Description This article describes techniques on how to identify, debug, and troubleshoot issues...
Lacework
Created on
Edited on
Description
This article describes how to use Lacework FortiCNAPP to isolate from the network an infected EC2, using channel alerts and AWS Lambda.
ScopeLacework FortiCNAPP.Solution
Download link: GitHub link.
This int...
Created on
Description
This article describes and presents a video for automating/integrating Lacework FortiCNAPP with FortiGate.
Scope
Lacework FortiCNAPP, FortiGate.
Solution
Check out the video and comment below with a...
Created on
Description
This article explains how Lacework FortiCNAPP can help detect post-exploitation behaviors following the exploitation of Ivanti Cloud Services Appliance (CSA) vulnerabilities (CVE-2024-9379, CVE-2024-9380, CVE...
Created on
DescriptionWhere does the data come from that Lacework uses to scan for vulnerabilities?ScopeLaceworkSolution
For both hosts and containers, a scan is performed against the source which generates a manifest.json that con...
Created on
DescriptionHow to IdC users in AWSScopeLacework, AWSSolution
The users created in one public cloud sync to AWS IdC.
We do support AWS Identity Center today. Identities are sync’d via SCIM into the Identity Center and ...
Created on
DescriptionCan I suppress noisy Lacework Alerts?ScopeLaceworkSolution
Yes, absolutely! Organizations may experience high alert volume due to expected recurring activity that triggers Lacework alerts. For example, hosted ...
Created on
DescriptionResponding to a New Vulnerable Application alertScopeLacework AlertsSolution
Start your investigation by gaining an understanding of the vulnerability impacting the application. Ensure you know what exploitati...
Created on
DescriptionDoes Lacework have an Integration with BitsightScopeLacework, BitsightSolution
Currently, Lacework does not have a direct integration with Bitsight.
However, as a result of all of the data that Lacework ing...
Can't find what you are looking for?
Suggest New Article