{"id":"3714c000-e995-4ee5-8b3c-b0cb5ead1b82","timestamp":1775726396466,"matcher":{"static":{"/app/settings/team":{"redirect":"/app/settings/organization"},"/lunchandlearn":{"redirect":"/lunchandlearn/form"},"/holidays":{"redirect":"/lp/holidays"}},"wildcard":{},"dynamic":{}},"prerendered":["/help/chatops-topic-guide-potential-account-compromise-alerts","/help/what-can-i-use-the-app-banner-for-templates-and-examples","/help/how-do-i-configure-browser-event-storage","/help/can-i-send-push-data-to-other-systems-like-a-siem-or-ticketing-system","/help/push-runbooks-for-detection-and-response-teams","/help/how-do-i-add-a-custom-login-domain-in-push","/help/how-does-push-detect-cloned-login-pages","/help/how-does-push-assign-a-severity-level-to-detections","/help/how-do-i-add-custom-branding-to-push-banners-and-block-pages","/help/guide-for-push-technical-integration-partners","/help/what-browsers-does-push-support","/help/how-do-i-remove-an-employees-browser-that-was-incorrectly-enrolled-in-push","/help/configure-chatops-messages-to-private-channels-on-slack","/help/can-push-detect-other-installed-browser-extensions","/help/can-i-automatically-remove-licenses-from-inactive-employees","/help/how-does-push-enrich-detections-with-domain-analysis-data","/help/chatops-topic-guide-security-findings","/help/guide-to-chatops-topics","/help/how-does-push-detect-malicious-browser-extensions","/help/can-i-use-push-to-detect-personal-or-non-work-accounts","/help/can-i-use-push-to-help-protect-against-device-code-phishing-scenarios","/help/how-does-push-detect-attacks-like-clickfix-and-filefix","/help/what-is-multi-factor-authentication-mfa-and-why-should-i-enable-it","/help/how-to-create-a-configuration-rule-for-app-banners","/help/how-does-push-determine-if-a-mail-rule-is-suspicious","/help/push-security-end-user-communications-templates","/help/how-does-push-detect-and-prevent-phishing-attacks","/help/how-do-i-delete-third-party-integrations","/help/can-push-block-users-from-visiting-websites","/help/how-does-push-determine-if-a-password-is-weak","/help/chatops-topic-guide-saas-notifications","/help/can-i-automatically-license-new-employees-in-push","/help/does-push-automatically-unlicense-employees-after-being-deleted-from-a","/help/what-is-the-data-retention-period-for-employee-activity-in-the-push-platform","/help/how-do-i-create-an-exception-for-mfa-findings","/help/how-does-push-help-detect-session-token-theft","/help/how-do-i-create-an-exception-for-reused-password-findings","/help/how-does-push-evaluate-passwords-containing-words-restricted-by-an","/help/why-am-i-seeing-incorrect-account-security-findings-for-employees-using","/help/how-does-push-detect-mfa-registration","/help/how-does-mfa-enforcement-work","/help/can-i-use-push-to-detect-phishing-tools-like-evilnovnc-and-evilginx","/help/how-does-strong-password-enforcement-work","/help/why-do-i-see-a-message-in-safari-about-the-permissions-of-the-push-browser","/help/how-do-i-resolve-a-shared-account-finding","/help/what-apps-appear-in-the-other-apps-list-in-push","/help/does-the-push-admin-console-support-saml-login","/help/how-do-i-capture-a-screenshot-during-a-detection-event","/help/how-do-i-classify-a-push-detection","/help/how-do-i-fix-a-webhook-that-was-disabled","/help/how-do-employee-verification-codes-work","/help/can-push-identify-when-employees-are-syncing-browser-profile-data","/help/why-arent-employee-browsers-showing-up-in-push-after-completing-a-managed","/help/how-do-i-remove-account-data-that-is-old-or-unneeded","/help/chatops-topic-guide-attack-detections","/help/how-does-push-browser-extension-work","/help/how-does-push-detect-stolen-credentials","/help/how-does-push-determine-if-an-employee-is-using-a-password-manager","/help/what-domains-does-the-push-browser-extension-communicate-with","/help/what-happens-when-i-merge-employee-records","/help/can-i-restrict-which-websites-push-monitors","/help/guide-to-reviewing-and-classifying-saas-apps","/help/how-does-the-push-browser-extension-securely-track-reused-passwords","/help/can-i-restrict-logins-to-the-push-admin-console-to-allowed-ip-addresses","/help/how-do-i-add-employees-to-a-group-in-push","/help/what-is-the-push-browser-extension-and-what-does-it-do","/help/why-do-i-see-the-error-the-bot-was-blocked-by-a-permission-policy-when","/help/can-i-use-my-own-labels-to-categorize-apps-in-push","/help/is-push-soc-2-certified","/help/how-do-i-determine-what-version-of-the-push-browser-extension-is-installed","/help/how-do-i-access-the-debug-page-for-the-push-browser-extension","/help/what-data-does-the-push-browser-extension-collect","/help/do-push-administrators-consume-a-license-for-billing-purposes","/help/why-am-i-seeing-incorrect-shared-account-findings","/help/how-quickly-do-new-saas-appear-in-the-push-admin-console","/help/what-is-a-third-party-integration","/help/why-do-i-see-the-message-not-seen-yet-when-viewing-third-party-integration","/help/what-is-the-difference-between-a-labs-feature-and-a-beta-feature","/help/what-scopes-permissions-are-required-for-the-push-api-integration","/help/how-do-i-remove-a-login-method-from-push","/help/application-and-delegated-oauth-permissions","/help/how-to-restrict-external-forwarding-microsoft-office-365","/help/what-to-do-if-you-find-a-malicious-mail-rule-microsoft-office-365","/help/what-to-do-when-you-find-a-malicious-mail-filter-in-google-workspace","/help/how-does-push-discover-saas","/help/why-is-microsoft-365-mfa-data-not-available-yet-in-push","/help/understanding-mfa-status","/help/can-i-specify-an-owner-for-a-saas-app-in-the-push-platform","/help/how-to-enforce-multi-factor-authentication-on-microsoft-365-using-conditional-access","/help/how-to-undo-a-group-policy-managed-push-browser-extension-rollout","/help/how-do-i-ignore-service-accounts-or-other-unlicensed-accounts-in-push","/help/google-workspace-how-to-enforce-2-step-verification-2sv","/help/how-to-enforce-multi-factor-authentication-on-microsoft-365-using-sec-defaults","/help/why-do-i-see-an-error-when-trying-to-log-into-the-push-admin-console","/help/how-do-i-fix-a-google-workspace-reintegration-failure","/help/how-frequently-does-push-refresh-last-seen-data-for-employee-browsers","/help/why-did-i-end-up-in-a-blank-tenant-after-accepting-a-push-admin-team","/help/why-am-i-seeing-duplicate-third-party-integrations-with-google-workspace","/help/guide-to-triaging-a-potentially-malicious-mail-rule","/help/what-azure-ad-license-is-required-to-query-microsoft-365-mfa-details","/help/how-to-enforce-multi-factor-authentication-on-microsoft-office-365","/help/disable-mfa-for-a-user-in-an-emergency-google-workspace","/help/how-to-enforce-multi-factor-authentication-on-microsoft-365-using-per-user","/help/how-do-i-identify-the-publisher-of-a-third-party-integration","/help/what-is-consent-phishing","/help/missing-a-saas-platform","/help/how-to-choose-a-good-password-for-your-work-accounts","/help/why-is-the-browser-version-shown-in-push-not-exact","/help/how-long-do-sessions-last-in-the-push-admin-console","/webinar/state-of-browser-security","/news/push-security-identifies-linkedin-phishing-campaign","/news/push-identifies-consent-fix","/news/push-security-launches-PSAN","/news/push-security-launches-new-stolen-credentials-detection-capability","/news/push-launches-malicious-browser-extension-blocking","/webinar/partner","/news/push-security-secures-30-million-series-b-funding","/news/push-security-recognized-as-rising-star-itdr","/news/push-security-new-security-alert-cross-IDP-impersonation","/news/push-launches-ClickFix-detection","/news/push-security-guidepoint-strategic-partnership","/news/pr-20250806-push-security-launches-phishing-detection-evasion-techniques-matrix","/news/push-security-welcomes-mark-orlando-field-cto","/news/former-crowdstrike-sales-leader-joins-push-security-cro","/webinar/investigating-browser-threats","/webinar/phish-kit-teardown","/webinar/automating-identity-attacks","/webinar/phishing","/webinar/identity-detection-response","/webinar/clickfix","/webinar/phishing-2025-review","/news/push-security-Raises-15M-Series-A-Round","/webinar/the-browser-blindspot","/news/chris-tilton-new-push-cmo","/webinar/scatteredspider","/partner/request-training","/news/push-security-announces-4M-Seed-Round","/partner/new-partner-inquiries","/webinar/browser-extension-attacks","/resources/ai-starts-browser","/resources/browser-extensions-webinar","/resources/clickfix","/resources/mfa-regulation-compliance","/resources/product-brochure","/resources/investigating-browser-threats","/partner/deal-registration","/resources/decipher-sep-2025","/resources/phishing-2025-review","/resources/rbn811","/resources/the-browser-blindspot","/resources/endpoint-security-evolution","/resources/phishing-evolution","/resources/incident-response-webinar","/resources/scattered-spider","/resources/automating-identity-attacks","/resources/phishing-2025","/resources/browser-attacks-report","/resources/kuppingercole-report","/resources/hacked-022125","/resources/riskybusiness-012925","/resources/riskybusiness0516","/resources/the-rsnake-show-demo-day-push-security","/resources/on-demand-webinar-phish-kit-teardown","/resources/riskybusiness-120224","/resources/riskybusiness-071824","/resources/infostealers-webinar-ondemand","/resources/googlecloudpodcast-072224","/resources/phishing-detecting-evilginx-evilnovnc-muraena-and-modlishka","/resources/snowflake-the-tip-of-the-iceberg","/resources/demonstrating-ghost-logins-in-snowflake-and-how-to-remediate-them","/resources/the-new-saas-cyber-kill-chain-so-con-2024","/resources/riskybusiness-151123","/resources/ciso-series-062724","/resources/phishing-slack","/resources/bluehat-041724","/resources/cyberontheedge-031824","/resources/2024-identity-attacks","/resources/resilientcyber-031524","/resources/cybersecuritydefenderspodcast-230124","/resources/saas-attacks-report","/resources/cyberranch-112923","/resources/understanding-the-new-saas-cyber-kill-chain","/resources/compromising-an-org-without-touching-the-network","/resources/bluehat-2023-saas-cyber-kill-chain","/resources/dcppodcast-111323","/resources/cyberwiredaily-091323","/resources/cyberwiredaily-151123","/resources/ciso-series-083123","/resources/cyberbytes-071823","/resources/pain-in-the-saas-at-withsecure","/contact","/pricing","/faq","/product","/legal/cookies","/legal/privacy","/legal/terms","/demo","/legal/subprocessors","/legal/processing","/help/audience/administrators","/help/audience/employees","/blog/email-security-how-hackers-use-mail-rules-to-access-your-inbox","/blog/should-you-disable-external-email-auto-forwarding","/s","/404","/news","/cyber","/login","/help/audience/administrators/docs/manage-security-controls/configure-chatops","/hacked","/hunt","/resources","/help/10125","/help/10147","/about","/events/rsa-2026-usa","/events/blackhat-europe","/","/events/sector-2026","/events/blackhat-2026-meeting","/events/infosecurity-europe-2026","/events/gartner-security-summit-2026","/events/gartner-europe-2026-meeting","/uc/zero-day-phishing-protection","/customer-stories/convex","/uc/account-takeover-detection","/uc/clickfix-protection","/uc/attack-path-hardening","/uc/browser-extension-security","/uc/incident-response","/uc/shadow-saas","/uc/shadow-ai","/customer-stories/upvest","/customer-stories/cribl","/help/10100","/customer-stories/inductive-automation","/help/audience/administrators/docs/install-the-browser-extension/managed-deployment-using-an-mdm-on-macos","/help/audience/administrators/docs/install-the-browser-extension/managed-deployment-using-microsoft-endpoint-manager-intune","/help/audience/administrators/docs/install-the-browser-extension/managed-deployment-using-google-admin-console","/help/audience/administrators/docs/install-the-browser-extension/managed-deployment-with-island","/botcheck","/help/audience/administrators/docs/install-the-browser-extension/managed-deployment-using-microsoft-group-policy","/continue","/redirect","/try-again","/help/10058","/app/events","/app/apps","/help/10059","/help/10093","/help/10130","/help/10138","/help/10065","/help/10103","/help/audience/administrators/docs/getting-started","/help/10106","/help/10105","/help/10117","/help/10073","/help/10126","/help/audience/employees/docs/keeping-you-and-your-data-safe","/help/10139","/help/10067","/help/10045","/help/10083","/help/10143","/retry-demo","/newsletter","/app/chatops","/help/audience/administrators/docs/install-the-browser-extension","/error","/maintenance","/notverified","/app/accounts","/app/browsers","/integration/supported","/app/controls","/app/settings","/app/settings/labs","/app/settings/account","/app/settings/domains","/app/settings/advanced","/app/settings/api-keys","/help/audience/administrators/docs/add-employees","/app/settings/branding","/app/settings/webhooks","/app/settings/licensing","/app/settings/telemetry","/app/settings/integrations","/app/settings/mfa-findings","/app/settings/organization","/app/settings/plan-and-billing","/app/settings/vulnerabilities","/app/settings/password-findings","/app/detections","/app/oauth-apps","/cmp/redirect","/thank-you-demo","/help/10121","/setup/uninstall","/setup/verified","/setup/initializing","/app/vulnerabilities","/integration/success","/integration/waiting","/app/mail-rules","/setup/verify-success","/app/browser-extensions","/blog","/account/notification","/signup/trial/create","/setup/verify","/account/setup","/help/10109","/help/10129","/app/dashboard","/app/employees","/customer-stories","/setup/browser","/account/accept","/help/10066","/integration/setup/google","/integration/unsuccessful","/integration/setup/okta","/setup/not-supported-admin","/app/mail-rules/closed","/error/saml-in-use/use-email","/features/saas-discovery","/error/saml-in-use/use-idp","/setup/not-supported-employee","/partner","/help/audience/administrators/topic/chatops","/product-demo","/account/email-address-confirmed","/account/password-change-success","/help/10107","/help/10140","/features/detect-malicious-mail-rules","/features/adopt-multi-factor-authentication","/features/secure-oauth-permissions-and-applications","/help/10127","/help/10120","/events","/help/audience/administrators/docs/manage-security-controls","/help/audience/administrators/topic/managing-saas","/help/10070","/help/10104","/help/10044","/help/10085","/help/10039","/help/10075","/help/audience/administrators/topic/privacy-and-security","/help/audience/administrators/topic/push-admin-console","/help/10003","/help/audience/administrators/topic/browser-extension","/help/audience/administrators/topic/integrating-with-google-workspace-and-microsoft-365","/blog/which-mfa-methods-should-you-use","/help/audience/administrators/topic/managing-administrators-and-employees","/blog/how-to-set-up-multi-factor-authentication-for-microsoft-365","/blog/consent-phishing-the-emerging-phishing-technique-that-can-bypass-2fa","/help/audience/employees/topic/security-and-privacy","/blog/push-plus-cloud-security","/blog/push-plus-endpoint-security","/help/audience/administrators/topic/investigating-mail-rules","/blog/push-plus-network-security","/help/audience/employees/topic/using-the-push-browser-extension","/blog/three-reasons-why-browser-is-best-for-stopping-phishing-attacks","/blog/phishing-2-0-how-phishing-toolkits-are-evolving-with-aitm","/help/10021","/help/audience/employees/docs/what-is-push","/blog/why-most-phishing-attacks-feel-like-a-zero-day","/help/10022","/blog/case-study-business-email-compromise-bec-attack-nearly-cost-us-millions","/help/audience/administrators/docs/administering-push","/help/audience/administrators/docs/view-saas-apps-and-employee-activity","/blog/guide-how-to-use-push-controls-to-protect-your-users-from-modern-attacks","/help/audience/administrators/docs/connect-to-siem-or-soar","/blog/tiktok-phishing","/blog/device-code-phishing","/blog/stryker-handala-report","/blog/consentfix","/blog/scattered-lapsus-hunters","/blog/uncovering-a-calendly-themed-phishing-campaign","/help/audience/employees/docs/enrolling-your-browser-in-push","/help/10115","/help/10088","/help/10062","/help/10063","/help/10072","/blog/detecting-and-blocking-phishing-attacks-in-the-browser","/blog/product-release-march-2026","/blog/installfix","/blog/browser-extension-management-guide","/blog/cyber-essentials-april-2026-update","/blog/consentfix-debrief","/blog/unpacking-the-latest-slh-campaign","/blog/cyber-criminal-ecosystem-analysis","/blog/google-search-malvertising-campaign-continues-now-impersonating-ahrefs","/blog/taking-the-fight-to-attackers-top-features-of-2025","/blog/2025-top-phishing-trends","/blog/analysing-a-sophisticated-google-malvertising-attack","/blog/analysing-a-malvertising-attack-targeting-business-google-accounts","/blog/analyzing-the-latest-sneaky2fa-phishing-page","/blog/the-most-advanced-clickfix-yet","/blog/product-release-november-2025","/blog/what-the-expansion-of-nydfs-nycrr-part-500-means-for-mfa-compliance","/blog/new-phishing-campaign-identified-targeting-linkedin-users","/blog/fixing-secops-alert-fatigue-with-browser-telemetry","/blog/introducing-malicious-copy-paste-detection","/blog/why-attackers-are-moving-beyond-email-based-phishing","/blog/how-cyber-breaches-are-driving-tighter-mfa-requirements-and-enforcement","/blog/how-push-stopped-a-high-risk-linkedin-spear-phishing-attack","/blog/6-browser-based-attacks-every-security-team-should-be-prepared-for","/blog/product-release-september-2025","/blog/how-the-browser-became-the-main-cyber-battleground","/blog/phishing-with-active-directory-federation-services","/blog/phishing-detection-evasion-launch","/blog/introducing-push-detections","/blog/mfa-downgrade-attacks","/blog/detecting-phishing-pages-using-obfuscated-url-destinations","/blog/key-takeaways-from-the-scattered-spider-attacks-on-insurance-firms","/blog/app-specific-password-phishing","/blog/scattered-spider-defending-against-help-desk-scams","/blog/how-browser-level-controls-change-the-fight-against-phishing","/blog/employee-identity-verification-codes-release","/blog/product-release-june-2025","/blog/better-together-identity-telemetry-from-push-smart-storage-and-searches-from","/blog/2025-hipaa-rule-change","/blog/introducing-the-push-security-advisor-network-psan","/blog/scattered-spider-ttp-evolution-in-2025","/blog/series-b-and-beyond","/blog/how-consent-phishing-is-evolving","/blog/investigating-a-recent-malvertising-campaign-targeting-onfido-customers","/blog/dissecting-a-recent-mailchimp-phishing-attack","/blog/why-attackers-are-targeting-jira-with-stolen-credentials","/blog/introducing-strong-password-enforcement","/blog/why-its-time-for-phishing-prevention-to-move-beyond-email","/blog/5-ways-attackers-can-use-computer-using-agents-to-automate-identity-attacks","/blog/product-release-march-2025","/blog/how-new-ai-agents-will-transform-credential-stuffing-attacks","/blog/minimum-viable-identity-security","/blog/considering-the-impact-of-computer-using-agents","/blog/enforce-mfa-on-third-party-apps","/blog/push-features-2024","/blog/guide-to-secure-browser-extension-deployment","/blog/2024-identity-breaches","/blog/product-release-december-2024","/blog/automating-sso-password-resets-using-push","/blog/navigating-your-first-90-days-with-push","/blog/verified-stolen-credential-detection","/blog/snowflake-retro","/blog/a-new-class-of-phishing-verification-phishing-and-cross-idp-impersonation","/blog/why-im-joining-push-security-the-team-redefining-itdr","/blog/cross-idp-impersonation","/blog/how-aitm-phishing-kits-evade-detection-p2","/blog/product-release-november-2024","/blog/stop-users-saving-corp-creds-into-personal-password-managers","/blog/learning-from-the-servicenow-disclosure","/blog/how-many-vulnerable-identities-do-you-have","/blog/shifting-detection-left-for-more-effective-threat-detection","/blog/the-saas-attack-matrix-one-year-on","/blog/introducing-cloned-login-page-detection","/blog/how-to-prevent-account-takeover-with-push","/blog/our-design-philosophy-detecting-what-matters","/blog/what-the-rise-of-infostealers-says-about-identity-attacks","/blog/push-introduces-support-for-arc-browser-securing-users-wherever-they-work","/blog/how-aitm-phishing-kits-evade-detection","/blog/product-release-july-2024","/blog/ghost-logins-when-forgotten-identities-come-back-to-haunt-you","/blog/introducing-set-and-forget-controls-that-stop-real-world-identity-attacks","/blog/5-reasons-why-push-security-shouldnt-exist","/blog/combining-the-powers-of-push-and-panther-to-stop-identity-attacks","/blog/introducing-session-token-theft-detection-why-browser-is-best","/blog/investigating-and-responding-to-a-third-party-data-breach-using-push","/blog/the-web-proxy-is-dead-long-live-the-browser-extension","/blog/introducing-aitm-phishing-toolkit-detection-powered-by-the-push-browser","/blog/product-release-may-2024","/blog/control-which-cloud-apps-employees-are-using-your-way","/blog/dev-diary-phishing-prevention-behind-the-scenes","/blog/product-release-april-2024","/blog/introducing-sso-password-protection","/blog/a-year-of-building-top-features-we-shipped-this-year","/blog/identity-attacks-in-the-wild","/blog/can-my-admins-steal-my-cloud-password-manager-secrets","/blog/product-release-february-2024","/blog/5-ways-to-defeat-identity-based-attacks","/blog/introducing-in-browser-app-banners-set-guardrails-for-cloud-apps","/blog/phishing-microsoft-teams-for-initial-access","/blog/product-release-january-2024","/blog/what-is-saml-sso","/blog/oktajacking","/blog/product-release-november-2023","/blog/okta-swa","/blog/third-party-risk-management","/blog/phishing-slack-persistence","/blog/slack-phishing-for-initial-access","/blog/product-release-september-2023","/blog/manage-third-party-data-access","/blog/report-on-identity-based-attacks","/blog/what-is-credential-stuffing","/blog/what-are-shadow-identities","/blog/nearly-invisible-attack-chain","/blog/the-risky-terrain-of-oauth-scopes-in-third-party","/blog/understanding-shadow-it","/blog/samljacking-a-poisoned-tenant","/blog/focus-on-account-security-to-reduce-saas-risks","/blog/product-release-july-2023","/blog/what-is-saas-security","/blog/saas-attack-techniques","/blog/free-and-trial-saas-applications-are-even-riskier-than-paid-apps","/blog/protect-your-data-across-all-your-apps-even-the-ones-employees-use-without","/blog/saas-has-changed-how-we-adopt-software-how-should-security-adapt","/blog/3-steps-to-secure-your-data-across-shadow-saas-apps","/blog/half-of-account-compromise-attacks-included-malicious-mail-rules","/blog/product-release-june-2023","/blog/want-to-discover-the-full-extent-of-your-saas-sprawl-embrace-browser","/blog/push-it-real-good-why-im-excited-to-join-pushs-board","/blog/embrace-saas-to-move-faster-than-your-competitors","/blog/from-launch-to-series-a","/blog/product-release-march-2023","/blog/password-expirations-dont-work-try-these-best-practices-instead","/blog/an-investigation-guide-for-assessing-app-to-app-oauth-integration-risk","/blog/how-attackers-compromise-azure-organizations-through-saas-apps","/blog/product-release-december-2022","/blog/maintaining-persistent-access-in-a-saas-first-world","/blog/is-it-safe-to-allow-my-employees-to-connect-third-party-apps-to-our-m365","/blog/should-i-let-my-employees-login-with-their-work-google-account","/blog/how-to-kick-off-an-incident-response-investigation-for-a-compromised-saas","/blog/product-release-august-2022","/blog/how-to-discover-saas-use-without-invading-employee-privacy","/blog/manage-saas-risks-without-hindering-employees","/blog/how-to-find-the-right-saas-security-solution-for-your-organization","/blog/what-weve-been-up-to-with-our-seed-funding","/blog/building-a-culture-of-trust-to-secure-saas-together","/blog/push-security-announces-4m-seed-round-to-introduce-user-centric-approach","/blog/product-release-july-2022","/blog/microsoft-rolls-out-security-defaults-for-azure-ad-to-secure-access","/blog/rolling-your-own-saas-discovery","/blog/how-to-find-a-malicious-oauth-app-on-microsoft-365","/blog/investigating-user-delegated-oauth-tokens-in-google-workspace-a-ride-along","/blog/multi-factor-authentication-is-the-top-security-control-for-most-small-and","/help/10060","/help/10064","/help/10079","/help/10113","/help/10114","/help/10141","/help/10028","/help/10018","/help/10030","/help/10036","/help/10034","/help/10035","/help/10038","/help/10076","/help/10086","/help/10077","/help/10087","/help/10094","/help/10097","/help/10108","/help/10116","/help/10149","/help/10081","/help/10037","/help/10131","/help/10133","/help/10136","/help/10146","/help/10148","/help/10150","/help/10015","/help/10074","/events/virtual-ribeye-grilling","/help/10078","/help/10101","/help/10102","/help/10123","/help/10124","/help/10134","/help/10137","/help/10043","/help/10071","/help/10091","/help/10095","/help/10099","/help/10112","/help/10128","/help/10135","/help/10142","/help/10001","/help/10014","/help/10046","/help/10144","/help/10084","/help/10089","/help/10096","/help/10090","/help/10098","/help/10110","/help/10122","/help/10132","/help/10061","/help/10069","/help/10027","/help/10026","/help/10068","/help/10042","/help/10111","/help/audience/administrators/docs/connect-to-siem-or-soar/ingesting-events-using-azure-monitor-and-microsoft-sentinel","/help/audience/administrators/docs/connect-to-siem-or-soar/ingesting-events-using-panther","/help/audience/administrators/docs/connect-to-siem-or-soar/ingesting-events-using-datadog","/help/audience/administrators/docs/connect-to-siem-or-soar/ingesting-events-using-cribl-cloud","/help/audience/administrators/docs/connect-to-siem-or-soar/ingesting-events-using-splunk-cloud","/help/audience/administrators/docs/connect-to-siem-or-soar/ingesting-events-using-tines","/help/audience/administrators/docs/connect-to-siem-or-soar/send-webhook-events-to-slack"]}