Skip to content

Commit 34f4de9

Browse files
authored
Update cyberark-source.md
1 parent 5a8a553 commit 34f4de9

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cyberark-source.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1818

1919
The CyberArk Endpoint Privilege Manager (EPM) is a security solution that helps organizations reduce the risk of information theft or ransomware attacks by enforcing the principle of least privilege and preventing unauthorized access to critical systems and data. The solution employs a combination of privilege security, application control, and credential theft prevention to reduce the likelihood of malware infections.
2020

21-
The integration with CyberArk EPM's API allows for retrieving administrative, detailed raw, policy audit, and policy audit raw events from every set in the environment. The [API documentation](https://docs.cyberark.com/Product-Doc/OnlineHelp/EPM/Latest/en/Content/LandingPages/LPDeveloper.htm) provides guidance on accessing and utilizing this information. This integration facilitates retrieving various audit events, including administrative actions, policy violations, and application usage, to generate alerts, reports, and remediation actions that enhance the organization's security posture.
21+
The integration with CyberArk EPM's API allows for retrieving administrative, detailed raw, policy audit, policy audit raw events, and aggregated events from every set in the environment. The [API documentation](https://docs.cyberark.com/Product-Doc/OnlineHelp/EPM/Latest/en/Content/LandingPages/LPDeveloper.htm) provides guidance on accessing and utilizing this information. This integration facilitates retrieving various audit events, including administrative actions, policy violations, and application usage, to generate alerts, reports, and remediation actions that enhance the organization's security posture.
2222

2323
## Data collected
2424

@@ -131,4 +131,4 @@ When setting the poll frequency, it's recommended to consider these limitations
131131

132132
:::info
133133
Click [here](/docs/c2c/info) for more information about Cloud-to-Cloud sources.
134-
:::
134+
:::

0 commit comments

Comments
 (0)