Langsung ke konten utama
Dokumentasi
Area teknologi
close
AI dan ML
Pengembangan aplikasi
Hosting aplikasi
Compute
Analisis data dan pipeline
Database
Terdistribusi, hybrid, dan multi-cloud
AI Generatif
Solusi industri
Jaringan
Kemampuan observasi dan pemantauan
Keamanan
Storage
Alat lintas produk
close
Pengelolaan akses dan resource
Pengelolaan biaya dan penggunaan
Google Cloud SDK, bahasa, framework, dan alat
Infrastruktur sebagai kode
Migrasi
Situs terkait
close
Beranda Google Cloud
Uji Coba Gratis dan Paket Gratis
Architecture Center
Blog
Hubungi Bagian Penjualan
Pusat Developer Google Cloud
Pusat Developer Google
Google Cloud Marketplace
Dokumentasi Google Cloud Marketplace
Google Cloud Skills Boost
Google Cloud Solution Center
Dukungan Google Cloud
Channel YouTube Google Cloud Tech
/
English
Deutsch
Español
Español – América Latina
Français
Indonesia
Italiano
Português
Português – Brasil
中文 – 简体
中文 – 繁體
日本語
한국어
Konsol
Masuk
Google Security Operations
Panduan
Referensi
Referensi
Hubungi Kami
Mulai gratis
Dokumentasi
Panduan
Referensi
Referensi
Area teknologi
Lainnya
Alat lintas produk
Lainnya
Situs terkait
Lainnya
Konsol
Hubungi Kami
Mulai gratis
Ringkasan
Semua topik Security Operations
Ringkasan Google SecOps
Apa yang baru di Google SecOps?
Rencana rilis untuk Google SecOps
Login ke Google Security Operations
Menavigasi platform Google SecOps
Memahami platform Google SecOps
Mengonfigurasi preferensi pengguna
Gemini di SecOps
Lab Google SecOps
Menggunakan Gemini dan eksperimen lainnya di Google SecOps
Menggunakan Alert Response Recommender
Ringkasan dokumentasi Gemini
Orientasi
Melakukan aktivasi instance Google SecOps
Mengonfigurasi project Google Cloud untuk Google SecOps
Mengonfigurasi penyedia identitas Google Cloud
Mengonfigurasi penyedia identitas pihak ketiga
Menautkan instance Google SecOps ke layanan Google Cloud
Mengonfigurasi kontrol akses fitur menggunakan IAM
Mengonfigurasi RBAC data menggunakan IAM
Panduan pengguna RBAC untuk aplikasi yang tidak menggunakan IAM
Memetakan pengguna di platform Google SecOps menggunakan identitas Google Cloud
Memetakan pengguna dengan beberapa parameter kontrol akses
Memetakan pengguna di platform Google SecOps menggunakan grup IdP
Pengelolaan pengguna
Menambahkan pengguna SIEM atau SOAR ke Google SecOps
Panduan memulai: Melakukan penelusuran
Panduan memulai: Menyelidiki pemberitahuan
Pengumpulan Data
Penyerapan
Penyerapan data Google SecOps
Ringkasan penyerapan data
Ringkasan Hub Konten
Set data dan parser default yang didukung
Menyerap data ke Google SecOps
Menginstal dan mengonfigurasi forwarder
Menginstal dan mengonfigurasi forwarder
Mengelola konfigurasi forwarder melalui UI
Mengelola konfigurasi forwarder secara manual
File yang dapat dieksekusi forwarder Google SecOps untuk Windows
Memecahkan masalah umum forwarder Linux
Agen pengumpulan Bindplane
Menggunakan agen Bindplane
Mengonfigurasi Bindplane untuk Pemantauan Host Senyap
Menyiapkan feed data
Ringkasan pengelolaan feed
Menggunakan aplikasi pengelolaan feed
Membuat feed Azure Event Hub
Menggunakan API pengelolaan feed
Pipeline Pemrosesan Data
Menyiapkan dan mengelola pipeline pemrosesan data
Menggunakan skrip transfer yang di-deploy sebagai Cloud Functions
Menggunakan Ingestion API
Mengonfigurasi batas burst
Menyerap data Google Cloud ke Google SecOps
Pengelolaan Feed Berfokus pada Produk
Parser default
Daftar parser default
Parser premium
Log Apigee
Log Host AWS EC2
Log Instance AWS EC2
Log pengelolaan Chrome
Log firewall Cisco ASA
Parser Resource Konteks
Log CrowdStrike Falcon
Log Aktivitas Duo
Log Fluentd
Log Firewall Fortinet
Menyerap data Google Cloud ke Google Security Operations
Log Peristiwa Penyalahgunaan Google Cloud
Google Cloud Audit Logs
Log Google Cloud DNS
Log Firewall Google Cloud
Log Google Cloud Load Balancing
Log Google Cloud NAT
Log Google Kubernetes Engine (GKE)
Log Google Cloud SQL
Log Google Workspace
Log Jamf Protect
Log Telemetri Jamf
Log Jamf Protect Telemetry v2
Log Peristiwa Ancaman Jamf
Log Microsoft 365
Log Microsoft Defender untuk Endpoint
Log pemberitahuan Microsoft Graph API
Log Microsoft Windows AD
Log DHCP Microsoft Windows
Log DNS Microsoft Windows
Log aktivitas Microsoft Windows
Log Sysmon Microsoft Windows
Log Sistem NIX
Log OCSF
Log OSSEC
Log osquery
Log firewall Palo Alto Networks
Temuan Security Command Center
Log Notifikasi SentinelOne
Log SentinelOne Cloud Funnel
Log CIM Splunk
Log Zeek (Bro)
Log CASB Zscaler
Ringkasan parser Zscaler
Log Zscaler Deception
Log DLP Zscaler
Log DNS Zscaler
Log Firewall Zscaler
Log Zscaler Internet Access
Log Zscaler Tunnel
Log Zscaler VPN
Log Zscaler Web Proxy
Log Zscaler ZPA
Log audit Zscaler ZPA
Log Zeek (Bro)
Parser Standar A - B - C
Log A10 Network Load Balancer
Log Abnormal Security
Log Acalvio
Log Akamai Cloud Monitor
Log Akamai DataStream 2
Log DNS Akamai
Log Akamai WAF
Log Akeyless Vault
Log switch Alcatel
Log AlgoSec Security Management
Log Amazon CloudFront
Log IOC ThreatStream Anomali
Log Ansible AWX
Log Apache
Log Apache Cassandra
Log Apache Tomcat
Log Appian Cloud
Data syslog Apple macOS
Log Aqua Security
Log Arbor Edge Defense
Log IRM Archer
Log CEF ArcSight
Log switch Arista
Log Area 1
Log Aruba ClearPass
Log Aruba EdgeConnect SD-WAN
Log switch Aruba
Log Pengontrol Nirkabel dan Titik Akses Aruba
Log Atlassian Bitbucket
Log Audit Admin Atlassian Cloud
Log Atlassian Jira
Log BOTsink Attivo Networks
Log Auth0
Log Automation Anywhere
Log Avatier
Log Avaya Aura
Log Avigilon Access Control Manager
Log audit Aware
Log akses AWS API Gateway
Log AWS Aurora
Log AWS CloudTrail
Log AWS CloudWatch
Log AWS Config
Log AWS Control Tower
Log AWS Elastic Load Balancing
Log AWS Elastic MapReduce
Log AWS GuardDuty
Log AWS IAM
Log AWS Key Management Service
Log AWS Macie
Log AWS Network Firewall
Log AWS RDS
Log AWS Route 53
Log akses server AWS S3
Log AWS Security Hub
Log AWS Session Manager
Log Aliran AWS VPC
Log aliran traffic AWS VPC Transit Gateway
Log VPN AWS
Log AWS WAF
Log firewall Azion
Log Masuk Azure AD
Log Azure API Management
Log Azure App Service
Log Azure Application Gateway
Log Azure Firewall
Log Audit Azure Storage
Log VPN Azure
Log Azure WAF
Log Barracuda CloudGen Firewall
Log Barracuda Email Security Gateway
Log WAF Barracuda
Log Barracuda Web Filter
Log BeyondTrust BeyondInsight
Log BeyondTrust EPM
Log BeyondTrust Privileged Identity
Log BeyondTrust Remote Support
Log Akses Jarak Jauh Aman BeyondTrust
Log Bitdefender
Log peristiwa Bitwarden Enterprise
Log BloxOne Threat Defense
Log DDI BlueCat
Log BlueCat Edge
Log Blue Coat ProxySG
Log BMC Helix Discovery
Log JSON Kolaborasi Box
Log Broadcom CA PAM
Log VA SSL Broadcom
Log Akses Web Broadcom Symantec SiteMinder
Log Brocade ServerIron
Log switch Brocade
Log Cambium Networks
Log Carbon Black App Control
Log Carbon Black EDR
Log Cato Networks
Log Censys
Log Audit Check Point
Log Check Point EDR
Log firewall Check Point
Check Point Harmony
Log Check Point SmartDefense
Log CipherTrust Manager
Log audit CircleCI
Log Cisco Application Control Engine (ACE)
Log Cisco Firepower NGFW
Log Cisco Firewall Service Module (FWSM)
Log Cisco IronPort
Log Cisco IOS
Log Cisco ISE
Log Cisco Meraki
Log Cisco PIX
Log Cisco Prime
Log Router Cisco
Log Cisco Secure ACS
Log Cisco Secure Email Gateway
Log Cisco Stealthwatch
Log Cisco Switch
Log Cisco UCS
Log Cisco VCS
Log VPN Cisco
Log Cisco Web Security Appliance (WSA)
Log Cisco Wireless Intrusion Prevention System (WIPS)
Log Cisco Wireless LAN Controller (WLC)
Log Cisco Wireless Security Management (WiSM)
Log Perangkat Cloud Identity
Log Pengguna Perangkat Cloud Identity
Log Cloud Intrusion Detection System (Cloud IDS)
Data Akses Kontekstual
Log Cloud Next Generation Firewall
Log Cloud Run
Log Konteks Cloud Storage
Log Cloudflare
Log WAF Cloudflare
Log Cloudian HyperStore
Log CloudPassage Halo
Set data inti Code42 Incydr
Log Cohesity
Log Commvault
Log CommVault Backup and Recovery
Log Comodo AV
Log Sensor Corelight
Log CrowdStrike Falcon dalam CEF"
Streaming log CrowdStrike Falcon
Log CrushFTP
File IOC Kustom CSV
Log CyberArk EPM
Log CyberArk PAM
Log CyberArk Privilege Cloud
Log CyberArk Privileged Threat Analytics
Log CyberX
Log Cylance PROTECT
Log Cyolo OT
Parser Standar D - E - F - G
Log Datadog
Log Darktrace
Log EDR Deep Instinct
Log Delinea Distributed Engine
Log PAM Delinea
Log Delinea Secret Server
Log Dell CyberSense
Log Dell ECS
Log Dell EMC Data Domain
Log NAS Dell EMC Isilon
Log Dell EMC PowerStore
Log Dell EMC PowerStore
Log Dell OpenManage
Log switch Dell
Log audit DigiCert
Log Modem Digi
Hasil DomainTools Iris Investigate
Log administrator Duo
Log autentikasi Duo
Log konteks entity Duo
Log konteks Pengguna Duo
Log DLP Endpoint Protector
Log Epic Systems
Log ESET AV
Log ESET EDR
Log DNS ExtraHop
Log ExtraHop RevealX
Log Extreme Switch
Log Extreme Wireless
Log F5 AFM
Log F5 ASM
Log F5 BIG-IP APM
Log F5 BIG-IP ASM
Log F5 BIG-IP LTM
Log DNS F5
Log VPN F5
Log WAF Fastly
Log Fidelis Network
Log FTP FileZilla
Log FireEye HX
Log FireEye NX
Log Forcepoint CASB
Log Forcepoint DLP
Log Forcepoint Proxy
Log Forescout NAC
Log ForgeRock OpenAM
Log FortiAnalyzer Fortinet
Log FortiAuthenticator Fortinet
Log FortiMail Fortinet
Log WAF FortiWeb
Log DLP Fortra Digital Guardian
Log audit GitHub
Log GitLab
Log Google Cloud IoT
Log konteks Google Cloud Compute
Log Google Cloud Compute
Log Google Cloud IDS
Log Aktivitas Google Workspace
Parser Standar H - I - J - K
Log HAProxy
Log audit Harness IO
Log audit HashiCorp
Log HP ProCurve
Log HPE Aruba Networking Central
Log HPE BladeSystem c7000
Log Akses Identitas IBM Verify
Log Analisis Identity and Access Management (IAM)
Log Illumio Core
Log WAF Imperva
Log Infoblox
Log konteks Jamf Pro
Log Jenkins
Log JFrog Artifactory
Log Juniper Junos
Log Firewall Juniper NetScreen
Log Kaseya Datto File Protection
Log AV Kaspersky
Log Kemp Load Balancer
Parser Standar L - M - N
Log Lacework Cloud Security
Log EDR LimaCharlie
Log sistem auditd dan AIX Linux
Log ManageEngine AD360
Log ManageEngine ADAudit Plus
Log McAfee Firewall Enterprise
Log McAfee Web Gateway
Log Micro Focus NetIQ Access Manager
Log aktivitas Microsoft Azure
Log Microsoft Azure AD
Log audit Microsoft Azure AD
Log Konteks Microsoft Azure AD
Log audit Microsoft Azure DevOps
Log Microsoft SQL Server
Log logging Microsoft Azure Key Vault
Log Pemberitahuan Microsoft Defender untuk Cloud
Log Microsoft Defender for Identity
Log Microsoft Exchange
Log Aktivitas Microsoft Graph
Log Microsoft IIS
Log Microsoft Intune
Log Microsoft LAPS
Log Microsoft Sentinel
Log Microsoft Windows Defender ATP
Log Mimecast Mail
Log IOC MISP
Log MobileIron
Log MuleSoft Anypoint
Log MYSQL
Log Platform Layanan File Nasuni
Log NetApp ONTAP
Log SAN NetApp
Log Netgate pfSense
Log Netscaler
Log peringatan Netskope v1
Log peringatan Netskope v2
Log proxy web Netskope
Log NGINX
Log Nix Systems Red Hat
Log Nix Systems Ubuntu Server (Unix System)
Log Router Nokia
Log ntopng
Log Nutanix Prism
Pengurai Standar O - P - Q - R
Log Okta
Log Single Sign-On (SSO) OneLogin
Log 1Password
Log audit 1Password
Log Onfido
Log OpenCanary
Log firewall OPNsense
Log Oracle DB
Log pemberitahuan Palo Alto Cortex XDR
Log peristiwa Palo Alto Cortex XDR
Log IOC Palo Alto Networks
Log Traps Palo Alto Networks
Log Prisma Cloud Palo Alto
Log pemberitahuan Prisma Cloud Palo Alto
Log SD-WAN Prisma Palo Alto
Log PingOne Advanced Identity Cloud
Log PowerShell
Log Proofpoint On-Demand
Log peringatan Proofpoint TAP
Log Pulse Secure
Log konteks aset Qualys
Log Qualys Continuous Monitoring
Log Pemindaian Qualys
Log Pemindai Virtual Qualys
Log Qualys Vulnerability Management
Log WAF Radware
Log Rapid7 InsightIDR
Log reCAPTCHA Enterprise
Log IOC Recorded Future
Log RevealX
Log RSA Authentication Manager
Parser Standar S - T - U
Log Salesforce
Log SecureAuth Identity Platform
Log Secure Web Proxy
Log Error Security Command Center
Log pengamatan Security Command Center
Log Pelanggaran Postur Security Command Center
Log Kombinasi Toksik Security Command Center
Log Tidak ditentukan Security Command Center
Log Deep Visibility SentinelOne
Log EDR SentinelOne
Log Keamanan ServiceNow
Log WAF Signal Sciences
Log Skyhigh Security
Mengumpulkan log audit Slack
Log Snort
Log Snowflake
Log audit tingkat grup Snyk
Log audit dan masalah tingkat grup Snyk
Log SonicWall
Log Sophos Central
Log Sophos UTM
Log Sophos XG Firewall
Log Eve Suricata
Log CASB Symantec CloudSOC
Log DLP Symantec
Log Symantec EDR
Log Symantec Endpoint Protection
Log Symantec Event Export
Log Symantec VIP Authentication Hub
Log Symantec VIP Enterprise Gateway
Log Symantec Web Isolation
Log Synology
Log Sysdig
Log Thinkst Canary
Log IOC ThreatConnect
Log Trellix DLP
Log Trellix ePO
Log Trellix IPS
Log Trend Micro Apex One
Log Trend Micro Cloud One
Log DDI Trend Micro
Log Trend Micro Deep Security
Log Trend Micro Email Security
Log Trend Micro Vision One
Log Aktivitas Trend Micro Vision One
Log audit Trend Micro Vision One
Log Trend Micro Vision One Container Vulnerability
Log Deteksi Trend Micro Vision
Log Teknik Serangan yang Teramati Trend Micro Vision One
Log Trend Micro Vision One Workbench
Log Tripwire
Log Twingate VPN
Parser Standar V - W - X - Y - Z
Log Varonis
Log Veeam
Log PKI Zero Touch Venafi
Log Veridium ID
Log Veritas NetBackup
Log Versa Networks Secure Access Service Edge (SASE)
Log VMware Airwatch
Log WAF VMware Avi Load Balancer
Log VMware ESXi
Log VMware Horizon
Log VMware Networking and Security Virtualization (NSX) Manager
Log VMware Tanzu
Log VMware vCenter
Log SD-WAN VMware VeloCloud
Log VMware vRealize
Log VMware vSphere