Integrations

Connect Wardex to the tools you already run.

Alerts, cases and telemetry flow in and out of Wardex over well-documented protocols. Every built-in connector is configured from the admin console under Settings → Integrations.

Alerting & chat

Get paged where you work

Slack

Built-in

Route alerts, case updates and runbook prompts to channels or DMs via incoming webhook.

Microsoft Teams

Built-in

Incoming-webhook adapter with Adaptive Card formatting.

PagerDuty

Built-in

Events API v2 with dedup keys per case ID.

Opsgenie

Planned

Events API with priority mapping from severity.

Webhook (generic)

Built-in

Signed JSON POST with retries, suitable for any receiver.

SMTP

Built-in

Email alerts and weekly digests with TLS.

Ticketing & case management

Keep the ticket of record honest

Jira

Built-in

Create/update issues with bidirectional state sync and custom-field mapping.

ServiceNow

Built-in

Table API connector for Security Incident Response.

GitHub Issues

Built-in

For small teams running internal tracking in GitHub.

Linear

Planned

GraphQL mutations with project/team mapping.

SIEM & log pipelines

Fan telemetry out to your SIEM

Splunk HEC

Built-in

HTTP Event Collector sink with batching and backpressure.

Elastic

Built-in

Bulk API sink with ECS-mapped field names.

Syslog (RFC 5424)

Built-in

TLS and UDP transports, CEF and raw JSON payloads.

OpenTelemetry OTLP

Built-in

Export traces, metrics and logs to any OTLP receiver.

Kafka

Planned

Native producer with SASL/SCRAM and TLS.

S3 / object-store

Planned

Cold archival of events and case artifacts with compression.

Integration Guide

Document the operating model, not just the logo.

Every connector needs explicit auth, payload ownership, and retry behavior. Treat the integration as part of the incident path, not a decorative add-on.

Authentication & Secret Handling

Store credentials in the integration config only long enough to test delivery, then rotate into the secret source you actually operate with.

  • Prefer scoped API tokens over user passwords
  • Record token owner and rotation window
  • Run a dry test after every secret change

Delivery, Retry, and Audit Trail

Wardex connectors retry transient failures, keep dedup keys stable where the downstream API supports them, and write the integration attempt into the audit surface.

  • PagerDuty dedups on case ID
  • Webhook and HEC sinks use backoff rather than blind loops
  • Keep a failure mailbox for sinks that are business-critical

Field Mapping Rules

Decide once how severity, ownership, MITRE references, asset identity, and case URLs map into the downstream system, then keep that mapping stable across releases.

  • Map Wardex severity to downstream priority explicitly
  • Carry case ID and endpoint ID through every payload
  • Include the Wardex URL so the external system links back cleanly

Setup Walkthrough

How to bring a connector online safely.

The goal is predictable delivery and predictable rollback. This is the shortest path that still leaves an audit trail.

01

Define the owner

Assign the person or team that owns the downstream endpoint, token, and escalation path before you paste credentials into the admin console.

02

Map severity and routing

Choose which severities send immediately, which cases create tickets, and whether the connector should mirror alerts, cases, or both.

03

Dry-run a known sample

Send a single controlled event or case update first. Validate the payload shape, timestamp formatting, and backlink into Wardex before enabling wide fan-out.

04

Document fallback behavior

Decide what operators do if the connector is down: retry later, fall back to email, or continue case work only inside Wardex until the sink recovers.

Generic Webhook Example

Signed JSON payloads are the safest default when the downstream system has a custom receiver.

{ "case_id": "CASE-1042", "severity": "high", "status": "triage", "title": "Suspicious shell spawned from Office", "endpoint_id": "macbook-sec-17", "rule": "office-child-process", "mitre": ["T1204", "T1059"], "wardex_url": "https://console.example/cases/CASE-1042" }

Syslog / SIEM Payload Notes

When forwarding to syslog or a SIEM collector, keep the normalized case identifiers and timestamps intact so correlation stays deterministic.

<134>1 2026-04-21T14:22:09Z wardex control-plane - - - event.kind=alert event.id=CASE-1042 severity=high endpoint.id=macbook-sec-17 rule=office-child-process wardex.url=https://console.example/cases/CASE-1042

Reference docs: Pair this page with the SIEM runbook, the OpenAPI contract, and the SDK guide when you build or debug a connector.

Identity & SSO

Plug into your IdP

OIDC (generic)

Built-in

Works with Okta, Entra ID, Google Workspace, Authentik, Keycloak.

SAML 2.0

Planned

Enterprise federation for Azure AD / ADFS / PingFederate.

SCIM 2.0

Planned

Automated user and group provisioning.

Threat intel

Enrich with your feeds

MISP

Built-in

Pull indicators via REST and auto-attach to matching events.

TAXII 2.1

Planned

Pull STIX feeds from any TAXII server (DHS AIS, OTX, commercial).

VirusTotal

Built-in

Hash and URL enrichment with per-tenant API keys.

AbuseIPDB

Built-in

IP reputation for external connections.

Missing a connector?

The integration layer is a stable Rust trait. Email the support mailbox with the downstream system, auth model, payload expectations, and urgency, or open a PR if you already know the implementation shape.