdtd","title":"Custom Alerts Webhook","pathname":"/radiant-connectors/data-connectors/custom-alerts-webhook","siteSpaceId":"sitesp_WUbDt","description":"Send alerts from unsupported data sources to Radiant Security for AI triage","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"Eq0RZjfrbAHPCjgOwBoz","title":"Custom Events Webhook","pathname":"/radiant-connectors/data-connectors/custom-events-webhook","siteSpaceId":"sitesp_WUbDt","description":"Send events from unsupported data sources to Radiant Security","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"zMSJoAHbkTmenEKTX5aY","title":"Darktrace Email","pathname":"/radiant-connectors/data-connectors/darktrace-email","siteSpaceId":"sitesp_WUbDt","description":"Configure the Darktrace email connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"uyVc9uQApNKJ1o7a42T0","title":"Darktrace NDR","pathname":"/radiant-connectors/data-connectors/darktrace-ndr","siteSpaceId":"sitesp_WUbDt","description":"Configure the DarkTrace NDR data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"M9BoSM1BTtF8PzHAGSdb","title":"Defender for Endpoint via Event Hub","pathname":"/radiant-connectors/data-connectors/defender-for-endpoint-via-event-hub","siteSpaceId":"sitesp_WUbDt","description":"Add the Microsoft Defender via EventHub data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"Fnv8cdmLQUYqrzbC5jAL","title":"Add Microsoft Defender Permissions","pathname":"/radiant-connectors/data-connectors/defender-for-endpoint-via-event-hub/add-microsoft-defender-permissions","siteSpaceId":"sitesp_WUbDt","description":"Add the Microsoft Defender data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"},{"label":"Defender for Endpoint via Event Hub"}]},{"id":"FRw477LcuvgGDawaFxRa","title":"Dragos Platform","pathname":"/radiant-connectors/data-connectors/dragos-platform","siteSpaceId":"sitesp_WUbDt","description":"Configure the Dragos Platform data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"mGLQjuOuGNBxJyVyDB41","title":"Elastic SIEM (webhook)","pathname":"/radiant-connectors/data-connectors/elastic-siem-webhook","siteSpaceId":"sitesp_WUbDt","description":"Configure Elastic SIEM to forward alerts to Radiant Security via webhook.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"7PKFHzdPeUJ1FjpwXDE7","title":"Execute Response Actions with KnowBe4","pathname":"/radiant-connectors/data-connectors/execute-response-actions-with-knowbe4","siteSpaceId":"sitesp_WUbDt","description":"Configure the action connector for KnowBe4.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"JfsEuf0bDycKKxIDvrYl","title":"Forcepoint NGFW (syslog)","pathname":"/radiant-connectors/data-connectors/forcepoint-ngfw-syslog","siteSpaceId":"sitesp_WUbDt","description":"Configure Forcepoint NGFW Security Management Center (SMC) for syslog forwarding to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"8165F7tA79NhJQSuCtIf","title":"Forcepoint ONE SSE","pathname":"/radiant-connectors/data-connectors/forcepoint-one-sse","siteSpaceId":"sitesp_WUbDt","description":"Configure the data connector for Forcepoint ONE SSE.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"BIqecNtBvHaEoipV8o9V","title":"Fortinet Fortigate (syslog)","pathname":"/radiant-connectors/data-connectors/fortinet-fortigate-syslog","siteSpaceId":"sitesp_WUbDt","description":"Configure Fortinet Fortigate for syslog log forwarding to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"8cukISptF2Lm8N2IMN5Y","title":"Fortinet Fortigate via Radiant Agent","pathname":"/radiant-connectors/data-connectors/fortinet-fortigate-via-radiant-agent","siteSpaceId":"sitesp_WUbDt","description":"Configure Fortinet Fortigate for syslog log forwarding to Radiant Security via Radiant Agent.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"ApH9IGaBX597Ensab2OA","title":"Fortinet FortiAnalyzer (syslog)","pathname":"/radiant-connectors/data-connectors/fortinet-fortianalyzer-syslog","siteSpaceId":"sitesp_WUbDt","description":"Configure Fortinet FortiAnalyzer for syslog log forwarding to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"FfFgI8TkSBfQ1OyjHUdI","title":"GCP Audit Logs","pathname":"/radiant-connectors/data-connectors/gcp-audit-logs","siteSpaceId":"sitesp_WUbDt","description":"Set up the GCP Audit Logs connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"fsU7IhJnEkhcjbGkInrr","title":"GCP Security Command Center (SCC)","pathname":"/radiant-connectors/data-connectors/gcp-security-command-center-scc","siteSpaceId":"sitesp_WUbDt","description":"Set up the GCP Security Command Center data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"elqd5PfuLl8oXkm6gBIT","title":"Google Workspace","pathname":"/radiant-connectors/data-connectors/google-workspace","siteSpaceId":"sitesp_WUbDt","description":"Onboard the Google Workspace data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"tTjDUMUzuzr6SB5ZCzkT","title":"Execute Response Actions with Google Workspace","pathname":"/radiant-connectors/data-connectors/google-workspace/execute-response-actions-with-google-workspace","siteSpaceId":"sitesp_WUbDt","description":"Configure the action connector for Google Workspace.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"},{"label":"Google Workspace"}]},{"id":"rjtLgqu6KDneKLzjzKv0","title":"Google Workspace IAM only","pathname":"/radiant-connectors/data-connectors/google-workspace-iam-only","siteSpaceId":"sitesp_WUbDt","description":"Onboard the Google Workspace IAM and Email data connectors.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"eunT7vImKeOiQdm58oBg","title":"Imperva Cloud WAF (Incapsula)","pathname":"/radiant-connectors/data-connectors/imperva-cloud-waf-incapsula","siteSpaceId":"sitesp_WUbDt","description":"Configure Imperva Cloud WAF for log forwarding to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"EtlrLFQ68uubQruVkMvp","title":"Install the Radiant Security Agent","pathname":"/radiant-connectors/data-connectors/install-the-radiant-security-agent","siteSpaceId":"sitesp_WUbDt","description":"Send your logs to Radiant Security's S3 environment for analysis.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"03jV3anWuHBOwuthYFKB","title":"Ivanti Connect Secure (Pulse Secure VPN)","pathname":"/radiant-connectors/data-connectors/ivanti-connect-secure-pulse-secure-vpn","siteSpaceId":"sitesp_WUbDt","description":"Configure Ivanti Connect Secure (formerly known as Pulse Secure VPN) for syslog log forwarding to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"8JDVMLX9ojEyT7Cuq9nS","title":"Keycloak","pathname":"/radiant-connectors/data-connectors/keycloak","siteSpaceId":"sitesp_WUbDt","description":"Configure syslog log forwarding for Keycloak.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"YVU6jMlq2TOMdUkFD5es","title":"Linux Server Logs","pathname":"/radiant-connectors/data-connectors/linux-server-logs","siteSpaceId":"sitesp_WUbDt","description":"Configure syslog log forwarding for Ubuntu servers.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"CjO8RA1v6JWJN5LkHiTu","title":"Microsoft O365","pathname":"/radiant-connectors/data-connectors/microsoft-o365","siteSpaceId":"sitesp_WUbDt","description":"Onboard the Microsoft O365 data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"K6gDiy5p1NCinlEChoas","title":"Microsoft O365 Expired Client Secret Key","pathname":"/radiant-connectors/data-connectors/microsoft-o365/microsoft-o365-expired-client-secret-key","siteSpaceId":"sitesp_WUbDt","description":"Update your expired client secret key.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"},{"label":"Microsoft O365"}]},{"id":"Yum6FqCS2Mz95OgMcmsj","title":"Execute Response Actions with Microsoft O365 (certificate)","pathname":"/radiant-connectors/data-connectors/microsoft-o365/execute-response-actions-with-microsoft-o365-certificate","siteSpaceId":"sitesp_WUbDt","description":"Configure the action connector for Microsoft O365 (certificate).","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"},{"label":"Microsoft O365"}]},{"id":"XHLPu2OmHSdKSpgMs4Ty","title":"Onboard Hosts to Microsoft Defender for Endpoint","pathname":"/radiant-connectors/data-connectors/microsoft-o365/onboard-hosts-to-microsoft-defender-for-endpoint","siteSpaceId":"sitesp_WUbDt","description":"Obtain the list of assets that do not require onboarding to Defender for Endpoint.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"},{"label":"Microsoft O365"}]},{"id":"SWB2ZlIWmUsxTDkWZjrA","title":"Microsoft Safe Links","pathname":"/radiant-connectors/data-connectors/microsoft-safe-links","siteSpaceId":"sitesp_WUbDt","description":"Connect the Microsoft Safe Links data feed.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"4FYSU6HgwlLs7b1Xc4jI","title":"Mimecast API 2.0","pathname":"/radiant-connectors/data-connectors/mimecast-api-2.0","siteSpaceId":"sitesp_WUbDt","description":"Configure the Mimecast API 2.0 data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"kjB7MMTXZMR7TmzAuckZ","title":"Netskope","pathname":"/radiant-connectors/data-connectors/netskope","siteSpaceId":"sitesp_WUbDt","description":"Configure the Netskope data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"WGkStYQamDLBQ3pqirRx","title":"Execute Response Actions with  Netskope","pathname":"/radiant-connectors/data-connectors/netskope/execute-response-actions-with-netskope","siteSpaceId":"sitesp_WUbDt","description":"Configure the action connector for Netskope.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"},{"label":"Netskope"}]},{"id":"xat7jT1UBDU4IXGdkCbI","title":"Okta","pathname":"/radiant-connectors/data-connectors/okta","siteSpaceId":"sitesp_WUbDt","description":"Pull Okta's activity telemetry and enable one-click containment and remediation tasks","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"9amGNBiWgEq4ilHQojXV","title":"Palo Alto Networks Cortex XSIAM","pathname":"/radiant-connectors/data-connectors/palo-alto-networks-cortex-xsiam","siteSpaceId":"sitesp_WUbDt","description":"Allow Radiant to collect alerts from Palo Alto Networks Cortex XSIAM","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"5NB4OSQaQWP1azeufAJe","title":"Palo Alto Networks Firewall","pathname":"/radiant-connectors/data-connectors/palo-alto-networks-firewall","siteSpaceId":"sitesp_WUbDt","description":"Configure Palo Alto Networks Firewall for syslog log forwarding to Radiant Security","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"CzeYxZyQUuR6chxFCM6M","title":"Execute Response Actions with Palo Alto Networks PAN-OS","pathname":"/radiant-connectors/data-connectors/palo-alto-networks-firewall/execute-response-actions-with-palo-alto-networks-pan-os","siteSpaceId":"sitesp_WUbDt","description":"Configure the action connector for Palo Alto Networks PAN-OS.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"},{"label":"Palo Alto Networks Firewall"}]},{"id":"FrDieAkSok6fJYpvdb5w","title":"Palo Alto Networks Firewall via Radiant Agent","pathname":"/radiant-connectors/data-connectors/palo-alto-networks-firewall-via-radiant-agent","siteSpaceId":"sitesp_WUbDt","description":"Configure Palo Alto Networks Firewall for syslog log forwarding to Radiant Security via Radiant Agent","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"ulbDjE9fvZvupXm1KZ1P","title":"Palo Alto Networks Strata (syslog)","pathname":"/radiant-connectors/data-connectors/palo-alto-networks-strata-syslog","siteSpaceId":"sitesp_WUbDt","description":"Configure the Palo Alto Strata Logging Service to forward Palo Alto Firewall logs to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"9tc4RpxBjEj5FDtpJ4vz","title":"Palo Alto Panorama (syslog)","pathname":"/radiant-connectors/data-connectors/palo-alto-panorama-syslog","siteSpaceId":"sitesp_WUbDt","description":"Configure Palo Alto Network custom log formats for syslog log forwarding to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"J0qAWbuZ6GsqzuCjMQk6","title":"Palo Alto Prisma Access (syslog)","pathname":"/radiant-connectors/data-connectors/palo-alto-prisma-access-syslog","siteSpaceId":"sitesp_WUbDt","description":"Configure Palo Alto Prisma Access to forward syslog to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"B1N4uxLpAL9HsjzJaNhs","title":"Palo Alto Prisma Cloud","pathname":"/radiant-connectors/data-connectors/palo-alto-prisma-cloud","siteSpaceId":"sitesp_WUbDt","description":"Configure Radiant Security to pull Pull Palo Alto Prisma Cloud alerts.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"uf6K5G2uSVhvuVQjUK3r","title":"Proofpoint TAP","pathname":"/radiant-connectors/data-connectors/proofpoint-tap","siteSpaceId":"sitesp_WUbDt","description":"Configure the Proofpoint data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"ryGJZIqcp4qNOYAUjvDb","title":"Execute Response Actions with Proofpoint TAP","pathname":"/radiant-connectors/data-connectors/proofpoint-tap/execute-response-actions-with-proofpoint-tap","siteSpaceId":"sitesp_WUbDt","description":"Configure the action connector for Proofpoint.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"},{"label":"Proofpoint TAP"}]},{"id":"SGftUTzlhrOm20VvHJAo","title":"Rapid7 Insight IDR Webhook","pathname":"/radiant-connectors/data-connectors/rapid7-insight-idr-webhook","siteSpaceId":"sitesp_WUbDt","description":"Set up the Rapid7 Insight IDR Webhook data connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"xclHpiY4bMImod5an7aS","title":"Salt Security","pathname":"/radiant-connectors/data-connectors/salt-security","siteSpaceId":"sitesp_WUbDt","description":"Configure Salt Security solution to forward alerts to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"zAp6lM5gVLjV8yLUT5fa","title":"SentinelOne Cloud Funnel","pathname":"/radiant-connectors/data-connectors/sentinelone-cloud-funnel","siteSpaceId":"sitesp_WUbDt","description":"Configure the data connector for SentinelOne Cloud Funnel.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"AgcdB1ctm410Ex1h9O9h","title":"SentinelOne Deep Visibility","pathname":"/radiant-connectors/data-connectors/sentinelone-deep-visibility","siteSpaceId":"sitesp_WUbDt","description":"Configure the data connector for SentinelOne Deep Visibility.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"jqo3ua0Ta6zWufT3cFNK","title":"SentinelOne Deep Visibility: Set the API Key Expiry","pathname":"/radiant-connectors/data-connectors/sentinelone-deep-visibility/sentinelone-deep-visibility-set-the-api-key-expiry","siteSpaceId":"sitesp_WUbDt","description":"Generate new credentials for the SentinelOne connector.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"},{"label":"SentinelOne Deep Visibility"}]},{"id":"ALtDJXZVUCppdk8osdiM","title":"Execute Response Actions with SentinelOne","pathname":"/radiant-connectors/data-connectors/sentinelone-deep-visibility/execute-response-actions-with-sentinelone","siteSpaceId":"sitesp_WUbDt","description":"Configure the action connector for SentinelOne.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"},{"label":"SentinelOne Deep Visibility"}]},{"id":"u11VcRvCWuT9xq0X0Vz1","title":"SentinelOne Singularity Data Lake","pathname":"/radiant-connectors/data-connectors/sentinelone-singularity-data-lake","siteSpaceId":"sitesp_WUbDt","description":"Configure the connectors for SentinelOne Singularity Data Lake.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"bKMbVuyAyalYMQDGu99H","title":"SonicWall Network (syslog)","pathname":"/radiant-connectors/data-connectors/sonicwall-network-syslog","siteSpaceId":"sitesp_WUbDt","description":"Set up the SonicWall connector for syslog forwarding.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"o3879YMN9FIoRBjYOiqH","title":"Sophos Intercept X","pathname":"/radiant-connectors/data-connectors/sophos-intercept-x","siteSpaceId":"sitesp_WUbDt","description":"Pull Sophos endpoint data.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"1A9WPgRN7NkJbfygtB8P","title":"Splunk Webhook","pathname":"/radiant-connectors/data-connectors/splunk-webhook","siteSpaceId":"sitesp_WUbDt","description":"Configure Splunk to forward alerts to Radiant Security","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"GmSsWBK0YnaDvxGR4F4t","title":"StellarCyber Alerts","pathname":"/radiant-connectors/data-connectors/stellarcyber-alerts","siteSpaceId":"sitesp_WUbDt","description":"Configure StellarCyber to forward alerts to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"I2HGMx2Jp9UbrqyC1WrV","title":"Suricata IDS (syslog)","pathname":"/radiant-connectors/data-connectors/suricata-ids-syslog","siteSpaceId":"sitesp_WUbDt","description":"Configure Suricata IDS for syslog forwarding to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"NK4eeZsnrBg6FSNELV99","title":"Trend Micro Apex Central (syslog)","pathname":"/radiant-connectors/data-connectors/trend-micro-apex-central-syslog","siteSpaceId":"sitesp_WUbDt","description":"Configure Trend Micro Apex Central for syslog forwarding to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"UCYn2ZU6R03vx2NJR0d8","title":"Trend Micro Vision One","pathname":"/radiant-connectors/data-connectors/trend-micro-vision-one","siteSpaceId":"sitesp_WUbDt","description":"Configure Trend Micro Vision One for integration with Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"tmdJ3jq8w6X0cpoBwbB1","title":"Create a Trend Micro Vision One API Token","pathname":"/radiant-connectors/data-connectors/trend-micro-vision-one/create-a-trend-micro-vision-one-api-token","siteSpaceId":"sitesp_WUbDt","description":"Learn how to create a Trend Micro Vision One API Token.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"},{"label":"Trend Micro Vision One"}]},{"id":"8I7a4XmQMaLbu5gtxjyw","title":"Varonis (syslog)","pathname":"/radiant-connectors/data-connectors/varonis-syslog","siteSpaceId":"sitesp_WUbDt","description":"Configure Varonis to forward syslog to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"0GRzuHDJgLOw8M2b1W6O","title":"Vectra NDR (syslog)","pathname":"/radiant-connectors/data-connectors/vectra-ndr-syslog","siteSpaceId":"sitesp_WUbDt","description":"Configure Vectra NDR for syslog log forwarding to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"nmwlDg4u5fVzoilA7l7O","title":"Vectra Stream (syslog)","pathname":"/radiant-connectors/data-connectors/vectra-stream-syslog","siteSpaceId":"sitesp_WUbDt","description":"Configure Vectra Stream for syslog log forwarding to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"mNPCAoOQ22TZAOW8fEcN","title":"Wazuh Correlation Rule Alerts via Webhook","pathname":"/radiant-connectors/data-connectors/wazuh-correlation-rule-alerts-via-webhook","siteSpaceId":"sitesp_WUbDt","description":"Send Wazuh correlation rule alerts to Radiant Security via HTTPS webhook.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"qHvwth2NfLUW9LL3HweC","title":"WatchGuard Firewall (syslog)","pathname":"/radiant-connectors/data-connectors/watchguard-firewall-syslog","siteSpaceId":"sitesp_WUbDt","description":"Configure WatchGuard Firewall for syslog log forwarding to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"LBeNvYDKxon9JfNUFlcU","title":"Windows Event Logs","pathname":"/radiant-connectors/data-connectors/windows-event-logs","siteSpaceId":"sitesp_WUbDt","description":"Configure Windows on-premises servers to forward security events to Radiant.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"nJNCIZZ0xeZiw36dcE4x","title":"ZScaler Cloud NSS Feed","pathname":"/radiant-connectors/data-connectors/zscaler-cloud-nss-feed","siteSpaceId":"sitesp_WUbDt","description":"Configure ZScaler NSS Cloud HTTPS log forwarding to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"HGPvhkhsV7LsOCfpQNW7","title":"ZScaler NSS (syslog)","pathname":"/radiant-connectors/data-connectors/zscaler-nss-syslog","siteSpaceId":"sitesp_WUbDt","description":"Configure ZScaler NSS custom log formats for log forwarding to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"k8tAQCla2WBfgv9LseJN","title":"ZScaler ZPA","pathname":"/radiant-connectors/data-connectors/zscaler-zpa","siteSpaceId":"sitesp_WUbDt","description":"Configure ZScaler ZPA for log forwarding to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Data Connectors","icon":"plug"}]},{"id":"Oea37Mtc9CyXABGDAOGR","title":"Communication Tools","pathname":"/radiant-connectors/communication-tools","siteSpaceId":"sitesp_WUbDt","icon":"slack","description":"","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"}]},{"id":"p5ajrrcYEFh9g027qaId","title":"Microsoft Teams","pathname":"/radiant-connectors/communication-tools/microsoft-teams","siteSpaceId":"sitesp_WUbDt","description":"Onboard the Microsoft Teams connector to Radiant Security","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Communication Tools","icon":"slack"}]},{"id":"EXJkcUf8LfMC7yFy9GLu","title":"Slack","pathname":"/radiant-connectors/communication-tools/slack","siteSpaceId":"sitesp_WUbDt","description":"Onboard the Slack connector to Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"RADIANT CONNECTORS"},{"label":"Communication Tools","icon":"slack"}]},{"id":"QEFtMEfZAmVJGNBxMagi","title":"Audit Logs","pathname":"/log-management/audit-logs","siteSpaceId":"sitesp_WUbDt","icon":"square-code","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"LOG MANAGEMENT"}]},{"id":"CQ5NTPSNL0ZVJL1X8Eix","title":"Introduction to Audit Logs","pathname":"/log-management/audit-logs/introduction-to-audit-logs","siteSpaceId":"sitesp_WUbDt","description":"Review system activity and maintain accountability.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"LOG MANAGEMENT"},{"label":"Audit Logs","icon":"square-code"}]},{"id":"uXzOMYe4UwaZUAnH3Acu","title":"Bring Your Own Bucket (BYOB)","pathname":"/log-management/bring-your-own-bucket-byob","siteSpaceId":"sitesp_WUbDt","icon":"bucket","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"LOG MANAGEMENT"}]},{"id":"zv3ZSpqlTEc6ah5ZxeKG","title":"Bring your own bucket for Log Management","pathname":"/log-management/bring-your-own-bucket-byob/bring-your-own-bucket-for-log-management","siteSpaceId":"sitesp_WUbDt","description":"Bring your own AWS bucket to Radiant Security and manage your logs using the new Log Management feature.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"LOG MANAGEMENT"},{"label":"Bring Your Own Bucket (BYOB)","icon":"bucket"}]},{"id":"ZFuHziE1rAJVe0InHBeB","title":"Bring your own bucket for Log Management with Terraform","pathname":"/log-management/bring-your-own-bucket-byob/bring-your-own-bucket-for-log-management-with-terraform","siteSpaceId":"sitesp_WUbDt","description":"Bring your own AWS bucket to Radiant Security and manage your logs using the new Log Management feature.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"LOG MANAGEMENT"},{"label":"Bring Your Own Bucket (BYOB)","icon":"bucket"}]},{"id":"6YBA7sO5Do9ZP086fPou","title":"Grafana Plug-in","pathname":"/log-management/grafana-plug-in","siteSpaceId":"sitesp_WUbDt","icon":"chart-pie","description":"Visualize and analyze your security data with the Radiant Security Grafana plug-in.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"LOG MANAGEMENT"}]},{"id":"vcayhc0AjYUAqCyliKmb","title":"Install the Grafana Plug-In to Query Events in the Radiant Log Manager","pathname":"/log-management/grafana-plug-in/install-the-grafana-plug-in-to-query-events-in-the-radiant-log-manager","siteSpaceId":"sitesp_WUbDt","description":"Enable Grafana access to events stored in the Radiant Log Manager to create custom dashboards and visualizations.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"LOG MANAGEMENT"},{"label":"Grafana Plug-in","icon":"chart-pie"}]},{"id":"FyjDksPHSrVUST1NR4ul","title":"Install the Grafana OpenSearch Plug-In to Query Radiant Alerts","pathname":"/log-management/grafana-plug-in/install-the-grafana-opensearch-plug-in-to-query-radiant-alerts","siteSpaceId":"sitesp_WUbDt","description":"Enable Grafana access to Radiant Alerts to create custom dashboards and visualizations.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"LOG MANAGEMENT"},{"label":"Grafana Plug-in","icon":"chart-pie"}]},{"id":"4vhtny6dDoA3SAEJjSTA","title":"Log Search and Query","pathname":"/log-management/log-search-and-query","siteSpaceId":"sitesp_WUbDt","icon":"box-magnifying-glass","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"LOG MANAGEMENT"}]},{"id":"xaxHSth6XQRdbADqaXUn","title":"Craft search queries in Log Management","pathname":"/log-management/log-search-and-query/craft-search-queries-in-log-management","siteSpaceId":"sitesp_WUbDt","description":"Learn how to effectively query Log Management to filter and sort through log data to find the information you need.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"LOG MANAGEMENT"},{"label":"Log Search and Query","icon":"box-magnifying-glass"}]},{"id":"jUz5eqMEJUroNp0tZbsY","title":"Search Query API Reference","pathname":"/log-management/log-search-and-query/search-query-api-reference","siteSpaceId":"sitesp_WUbDt","description":"Query raw events in Log Management programmatically using the Quickwit-compatible multi-search endpoint.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"LOG MANAGEMENT"},{"label":"Log Search and Query","icon":"box-magnifying-glass"}]},{"id":"Uuhv4mOd4tDMj04KGMA6","title":"Storage and Retention","pathname":"/log-management/storage-and-retention","siteSpaceId":"sitesp_WUbDt","icon":"box-isometric","description":"Learn how Radiant Log Management stores your security data and what retention options are available for your organization.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"LOG MANAGEMENT"}]},{"id":"54kysi8EamCp04BIOxpD","title":"Outgoing Webhooks","pathname":"/export-logs/outgoing-webhooks","siteSpaceId":"sitesp_WUbDt","icon":"webhook","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"Export Logs"}]},{"id":"bmqwoWMXgFxtfYd1sTqL","title":"Set up Outgoing Webhooks","pathname":"/export-logs/outgoing-webhooks/set-up-outgoing-webhooks","siteSpaceId":"sitesp_WUbDt","description":"Integrate with Radiant Security to receive real time updates on your alerts.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"Export Logs"},{"label":"Outgoing Webhooks","icon":"webhook"}]},{"id":"wZbfFILnnUr6NUbMtjOi","title":"Set up Jira to Receive Radiant Outgoing Webhooks","pathname":"/export-logs/outgoing-webhooks/set-up-jira-to-receive-radiant-outgoing-webhooks","siteSpaceId":"sitesp_WUbDt","description":"Create Jira tasks from Radiant Incoming webhooks.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"Export Logs"},{"label":"Outgoing Webhooks","icon":"webhook"}]},{"id":"QZ2LQR4lr2PxdvnLSoIf","title":"Alert Filters","pathname":"/manage-radiant/alert-filters","siteSpaceId":"sitesp_WUbDt","icon":"filter","description":"Suppress low-fidelity alerts before they reach the triage pipeline to reduce noise and focus analyst attention on real threats.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"Manage Radiant"}]},{"id":"TXbz5j8VeSRebEtRENbZ","title":"Organization Settings","pathname":"/manage-radiant/organization-settings","siteSpaceId":"sitesp_WUbDt","icon":"gear","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"Manage Radiant"}]},{"id":"KEtvAkKx46P3O0HlLXwP","title":"Security","pathname":"/manage-radiant/organization-settings/security","siteSpaceId":"sitesp_WUbDt","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"Manage Radiant"},{"label":"Organization Settings","icon":"gear"}]},{"id":"LGrPuozs1OJGRrHgWdX2","title":"Set Up Single Sign-On (SSO)","pathname":"/manage-radiant/organization-settings/security/set-up-single-sign-on-sso","siteSpaceId":"sitesp_WUbDt","description":"Set up SSO with your identity provider to provide secure, centralized access to Radiant.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"Manage Radiant"},{"label":"Organization Settings","icon":"gear"},{"label":"Security"}]},{"id":"AUd9NK2zFe0ZfAaiX5DD","title":"User Management","pathname":"/manage-radiant/organization-settings/user-management","siteSpaceId":"sitesp_WUbDt","description":"Create, edit, and delete users in Radiant.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"Manage Radiant"},{"label":"Organization Settings","icon":"gear"}]},{"id":"ae9hrQhrotsrti2GA8dE","title":"User Settings","pathname":"/manage-radiant/user-settings","siteSpaceId":"sitesp_WUbDt","icon":"user-gear","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"Manage Radiant"}]},{"id":"HmnWYRc915ZTq27KVIJf","title":"Account Notifications","pathname":"/manage-radiant/user-settings/account-notifications","siteSpaceId":"sitesp_WUbDt","description":"Configure your account notification settings in Radiant Security.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"Manage Radiant"},{"label":"User Settings","icon":"user-gear"}]},{"id":"R3CsYREUb7aHXDGc9g2C","title":"Report an issue","pathname":"/get-help/report-an-issue","siteSpaceId":"sitesp_WUbDt","description":"Report issues you find using the product reporting button.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"Get Help"}]},{"id":"TEnFcY0C7RyFjNI0U9aR","title":"Feedback & Support Button","pathname":"/get-help/feedback-and-support-button","siteSpaceId":"sitesp_WUbDt","description":"Find the help that you need, report any issues, and send us feedback using the product reporting button.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"Get Help"}]},{"id":"p9jyWGHZQNLzf6MLjjW1","title":"Submit a feature request","pathname":"/get-help/submit-a-feature-request","siteSpaceId":"sitesp_WUbDt","description":"Submit your feature requests using the product reporting button.","breadcrumbs":[{"label":"Documentation","icon":"book-open"},{"label":"Get Help"}]}]}