Welcome/Settings/Configuration

Configuration

Category
User Guide
Parent item
WitnessAI Documentation
List
Quick Start
User Guide
Policies & GuardRails
Witness Anywhere: Remote Device Security
Witness Attack
Administrator Guide

Configuration

API Keys

notion image
API Keys are for using the WitnessAI API.
  1. Give it a Key Name.
  1. Choose an Expiration Date.
  1. Click Generate user key button.
notion image
 
  1. Click the Copy icon. The API key will be copied to your system clipboard, and the following dialog will display.
    1. notion image
 
  1. Immediately save the key in a safe location, like a secrets manager or a password manager. After you navigate away from the API Keys page, you will not be able to access or copy any API keys again.
    1. Only users with Super Admin role are able to access API keys after they have been created and the page is exited.
  1. Super Admin users can copy any active or expired API key by clicking the copy icon in the API key’s “Actions” column.

Models

notion image
 
notion image
 

Proxy Configuration (PAC)

notion image

Download Scripts

notion image

SIEM Integrations

notion image

Connection Settings

Choose your SIEM Platform from the drop-down. Current choices include: Cribl, Crowdstrike, Exabeam, Google Secops, Splunk, Sumo Logic, Other (HEC), & Other (Bearer Token).
Fill in all the data fields for your SIEM Platform.
The most common required fields include:
URL: Enter the endpoint into the URL field.
Authentication Token.
Sync Frequency: Enter the number of records you want to be sent per synchronization.
Splunk requires a Splunk Index. The index must be created before configuring Splunk as your SIEM.
Google SecOps: The URL must include the following query parameters:
  • Key: Your Google SecOps API key
  • Secret: Your SecOps API secret
Example: https://your-instance.googleapis.com/v1/endpoint?key=my-secops-key&secret=my-secops-secret

SIEM Data Integration

Choose one radio button to forward Prompts & Alerts or Alerts Only to your SIEM.
Additional data options:
Check any boxes next to your desired data and formats listed.
Include Audit Logs to send Audit Logs to your SIEM. Documentation here.
JSON Lines Format: Documentation here.
Include Sanitized Prompt: This will send the redacted version of prompts to your SIEM. Documentation here.
Include Raw Prompt and Response: This will send the original version of prompts and responses, that include sensitive data to your SIEM. Documentation here.
Include LLM Response: Choosing this option
Click Save.

Exabeam Additional Details

The Exabeam Webhook Cloud Collector documentation is here.
Enter your preferred URL based on your Region. The Exabeam list of Regions for Cloud Collectors is here.

Splunk Additional Details

The Splunk steps are near-identical to the steps for Exabeam. The Splunk HTTP Event Collector (HEC) documentation is here.