{"version":1,"pages":[{"id":"BDwIHwFqYjN7eEf60JmV","title":"Spyderbat Product Docs","pathname":"/","siteSpaceId":"sitesp_U3riz","description":"Everything you need to know about our cloud-native runtime security platform that will provide you with continuous security monitoring, improved observability and timely alerting."},{"id":"2WgiaYop8eE0vASoFr2N","title":"Getting Started","pathname":"/getting-started","siteSpaceId":"sitesp_U3riz","description":"Introduction to essential features and functionality of the Spyderbat console."},{"id":"Ln6DMgHfV0M15xPL458E","title":"Create an Organization","pathname":"/getting-started/create-an-organization","siteSpaceId":"sitesp_U3riz","description":"Spyderbat Accounts are tied to one or more Organizations. Membership to an Organization is a requirement for installing the Spyderbat Nano Agent and fully utilizing Spyderbat as a whole.","breadcrumbs":[{"label":"Getting Started"}]},{"id":"FUJx080kiJm5UaiNx4Mo","title":"Install the Nano Agent","pathname":"/getting-started/install-the-nano-agent","siteSpaceId":"sitesp_U3riz","description":"Once you have successfully logged into your organization, the next step is to install the Nano Agent","breadcrumbs":[{"label":"Getting Started"}]},{"id":"UkSdfwcop2O5wFZ2ZmwE","title":"Three Things to Try with Spyderbat Community Edition","pathname":"/getting-started/three-things-to-try-with-spyderbat-community-edition","siteSpaceId":"sitesp_U3riz","description":"Review your security monitoring scope, trace your own activity at runtime, and validate detected suspicious activity via Spyderbat flags.","breadcrumbs":[{"label":"Getting Started"}]},{"id":"F1cU8pyxw1JlxXCsUtqD","title":"Manage Users and Roles","pathname":"/getting-started/spyderbat-user-and-role-management-overview","siteSpaceId":"sitesp_U3riz","description":"Manage team members and control their access levels in your Spyderbat organization.","breadcrumbs":[{"label":"Getting Started"}]},{"id":"AqxPHsb5XPSHjYUkhuNI","title":"Help and Support","pathname":"/getting-started/help-and-support","siteSpaceId":"sitesp_U3riz","description":"How to get help, report issues, and find the right contact for your question.","breadcrumbs":[{"label":"Getting Started"}]},{"id":"hY4A7mc3WaWx0omUJYLm","title":"Installation","pathname":"/installation","siteSpaceId":"sitesp_U3riz","description":"Spyderbat Nano Agent installation and deployment configuration options."},{"id":"iJKdd9ICuxb2IzNJazFP","title":"Spyderbat Nano Agent","pathname":"/installation/spyderbat-nano-agent","siteSpaceId":"sitesp_U3riz","description":"Nano Agent operational principles, compatibility, network requirements and proxy support, general FAQ","breadcrumbs":[{"label":"Installation"}]},{"id":"OiI1i1dkbdCvma5riJuv","title":"Kubernetes","pathname":"/installation/spyderbat-nano-agent/kubernetes","siteSpaceId":"sitesp_U3riz","description":"Nano Agent install via public or locally hosted Helm Chart or manually via daemonset; configuring parameters (memory and CPU resources, priority class), and validating install into a K8s cluster.","breadcrumbs":[{"label":"Installation"},{"label":"Spyderbat Nano Agent"}]},{"id":"uViapeSz3yd5qndPrw6m","title":"Pre Deployment Environment Data Collection Script","pathname":"/installation/spyderbat-nano-agent/kubernetes/spyderbat-pre-deployment-environment-data-collection","siteSpaceId":"sitesp_U3riz","description":"Optimize your Helm Chart values to ensure proper sizing of the Spyderbat Nano Agent parameters for your K8s environment.","breadcrumbs":[{"label":"Installation"},{"label":"Spyderbat Nano Agent"},{"label":"Kubernetes"}]},{"id":"VU21XX2gRCpBkoM0LW2A","title":"Linux Standalone","pathname":"/installation/spyderbat-nano-agent/linux-vm","siteSpaceId":"sitesp_U3riz","description":"This section covers: adding a source to your monitoring scope in Spyderbat console, generating installation scripts/commands, and running the agent installer on the target machine.","breadcrumbs":[{"label":"Installation"},{"label":"Spyderbat Nano Agent"}]},{"id":"wG6IDHKjlwIfVMs58GIr","title":"AWS Unattended Install","pathname":"/installation/spyderbat-nano-agent/aws-unattended-install","siteSpaceId":"sitesp_U3riz","description":"Automatic installation of the Spyderbat Nano Agent on an AWS EC2 instance with auto-scaling groups using the instance launch wizard.","breadcrumbs":[{"label":"Installation"},{"label":"Spyderbat Nano Agent"}]},{"id":"RABOQyMHqrqIBmFwtBBi","title":"Secure your Registration Code with AWS Secrets Manager","pathname":"/installation/spyderbat-nano-agent/aws-unattended-install/aws-secrets-manager-overview","siteSpaceId":"sitesp_U3riz","description":"Learn how to leverage AWS Secrets Manager as a secret store for the Nano Agent Registration Code (There is an assumption that you are familiar with AWS, IAM, and EKS and how the 3 interact).","breadcrumbs":[{"label":"Installation"},{"label":"Spyderbat Nano Agent"},{"label":"AWS Unattended Install"}]},{"id":"vAcVQYMagOtzWFQ4yz1C","title":"Create a Golden Image with the Nano Agent Pre-Installed","pathname":"/installation/spyderbat-nano-agent/creating-vm-golden-images-that-include-spyderbats-nano-agent","siteSpaceId":"sitesp_U3riz","description":"Template Spyderbat Nano Agent install via Golden Image for environments with auto-scaling and automation requirements.","breadcrumbs":[{"label":"Installation"},{"label":"Spyderbat Nano Agent"}]},{"id":"yf0NSy61hY8MLlQn2pHN","title":"Spyderbat AWS Agent","pathname":"/installation/spyderbat-aws-agent","siteSpaceId":"sitesp_U3riz","description":"Overview of the AWS Agent, deployment options and how to get started","breadcrumbs":[{"label":"Installation"}]},{"id":"bRu4KFlCV2wZSJiod5N1","title":"AWS Linux VM","pathname":"/installation/spyderbat-aws-agent/aws-agent-vm","siteSpaceId":"sitesp_U3riz","description":"Automatic installation of the Spyderbat AWS Agent on an AWS EC2 instance","breadcrumbs":[{"label":"Installation"},{"label":"Spyderbat AWS Agent"}]},{"id":"UwZNqWCpDFF3bYH9ahRq","title":"Kubernetes","pathname":"/installation/spyderbat-aws-agent/aws-agent-helm","siteSpaceId":"sitesp_U3riz","description":"Automatic installation of the Spyderbat AWS Agent on a Kubernetes Cluster","breadcrumbs":[{"label":"Installation"},{"label":"Spyderbat AWS Agent"}]},{"id":"j2ALRdimEcvDI0UvPKz3","title":"Configuration Guide - AWS Linux VM","pathname":"/installation/spyderbat-aws-agent/aws-agent-vm-configuration","siteSpaceId":"sitesp_U3riz","description":"Detailed configuration guide for the Spyderbat AWS Agent installed on an AWS VM","breadcrumbs":[{"label":"Installation"},{"label":"Spyderbat AWS Agent"}]},{"id":"GpGbNneKyIcWquyuFsGl","title":"Configuration Guide - Kubernetes","pathname":"/installation/spyderbat-aws-agent/aws-agent-helm-configuration","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Installation"},{"label":"Spyderbat AWS Agent"}]},{"id":"13j7yG8oEOJVHBOzB7VC","title":"Install Spyctl CLI","pathname":"/installation/spyctl","siteSpaceId":"sitesp_U3riz","description":"Spyctl, an open source CLI tool, allows you to view and manage resources within your Spyderbat environment.","breadcrumbs":[{"label":"Installation"}]},{"id":"chklFLTHiOqyffXTiHIQ","title":"Initial Configuration","pathname":"/installation/spyctl/spyctl-initial-configuration","siteSpaceId":"sitesp_U3riz","description":"Learn how to quickly configure Spyctl to interact with your Spyderbat data","breadcrumbs":[{"label":"Installation"},{"label":"Install Spyctl CLI"}]},{"id":"NtK3aN4APw7243u8jsSf","title":"Install Spydertop CLI","pathname":"/installation/spydertop","siteSpaceId":"sitesp_U3riz","description":"Learn how Spyderbat leverages kernel-level system monitoring and public APIs to expand HTOP functionality to allow analysts to look into system anomalies days or even months later.","breadcrumbs":[{"label":"Installation"}]},{"id":"jAUUfDAjuFazubNm36Qb","title":"Install the Spyderbat Event Forwarder","pathname":"/installation/spyderbat-event-forwarder","siteSpaceId":"sitesp_U3riz","description":"Install the Spyderbat Event Forwarder to deliver SIEM-forwarded events from Spyderbat to your SIEM, Splunk, or any HTTP endpoint.","breadcrumbs":[{"label":"Installation"}]},{"id":"lKgwXrnT3ScxRURLZHAQ","title":"Helm Chart","pathname":"/installation/spyderbat-event-forwarder/helm-chart","siteSpaceId":"sitesp_U3riz","description":"Install the Spyderbat Event Forwarder on Kubernetes using the Helm chart.","breadcrumbs":[{"label":"Installation"},{"label":"Install the Spyderbat Event Forwarder"}]},{"id":"LgfsQS4QrumiYc9U5o2M","title":"Traditional Installer","pathname":"/installation/spyderbat-event-forwarder/traditional-installer","siteSpaceId":"sitesp_U3riz","description":"Install the Spyderbat Event Forwarder on Linux using the traditional installer.","breadcrumbs":[{"label":"Installation"},{"label":"Install the Spyderbat Event Forwarder"}]},{"id":"feiOPOdU9832qhJRVtpw","title":"Install the Spyderbat MCP Server","pathname":"/installation/mcp","siteSpaceId":"sitesp_U3riz","description":"Model Context Protocol (MCP) server for LLMs to interact with Spyderbat's API, enabling AI assistants to search, query, and manage Spyderbat resources.","breadcrumbs":[{"label":"Installation"}]},{"id":"f83uCvVfWBtiGLzklAB8","title":"Concepts","pathname":"/concepts","siteSpaceId":"sitesp_U3riz","description":"The Concepts section helps you learn about the Spyderbat Platform. This section is designed to provide a comprehensive understanding of the fundamental ideas and principles that let you view and secur"},{"id":"dxSeZ1kZ9qhHZ3xgdSWy","title":"Guardian & Interceptor","pathname":"/concepts/guardian","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Concepts"}]},{"id":"5u9J7KBT6ERG0VblgCDF","title":"Ruleset Policies","pathname":"/concepts/guardian/ruleset_policies","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Concepts"},{"label":"Guardian & Interceptor"}]},{"id":"Wz5XKPHJhzFMjlO7GbtW","title":"Workload Policies","pathname":"/concepts/guardian/workload_policies","siteSpaceId":"sitesp_U3riz","description":"Workload Policies define allowed process and network activity for containers and Linux services, alerting or blocking deviations from expected behavior.","breadcrumbs":[{"label":"Concepts"},{"label":"Guardian & Interceptor"}]},{"id":"c8mTB8uHSzYjfTlwwXwL","title":"Flashback (Go Back In Time)","pathname":"/concepts/flashback","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Concepts"}]},{"id":"Yn1kZI34qXIj8PUjXcE9","title":"Investigations","pathname":"/concepts/flashback/investigations","siteSpaceId":"sitesp_U3riz","description":"Overview of Process Investigations in the Spyderbat Console — the Records Panel, Causal Tree, and Details Panel for visual causal analysis of Spydertraces.","breadcrumbs":[{"label":"Concepts"},{"label":"Flashback (Go Back In Time)"}]},{"id":"catEEZWbYP4iaFkGLayJ","title":"Search","pathname":"/concepts/search","siteSpaceId":"sitesp_U3riz","description":"Detailed overview of the Search tab in the console and the Spyderbat search language it uses.","breadcrumbs":[{"label":"Concepts"}]},{"id":"7g43Y9wWst3dDpSzJUfN","title":"Saved Searches","pathname":"/concepts/search/saved-search","siteSpaceId":"sitesp_U3riz","description":"Store and reuse search queries in Spyderbat. Enable notifications and SIEM forwarding on saved queries to automate alerting and event delivery.","breadcrumbs":[{"label":"Concepts"},{"label":"Search"}]},{"id":"cf7Gv8PWVV2yTEuXuWsx","title":"Summarize","pathname":"/concepts/summarize","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Concepts"}]},{"id":"GRIo07LZVIBoZoYm8f8V","title":"Spydertrace Summarize","pathname":"/concepts/summarize/spydertrace-summarize","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Concepts"},{"label":"Summarize"}]},{"id":"1bWkiiV1C7lVwGuqgMJg","title":"Dashboards","pathname":"/concepts/dashboards","siteSpaceId":"sitesp_U3riz","description":"Detailed overview of the Dashboard section of the console, including collected types of data, data management (sorting, filtering and grouping), and shortest path to investigating suspicious activity.","breadcrumbs":[{"label":"Concepts"}]},{"id":"hDNrwRbFuHWMffLRx3Hl","title":"Dashboard Categories","pathname":"/concepts/dashboards/spyderbat-dashboard-categories","siteSpaceId":"sitesp_U3riz","description":"The seven built-in dashboard categories in Spyderbat: Security, User Tracking, Policy, Operations, Network, Inventory, and Kubernetes. Includes the full list of default cards in each category.","breadcrumbs":[{"label":"Concepts"},{"label":"Dashboards"}]},{"id":"9p7wVMqtXON7KgnUvDv9","title":"Reports","pathname":"/concepts/reports","siteSpaceId":"sitesp_U3riz","description":"Overview of the Reporting section of the console, including report creation, review, download and printing.","breadcrumbs":[{"label":"Concepts"}]},{"id":"LQkGnGGHMblRISr9z3o8","title":"Notifications","pathname":"/concepts/notifications","siteSpaceId":"sitesp_U3riz","description":"Get notified when Spyderbat detects operations issues or suspicious behavior at runtime in your environment.","breadcrumbs":[{"label":"Concepts"}]},{"id":"w6sePv65ceOqTJ6cNyQW","title":"Notification Targets","pathname":"/concepts/notifications/notification-targets","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Concepts"},{"label":"Notifications"}]},{"id":"g3QxePqAKLtWTwhDEyyc","title":"Notification Templates","pathname":"/concepts/notifications/notification-templates","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Concepts"},{"label":"Notifications"}]},{"id":"2CwmIy7KcOgW0jvdVdEy","title":"Actions","pathname":"/concepts/actions","siteSpaceId":"sitesp_U3riz","description":"Overview of manual response actions that can be executed in the UI, including killing a process or killing a pod.","breadcrumbs":[{"label":"Concepts"}]},{"id":"IOTkWrOLqrIXZEOny5eC","title":"Integrations","pathname":"/concepts/integrations","siteSpaceId":"sitesp_U3riz","description":"Integrate Spyderbat with your existing security infrastructure — route events to your SIEM, connect AWS accounts, and forward data to external tools.","breadcrumbs":[{"label":"Concepts"}]},{"id":"dnQXlR3QkFcWFHa54jIz","title":"SIEM Forwarding","pathname":"/concepts/integrations/siem-forwarding","siteSpaceId":"sitesp_U3riz","description":"How Spyderbat SIEM forwarding works — enabling forwarding on saved queries and deploying the Event Forwarder to deliver events to your SIEM.","breadcrumbs":[{"label":"Concepts"},{"label":"Integrations"}]},{"id":"ovnQms8tDlKHYPJrIN1T","title":"AWS Integration","pathname":"/concepts/integrations/aws","siteSpaceId":"sitesp_U3riz","description":"Overview of the AWS Context Integration using the AWS Agent","breadcrumbs":[{"label":"Concepts"},{"label":"Integrations"}]},{"id":"hKhKfnRDzm74tJao3n9n","title":"Spyderbat Event Forwarder","pathname":"/concepts/integrations/spyderbat-event-forwarder","siteSpaceId":"sitesp_U3riz","description":"The Spyderbat Event Forwarder polls the SIEM forwarding API and delivers events to your SIEM, log management platform, or any HTTP endpoint.","breadcrumbs":[{"label":"Concepts"},{"label":"Integrations"}]},{"id":"cmvLb5gWbhggp2B3F2Kh","title":"Suppression & Tuning","pathname":"/concepts/suppression","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Concepts"}]},{"id":"JexFlbePGN6XHqC6hpWm","title":"Scout (Detections)","pathname":"/concepts/scout","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Concepts"}]},{"id":"GLCuo8iyEizUJTTJ3gYk","title":"Spydertraces","pathname":"/concepts/scout/spydertraces","siteSpaceId":"sitesp_U3riz","description":"A Spydertrace is a causally connected record of system activity. This page explains how traces are triggered, scored, and reviewed by analysts.","breadcrumbs":[{"label":"Concepts"},{"label":"Scout (Detections)"}]},{"id":"YbhFHACvOYIX2YMpM3Cw","title":"Custom Flags","pathname":"/concepts/scout/custom-flags","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Concepts"},{"label":"Scout (Detections)"}]},{"id":"OS0jYmbuSwe5nP36A8xC","title":"Tutorials","pathname":"/tutorials","siteSpaceId":"sitesp_U3riz","description":""},{"id":"QELIo2ET7bIwksEfDw3o","title":"Flashback","pathname":"/tutorials/flashback","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Tutorials"}]},{"id":"g2zJfOCVdWX8BcRdGo8F","title":"How to Use the Investigations Feature in Spyderbat","pathname":"/tutorials/flashback/how-to-investigate-in-spyderbat","siteSpaceId":"sitesp_U3riz","description":"How to use the Causal Tree in a Process Investigation — adding and removing nodes, toolbar controls, right-click context menus, data layers, and sharing investigation links.","breadcrumbs":[{"label":"Tutorials"},{"label":"Flashback"}]},{"id":"lnVxnDWQnUCnK01cZyxt","title":"Guardian","pathname":"/tutorials/guardian","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Tutorials"}]},{"id":"irSBRlN5qDbs495aT8xA","title":"How to Lock Down Your Workloads With Guardian Policies Using Spyctl","pathname":"/tutorials/guardian/how-to-lock-down-your-critical-workloads-with-policies-spyctl","siteSpaceId":"sitesp_U3riz","description":"This page will teach you about Guardian Workload Policies. It will explain what they are, how to create them, how to apply them, and how to manage them.","breadcrumbs":[{"label":"Tutorials"},{"label":"Guardian"}]},{"id":"KJs8PASHiWlkXIbdSYev","title":"How to Put Guardrails Around Your K8s Clusters Using Spyctl","pathname":"/tutorials/guardian/how-to-put-guardrails-around-your-k8s-cluster-spyctl","siteSpaceId":"sitesp_U3riz","description":"This tutorial will walk you through the creation, tuning, and management of Cluster Ruleset Policies.","breadcrumbs":[{"label":"Tutorials"},{"label":"Guardian"}]},{"id":"NUbn7vbIgkrfPgKYNo1l","title":"Integrations","pathname":"/tutorials/integrations","siteSpaceId":"sitesp_U3riz","description":"Step-by-step guides for integrating Spyderbat with external tools and SIEMs.","breadcrumbs":[{"label":"Tutorials"}]},{"id":"mrQsiAmV0BSm3F7qzOFW","title":"SIEM Forwarding Quickstart","pathname":"/tutorials/integrations/siem-forwarding-quickstart","siteSpaceId":"sitesp_U3riz","description":"Set up SIEM forwarding end to end — enable a saved search, install the Event Forwarder, and verify events reach your SIEM.","breadcrumbs":[{"label":"Tutorials"},{"label":"Integrations"}]},{"id":"laTkI8NJfp2ub5Puwrxt","title":"Panther Webhook Configuration","pathname":"/tutorials/integrations/forwarder-panther-config","siteSpaceId":"sitesp_U3riz","description":"Configure the Spyderbat Event Forwarder to send events to Panther via webhook.","breadcrumbs":[{"label":"Tutorials"},{"label":"Integrations"}]},{"id":"RosNOLIh0vR2RFbipPBo","title":"How to Set Up Spyderbat to Ingest Falco Alerts","pathname":"/tutorials/integrations/falco-connector-deployment","siteSpaceId":"sitesp_U3riz","description":"Let's talk about the most optimal way to integrate Falco security detections with Spyderbat platform to further enhance the cloud-native runtime security monitoring value of Spyderbat.","breadcrumbs":[{"label":"Tutorials"},{"label":"Integrations"}]},{"id":"Nov4xZrFg5kUekDsalUW","title":"How to Create and Use a Spyderbat API Key","pathname":"/tutorials/integrations/how-to-set-up-your-spyderbat-api-key-and-use-the-spyderbat-api","siteSpaceId":"sitesp_U3riz","description":"Spyderbat leverages API very heavily. To configure a variety of inbound and outbound API integrations, you will need to generate your API key. Learn how to create, maintain and manage your API keys.","breadcrumbs":[{"label":"Tutorials"},{"label":"Integrations"}]},{"id":"dwqiG8CqNzIZmc04d8vp","title":"Notifications","pathname":"/tutorials/notifications","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Tutorials"}]},{"id":"dbgvBNsT2EsBLHPc68hh","title":"How to Set Up Notifications Using Spyctl","pathname":"/tutorials/notifications/how-to-set-up-spyderbat-notifications-spyctl","siteSpaceId":"sitesp_U3riz","description":"Configure Notifications using Spyctl to receive alerts for significant Security or Operations events.","breadcrumbs":[{"label":"Tutorials"},{"label":"Notifications"}]},{"id":"2TZp3W3k3lIqZBnOqyhu","title":"How to Set up Agent-Health Notifications Using Spyctl","pathname":"/tutorials/notifications/how-to-set-up-agent-health-notifications-in-spyctl","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Tutorials"},{"label":"Notifications"}]},{"id":"3sDbDM1mwgPEmWhbAGtj","title":"Dashboards","pathname":"/tutorials/how-to-create-custom-dashboards","siteSpaceId":"sitesp_U3riz","description":"Learn about how to create custom Spyderbat dashboards and dashboard cards using Athena Search or existing dashboard templates, as well as how to share and manage access to the custom dashboards.","breadcrumbs":[{"label":"Tutorials"}]},{"id":"vSmqoKoK2V5rkHDS54qW","title":"Miscellaneous","pathname":"/tutorials/miscellaneous","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Tutorials"}]},{"id":"S5jB6YeyikaVdMvwj0YZ","title":"Scout (Detections)","pathname":"/tutorials/scout","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Tutorials"}]},{"id":"vtaJKJ6392VK0yyRyJiO","title":"How to Set Up Custom Flags Using Spyctl CLI","pathname":"/tutorials/scout/setup-custom-flags","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Tutorials"},{"label":"Scout (Detections)"}]},{"id":"zCAgdKV84i7DhNymaNs9","title":"Reference","pathname":"/reference","siteSpaceId":"sitesp_U3riz","description":""},{"id":"VnQ5Ofm8Wo7WimTKWR97","title":"Policies","pathname":"/reference/policies","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Reference"}]},{"id":"8JcPjMoc7iks0QIa5GGo","title":"Response Actions","pathname":"/reference/policies/response-actions","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Reference"},{"label":"Policies"}]},{"id":"OntZU3LdtrlWfsmzZ2Mv","title":"Rulesets","pathname":"/reference/rulesets","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Reference"}]},{"id":"uU7trBkS9oqQ8EGLAPfT","title":"Selectors","pathname":"/reference/selectors","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Reference"}]},{"id":"zZmjYGu45yHSbfIrT7iV","title":"Notifications","pathname":"/reference/notifications","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Reference"}]},{"id":"gsfLxUJqP00OWrz4eN4C","title":"Spyctl CLI","pathname":"/reference/spyctl","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Reference"}]},{"id":"MdiQf5QAJZVvLOo1bpqQ","title":"Spyctl Commands","pathname":"/reference/spyctl/spyctl-commands","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Reference"},{"label":"Spyctl CLI"}]},{"id":"DhCkCcOmSLlW61UzC8NU","title":"Guardian Policy Management using Spyctl","pathname":"/reference/spyctl/guardian-policy-management-spyctl","siteSpaceId":"sitesp_U3riz","description":"This reference page details the commands used to manage Guardian Workload Policies","breadcrumbs":[{"label":"Reference"},{"label":"Spyctl CLI"}]},{"id":"69uuN0Dz7my8OVH6QX0d","title":"Notification Template Management using Spyctl","pathname":"/reference/spyctl/notification-template-management-spyctl","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Reference"},{"label":"Spyctl CLI"}]},{"id":"WgPo4BliGxBbLjSyEuGt","title":"Notification Target Management using Spyctl","pathname":"/reference/spyctl/notification-targets-management-spyctl","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Reference"},{"label":"Spyctl CLI"}]},{"id":"XvAqn5v9mbxz55TwMCoR","title":"Search","pathname":"/reference/search","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Reference"}]},{"id":"wK4ij6GsGl0v7CTsdINR","title":"All Operators","pathname":"/reference/search/search-operators","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Reference"},{"label":"Search"}]},{"id":"tUaVhzoQnTeYAO254OQI","title":"All Fields","pathname":"/reference/search/search-fields","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Reference"},{"label":"Search"}]},{"id":"IWpZvqd2IGuTIuYzupHB","title":"All Related Objects","pathname":"/reference/search/search-joins","siteSpaceId":"sitesp_U3riz","description":"","breadcrumbs":[{"label":"Reference"},{"label":"Search"}]}]}