Configuring email notifications and ticketing events for Graphus Alerts

This article describes how to configure email notifications and publish ticketing system events for graphus alerts.

Email notifications

Graphus will send an email notification to specified recipients when an alert is generated for a category you have selected. You can select more than one category. For example, if Quarantine is selected, an email notification will be sent to the specified recipients whenever an email is quarantined.

When EmployeeShield is selected, an email will be sent when a banner is applied to an email. If Phish911 is selected, an email notification will be sent when a user reports an email via Phish911.

Ticketing events

Graphus will publish an event to the configured SIEM or ticketing system when it generates an alert for the categories you have selected. You can select more than one category.

An event will be published for each category as described below:

  • Quarantine: An email is quarantined.
  • EmployeeShield: A banner is applied to an email.
  • Phish911: A user reports an email via Phish911.

An event can be published in JSON format or a detailed message.

Integration types

Publishing an event to a SIEM or ticketing system requires that you select from the following integration types: AWS S3, Splunk, ConnectWise, or BMS. The table below describes the information you must provide for each type to complete the integration.

Integration type Required fields
AWS S3
  • Role Access Key
  • Role Secret Access Key
  • Bucket Name
  • Folder Name
  • Region
Splunk
  • Host
  • Port
  • Scheme
  • Token
  • Source Type
ConnectWise
  • Base URL
  • Public Key
  • Private Key
  • Base Company ID
  • Board Name
  • Company Identifier
BMS
  • Base URL
  • User Name
  • Password
  • Tenant ID
  • Account ID
  • Account Location ID
  • Source ID
  • Type ID
  • Priority ID
  • Status ID
  • Queue ID

How to...