Glossary
Report an Issue
Newsroom
Try SAFE for Free
SAFE 3.1
SAFE One
SAFE 3.1
SAFE 3.2
Contents
x
Getting Started
User Guide
Integration Guide
Release Notes
Support Matrix
SAFE KB Articles
Powered by
Integration Guide
37 Articles
in this category
Print
Contents
Integration Guide
37 Articles
in this category
Adobe Experience Manager
About this document This document provides the step-by-step procedure to onboard an Adobe Experience Manager (AEM) asset in SAFE. Prerequisite To onboard an Adobe Experience Manager asset in SAFE, you need the following privileges: Users must...
Atlassian JIRA - Issue Tracking
Introduction Users can track incidents such as tracking action items for failed controls or assets with low SAFE Score via this integration of SAFE with Atlassian JIRA - Issue Tracking. SAFE admins can configure JIRA from the SAFE Hooks. Prere...
AWS
1. Introduction SAFE allows users to onboard and assess AWS accounts. SAFE admins can configure the AWS integration from SAFE Hooks. SAFE scans the configured and confirmed AWS accounts and automatically onboard discovered assets unde...
Azure - Defender for Cloud
1. About this document This document provides step-by-step instructions to configure "Azure - Defender for Cloud" (written as "Azure" in this document) in SAFE. Info We have recently enhanced the SAFE-Azure Integration with several new capab...
Azure Active Directory
SAFE integrates with Microsoft 365 Defender to get the misconfigurations from Azure Active Directory. Refer to Microsoft 365 Defender for more details.
Azure AD SSO
About this document This document describes the step-by-step procedure to configure Single Sign-On (SSO) for SAFE via Azure AD. Introduction Single Sign-On (SSO) enables organizations to use the SAML 2.0 authentication provider for authenticating...
Azure AD User Provisioning
1. About this document This document provides step-by-step instructions to configure Azure AD User Provisioning in SAFE. 2. Introduction The integration of SAFE with Azure AD User Provisioning streamlines the user management under the p...
BeyondTrust
Introduction BeyondTrust helps in managing, controlling, and monitoring privileged user activities. The SAFE-BeyondTrust integration eliminates the manual entry of the assets’ password on the SAFE platform for assessment. With this integration, SA...
Phishing Report Upload
About this document This document provides step-by-step instructions to upload a phishing report in CSV format in SAFE. Introduction SAFE allows users to upload phishing campaign results obtained from any phishing tool via the Phishing ...
CrowdStrike Falcon
About this document This document gives you the step-by-step procedure to configure CrowdStrike Falcon in SAFE. Note SAFE can only generate a score for an asset if there is a TTP mapping for the incoming signal for that asset. If Crowd...
Databricks
About this document This document gives you the step-by-step procedure to configure Databricks in SAFE. Introduction SAFE allows you to onboard and assess your Databricks account for its configuration assessment. SAFE admins can configure the D...
GCP
2 Articles
in this category
Google Workspace
About this document This document gives you the step-by-step procedure to configure Google Workspace in SAFE. Introduction SAFE allows you to onboard and assess your Google Workspace account for its configuration assessment. SAFE admins c...
Imperva WAF
About this document This document describes the step-by-step procedure to configure Imperva WAF in SAFE. Introduction SAFE integrates with Imperva WAF, allowing you to assess the configuration of web applications protected by the Imperva WA...
KnowBe4
About this document This document provides a step-by-step procedure to configure the KnowBe4 in SAFE. Introduction SAFE seamlessly integrates with KnowBe4 KMSAT , and this integration allows SAFE to pull the Phishing results from KnowB...
Malware Patrol
Important Malware Patrol comes pre-configured with your SAFE instance. SAFE seamlessly integrates with Malware patrol to fetch the threat intelligence on malware, crypto mining, and phishing. Malware Patrol monitors t...
Microsoft 365
SAFE integrates with Microsoft 365 Defender to get the misconfigurations from Microsoft 365. Refer to Microsoft 365 Defender for more details.
Microsoft 365 Defender
1. About this document This document provides step-by-step instructions to configure Microsoft 365 Defender in SAFE. 2. Introduction SAFE integrates with Microsoft 365 Defender to fetch the configuration assessment of the following Mic...
Microsoft 365 Exchange Online
SAFE integrates with Microsoft 365 Defender to get the misconfigurations from Microsoft 365. Refer to Microsoft 365 Defender for more details.
Microsoft SharePoint
SAFE integrates with Microsoft 365 Defender to get the misconfigurations from Microsoft SharePoint. Refer to Microsoft 365 Defender for more details.
Microsoft Teams
SAFE integrates with Microsoft 365 Defender to get the misconfigurations from Microsoft Teams. Refer to Microsoft 365 Defender for more details.
Qualys VMDR
2 Articles
in this category
Qualys SCA
2 Articles
in this category
Rapid7 InsightVM
About this document This document provides the step-by-step procedure to configure Rapid7 InsightVM in SAFE. Pre-requisites You must install an on-prem Site Coordinator (SC) for the SAFE instance on which you want to configure Rapid7 Insight...
Salesforce
1. About this document This document provides step-by-step instructions to configure a Salesforce account in SAFE. Important This document only applies to configuring a single Salesforce account in SAFE. To configure multiple Salesforce ac...
SAP HANA
About this document This document provides the step-by-step procedure to onboard the SAP Hana Database 2.0 in SAFE. Important Currently SAFE supports the TCP/IP connection type. Users can onboard an SAP Hana Database 2.0 using the username, pa...
Sectona
Introduction Sectona provides a single console for securing passwords in an embedded vault, securing access with cross-platform access technology & managing privileges over endpoints. The SAFE-Sectona integration eliminates the manual entry o...
SecurityTrails
Important SecurityTrails comes pre-configured with your SAFE instance. SAFE integrates with SecurityTrails to enrich asset data of your company in SAFE. It helps you track your internet-facing infrastructure with a det...
ServiceNow
About this document This document provides step-by-step instructions to onboard a ServiceNow account in SAFE. Introduction SAFE integrates with ServiceNow via read-only APIs and fetches the security misconfiguration of the ServiceNow account in...
Shodan
Important Shodan comes pre-configured with your SAFE instance. SAFE integrates with Shodan to fetch the open port information, TLS SSL version, and IP location. Shodan enables you to see your current connections to th...
Snowflake
About this document This document provides the step-by-step procedure to onboard a Snowflake asset in SAFE. Important This document only applies to onboarding a single Snowflake account in SAFE. To onboard multiple Salesforce accounts in SAF...
SpyCloud
Important SpyCloud comes pre-configured with your SAFE instance. SAFE seamlessly integrates with SpyCloud to fetch the compromised credentials, and PII recaptured from third-party breaches, malware-infected devices, an...
Tanium
About this document This document provides the step-by-step procedure to configure Tanium in SAFE. Introduction SAFE seamlessly integrates with Tanium, a top-tier endpoint security management platform, to get the assets and their security m...
Tenable.io
1. About this document This document provides step-by-step instructions to configure a Tenable.io account in SAFE. Info You can onboard multiple Tenable.io accounts in SAFE. To onboard multiple accounts, refer to Add multiple integration ac...
Tenable.sc
About this document This document provides the step-by-step procedure to configure Tenable.sc in SAFE. Pre-requisites You must install an on-prem Site Coordinator (SC) for the SAFE instance on which you want to configure the Tenable.sc . ...
Thycotic
1. Introduction Thycotic Secret Server (PAM) provides a solution that helps manage, control, and monitor the admin activities on assets. The SAFE - Thycotic integration leverages the credentials stored in Thycotic Secret Server and eliminates the...
VA Report Upload
About this document This document provides step-by-step instructions to upload a VA report in SAFE. Introduction SAFE allows users to upload reports from any VA tool via the VA report upload functionality. The vulnerabilities report can be d...
Zoom
About this document This document provides the step-by-step procedure to configure Zoom in SAFE. Introduction SAFE allows you to onboard and assess your Zoom account for its configuration assessment. SAFE admins can configure the Zoom integrati...
Integrate any VA tool with SAFE using APIs
About this document This page describes the step-by-step procedure to integrate any Vulnerability Assessment (VA) tool like Qualys, Tenable.io, etc., with SAFE using SAFE REST APIs to post VA data for technology assets. Info ...
Wiz
1. About this document This document provides step-by-step instructions to configure Wiz in SAFE. 2. Introduction SAFE seamlessly integrates with Wiz and pulls assets and their corresponding security issues in SAFE. This integration provide...
SSO
3 Articles
in this category