🔌Threat Hunting Connectors
Non-exhaustive list of the available connectors you can integrate to your Enterprise plan
Connectors can be used both in the WebApp and API. Connectors are exclusive to the Enterprise Plan.
Our connectors
Microsoft Sentinel
Query and assess threats in your network using our Microsoft Sentinel connector. Integrate seamlessly with Sentinel SIEM logs, launching customizable KQL queries to retrieve artifact information and bolster your incident response.
ServiceNow
Effortlessly query and analyze incidents with our ServiceNow connector. Integrate with ServiceNow to run tailored queries, gaining detailed information about previous investigations for enhanced incident response.
ElasticSearch
Analyze logs efficiently with our Elasticsearch connector. Run custom queries on Elasticsearch indices to extract insights on network logs, user activity, resource information and security threats.

Splunk
Boost security intelligence with our Splunk connector. Execute custom searches and queries within Splunk to investigate incidents, system logs, and generate reports for proactive threat identification.
TheHive
Have you already seen this IOC in your incident backlog ? Retrieve information about previous investigations and react quicker thanks to this TheHive connector.
🔌 Custom Connector
Do you have SOAR Engineering talents in your team ? In that case you can use any SOAR platform of your choice to easily create a custom Houdin connector tailored to your needs !
Last updated