{"version":1,"pages":[{"id":"9j0lqno0s2FmVvyQKBth","title":"Overview","pathname":"/perimeters-documentation","siteSpaceId":"sitesp_YoSNP","description":"","breadcrumbs":[{"label":"Getting Started","emoji":"2728"}]},{"id":"qOfyr6oVCNvr8KIpnRhd","title":"Quick Start","pathname":"/perimeters-documentation/getting-started/quick-start","siteSpaceId":"sitesp_YoSNP","description":"","breadcrumbs":[{"label":"Getting Started","emoji":"2728"}]},{"id":"2fMnPejGTKdEPeA5UfTb","title":"First Login","pathname":"/perimeters-documentation/getting-started/quick-start/first-login","siteSpaceId":"sitesp_YoSNP","description":"","breadcrumbs":[{"label":"Getting Started","emoji":"2728"},{"label":"Quick Start"}]},{"id":"jlw5eMsGcvE5fmdLP7CU","title":"Connecting things up","pathname":"/perimeters-documentation/getting-started/quick-start/connecting-things-up","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Getting Started","emoji":"2728"},{"label":"Quick Start"}]},{"id":"qS5DLDE78ocodigTFrCS","title":"Prioritize IdP Integration","pathname":"/perimeters-documentation/getting-started/quick-start/connecting-things-up/prioritize-idp-integration","siteSpaceId":"sitesp_YoSNP","description":"","breadcrumbs":[{"label":"Getting Started","emoji":"2728"},{"label":"Quick Start"},{"label":"Connecting things up"}]},{"id":"6uyH29dPUcUvCOTW3jkE","title":"Integrating Response & Automation Applications","pathname":"/perimeters-documentation/getting-started/quick-start/connecting-things-up/integrating-response-and-automation-applications","siteSpaceId":"sitesp_YoSNP","description":"","breadcrumbs":[{"label":"Getting Started","emoji":"2728"},{"label":"Quick Start"},{"label":"Connecting things up"}]},{"id":"cMapV8xInAR4CJusSarh","title":"Following Compliance Frameworks","pathname":"/perimeters-documentation/getting-started/quick-start/connecting-things-up/following-compliance-frameworks","siteSpaceId":"sitesp_YoSNP","description":"","breadcrumbs":[{"label":"Getting Started","emoji":"2728"},{"label":"Quick Start"},{"label":"Connecting things up"}]},{"id":"cKbF9BKlzxFAEH8JUZGF","title":"MSP Management","pathname":"/perimeters-documentation/getting-started/quick-start/msp-management","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Getting Started","emoji":"2728"},{"label":"Quick Start"}]},{"id":"kluVGwMJM76ce3DhkNH9","title":"Onboarding Child Organizations","pathname":"/perimeters-documentation/getting-started/quick-start/msp-management/onboarding-child-organizations","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Getting Started","emoji":"2728"},{"label":"Quick Start"},{"label":"MSP Management"}]},{"id":"ZRM4H4vgiUWBUwkpTgdn","title":"Managing Tenant","pathname":"/perimeters-documentation/getting-started/quick-start/msp-management/managing-tenant","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Getting Started","emoji":"2728"},{"label":"Quick Start"},{"label":"MSP Management"}]},{"id":"JR2CiexMVIXQXwEGELUp","title":"Access Control","pathname":"/perimeters-documentation/getting-started/quick-start/msp-management/access-control","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Getting Started","emoji":"2728"},{"label":"Quick Start"},{"label":"MSP Management"}]},{"id":"AVZWnWCOXTFo3hRqzz1G","title":"Extend your Coverage","pathname":"/perimeters-documentation/getting-started/quick-start/extend-your-coverage","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Getting Started","emoji":"2728"},{"label":"Quick Start"}]},{"id":"lMzM1GjkokaYt5ExqqyM","title":"Integrate Additional SaaS Services","pathname":"/perimeters-documentation/getting-started/quick-start/extend-your-coverage/integrate-additional-saas-services","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Getting Started","emoji":"2728"},{"label":"Quick Start"},{"label":"Extend your Coverage"}]},{"id":"3xb9qauNZT7gO66i17cy","title":"Integrate Supported Shadow Applications","pathname":"/perimeters-documentation/getting-started/quick-start/extend-your-coverage/integrate-supported-shadow-applications","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Getting Started","emoji":"2728"},{"label":"Quick Start"},{"label":"Extend your Coverage"}]},{"id":"L3egHQj1sjUqGqZIVbjH","title":"Close Some Issues","pathname":"/perimeters-documentation/getting-started/quick-start/extend-your-coverage/close-some-issues","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Getting Started","emoji":"2728"},{"label":"Quick Start"},{"label":"Extend your Coverage"}]},{"id":"QtOCGVRrIWTpPcfAkQAQ","title":"Making the most of Perimeters","pathname":"/perimeters-documentation/getting-started/making-the-most-of-perimeters","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Getting Started","emoji":"2728"}]},{"id":"zEm4EuSC7ZVk0dCSfSMp","title":"Security Insights","pathname":"/perimeters-documentation/security-insights/security-insights","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"}]},{"id":"2Rr4IeU40LEcRgpNcU65","title":"Dashboard","pathname":"/perimeters-documentation/security-insights/security-insights/dashboard","siteSpaceId":"sitesp_YoSNP","description":"","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"}]},{"id":"Ve608tEaSuBklUGikHuH","title":"Inventory","pathname":"/perimeters-documentation/security-insights/security-insights/inventory","siteSpaceId":"sitesp_YoSNP","description":"","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"}]},{"id":"Dv1ZjECvnHUEj3z8eIhl","title":"Applications","pathname":"/perimeters-documentation/security-insights/security-insights/inventory/applications","siteSpaceId":"sitesp_YoSNP","icon":"table-cells-large","description":"","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"},{"label":"Inventory"}]},{"id":"wWVSk0l6l0Ri8pqrXSt5","title":"Users","pathname":"/perimeters-documentation/security-insights/security-insights/inventory/users","siteSpaceId":"sitesp_YoSNP","icon":"user-group","description":"","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"},{"label":"Inventory"}]},{"id":"H9KKMpMDBs2vcn1QCxKn","title":"Shadow Applications","pathname":"/perimeters-documentation/security-insights/security-insights/inventory/shadow-applications","siteSpaceId":"sitesp_YoSNP","icon":"circle-nodes","description":"","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"},{"label":"Inventory"}]},{"id":"vfYJ0W9Cp2A4NMllgyzz","title":"Shared Data","pathname":"/perimeters-documentation/security-insights/security-insights/inventory/shared-data","siteSpaceId":"sitesp_YoSNP","icon":"file-spreadsheet","description":"","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"},{"label":"Inventory"}]},{"id":"w7W7RgJMeZjkEOUJLki5","title":"Issues","pathname":"/perimeters-documentation/security-insights/security-insights/issues","siteSpaceId":"sitesp_YoSNP","description":"","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"}]},{"id":"PQ51hAxsTk24Kfv9NkOc","title":"Use Case Issues","pathname":"/perimeters-documentation/security-insights/security-insights/issues/use-case-issues","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"},{"label":"Issues"}]},{"id":"2l1HNa25MoZ1MrqrETD5","title":"Threats","pathname":"/perimeters-documentation/security-insights/security-insights/threats","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"}]},{"id":"LyRCEfFy1dHzim3EejV2","title":"Rules","pathname":"/perimeters-documentation/security-insights/security-insights/threats/rules","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"},{"label":"Threats"}]},{"id":"JEmpt7I89WmNUXVdyY07","title":"Activity","pathname":"/perimeters-documentation/security-insights/security-insights/threats/activity","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"},{"label":"Threats"}]},{"id":"vKLEokRqSdcSPFzjc8k8","title":"Settings","pathname":"/perimeters-documentation/security-insights/security-insights/settings","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"}]},{"id":"bM2fMX5SDpPpXZBr9G0M","title":"Domain Management","pathname":"/perimeters-documentation/security-insights/security-insights/settings/domain-management","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"},{"label":"Settings"}]},{"id":"9WcLH3wELGXPZl37T2VV","title":"Identity Management","pathname":"/perimeters-documentation/security-insights/security-insights/settings/identity-management","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"},{"label":"Settings"}]},{"id":"9k273xusEJNYhgaiusvP","title":"Reports","pathname":"/perimeters-documentation/security-insights/security-insights/settings/reports","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"},{"label":"Settings"}]},{"id":"KQQsjP2N7Fi3uSotc32k","title":"Action Templates","pathname":"/perimeters-documentation/security-insights/security-insights/settings/action-templates","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"},{"label":"Settings"}]},{"id":"h3YTZ6psJqDykwWnetOQ","title":"Application Logs","pathname":"/perimeters-documentation/security-insights/security-insights/settings/application-logs","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"},{"label":"Settings"}]},{"id":"worefzc1HJhTzg89yak0","title":"Bulk Operations","pathname":"/perimeters-documentation/security-insights/security-insights/settings/bulk-operations","siteSpaceId":"sitesp_YoSNP","description":"The Bulk Operations page in the Organization Settings section allows you to monitor ongoing and past bulk actions initiated in your organization.","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"},{"label":"Settings"}]},{"id":"WUePU2RDeitlxzBXdKqU","title":"Compliance","pathname":"/perimeters-documentation/security-insights/security-insights/compliance","siteSpaceId":"sitesp_YoSNP","description":"","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"}]},{"id":"rsjT0W8pxakUjV4WSUBI","title":"Single Framework","pathname":"/perimeters-documentation/security-insights/security-insights/compliance/single-framework","siteSpaceId":"sitesp_YoSNP","description":"","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"},{"label":"Compliance"}]},{"id":"M7R0HNSj6pRbeBB6eDKO","title":"Account Settings","pathname":"/perimeters-documentation/security-insights/security-insights/account-settings","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"}]},{"id":"2Sadw4FFNP6Tba3d5uUN","title":"Setting up Okta OIDC -OpenID Connect SSO","pathname":"/perimeters-documentation/security-insights/security-insights/account-settings/setting-up-okta-oidc-openid-connect-sso","siteSpaceId":"sitesp_YoSNP","description":"Perform the following steps to allow users signin via Okta. This is a two step process which requires setup in Okta and Perimeters application.","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"},{"label":"Account Settings"}]},{"id":"k9NGS5gzE1F3vpRYOdVq","title":"Switching Organization","pathname":"/perimeters-documentation/security-insights/security-insights/account-settings/switching-organization","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Security Insights","emoji":"1f6aa"},{"label":"Security Insights"},{"label":"Account Settings"}]},{"id":"MATtp9hzH9Q8Qrj5eYQF","title":"General Instructions","pathname":"/perimeters-documentation/connecting-perimeters/general-instructions","siteSpaceId":"sitesp_YoSNP","description":"Description of the process, purpose, and types of integrations (including list of available integrations)","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"}]},{"id":"LtarE7jlwp4AHHiEts14","title":"Integrations for Security Insights","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"}]},{"id":"XcYt4fHsOmwzU2K3hxY7","title":"SaaS Applications","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications","siteSpaceId":"sitesp_YoSNP","description":"Below you can find the list to the SaaS services you can integrate with Perimeters. Follow the link to each application to view the integration details and instructions.","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"}]},{"id":"oszvB4vDhxosaQqxDqzw","title":"Atlassian Guard (Previously Access)","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/atlassian-guard-previously-access","siteSpaceId":"sitesp_YoSNP","description":"Atlassian Access Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"LYFqabvIMghjOh1vNMtT","title":"Bitbucket","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/bitbucket","siteSpaceId":"sitesp_YoSNP","description":"Bitbucket Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"0KUe8D8AMNdyR4MF3ooD","title":"BambooHR","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/bamboohr","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"oulVt2ws8mNIUsW5Pqbb","title":"Cisco Duo","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/cisco-duo","siteSpaceId":"sitesp_YoSNP","description":"Cisco Duo Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"S5C9VzwRbnHUhRtNO0mq","title":"Confluence","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/confluence","siteSpaceId":"sitesp_YoSNP","description":"Confluence Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"ZiPvvDqnUnARo1tTYxOr","title":"Custom Integration","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/custom-integration","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"1Ghzha3DpykD0iwSinLp","title":"Datadog","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/datadog","siteSpaceId":"sitesp_YoSNP","description":"Datadog Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"ZmSM6hoVNsBDtSzWyHqc","title":"DocuSign","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/docusign","siteSpaceId":"sitesp_YoSNP","description":"DocuSign Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"NjDTcGfcKAifBmLPRjkZ","title":"Dropbox","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/dropbox","siteSpaceId":"sitesp_YoSNP","description":"Dropbox Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"UkuBkKxT1cieeU1TRy9v","title":"EntraID","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/entraid","siteSpaceId":"sitesp_YoSNP","description":"EntraID Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"EDEgSz1RjjcXujwvc7Lx","title":"GitHub","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/github","siteSpaceId":"sitesp_YoSNP","description":"GitHub Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"76OaOBq5oBzZB7crOQ8A","title":"Google Workspace (G Suite)","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/google-workspace-g-suite","siteSpaceId":"sitesp_YoSNP","description":"Google Workspace Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"lCZVFnZmYIl2FskL6Ey8","title":"Hubspot","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/hubspot","siteSpaceId":"sitesp_YoSNP","description":"Hubspot Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"BMG6PX0oYCrvyQ2QM8Q6","title":"Intune","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/intune","siteSpaceId":"sitesp_YoSNP","description":"Intune Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"p3bKWrri0c4HVfKHZOfD","title":"Jamf","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/jamf","siteSpaceId":"sitesp_YoSNP","description":"Jamf Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"iGUkgo7AdgWI8gh144Lc","title":"Jira Software","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/jira-software","siteSpaceId":"sitesp_YoSNP","description":"Jira Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"v91xZb4CkbCgHcu0wgFJ","title":"Microsoft 365","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/microsoft-365","siteSpaceId":"sitesp_YoSNP","description":"Microsoft 365 Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"5dgrxxgW3aOFZR395HKi","title":"Monday","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/monday","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"BpRSVGMRrdD5Rqn7B4dL","title":"MongoDB (Atlas Mongo)","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/mongodb-atlas-mongo","siteSpaceId":"sitesp_YoSNP","description":"MongoDB Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"k1DDq2KbGjoO3FSj83EQ","title":"Okta","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/okta","siteSpaceId":"sitesp_YoSNP","description":"Okta Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"qGEwvvstmTUjqtJ3zaf3","title":"OneLogin","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/onelogin","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"LgMxuhr7vvmvqR8hvt8n","title":"OpenAI","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/openai","siteSpaceId":"sitesp_YoSNP","description":"OpenAI Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"wrCJDnnk3wX21bNmx9Mv","title":"Salesforce","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/salesforce","siteSpaceId":"sitesp_YoSNP","description":"Salesforce Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"Ke6fPfPNK8qiaIwnpSN4","title":"Sentry","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/sentry","siteSpaceId":"sitesp_YoSNP","description":"Sentry Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"57ykGWOVNbraquvcLOsj","title":"ServiceNow","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/servicenow","siteSpaceId":"sitesp_YoSNP","description":"ServiceNow Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"iWMYvdHujAjtHayzrwvQ","title":"SharePoint","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/sharepoint","siteSpaceId":"sitesp_YoSNP","description":"SharePoint Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"tp3BrWUXGYUXW45bcuRd","title":"Slack","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/slack","siteSpaceId":"sitesp_YoSNP","description":"Slack Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"jqYgiSLMWWP9jgIrn57k","title":"Teams","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/teams","siteSpaceId":"sitesp_YoSNP","description":"Teams Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"18jTkjyOFnr8MQhHoH01","title":"Trello","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/trello","siteSpaceId":"sitesp_YoSNP","description":"Trello Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"7sGnLEpmAQBEeyy9CLxI","title":"Zendesk","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/zendesk","siteSpaceId":"sitesp_YoSNP","description":"Zendesk Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"Hzif1dPG79bPGRf2XnSe","title":"Zoom","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/saas-applications/zoom","siteSpaceId":"sitesp_YoSNP","description":"Zoom Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"SaaS Applications"}]},{"id":"TYEk5JtDDQsgC2EdKJeK","title":"MSP Specific Applications","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/msp-specific-applications","siteSpaceId":"sitesp_YoSNP","description":"Below you can find the list to the MSP specific applications you can integrate with Perimeters. Follow the link to each application to view the integration details and instructions.","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"}]},{"id":"bQzukiBTrnWzGhekq6aW","title":"ConnectWise PSA","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/msp-specific-applications/connectwise-psa","siteSpaceId":"sitesp_YoSNP","description":"ConnectWise PSA Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"MSP Specific Applications"}]},{"id":"ig1q79TKJqtEUMOITp3u","title":"HaloPSA","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/msp-specific-applications/halopsa","siteSpaceId":"sitesp_YoSNP","description":"HaloPSA Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"MSP Specific Applications"}]},{"id":"YDzqlSDkfDuj6Snrokr6","title":"Autotask","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/msp-specific-applications/autotask","siteSpaceId":"sitesp_YoSNP","description":"Autotask Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"MSP Specific Applications"}]},{"id":"E4EgGQN4nE7nyMzJqITR","title":"N-Central","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/msp-specific-applications/n-central","siteSpaceId":"sitesp_YoSNP","description":"N-Central Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"MSP Specific Applications"}]},{"id":"YJqMXPR5dec1XpWiSj2R","title":"Cloud Applications","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/cloud-applications","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"}]},{"id":"9XFNCxNgVAITLeDX410W","title":"AWS IAM","pathname":"/perimeters-documentation/connecting-perimeters/integrations-for-security-insights/cloud-applications/aws-iam","siteSpaceId":"sitesp_YoSNP","description":"","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Integrations for Security Insights"},{"label":"Cloud Applications"}]},{"id":"wQ3BZ1YS95Ehlv8djDxL","title":"Response & Automation","pathname":"/perimeters-documentation/connecting-perimeters/response-and-automation","siteSpaceId":"sitesp_YoSNP","description":"Describes the general idea of integrating applications to manage their configuration","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"}]},{"id":"kxBnsnZxd615Xlr8vO2B","title":"Email","pathname":"/perimeters-documentation/connecting-perimeters/response-and-automation/email","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Response & Automation"}]},{"id":"wji8nomWacJxyBVhnNnr","title":"custom Email","pathname":"/perimeters-documentation/connecting-perimeters/response-and-automation/email/custom-email","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Response & Automation"},{"label":"Email"}]},{"id":"hsKLidiDvWPI9Rqf3hx2","title":"eMail","pathname":"/perimeters-documentation/connecting-perimeters/response-and-automation/email/email","siteSpaceId":"sitesp_YoSNP","description":"eMail Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Response & Automation"},{"label":"Email"}]},{"id":"4pImzmjH3UOGPFxo4WrL","title":"Ticketing for SaaS","pathname":"/perimeters-documentation/connecting-perimeters/response-and-automation/ticketing-for-saas","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Response & Automation"}]},{"id":"MPd1m6BVKQ6ydp7iIWUg","title":"Jira Software","pathname":"/perimeters-documentation/connecting-perimeters/response-and-automation/ticketing-for-saas/jira-software","siteSpaceId":"sitesp_YoSNP","description":"Jira Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Response & Automation"},{"label":"Ticketing for SaaS"}]},{"id":"tgwLfVGR78NCWBBjdfbn","title":"Zendesk","pathname":"/perimeters-documentation/connecting-perimeters/response-and-automation/ticketing-for-saas/zendesk","siteSpaceId":"sitesp_YoSNP","description":"Zendesk integration as a Response and Automation allows you to create support tickets.","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Response & Automation"},{"label":"Ticketing for SaaS"}]},{"id":"7U4mYx4lNpCuI9nxmfeM","title":"PSA","pathname":"/perimeters-documentation/connecting-perimeters/response-and-automation/psa","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Response & Automation"}]},{"id":"fiEL2rnR3buIUmaaM3Cl","title":"HaloPSA","pathname":"/perimeters-documentation/connecting-perimeters/response-and-automation/psa/halopsa","siteSpaceId":"sitesp_YoSNP","description":"HaloPSA Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Response & Automation"},{"label":"PSA"}]},{"id":"j7F4v92Lsn59VYoUqHmH","title":"ConnectWise PSA","pathname":"/perimeters-documentation/connecting-perimeters/response-and-automation/psa/connectwise-psa","siteSpaceId":"sitesp_YoSNP","description":"ConnectWise PSA Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Response & Automation"},{"label":"PSA"}]},{"id":"QfKnFAxjl6QRKF36IZpl","title":"Workflow Actions","pathname":"/perimeters-documentation/connecting-perimeters/response-and-automation/workflow-actions","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Response & Automation"}]},{"id":"d9QUqvdIpanE6sSCnXUf","title":"Slack","pathname":"/perimeters-documentation/connecting-perimeters/response-and-automation/workflow-actions/slack","siteSpaceId":"sitesp_YoSNP","description":"Slack Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Response & Automation"},{"label":"Workflow Actions"}]},{"id":"aKE4J2NHgX8RQSU1Cjgm","title":"Webhook","pathname":"/perimeters-documentation/connecting-perimeters/response-and-automation/workflow-actions/webhook","siteSpaceId":"sitesp_YoSNP","description":"Webhook Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Response & Automation"},{"label":"Workflow Actions"}]},{"id":"cZ6PYokJWcUFhnFeJB2z","title":"Other","pathname":"/perimeters-documentation/connecting-perimeters/response-and-automation/other","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Response & Automation"}]},{"id":"l4vRGQNgz8KrC6LimcMn","title":"Splunk","pathname":"/perimeters-documentation/connecting-perimeters/response-and-automation/other/splunk","siteSpaceId":"sitesp_YoSNP","description":"Splunk Integration Guide","breadcrumbs":[{"label":"Connecting Perimeters","emoji":"1faa2"},{"label":"Response & Automation"},{"label":"Other"}]},{"id":"WpLAjxMgXhxdDluUdZZJ","title":"Release Notes","pathname":"/perimeters-documentation/release-notes","siteSpaceId":"sitesp_YoSNP"},{"id":"f6HmrMuGsSfIxf0DGXtv","title":"Release Details","pathname":"/perimeters-documentation/release-notes/release-details","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Release Notes"}]},{"id":"38WnQp1zMXfg67PHFA9P","title":"Glossary","pathname":"/perimeters-documentation/additional/glossary","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Additional"}]},{"id":"YLtwcjYfWu9V7Gm6Xbd2","title":"FAQ","pathname":"/perimeters-documentation/additional/faq","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Additional"}]},{"id":"t5qzglAbTzyCqOl9zRTU","title":"Support","pathname":"/perimeters-documentation/additional/support","siteSpaceId":"sitesp_YoSNP","breadcrumbs":[{"label":"Additional"}]}]}