Cyber Ontology

← Home

Telemetry Source Configuration

Select which security domains Legion AI should ingest in this simulation.

22 of 22 sources enabled

Identity Events

Okta, Azure AD

Endpoint Alerts

CrowdStrike, Microsoft Defender

Cloud Events

AWS CloudTrail, Azure Activity Log

Network Logs

Palo Alto, Zscaler, Cloudflare

DLP Events

Proofpoint, Microsoft Purview

Vulnerability Findings

Tenable, Qualys, Rapid7

Vendor Risk Findings

SecurityScorecard, BitSight

SIEM Alerts

Splunk ES, Microsoft Sentinel

GRC Findings

ServiceNow GRC, Archer

HRIS Events

Workday, BambooHR

CMDB Assets

ServiceNow, Jira Service Management

MDM Events

Intune, Jamf

Threat Intelligence Events

TI Feeds

Secrets Access Events

HashiCorp Vault, AWS Secrets Manager

Encryption/KMS Events

AWS KMS, Azure Key Vault

UEBA Events

User Behavior Analytics

AppSec Findings

Snyk, Veracode, Checkmarx

CI/CD Events

GitHub Actions, GitLab CI

ASM/EASM Findings

External Attack Surface Scanners

Data Security / DSPM Events

Data Discovery, Classification

CSPM Findings

Wiz, Prisma Cloud

ITSM / Ticketing Events

ServiceNow, Jira

Explain0 attached
Attached Context

I'm Legion AI Copilot. I can help you understand incidents, identities, vendors, systems, data assets, and the ontology graph. What would you like to know?