We’re Here to Help
Quick Links
Blumira Agent
Blumira Cloud Connectors
- Getting started with Blumira's Microsoft 365 and Azure log monitoring
- Integrating with Microsoft 365
- Integrating with Microsoft 365 Defender
- Integrating with Microsoft Azure Event Hubs
- Integrating with Microsoft Defender for Cloud Apps
- Integrating with Microsoft Defender for Endpoint
- See all 29 articles
Blumira Sensors
Cloud Security Services
Endpoint Protection Services
Firewall Integrations
- Integrating with Barracuda Web Application Firewall
- Integrating with Check Point Next-Generation Firewall
- Integrating with Cisco ASA Firewall
- Integrating with Cisco Firepower Threat Defense
- Integrating with Cisco Meraki Firewall
- Integrating with Citrix Application Delivery Controller
- See all 16 articles
Identity Services
Linux Machines
Windows Machines
- Automating Windows log collection with Poshim
- Advanced Microsoft Windows logging with Logmira GPO template
- Integrating with Microsoft Windows Internet Information Services
- Deploying a Blumira honeytoken with Dogemira
- Deploying Blumira HoneyFiles to detect SYSVOL exploits
- Integrating with Microsoft Windows Server
- See all 8 articles
Other Systems
Detection Rules & Filters
Findings
- About Blumira findings
- Investigating “365 Alert Policy: Creation of forwarding/redirect rule” findings
- Investigating "Audit Policy Change via Auditpol" findings
- Investigating "Batch Script Execution" findings
- Investigating "Clearing of Windows Event Log" findings
- Investigating "Connection from Public IP Address" findings
- See all 18 articles
Reporting & Dashboards
Threat Response
- Configuring Microsoft 365 Threat Response
- Using response actions in supported Microsoft and Azure findings
- Manually isolating an endpoint with Blumira Agent
- Automatically isolating Windows endpoints with Blumira Agent
- About Blumira's dynamic blocklists
- Configuring blocklists and managing blocking
- See all 8 articles