Wider attack surface coverage powered by hundreds of integrations and deeper threat visibility powered by thousands of detections.
Version: AWS LogForwarder v1.0.10 or later.
AWS CloudTrail is one of the AWS services that facilitates you to manage, adhere, operate, and perform risk auditing of your AWS account. CloudTrail logs, continuously monitor, and retains account activity related to actions across your AWS infrastructure. It provides the event history of the AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command-line tools, and other AWS services.
Netsurion facilitates monitoring events from AWS CloudTrail by parsing the AWS CloudTrail logs and triggers from Amazon EventBridge. The dashboard, categories, and reports in Netsurion allow you to monitor overall actions performed related to the AWS CloudTrail service to keep you informed about its activities. It even triggers alerts when it performs critical and service-related activities.
For a new instance, integrate the AWS instance to Netsurion using the Netsurion integrator lambda function, which will in turn deliver logs to Netsurion from AWS. For an already-integrated AWS instance, make sure to update to AWS LogForwarder v1.0.1 or later.
Some of the Data Source Integrations available in Netsurion are listed below.
The configuration details are consistent with Netsurion version 9.3 or later, and AWS LogForwarder v1.0.10 or later.
Download Integration Guide and How-to Guide for more information and to configuration instructions.