Skip to content

Integrations

Extend Argus by connecting external services to enrich device data and enhance security insights.

Integrations Overview

Available Integrations

  • UniFi Network


    Import device data from Ubiquiti UniFi Controller

    • WiFi info (SSID, signal, channel)
    • Traffic statistics
    • Switch port mapping

    Configure UniFi

  • Pi-hole


    Enrich devices with DNS query data

    • DNS queries per device
    • Blocked domains tracking
    • DNS risk scoring

    Configure Pi-hole

  • AdGuard Home


    DNS filtering and query analytics

    • DNS queries per device
    • Blocked domains tracking
    • Suspicious domain detection

    Configure AdGuard

  • CVE Database


    Match services against known vulnerabilities

    • CVE matching for services
    • CVSS severity scores
    • Remediation guidance

    Configure CVE

How Integrations Work

flowchart LR
    subgraph External["External Services"]
        U[UniFi Controller]
        P[Pi-hole]
        A[AdGuard Home]
        N[NVD Database]
    end

    subgraph Argus["Argus"]
        I[Integration Engine]
        D[Device Data]
    end

    U -->|WiFi & Traffic| I
    P -->|DNS Queries| I
    A -->|DNS Queries| I
    N -->|CVE Data| I
    I -->|Enrichment| D

Accessing Integrations

Navigate to Settings External Integrations Manage Integrations to view and configure all available integrations.

Sync on Scan

Enable Sync on Scan for each integration to automatically fetch the latest data during network scans.

Integration Status

Each integration shows its current status:

Status Description
Active Integration enabled and configured
Inactive Integration disabled or not configured
Syncing Currently fetching data

DNS Risk Scoring

Both Pi-hole and AdGuard integrations calculate a DNS Risk Score (0-100) based on device behavior:

Factor Impact
High blocked percentage (>50%) +30 points
Suspicious domains detected +10 points each
Very high query volume +10 points
Known malware domains +20 points
Suspicious Domain Detection

Argus flags domains that match patterns commonly used by malware:

  • Random-looking subdomains (high entropy)
  • Known malicious TLDs
  • Cryptocurrency mining pools
  • Command & control patterns