Quick Start Guide¶
Get your first alert triaged in under 5 minutes.
Prerequisites¶
- An active Parapet Security account (sign up here)
- Access to your SIEM's webhook configuration
- (Optional) Slack workspace for notifications
Step 1: Create Your Account¶
- Go to app.parapetsecurity.com/signup
- Enter your email and create a password
- Verify your email address
Step 2: Select Your Region¶
During onboarding, you'll be asked to select your data region:
- Data stored in US East (Virginia)
- Webhook endpoint:
webhook-us.parapetsecurity.com - Best for: US, Canada, Latin America
- Data stored in EU West (Ireland)
- Webhook endpoint:
webhook-eu.parapetsecurity.com - Best for: EU, UK, Middle East, Africa
- GDPR compliant data residency
Region Selection is Permanent
Your data region cannot be changed after account creation. Choose carefully based on your compliance requirements.
Step 3: Choose Your Plan¶
Select a subscription plan during onboarding:
| Plan | Monthly Alerts | Price |
|---|---|---|
| Starter | 1,000 | $99/month |
| Professional | 5,000 | $199/month |
| Team | 20,000 | $299/month |
All plans include:
- AI-powered alert triage
- Slack and email notifications
- Full dashboard access
- 30-day alert history
Step 4: Get Your Webhook URL¶
After completing checkout, you'll be directed to set up your SIEM connection.
- Navigate to Settings → Service Tokens
- Click Generate New Token
-
Copy your unique webhook URL:
Keep this URL secret
Your webhook URL contains your tenant identifier. Treat it like a password and don't share it publicly.
Step 5: Configure Your SIEM¶
Choose your SIEM platform and follow the specific guide:
-
Wazuh
-
Elastic SIEM
-
CrowdStrike
-
Microsoft Sentinel
-
Splunk
Step 6: Verify Connection¶
- Trigger a test alert in your SIEM (or wait for a real one)
- Check your Parapet dashboard - the alert should appear within 30 seconds
- Review the AI triage analysis
You're all set!
Once you see your first alert in the dashboard, you're ready to configure notifications.
What Happens When an Alert Arrives?¶
sequenceDiagram
participant SIEM
participant Webhook as Parapet Webhook
participant AI as AI Engine
participant Dashboard
participant Slack
SIEM->>Webhook: POST alert payload
Webhook->>Webhook: Validate & scrub secrets
Webhook->>AI: Normalize alert
AI->>AI: Triage & score
AI->>Dashboard: Store triaged alert
alt Critical/High Severity
AI->>Slack: Send notification
end - Your SIEM sends an alert via webhook
- Parapet validates the request and scrubs any secrets/credentials
- AI normalizes the alert to a standard format (works with any SIEM)
- AI triages the alert with severity scoring and recommendations
- Dashboard updates with the new alert
- Notifications sent (if configured and above threshold)
Next Steps¶
- Understanding Your First Alert - Learn what the AI triage means
- Configure Slack Notifications - Get real-time alerts
- Dashboard Guide - Master the alert management interface