Illusive
Illusive Shadow provides undetectable deception technology that creates a hostile environment for attackers, stopping lateral movement and access to your critical assets.
Illusive Spotlight discovers and remediates identity vulnerabilities throughout your environment.
Configuring the Connector for Illusive
To configure Lucidum to ingest data from Illusive:
Log in to Lucidum.
In the left pane, click Connector.
In the Connector page, click Add Connector.
Scroll until you find the Connector you want to configure. Click Connect. The Settings page appears.
In the Settings page, enter the following:
URL (required): The URL of the Illusive Networks API
API Key (required): Illusive Networks API key
Verify SSL. For future use.
To test the configuration, click Test.
If the connector is configured correctly, Lucidum displays a list of services that are accessible with the connector.
If the connector is not configured correctly, Lucidum displays an error message.