Glossary
Report an Issue
Newsroom
Try SAFE for Free
SAFE 3.2
SAFE One
SAFE 3.1
SAFE 3.2
Contents
x
Getting Started
User Guide
Integration Guide
Release Notes
Support Matrix
SAFE KB Articles
Threat Intel Updates
Beta
Powered by
Integration Guide
41 Articles
in this category
Print
Contents
Integration Guide
41 Articles
in this category
Acunetix
Introduction Acunetix 360 is a web vulnerability assessment solution for the enterprise. This integration allows SAFE to pull the vulnerability assessment results of the configured web applications at pre-configured time intervals (1 to 30 days). ...
Adobe Experience Manager
About this document This document provides the step-by-step procedure to onboard an Adobe Experience Manager (AEM) asset in SAFE. Prerequisite To onboard an Adobe Experience Manager asset in SAFE, you need the following privileges: Users must...
Atlassian JIRA - Issue Tracking
Introduction Users can track incidents such as tracking action items for failed controls or assets with low SAFE Score via this integration of SAFE with Atlassian JIRA - Issue Tracking. SAFE admins can configure JIRA from the SAFE Hooks. Prere...
AWS
1. Introduction SAFE allows users to onboard and assess AWS accounts. SAFE admins can configure the AWS integration from SAFE Hooks. SAFE scans the configured and confirmed AWS accounts and automatically onboard discovered assets unde...
Azure - Defender for Cloud
1. About this document This document provides step-by-step instructions to configure "Azure - Defender for Cloud" (written as "Azure" in this document) in SAFE. 2. Introduction This integration allows you to onboard assets from Azure and fe...
Azure Active Directory
SAFE integrates with Microsoft 365 Defender to get the misconfigurations from Azure Active Directory. Refer to Microsoft 365 Defender for more details.
Azure AD SSO
About this document This document describes the step-by-step procedure to configure Single Sign-On (SSO) for SAFE via Azure AD. Introduction Single Sign-On (SSO) enables organizations to use the SAML 2.0 authentication provider for authenticating...
Azure AD User Provisioning
1. About this document This document provides step-by-step instructions to configure Azure AD User Provisioning in SAFE. 2. Introduction The integration of SAFE with Azure AD User Provisioning streamlines the user management under the peopl...
Checkmarx
Introduction Checkmarx provides static code analysis of web and mobile applications. This integration allows users to upload the CheckMarx report to SAFE and generate a SAFE score per application. Prerequisites The Checkmarx Report to be u...
CrowdStrike Falcon
About this document This document gives you the step-by-step procedure to configure CrowdStrike Falcon in SAFE. Note SAFE can only generate a score for an asset if there is a TTP mapping for the incoming signal for that asset. If Crowdstrik...
Burp Suite
Introduction SAFE allows users to upload the Burp report to SAFE, track the third-party controls with their status, and Score immediately on SAFE. Note Users cannot upload the Burp report for the assets, which are not available in SAFE. P...
Databricks
About this document This document gives you the step-by-step procedure to configure Databricks in SAFE. Introduction SAFE allows you to onboard and assess your Databricks account for its configuration assessment. SAFE admins can configure the D...
GCP
2 Articles
in this category
Google Workspace
About this document This document gives you the step-by-step procedure to configure Google Workspace in SAFE. Introduction SAFE allows you to onboard and assess your Google Workspace account for its configuration assessment. SAFE admins c...
G Suite
About this document This document provides the step-by-step procedure to onboard a G Suite asset in SAFE. Important Some steps while authenticating SAFE are needed to be performed by the SAFE support team. Please get in touch with the SAFE sup...
Imperva WAF
About this document This document describes the step-by-step procedure to configure Imperva WAF in SAFE. Introduction SAFE integrates with Imperva WAF, allowing you to assess the configuration of web applications protected by the Imperva WA...
Integrate any VA tool with SAFE using APIs
About this document This page describes the step-by-step procedure to integrate any Vulnerability Assessment (VA) tool like Qualys, Tenable.io, etc., with SAFE using SAFE REST APIs to post VA data for technology assets. Info ...
KnowBe4
About this document This document provides a step-by-step procedure to configure the KnowBe4 in SAFE. Introduction SAFE seamlessly integrates with KnowBe4 KMSAT , and this integration allows SAFE to pull the Phishing results from KnowB...
Malware Patrol
Important Malware Patrol comes pre-configured with your SAFE instance. SAFE seamlessly integrates with Malware patrol to fetch the threat intelligence on malware, crypto mining, and phishing. Malware Patrol monitors t...
Microsoft 365
SAFE integrates with Microsoft 365 Defender to get the misconfigurations from Microsoft 365. Refer to Microsoft 365 Defender for more details.
Microsoft 365 Defender
1. About this document This document provides step-by-step instructions to configure Microsoft 365 Defender in SAFE. 2. Introduction SAFE integrates with Microsoft 365 Defender to fetch the configuration assessment of the following Mic...
Microsoft 365 Exchange Online
SAFE integrates with Microsoft 365 Defender to get the misconfigurations from Microsoft 365 Exchange Online. Refer to Microsoft 365 Defende r for more details.
Phishing Report Upload
About this document This document provides step-by-step instructions to upload a phishing report in CSV format in SAFE. Introduction SAFE allows users to upload phishing campaign results obtained from any phishing tool via the Phishing ...
Snowflake
About this document This document provides the step-by-step procedure to onboard a Snowflake asset in SAFE. Important This document only applies to onboarding a single Snowflake account in SAFE. To onboard multiple Salesforce accounts in SAF...
Microsoft SharePoint
SAFE integrates with Microsoft 365 Defender to get the misconfigurations from Microsoft SharePoint. Refer to Microsoft 365 Defender for more details.
Microsoft Teams
SAFE integrates with Microsoft 365 Defender to get the misconfigurations from Microsoft Teams. Refer to Microsoft 365 Defender for more details.
Mulesoft
About this document This document provides the step-by-step procedure to onboard a Mulesoft asset in SAFE. Important Some steps while adding a Mulesoft asset in SAFE are needed to be performed using SSH credentials of the SAFE server. These st...
Nessus
Introduction SAFE allows users to upload the Nessus report to SAFE and track the third-party controls with their status, and Score immediately on SAFE. Note Users cannot upload the Nessus report for the assets which are not available in SAFE. ...
Qualys VMDR
2 Articles
in this category
Qualys SCA
2 Articles
in this category
Rapid7 InsightVM
1. About this document This document provides the step-by-step procedure to configure Rapid7 InsightVM in SAFE. 2. Introduction SAFE integrates with Rapid7 InsightVM and allows you to discover and import assets from Rapid7 InsightVM along ...
Salesforce
1. About this document This document provides step-by-step instructions to configure a Salesforce account in SAFE. Important This document only applies to configuring a single Salesforce account in SAFE. To configure multiple Salesforce ac...
SAP HANA
About this document This document provides the step-by-step procedure to onboard the SAP Hana Database 2.0 in SAFE. Important Currently SAFE supports the TCP/IP connection type. Users can onboard an SAP Hana Database 2.0 using the username, pa...
SecurityTrails
Important SecurityTrails comes pre-configured with your SAFE instance. SAFE integrates with SecurityTrails to enrich asset data of your company in SAFE. It helps you track your internet-facing infrastructure with a det...
ServiceNow
About this document This document provides step-by-step instructions to onboard a ServiceNow account in SAFE. Introduction SAFE integrates with ServiceNow via read-only APIs and fetches the security misconfiguration of the ServiceNow account in...
Shodan
Important Shodan comes pre-configured with your SAFE instance. SAFE integrates with Shodan to fetch the open port information, TLS SSL version, and IP location. Shodan enables you to see your current connections to th...
SpyCloud
Important SpyCloud comes pre-configured with your SAFE instance. SAFE seamlessly integrates with SpyCloud to fetch the compromised credentials, and PII recaptured from third-party breaches, malware-infected devices, an...
Tanium
About this document This document provides the step-by-step procedure to configure Tanium in SAFE. Introduction SAFE seamlessly integrates with Tanium, a top-tier endpoint security management platform, to get the assets and their security m...
Tenable.io
1. About this document This document provides step-by-step instructions to configure a Tenable.io account in SAFE. Info You can onboard multiple Tenable.io accounts in SAFE. To onboard multiple accounts, refer to Add multiple integration ac...
VA Report Upload
1. About this document This document provides step-by-step instructions to upload a VA report in SAFE. 2. Introduction SAFE allows users to upload reports from any VA tool via the VA report upload functionality. The vulnerabilities repor...
Zoom
About this document This document provides the step-by-step procedure to configure Zoom in SAFE. Introduction SAFE allows you to onboard and assess your Zoom account for its configuration assessment. SAFE admins can configure the Zoom integrati...
Wiz
1. About this document This document provides step-by-step instructions to configure Wiz in SAFE. 2. Introduction SAFE seamlessly integrates with Wiz and pulls assets and their corresponding security issues in SAFE. This integration provide...
BeyondTrust
Introduction BeyondTrust helps in managing, controlling, and monitoring privileged user activities. The SAFE-BeyondTrust integration eliminates the manual entry of the assets’ password on the SAFE platform for assessment. With this integration, SA...
Arcon
Introduction Arcon Privileged Access Management (PAM) provides a solution that helps in managing, controlling, and monitoring the admin activities on assets. The SAFE Arcon integration securely manages the asset's credentials on Arcon and elim...
SSO
4 Articles
in this category