Connectors
Securonix Connector
4 min
the snypr connector integrates with the securonix security analytics platform built on hadoop it uses machine learning based anomaly detection techniques and threat models to identify sophisticated cyber and insider threats capabilities the snypr connector provides the following capabilities run activity query get top threats get top violations get top violators list all policies list all users retrieve list of incidents note to retrieve "all violations by policy name", use the run activity query action with the following query index=violation and policyname = \<policyname> and \<additional conditions> asset setup this connector requires the following parameters for authentication url target snypr host (e g , https //hostname or ip/snypr) username login username password login password notes for full details on api endpoints, refer to the securonix api documentation https //documentation securonix com/bundle/securonix cloud user guide/page/content/rest api categories htm additional notes base url or host url must follow this format hostname or ipaddress/snypr while using the retrieve list of incidents action the tenantname parameter is optional for non mssp tenants the tenantname parameter is required for mssp tenants see the official documentation for more information retrieve list of incidents api documentation https //documentation securonix com/bundle/securonix cloud user guide/page/content/rest api categories htm#retrieve list of incidents