UTMStack Integrations

UTMStack comes out of the box with a wide range of built-in integrations for most mainstream technologies. Enabling an integration allows UTMStack to correlate logs coming from the corresponding data source on your network and detecting threats reliably. Each specific integration has its own guide. Our team is always working on a new integration, but here is the list of what we have developed so far:

** Integration Requirements ** : To ensure optimal system performance, certain additional requirements beyond the minimums must be considered. Each integration being introduced should reserve at least 1GB of space. This reservation is crucial to ensure proper data storage and efficient system operation as a whole.

** Logging Volume Considerations **: Furthermore, it’s important to take into account the volume of logs generated and processed within 10-minute intervals. If this volume exceeds 1GB within any time interval, immediate communication with the support team is required. This communication is essential to ensure system stability and performance, as well as to address any potential issues related to log management.

No. Name  
1 VMWare Syslog VMWare
2 Windows Agent Windows Agent
3 Syslog Syslog
4 Linux Agent Linux Agent
5 SOC AI SOC AI
6 ESET Endpoint Protection ESET Endpoint Protection
7 Kaspersky Security Kaspersky Security
8 Bitdefender GravityZone Bitdefender
9 Traefik Traefik
10 Google Cloud Platform Google Cloud Platform
11 AWS Cloudwatch AWS Cloudwatch
12 Office365 Office365
13 Azure Azure
14 Logstash Logstash
15 MongoDB MongoDB
16 MySQL MySQL
17 Redis Redis
18 Kafka Kafka
19 Elasticsearch Elasticsearch
20 PostgreSQL PostgreSQL
21 Kibana Kibana
22 Cisco Switch Cisco Switch
23 Cisco ASA Cisco ASA
24 Cisco Meraki Cisco Meraki
25 FortiGate FortiGate
26 Sophos XG Sophos XG
27 Fire Power Fire Power
28 MikroTik MikroTik
29 Palo Alto Palo Alto
30 SonicWall SonicWall
31 GitHub GitHub
32 Nats Nats
33 Json Input Json Input
34 MacOS MacOS
35 OsQuery OsQuery
36 Linux Auditing Demon Linux Auditing Demon
37 Deceptive Bytes Deceptive Bytes
38 High Availability Proxy High Availability Proxy
39 File Classification File Classification
40 Apache Apache
41 Internet Information Services Internet Information Services
42 Nginx Nginx
43 Sophos Central Sophos Central
44 SentinelOne Endpoint Security SentinelOne Endpoint Security
45 PfSense SentinelOne Endpoint Security
46 IBM AIX SentinelOne Endpoint Security
47 FortiWeb SentinelOne Endpoint Security
48 NetFlow SentinelOne Endpoint Security
49 IBM AS/400 IBM AS/400