WitnessAI Documentation
List
Quick Start
Quick Start
User Guide
User Guide
Policies & GuardRails
Policies & GuardRails
Witness Anywhere: Remote Device Security
Witness Anywhere: Remote Device Security
Witness Attack
Witness Attack
Administrator Guide
Administrator Guide
Configuration
API Keys
API Keys are for using the WitnessAI API.
- Give it a Key Name.
- Choose an Expiration Date.
- Click Generate user key button.
- Click the Copy icon. The API key will be copied to your system clipboard, and the following dialog will display.
- Immediately save the key in a safe location, like a secrets manager or a password manager. After you navigate away from the API Keys page, you will not be able to access or copy any API keys again.
Only users with Super Admin role are able to access API keys after they have been created and the page is exited.
- Super Admin users can copy any active or expired API key by clicking the copy icon in the API key’s “Actions” column.
Models
Proxy Configuration (PAC)
Download Scripts
SIEM Integrations
Connection Settings
Choose your SIEM Platform from the drop-down. Current choices include: Cribl, Crowdstrike, Exabeam, Google Secops, Splunk, Sumo Logic, Other (HEC), & Other (Bearer Token).
Fill in all the data fields for your SIEM Platform.
The most common required fields include:
URL: Enter the endpoint into the URL field.
Authentication Token.
Sync Frequency: Enter the number of records you want to be sent per synchronization.
Splunk requires a Splunk Index. The index must be created before configuring Splunk as your SIEM.
Google SecOps: The URL must include the following query parameters:
- Key: Your Google SecOps API key
- Secret: Your SecOps API secret
Example:
https://your-instance.googleapis.com/v1/endpoint?key=my-secops-key&secret=my-secops-secretSIEM Data Integration
Choose one radio button to forward Prompts & Alerts or Alerts Only to your SIEM.
Additional data options:
Check any boxes next to your desired data and formats listed.
Include Audit Logs to send Audit Logs to your SIEM. Documentation here.
JSON Lines Format: Documentation here.
Include Sanitized Prompt: This will send the redacted version of prompts to your SIEM. Documentation here.
Include Raw Prompt and Response: This will send the original version of prompts and responses, that include sensitive data to your SIEM. Documentation here.
Include LLM Response: Choosing this option
Click Save.
Exabeam Additional Details
The Exabeam Webhook Cloud Collector documentation is here.
Enter your preferred URL based on your Region. The Exabeam list of Regions for Cloud Collectors is here.
Splunk Additional Details
The Splunk steps are near-identical to the steps for Exabeam. The Splunk HTTP Event Collector (HEC) documentation is here.
ConfigurationAPI KeysModelsProxy Configuration (PAC)Download ScriptsSIEM IntegrationsConnection SettingsSIEM Data IntegrationExabeam Additional DetailsSplunk Additional Details