Glossary
Report an Issue
Newsroom
Try SAFE for Free
SAFE One
SAFE One
SAFE 3.1
SAFE 3.2
Contents
x
Getting Started
Configure Single Sign-On (SSO)
User Guide
Integration Guides
Release Notes
SAFE KB Articles
Beta
Powered by
Integration Guides
57 Articles
in this category
Print
Contents
Integration Guides
57 Articles
in this category
Asana
About this document This document provides the step-by-step procedure to configure Asana in SAFE. Introduction SAFE allows you to onboard and assess your Asana account for its configuration assessment. SAFE admins can configure the Asana in...
Adobe Admin Console
About this document This document provides the step-by-step procedure to configure Adobe Admin Console in SAFE. Introduction SAFE integrates with Adobe Admin Console via read-only APIs and fetches the security misconfiguration of the Adobe ...
BambooHR
About this document This document provides the step-by-step procedure to configure BambooHR in SAFE. Introduction SAFE integrates with BambooHR via read-only APIs and fetches the security misconfiguration of the BambooHR account in SAFE. SA...
Azure AD User Provisioning
1. About this document This document provides step-by-step instructions to configure Azure AD User Provisioning in SAFE. 2. Introduction The integration of SAFE with Azure AD User Provisioning streamlines the user management under the p...
Atlassian Opsgenie
About this document This document provides the step-by-step procedure to configure Atlassian Opsgenie in SAFE. Introduction SAFE integrates with Atlassian Opsgenie via read-only APIs and fetches the security misconfiguration of the Atlassia...
Auth0
About this document This document gives you the step-by-step procedure to configure Auth0 in SAFE. Pre-requisite You need the following connection details for this integration: API Identifier Client ID Client Secret API Audience Auth0...
Automox
About this document This document provides the step-by-step procedure to configure Automox in SAFE. Introduction SAFE integrates with Automox via read-only APIs and fetches the security misconfiguration of Automox in SAFE. Prerequisites ...
AWS
1. About this document This document includes the step-by-step procedure to onboard AWS accounts in SAFE. Once you configure and confirm an AWS account, SAFE automatically discovers and onboards AWS assets in SAFE. 2....
Azure - Defender for Cloud
1. About this document This document provides step-by-step instructions to configure "Azure - Defender for Cloud" (written as "Azure" in this document) in SAFE. 2. Introduction This integration allows you to onboard assets from Azure and fe...
Bitbucket
About this document This document gives you the step-by-step procedure to configure Bitbucket in SAFE. Pre-requisite You need the following connection details for this integration: Bitbucket Admin Access Bitbucket Workspace ID Bitbucket...
Cisco Meraki
About this document This document provides the step-by-step procedure to configure Cisco Meraki in SAFE. Introduction SAFE integrates with Cisco Meraki via read-only APIs and fetches the security misconfiguration of the Cisco Meraki account...
Cisco Umbrella
About this document This document provides the step-by-step procedure to configure Cisco Umbrella in SAFE. Introduction SAFE integrates with Cisco Umbrella via read-only APIs and fetches the security misconfiguration of the Cisco Umbrella a...
CrowdStrike Falcon
About this document This document gives you the step-by-step procedure to configure CrowdStrike Falcon in SAFE. Note SAFE can only generate a score for an asset if there is a TTP mapping for the incoming signal for that asset. If Crowdstrik...
Cloudflare
About this document This document gives you the step-by-step procedure to configure Cloudflare in SAFE. Pre-requisite You need the following connection details for this integration: Cloudflare Admin Access Cloudflare Instance URL Access...
CrowdStrike Spotlight
About this document This document gives you the step-by-step procedure to configure CrowdStrike Spotlight in SAFE. Pre-requisite You need the following connection details for this integration: CrowdStrike URL Client ID Client Secret ...
CyberArk Identity
About this document This document provides the step-by-step procedure to configure CyberArk Identity in SAFE. Pre-requisite You need the following connection details for this integration: CyberArk Identity Admin Access API Instance URL ...
Databricks
About this document This document gives you the step-by-step procedure to configure Databricks in SAFE. Introduction SAFE allows you to onboard and assess your Databricks account for its configuration assessment. SAFE admins can configure t...
Datadog
About this document This document provides the step-by-step procedure to configure Datadog in SAFE. Introduction SAFE integrates with Datadog via read-only APIs and fetches the security misconfiguration. Prerequisites Datadog Admin Ac...
Document360
About this document This document provides the step-by-step procedure to configure Document360 in SAFE. Introduction SAFE integrates with Document360 via read-only APIs and fetches the security misconfiguration of the Document360 Workspace ...
DocuSign
About this document This document provides the step-by-step procedure to configure DocuSign in SAFE. Pre-requisite You need the following connection details for this integration: DocuSign Admin Access API URL Account ID Integration K...
Duo Security
About this document This document provides the step-by-step procedure to configure Duo Security i n SAFE. Introduction SAFE integrates with Duo Security via read-only APIs and fetches the security misconfiguration. Prerequisites Duo S...
Dynatrace
About this document This document provides the step-by-step procedure to configure Dynatrace in SAFE. Pre-requisite You need the following connection details for this integration: Dynatrace Admin Access Account URN Environment ID Clie...
Fastly
About this document This document provides the step-by-step procedure to configure Fastly in SAFE. Introduction SAFE integrates with Fastly via read-only APIs and fetches the security misconfiguration of the Fastly account in SAFE. Prereq...
GCP - Security Command Center
About this document This document provides a step-by-step guide to onboard the GCP - Security Command Center into SAFE via UI. Introduction SAFE allows you to onboard and assess your GCP - Security Command Center assets. SAFE admins can con...
Google Workspace
About this document This document gives you the step-by-step procedure to configure Google Workspace in SAFE. Prerequisites To configure Google Workspace integration with SAFE, the user needs to provide the service account key. Configurin...
Github
About this document This document provides the step-by-step procedure to configure Github in SAFE. Introduction SAFE integrates with Github via read-only APIs and fetches the security misconfiguration of the Github account in SAFE. Prere...
GitLab
About this document This document provides the step-by-step procedure to configure GitLab in SAFE. Introduction SAFE integrates with GitLab via read-only APIs and fetches the security misconfiguration of the GitLab account in SAFE. SAFE adm...
Grafana
About this document This document provides the step-by-step procedure to configure Grafana in SAFE. Introduction SAFE integrates with Grafana via read-only APIs and fetches the security misconfiguration of the Grafana Workspace in SAFE. SAF...
Imperva WAF
About this document This document describes the step-by-step procedure to configure Imperva WAF in SAFE. Introduction SAFE integrates with Imperva WAF, allowing you to assess the configuration of web applications protected by the Imperva WA...
Jumpcloud
About this document This document provides the step-by-step procedure to configure Jumpcloud in SAFE. Introduction SAFE integrates with Jumpcloud via read-only APIs and fetches the security misconfiguration of Jumpcloud in SAFE. Prerequi...
Jamf
About this document This document gives you the step-by-step procedure to configure Jamf in SAFE. Pre-requisite You need the following connection details for this integration: Jamf Admin Access Jamf Instance URL (example: https://<your c...
JFrog
About this document This document provides the step-by-step procedure to configure JFrog in SAFE. Introduction SAFE integrates with JFrog via read-only APIs and fetches the security misconfiguration of the JFrog in SAFE. Prerequisites ...
KnowBe4
About this document This document provides a step-by-step procedure to configure the KnowBe4 in SAFE. Introduction SAFE seamlessly integrates with KnowBe4 KMSAT , and this integration allows SAFE to pull the Phishing results from KnowBe4 at...
LastPass
About this document This document provides the step-by-step procedure to configure LastPass in SAFE. Introduction SAFE integrates with LastPass via read-only APIs and fetches the security misconfiguration of LastPass in SAFE. Prerequisit...
Malware Patrol
Important Malware Patrol comes pre-configured with your SAFE instance. SAFE seamlessly integrates with Malware patrol to fetch the threat intelligence on malware, crypto mining, and phishing. Malware Patrol monitors t...
Microsoft 365 Defender
1. About this document This document provides step-by-step instructions to configure Microsoft 365 Defender in SAFE. 2. Introduction Note Make a note that for misconfiguration availability, products or services need to be configured...
Microsoft Defender for Endpoint
About this document This document provides step-by-step instructions to configure "Microsoft Defender for Endpoint" in SAFE. Introduction This integration allows you to onboard endpoints from MS Defender for Endpoint and fetch vulnerability...
monday.com
About this document This document provides the step-by-step procedure to configure monday.com in SAFE. Introduction SAFE integrates with monday.com via read-only APIs and fetches the security misconfiguration of the monday.com workspace in ...
Okta
About this document This document provides the step-by-step procedure to configure Okta in SAFE. Prerequisites Okta Admin Access API Token SAFE Admin Access Generate API Token To generate the API Token: Log in to your Okta accoun...
Phishing Report Upload
About this document This document provides step-by-step instructions to upload a phishing report in CSV format in SAFE. Introduction SAFE allows users to upload phishing campaign results obtained from any phishing tool via the Phishing repo...
Qualys SCA
About this document This document provides the step-by-step procedure to integrate SAFE with Qualys Security Configuration Assessment (SCA) and Policy Compliance (PC) . Introduction SAFE integrates with Qualys Security Configuration Asse...
Qualys VMDR
About this document This document provides the step-by-step procedure to integrate SAFE with Qualys VMDR. Introduction Qualys Vulnerability Management (VM) is a cloud service that gives users global visibility into where their IT systems mi...
Rapid7 InsightVM
1. About this document This document provides the step-by-step procedure to configure Rapid7 InsightVM in SAFE. 2. Introduction SAFE integrates with Rapid7 InsightVM and allows you to discover and import assets from Rapid7 InsightVM along ...
SecurityTrails
Important SecurityTrails comes pre-configured with your SAFE instance. SAFE integrates with SecurityTrails to enrich asset data of your company in SAFE. It helps you track your internet-facing infrastructure with a det...
SentinelOne
About this document This document provides the step-by-step procedure to configure SentinelOne in SAFE. Introduction SAFE integrates with SentinelOne and allows you to effortlessly discover and import assets and their EDR findings directly ...
SendGrid
About this document This document provides the step-by-step procedure to configure SendGrid in SAFE. Introduction SAFE integrates with SendGrid via read-only APIs and fetches the security misconfiguration of the SendGrid account in SAFE. ...
Sentry
About this document This document provides the step-by-step procedure to configure Sentry in SAFE. Introduction SAFE integrates with Sentry via read-only APIs and fetches the security misconfiguration of Sentry in SAFE. Prerequisites ...
ServiceNow
About this document This document provides step-by-step instructions to onboard a ServiceNow account in SAFE. Introduction SAFE integrates with ServiceNow via read-only APIs and fetches the security configuration of the ServiceNow account i...
Slack
About this document This document provides the step-by-step procedure to configure Slack in SAFE. Introduction SAFE integrates with Slack via read-only APIs and fetches the security misconfiguration of the Slack Workspace in SAFE. SAFE admi...
Shodan
Important Shodan comes pre-configured with your SAFE instance. SAFE integrates with Shodan to fetch the open port information, TLS SSL version, and IP location. Shodan enables you to see your current connections to th...
Tanium
About this document This document provides the step-by-step procedure to configure Tanium in SAFE. Introduction SAFE seamlessly integrates with Tanium to get the assets and their security misconfigurations into SAFE. The Tanium integration...
Tenable Vulnerability Management
1. About this document This document provides step-by-step instructions to configure a Tenable Vulnerability Management (formerly known as Tenable.io) account in SAFE. Info You can onboard multiple Tenable Vulnerability Management account...
Tenable Security Center
1. About this document This document provides the step-by-step procedure to configure the Tenable Security Center in SAFE. 2. Introduction SAFE integrates with Tenable Security Center and allows you to discover and import assets from T...
VA Report Upload
About this document This document provides step-by-step instructions to upload a VA report in SAFE. Introduction SAFE allows users to upload reports from any VA tool via the VA report upload functionality. The vulnerabilities report can ...
Veracode
About this document This document provides the step-by-step procedure to configure Veracode in SAFE. Introduction SAFE integrates with Veracode via read-only APIs and fetches the security misconfiguration. Prerequisites Veracode Admin...
Wiz
1. About this document This document provides step-by-step instructions to configure Wiz in SAFE. 2. Introduction SAFE seamlessly integrates with Wiz and pulls assets and their corresponding security issues in SAFE. This integration provide...
Zoom
About this document This document provides the step-by-step procedure to configure Zoom in SAFE. Introduction SAFE allows you to onboard and assess your Zoom account for its configuration assessment. SAFE admins can configure the Zoom integ...