Glossary
Report an Issue
Newsroom
Try SAFE for Free
SAFE 3.2
SAFE 3.1
SAFE 3.2
Contents
x
Getting Started
User Guide
Integration Guide
Release Notes
Support Matrix
SAFE KB Articles
Threat Intel Updates
Beta
Powered by
Integration Guide
41 Articles
in this category
Print
Contents
Integration Guide
41 Articles
in this category
Acunetix
Introduction Acunetix 360 is a web vulnerability assessment solution for the enterprise. This integration allows SAFE to pull the vulnerability assessment results of the configured web applications at pre-configured time intervals (1 to 30 days). ...
Adobe Experience Manager
About this document This document provides the step-by-step procedure to onboard an Adobe Experience Manager (AEM) asset in SAFE. Prerequisite To onboard an Adobe Experience Manager asset in SAFE, you need the following privileges: Users must...
Atlassian JIRA - Issue Tracking
Introduction Users can track incidents such as tracking action items for failed controls or assets with low SAFE Score via this integration of SAEF with Atlassian JIRA - Issue Tracking. SAFE admins can configure JIRA from the SAFE Hooks. Prere...
AWS
1. Introduction SAFE allows users to onboard and assess AWS accounts. SAFE admins can configure the AWS integration from SAFE Hooks. SAFE scans the configured and confirmed AWS accounts and automatically onboard discovered assets under the "...
Azure - Defender for Cloud
1. About this document This document provides step-by-step instructions to configure "Azure - Defender for Cloud" (written as "Azure" in this document) in SAFE. Info We have recently enhanced the SAFE-Azure Integration with several new capab...
Azure Active Directory
SAFE integrates with Microsoft 365 Defender to get the misconfigurations from Azure Active Directory. Refer to Microsoft 365 Defender for more details.
Azure AD SSO
About this document This document describes the step-by-step procedure to configure Single Sign-On (SSO) for SAFE via Azure AD. Introduction Single Sign-On (SSO) enables organizations to use the SAML 2.0 authentication provider for authenticating...
Azure AD User Provisioning
1. About this document This document provides step-by-step instructions to configure Azure AD User Provisioning in SAFE. 2. Introduction The integration of SAFE with Azure AD User Provisioning streamlines the user management under the p...
Checkmarx
Introduction Checkmarx provides static code analysis of web and mobile applications. This integration allows users to upload the CheckMarx report to SAFE and generate a SAFE score per application. Prerequisites The Checkmarx Report to be u...
CrowdStrike Falcon
About this document This document gives you the step-by-step procedure to configure CrowdStrike Falcon in SAFE. Note SAFE can only generate a score for an asset if there is a TTP mapping for the incoming signal for that asset. If Crowdstrik...
Burp Suite
Introduction SAFE allows users to upload the Burp report to SAFE, track the third-party controls with their status, and Score immediately on SAFE. Note Users cannot upload the Burp report for the assets, which are not available in SAFE. P...
Databricks
About this document This document gives you the step-by-step procedure to configure Databricks in SAFE. Introduction SAFE allows you to onboard and assess your Databricks account for its configuration assessment. SAFE admins can configure the D...
GCP
2 Articles
in this category
Google Workspace
About this document This document gives you the step-by-step procedure to configure Google Workspace in SAFE. Introduction SAFE allows you to onboard and assess your Google Workspace account for its configuration assessment. SAFE admins c...
Imperva WAF
About this document This document describes the step-by-step procedure to configure Imperva WAF in SAFE. Introduction SAFE integrates with Imperva WAF, allowing you to assess the configuration of web applications protected by the Imperva WA...
Integrate any VA tool with SAFE using APIs
About this document This page describes the step-by-step procedure to integrate any Vulnerability Assessment (VA) tool like Qualys, Tenable.io, etc., with SAFE using SAFE REST APIs to post VA data for technology assets. Info ...
KnowBe4
About this document This document provides a step-by-step procedure to configure the KnowBe4 in SAFE. Introduction SAFE seamlessly integrates with KnowBe4 KMSAT , and this integration allows SAFE to pull the Phishing results from KnowBe4 at...
Malware Patrol
Important Malware Patrol comes pre-configured with your SAFE instance. SAFE seamlessly integrates with Malware patrol to fetch the threat intelligence on malware, crypto mining, and phishing. Malware Patrol monitors t...
Microsoft 365
SAFE integrates with Microsoft 365 Defender to get the misconfigurations from Microsoft 365. Refer to Microsoft 365 Defender for more details.
Microsoft 365 Defender
1. About this document This document provides step-by-step instructions to configure Microsoft 365 Defender in SAFE. 2. Introduction SAFE integrates with Microsoft 365 Defender to fetch the configuration assessment of the following Mic...
Microsoft 365 Exchange Online
Important The integration between SAFE and Microsoft 365 Exchange Online has been temporarily suspended due to Microsoft's deprecation of Remote PowerShell . We are actively working on transitioning to the new integration method and plan to r...
Phishing Report Upload
About this document This document provides step-by-step instructions to upload a phishing report in CSV format in SAFE. Introduction SAFE allows users to upload phishing campaign results obtained from any phishing tool via the Phishing ...
Snowflake
About this document This document provides the step-by-step procedure to onboard a Snowflake asset in SAFE. Important This document only applies to onboarding a single Snowflake account in SAFE. To onboard multiple Salesforce accounts in SAF...
Microsoft SharePoint
SAFE integrates with Microsoft 365 Defender to get the misconfigurations from Microsoft SharePoint. Refer to Microsoft 365 Defender for more details.
Microsoft Teams
SAFE integrates with Microsoft 365 Defender to get the misconfigurations from Microsoft Teams. Refer to Microsoft 365 Defender for more details.
Mulesoft
About this document This document provides the step-by-step procedure to onboard a Mulesoft asset in SAFE. Important Some steps while adding a Mulesoft asset in SAFE are needed to be performed using SSH credentials of the SAFE server. These st...
Nessus
Introduction SAFE allows users to upload the Nessus report to SAFE and track the third-party controls with their status, and Score immediately on SAFE. Note Users cannot upload the Nessus report for the assets which are not available in SAFE. ...
Proofpoint
About this document This document provides a step-by-step procedure to configure the Proofpoint Targeted Attack Protection (TAP) in SAFE. Introduction The SAFE - Proofpoint integration helps you measure employee behavior more effectively. This...
Qualys VMDR
2 Articles
in this category
Qualys SCA
2 Articles
in this category
Rapid7 InsightVM
About this document This document provides the step-by-step procedure to configure Rapid7 InsightVM in SAFE. Pre-requisites You must install an on-prem Site Coordinator (SC) for the SAFE instance on which you want to configure Rapid7 Insight...
Salesforce
1. About this document This document provides step-by-step instructions to configure a Salesforce account in SAFE. Important This document only applies to configuring a single Salesforce account in SAFE. To configure multiple Salesforce ac...
SAP HANA
About this document This document provides the step-by-step procedure to onboard the SAP Hana Database 2.0 in SAFE. Important Currently SAFE supports the TCP/IP connection type. Users can onboard an SAP Hana Database 2.0 using the username, pa...
SecurityTrails
Important SecurityTrails comes pre-configured with your SAFE instance. SAFE integrates with SecurityTrails to enrich asset data of your company in SAFE. It helps you track your internet-facing infrastructure with a det...
ServiceNow
About this document This document provides step-by-step instructions to onboard a ServiceNow account in SAFE. Introduction SAFE integrates with ServiceNow via read-only APIs and fetches the security misconfiguration of the ServiceNow account in...
ServiceNow Incident
Introduction ServiceNow integration with SAFE allows users to create incidents for failed controls on ServiceNow. Only SAFE Admins can configure ServiceNow. Users can now create incidents on the following two levels: Control level incidents As...
Shodan
Important Shodan comes pre-configured with your SAFE instance. SAFE integrates with Shodan to fetch the open port information, TLS SSL version, and IP location. Shodan enables you to see your current connections to th...
SpyCloud
Important SpyCloud comes pre-configured with your SAFE instance. SAFE seamlessly integrates with SpyCloud to fetch the compromised credentials, and PII recaptured from third-party breaches, malware-infected devices, an...
Tanium
About this document This document provides the step-by-step procedure to configure Tanium in SAFE. Introduction SAFE seamlessly integrates with Tanium, a top-tier endpoint security management platform, to get the assets and their security m...
Tenable.io
1. About this document This document provides step-by-step instructions to configure a Tenable.io account in SAFE. Info You can onboard multiple Tenable.io accounts in SAFE. To onboard multiple accounts, refer to Add multiple integration ac...
Tenable.sc
About this document This document provides the step-by-step procedure to configure Tenable.sc in SAFE. Pre-requisites You must install an on-prem Site Coordinator (SC) for the SAFE instance on which you want to configure the Tenable.sc . ...
VA Report Upload
About this document This document provides step-by-step instructions to upload a VA report in SAFE. Introduction SAFE allows users to upload reports from any VA tool via the VA report upload functionality. The vulnerabilities report can be d...
Zoom
About this document This document provides the step-by-step procedure to configure Zoom in SAFE. Introduction SAFE allows you to onboard and assess your Zoom account for its configuration assessment. SAFE admins can configure the Zoom integrati...
Wiz
1. About this document This document provides step-by-step instructions to configure Wiz in SAFE. 2. Introduction SAFE seamlessly integrates with Wiz and pulls assets and their corresponding security issues in SAFE. This integration provide...
SSO
4 Articles
in this category