Loading

Neon Cyber Integration for Elastic

Serverless Observability Serverless Security Stack 9.0.0

Version 0.1.0 Beta (View all)
Subscription level
What's this?
Basic
Developed by
What's this?
Partner
Ingestion method(s) API
The Neon Cyber integration v0.1.0 is in beta

To use beta integrations, go to the Integrations page in Kibana, scroll down, and toggle on the Display beta integrations option.

The Neon Cyber integration for Elastic enables collection of workforce events and cybersecurity detections from the Neon API

The Neon Cyber integration collects log messages of the following types:

  • Events including geo, navigation, auth, app, extensions, and platform
  • Detections including compromised credentials, phishing, malware, and more

This integration requires you to generate a developer API key from the account settings of your Neon Cyber instance.

Elastic Agent must be installed. For more details, check the Elastic Agent installation instructions. You can install only one Elastic Agent per host.

Elastic Agent is required to stream data from the syslog or log file receiver and ship the data to Elastic, where the events will then be processed via the integration's ingest pipelines.

Agentless integrations allow you to collect data without having to manage Elastic Agent in your cloud. They make manual agent deployment unnecessary, so you can focus on your data instead of the agent that collects it. For more information, refer to Agentless integrations and the Agentless integrations FAQ.

Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. This functionality is in beta and is subject to change. Beta features are not subject to the support SLA of official GA features.

This integration includes one or more Kibana dashboards that visualizes the data collected by the integration. The screenshots below illustrate how the ingested data is displayed.