agent-integration
Zeek
Ingest and analyze Zeek network security logs—including connection, DNS, DHCP, protocol, file, and detection events—to monitor, investigate, and visualize network activity and threats in your SIEM.
-
Datadog help@datadoghq.com
https://www.datadoghq.com