What this integration is
Huntress provides managed detection/response-style telemetry that can complement endpoint and identity sources.Data path (how it flows)
Typical flow:- Huntress → External Service integration (API collector or export)
- Events → SIEM storage (Wazuh Indexer / OpenSearch-backed)
- Optional: events → Graylog alert definitions
- Alerts →
gl-events*→ CoPilot Incident Management → Alerts - Operator workflow → Cases
What data you get (high level)
- Alerts/detections (depending on enabled exports)
- Host/agent context (depending on integration design)
Setup (wireframe)
- Configure Huntress under External Services / 3rd Party Integrations.
- Ensure events are tenant-aware.
Success criteria
- You can find at least one recent Huntress event/detection
- It is associated with the expected customer
Dashboards
- Confirm dashboards populate (after provisioning)
Alerts (starter set)
- High-confidence Huntress detections promoted into SOC alerting
- Repeated detections on the same host
- New persistence indicators (if present in telemetry)
Troubleshooting
- Verify external service status
- Confirm export mechanism (API/webhook) and permissions
- Confirm routing
