In the General screen, you can define back up preferences, marketplace access credentials and organizational proxy for integrations.

  • Generate ROI Report (SOC Managers only)
  • Perform Backup
  • Export Error Logs
  • Configure Source Repository 
  • Define data retention
  • Proxy
  • LDAP Configuration

Generate ROI Report

In this screen, you can calculate a report which shows the return on investment on using Siemplify.
Click on  .
Fill out the relevant information. Note that the hour rate refers to US dollars.

Click Generate. A Word document showing the estimated savings when using Siemplify is downloaded to your desktop.

Perform Backup

You can perform the following options:

  • Enable/Disable backup
  • Specify Backup Folder (network pathway and folder name)
  • Add username and password
  • Specify the hour when backup should be performed
  • Backup immediately instead of waiting for configured backup time.

Configure Source Repository

The source repository obtains the integration data, the actions, playbooks, and the rest of the items an analyst can download in Siemplify.
Add the password, company name and Marketplace name. You can test to check the source repository is valid. You can also update the Marketplace with new information.

Data Retention

In this section, you can define how long the system retains all information related to closed cases before deleting it. You can either choose to set this system-wide (i.e., for all environments) or per environment. If you select the per environment checkbox, make sure to navigate to the required environment/environments in the Organization > Environments screen, click Edit and select the required time frame. The maximum time frame is defined within the customer license. Customers who wish to extend the time frame should contact their Siemplify Account Manager. The minimum time frame is 3 months.

Proxy

A Proxy is used for integrations that need information from outside the network or DMZ and want the security of a proxy.
In this section you can configure the proxy address, whether or not it should use authentication – as well as a valid user name and password.
You can add URLs or IP addresses that can be accessed without needing a proxy. Make sure to save all entered settings.

LDAP Configuration

Enter the parameters to enable you to authenticate LDAP users. For more information on LDAP, please refer to How To Configure LDAP

Need more help with this?
Click here to open a Support ticket

Thanks for your feedback.