Autonomic Security Operations
Workshops, technical content, products, integrations, and blueprints designed to help you kick-start your modernization journey to a state of autonomic security operations.
Maximize use-case coverage
Hunt for APTs, detect ransomware, investigate network anomalies, identify fraud signals, or partner with expert MSSPs. Through a transformative onboarding experience, we’ll meet you where your risks are.
Ready to transform your SOC or partner with an expert
Ready to transform your SOC or partner with an expert MSSP. Contact us.
SOC Transformation Partners
Managed Security Service Providers
Supported data sets in Chronicle
Chronicle can ingest raw logs from different companies, protocols, systems, and equipment. This document describes the currently supported data sets.
MITRE ATT&CK mapping of GCP logs
The tool helps you by mapping out threat tactics and techniques from the popular MITRE ATT&CK® threat model to the specific Google Cloud log types(s).
Overview of the YARA-L 2.0 language
YARA-L 2.0 is a computer language used to create rules for searching through your enterprise log data as it is ingested into your Chronicle account.
Supported default parsers
Parsers normalize raw log data into structured Unified Data Model format. This section lists devices, and ingestion labels, that have a default parser.