Cyber Ontology

← Home

Detective Kit

AI Agents that continuously scan and correlate behaviors across the enterprise.

Detective Kit

AI agents patrolling your cyber ontology.

Detectives are AI-driven agents that continuously scan IAM, endpoint, cloud, DLP, vendor, and SIEM data – similar to killer T-cells patrolling the body.

Active
15
Paused
0
Caught (24h)
22
AI Remediated
2

Detective Library

IAM Patrol Detective

Patrols IAM telemetry for unusual MFA patterns, privilege escalations, and impossible travel. Monitors identity and access management platforms for suspicious logins.

IAM
Platforms:
Okta, Microsoft Entra ID, Ping Identity

Endpoint Hunter

Scans endpoint detection and response platforms for malware, lateral movement, and suspicious process activity.

Endpoint
Platforms:
CrowdStrike, Microsoft Defender for Endpoint, SentinelOne

Cloud Guardian

Watches cloud security platforms for misconfigurations, exposed buckets, and risky IAM roles.

Cloud
Platforms:
AWS CloudTrail, Azure Activity Logs, GCP Audit Logs

Encryption Guardian

Monitors encryption and key management systems for unauthorized key access, key rotation failures, and encryption policy violations.

Encryption
Platforms:
AWS KMS, Azure Key Vault, HashiCorp Vault

Network Sentinel

Analyzes network security platforms for suspicious traffic patterns, unauthorized access attempts, and lateral movement indicators.

Network
Platforms:
Palo Alto, Zscaler, Cloudflare

Email Phishing Detective

Analyzes email security platforms for phishing campaigns and credential theft patterns.

Email
Platforms:
Proofpoint, Mimecast, Microsoft Defender Email

DLP Watcher

Monitors data loss prevention tools for sensitive data exfiltration, large exports, and external sharing.

DLP
Platforms:
Proofpoint DLP, Microsoft Purview DLP

AppSec Scanner

Scans application security platforms for vulnerabilities, code flaws, and security misconfigurations in applications.

AppSec
Platforms:
Snyk, Veracode, GitHub Security

CI/CD Guardian

Monitors CI/CD pipelines for security misconfigurations, unauthorized deployments, and supply chain attacks.

CI/CD
Platforms:
GitHub Actions, GitLab CI, Jenkins

CSPM Sentinel

Watches cloud security posture management platforms for misconfigurations, compliance violations, and cloud-native threats.

CSPM
Platforms:
Wiz, Prisma Cloud, Lacework

Threat Intel Hunter

Correlates threat intelligence feeds to identify known malicious indicators, IOCs, and emerging threat patterns.

ThreatIntel
Platforms:
Recorded Future, CrowdStrike Intel, Mandiant

UEBA Analyst

Analyzes user and entity behavior analytics to detect anomalous user activities and insider threats.

UEBA
Platforms:
Exabeam, Securonix

SIEM Correlator

Correlates events across SIEM platforms to identify cross-domain attack patterns and multi-stage incidents.

SIEM
Platforms:
Splunk, Microsoft Sentinel, IBM QRadar

GRC Auditor

Monitors governance, risk, and compliance platforms for policy violations, control gaps, and regulatory non-compliance.

GRC
Platforms:
ServiceNow GRC, Archer, OneTrust

Vendor Sentinel

Tracks vendor risk platforms for rating drops and high-risk vendor activity across the supply chain.

Vendor
Platforms:
BitSight, SecurityScorecard

HRIS Monitor

Monitors HRIS platforms for employee lifecycle changes, access provisioning anomalies, and termination access risks.

HRIS
Platforms:
Workday HRIS, BambooHR

MDM Enforcer

Enforces mobile device management policies and monitors for device compliance violations and unauthorized device access.

MDM
Platforms:
Intune, Jamf

Secrets Guardian

Monitors secrets management platforms for unauthorized secret access, secret rotation failures, and credential exposure.

SecretsMgmt
Platforms:
GitHub Secrets, GitLab Secrets, Vault Secrets

Data Protector

Monitors data security platforms for sensitive data discovery, classification anomalies, and data access patterns.

DataSecurity
Platforms:
Varonis, BigID

ASM Scanner

Scans external attack surface for exposed assets, misconfigurations, and potential entry points for attackers.

ASM
Platforms:
Randori, Cycognito

Detective Flow

Design how your Detectives patrol the enterprise — similar to killer T-cells scouring the body.

React Flow mini map
Explain0 attached
Attached Context

I'm Legion AI Copilot. I can help you understand incidents, identities, vendors, systems, data assets, and the ontology graph. What would you like to know?