You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/source/Attack_Range_Features.md
+24-6Lines changed: 24 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,22 +1,40 @@
1
1
# Attack Range Features
2
2
3
+
## Cisco Secure Endpoint
4
+
A Cisco Secure Endpoint agent can be automatically installed on the Windows server in Attack Range. It is required that the agent is downloaded into the apps folder before running the build command. The logs can ingested automatically to the Splunk server when you enable the Cisco Secure Endpoint log forwarding. You can use the following attack_range.yml configuration:
5
+
````yml
6
+
general:
7
+
attack_range_password: "ChangeMe123!"
8
+
cloud_provider: "aws"
9
+
key_name: "ar"
10
+
cisco_secure_endpoint: "1"# forward cisco secure endpoint logs to splunk
You need to update all the fields with your values.
19
+
20
+
3
21
## CrowdStrike Falcon
4
22
A CrowdStrike Falcon agent can be automatically installed on the Windows Servers in Attack Range. It is required that the agent is downloaded into the apps folder before running the build command. The logs can ingested automatically to the Splunk server when you have the CrowdStrike Falcon Data Replicator (FDR) entitlement. You can use the following `attack_range.yml` configuration:
5
23
````yml
6
24
general:
7
25
attack_range_password: "ChangeMe123!"
8
26
cloud_provider: "aws"
9
27
key_name: "ar"
10
-
crowdstrike_falcon: "1"
11
-
crowdstrike_agent_name: "WindowsSensor.exe"
28
+
crowdstrike_falcon: "1"# forward crowdstrike logs to splunk
0 commit comments