Get Started →
🔌Data Sources

Connect Your Security Stack

Lattice pulls network flows and asset data from your existing security tools. Configure once, and flows are enriched with full context automatically.

Azure
Azure
SentinelOne
SentinelOne
Dragos
Dragos
Tenable
Tenable
Active Directory
Active Directory

Supported Data Sources

Azure

Firewall logs

Ingest firewall logs from Palo Alto and FortiGate via Firewall logs workspace. Query traffic_CL or CommonSecurityLog tables.

Source IPDest IPPortProtocolBytes
SentinelOne

SentinelOne

Cache agent data to resolve IP addresses to hostnames. Query endpoint details including OS version and last seen time.

HostnameIP AddressOSAgent Version
Dragos

Dragos Platform

Import OT site coordinates for map visualization. Sync asset data from industrial sensors.

Site NameLat/LongOT AssetsOnline Status
Tenable

Tenable

Import vulnerability scan results and asset inventories. Correlate with flow data for risk assessment.

AssetsVulnerabilitiesCVSS Scores
Active Directory

Active Directory

LDAPS queries to resolve hostnames to computer objects. Get AD group memberships and user details.

Computer NameOSGroupsDescription

How to Connect

1

Configure Credentials

Add API keys, tenant IDs, and connection strings in the Settings → Sources page.

2

Run Initial Import

Execute import scripts to pull historical data into SurrealDB.

3

Schedule Syncs

Set up cron jobs or scheduled tasks for continuous data ingestion.

4

Start Analyzing

Open NetMap or Flow Review to explore your enriched network data.

Ready to Connect Your Tools?

Deploy Lattice and start integrating your security stack today.

Learn More →