diff --git a/docs/integrations/microsoft-azure/microsoft-defender-for-cloud.md b/docs/integrations/microsoft-azure/microsoft-defender-for-cloud.md
new file mode 100644
index 0000000000..57a74e4234
--- /dev/null
+++ b/docs/integrations/microsoft-azure/microsoft-defender-for-cloud.md
@@ -0,0 +1,399 @@
+---
+id: microsoft-defender-for-cloud
+title: Microsoft Defender for Cloud
+description: Learn about the Sumo Logic collection process for the Microsoft Defender for Cloud service.
+---
+
+import useBaseUrl from '@docusaurus/useBaseUrl';
+
+
+
+The Sumo Logic app for Microsoft Defender for Cloud is a powerful solution designed to provide Azure cloud security analysts with actionable insights into their cloud security posture. By integrating with Microsoft Defender for Cloud, this app delivers advanced monitoring, alerting, and compliance tracking capabilities through purpose-built dashboards tailored to meet the needs of security teams.
+
+Key features of the Microsoft Defender for Cloud app include:
+
+- Gain real-time visibility into security alerts across your Azure environment, categorized by severity (High, Medium, Low, and Informational).
+- Monitor trends in alert activity over time to identify spikes and recurring threats.
+- Geolocate alerts to identify suspicious activities from embargoed or high-risk regions.
+- Leverage detailed alert summaries and remediation steps for effective threat mitigation.
+- Address vulnerabilities proactively by monitoring security recommendations grouped by risk levels (High, Medium, and Low).
+- Visualize trends in recommendation volumes and focus on affected resources, such as Virtual Machines, Apps, and Containers.
+- Analyze threats by categories like data exfiltration, unauthorized access, and account breaches.
+- Follow step-by-step remediation plans to resolve high-priority risks and strengthen your overall security posture.
+- Track compliance performance across critical standards, including FedRAMP, PCI DSS 4, CIS Azure Foundations, and Microsoft Cloud Security Benchmark.
+- Understand pass, fail, and skip rates for specific compliance controls.
+- Identify areas requiring immediate action to ensure regulatory adherence for your Azure resources.
+
+:::info
+This app includes [built-in monitors](#microsoft-defender-for-cloud-monitors). For details on creating custom monitors, refer to [Create monitors for Microsoft Defender for Cloud app](#create-monitors-for-microsoft-defender-for-cloud-app).
+:::
+
+## Log types
+
+The Microsoft Defender for Cloud app uses the following logs:
+
+* [Alerts](https://learn.microsoft.com/en-us/azure/defender-for-cloud/managing-and-responding-alerts)
+* [Security recommendations](https://learn.microsoft.com/en-us/azure/defender-for-cloud/review-security-recommendations)
+* [Regulatory compliance](https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-regulatory-compliance-standards)
+
+## Collection configuration
+
+To forward Microsoft Defender events to Sumo Logic, you can set up an efficient pipeline: **Microsoft Defender** > **Event Hub** > **Sumo Logic (Hosted Collector)**. This setup ensures that security events from Microsoft Defender are seamlessly ingested into Sumo Logic for monitoring and analysis.
+
+1. **[Create a Sumo Logic Azure Event Hub Source](/docs/send-data/collect-from-other-data-sources/azure-monitoring/ms-azure-event-hubs-source/)**. Configure an Event Hub source to receive events from the Azure platform. This will act as the endpoint for the data pipeline.
+1. **[Set up continuous export in Azure](https://learn.microsoft.com/en-us/azure/defender-for-cloud/continuous-export)**. Within the Azure portal, configure the Microsoft Defender for Cloud to export its security events to the Event Hub instance created in the previous step. Continuous export ensures that the events such as alerts, recommendations, and regulatory compliance updates are forwarded in near real-time as shown below.
+
+## Sample log messages
+
+
+Alerts
+
+```json
+{
+ "VendorName": "Microsoft",
+ "AlertType": "K8S_AdmissionController",
+ "ProductName": "Microsoft Defender for Cloud",
+ "StartTimeUtc": "2024-11-20T08:32:12.950321Z",
+ "EndTimeUtc": "2024-11-20T08:32:12.950321Z",
+ "TimeGenerated": "2024-11-20T09:19:16.485Z",
+ "ProcessingEndTime": "2024-11-20T09:19:16.5381698Z",
+ "Severity": "Informational",
+ "Status": "New",
+ "ProviderAlertStatus": null,
+ "ConfidenceLevel": null,
+ "ConfidenceScore": 0.0,
+ "ConfidenceReasons": null,
+ "IsIncident": false,
+ "SystemAlertId": "57963b4b-3cb0-dc3a-16ed-f1e216311809",
+ "CorrelationKey": null,
+ "Intent": "Persistence, CredentialAccess",
+ "AzureResourceId": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/qek8dm0-azure-k8stest/providers/Microsoft.ContainerService/managedClusters/k8s--295-aks1-28-otc-dev-v4",
+ "WorkspaceId": null,
+ "WorkspaceSubscriptionId": null,
+ "WorkspaceResourceGroup": "",
+ "AgentId": "",
+ "CompromisedEntity": "k8s--295-aks1-28-otc-dev-v4",
+ "AlertDisplayName": "Creation of admission webhook configuration detected",
+ "Description": "Kubernetes audit log analysis detected a new admission webhook configuration. Kubernetes has two built-in generic admission controllers: MutatingAdmissionWebhook and ValidatingAdmissionWebhook. The behavior of these admission controllers is determined by an admission webhook that the user deploys to the cluster. The usage of such admission controllers can be legitimate, however attackers can use such webhooks for modifying the requests (in case of MutatingAdmissionWebhook) or inspecting the requests and gain sensitive information (in case of ValidatingAdmissionWebhook).",
+ "Entities": [
+ {
+ "$id": "4",
+ "CloudResource": {
+ "$id": "5",
+ "ResourceId": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/qek8dm0-azure-k8stest/providers/Microsoft.ContainerService/managedClusters/k8s--295-aks1-28-otc-dev-v4",
+ "ResourceType": "Kubernetes Service",
+ "ResourceName": "k8s--295-aks1-28-otc-dev-v4",
+ "Metadata": {
+ "IsGraphCenter": true
+ },
+ "Asset": true,
+ "Type": "azure-resource"
+ },
+ "Asset": false,
+ "Type": "K8s-cluster"
+ },
+ {
+ "$ref": "5"
+ }
+ ],
+ "ExtendedLinks": null,
+ "RemediationSteps": [
+ "Review the admission controller webhook associated with this configuration. The details of the webhook configuration can be retrieved by the command:\nkubectl get mutatingwebhookconfigurations sumo1732091427516-opentelemetry-operator-mutation -o json\nIf this configuration belongs to a legitimate admission controller in the cluster, you can ignore the alert."
+ ],
+ "ExtendedProperties": {
+ "Resource type": "mutatingwebhookconfigurations",
+ "Resource name": "sumo1732091427516-opentelemetry-operator-mutation",
+ "Webhook configuration rules": "[{\"apiGroups\":[\"\"],\"resources\":[\"pods\"],\"operations\":[\"CREATE\"],\"apiVersions\":[\"v1\"],\"scope\":\"Namespaced\"}]",
+ "resourceType": "Kubernetes Service",
+ "EffectiveAzureResourceId": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/qek8dm0-azure-k8stest/providers/Microsoft.ContainerService/managedClusters/k8s--295-aks1-28-otc-dev-v4",
+ "CompromisedEntity": "k8s--295-aks1-28-otc-dev-v4",
+ "ProductComponentName": "Containers",
+ "EffectiveSubscriptionId": "1111111-1111-1111-111-11111111"
+ },
+ "ResourceIdentifiers": [
+ {
+ "$id": "2",
+ "AzureResourceId": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/qek8dm0-azure-k8stest/providers/Microsoft.ContainerService/managedClusters/k8s--295-aks1-28-otc-dev-v4",
+ "Type": "AzureResource",
+ "AzureResourceTenantId": "a39bedba-be8f-4c0f-bfe2-b8c7913501ea"
+ },
+ {
+ "$id": "3",
+ "AadTenantId": "a39bedba-be8f-4c0f-bfe2-b8c7913501ea",
+ "Type": "AAD"
+ }
+ ],
+ "AlertUri": "https://portal.azure.com/#blade/Microsoft_Azure_Security_AzureDefenderForData/AlertBlade/alertId/57963b4b-3cb0-dc3a-16ed-f1e216311809/subscriptionId/1111111-1111-1111-111-11111111/resourceGroup/qek8dm0-azure-k8stest/referencedFrom/alertDeepLink/location/centralus"
+}
+```
+
+
+
+Security recommendation
+
+```json
+{
+ "assessmentEventDataEnrichment": {
+ "action": "Insert",
+ "apiVersion": "2019-01-01",
+ "isSnapshot": false
+ },
+ "securityEventDataEnrichment": {
+ "action": "Insert",
+ "apiVersion": "2019-01-01",
+ "isSnapshot": false
+ },
+ "tenantId": "a39bedba-be8f-4c0f-bfe2-b8c7913501ea",
+ "type": "Microsoft.Security/assessments",
+ "kind": null,
+ "location": null,
+ "id": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/AppServiceEnvV3_group/providers/Microsoft.Compute/virtualMachines/ase-ext-test/providers/Microsoft.Security/assessments/1f655fb7-63ca-4980-91a3-56dbc2b715c6",
+ "name": "1f655fb7-63ca-4980-91a3-56dbc2b715c6",
+ "tags": null,
+ "properties": {
+ "resourceDetails": {
+ "source": "Azure",
+ "id": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/AppServiceEnvV3_group/providers/Microsoft.Compute/virtualMachines/ase-ext-test",
+ "resourceName": "ase-ext-test",
+ "resourceType": "virtualMachines",
+ "resourceProvider": "Microsoft.Compute",
+ "nativeResourceId": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/AppServiceEnvV3_group/providers/Microsoft.Compute/virtualMachines/ase-ext-test"
+ },
+ "displayName": "Vulnerabilities in security configuration on your Linux machines should be remediated (powered by Guest Configuration)",
+ "status": {
+ "code": "NotApplicable",
+ "cause": "UnsupportedPricingPlan",
+ "description": "The subscription is not onboarded to Servers Plan 2 offering",
+ "statusChangeDate": "2024-11-20T10:51:36.3376828Z",
+ "firstEvaluationDate": "2024-11-20T10:51:36.3376828Z"
+ },
+ "additionalData": {
+ "subAssessmentsLink": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/AppServiceEnvV3_group/providers/Microsoft.Compute/virtualMachines/ase-ext-test/providers/Microsoft.Security/assessments/1f655fb7-63ca-4980-91a3-56dbc2b715c6/subAssessments"
+ },
+ "metadata": {
+ "displayName": "Vulnerabilities in security configuration on your Linux machines should be remediated (powered by Guest Configuration)",
+ "assessmentType": "BuiltIn",
+ "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/fc9b3da7-8347-4380-8e70-0a0361d8dedd",
+ "description": "Remediate vulnerabilities in security configuration on your Linux machines to protect them from attacks.",
+ "remediationDescription": "1. Select any of the findings below.
2. On the right pane opened, follow the instructions under 'Remediation' if exist.",
+ "categories": [
+ "Compute"
+ ],
+ "severity": "Low",
+ "userImpact": "Moderate",
+ "implementationEffort": "Moderate",
+ "threats": [
+ "DataExfiltration",
+ "DataSpillage",
+ "AccountBreach"
+ ]
+ },
+ "links": {
+ "azurePortal": "portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/1f655fb7-63ca-4980-91a3-56dbc2b715c6/resourceId/%2fsubscriptions%2f1111111-1111-1111-111-11111111%2fresourceGroups%2fAppServiceEnvV3_group%2fproviders%2fMicrosoft.Compute%2fvirtualMachines%2fase-ext-test"
+ }
+ }
+}
+```
+
+
+
+
+Regulatory compliance
+
+```json
+{
+ "securityEventDataEnrichment": {
+ "action": "Write",
+ "apiVersion": "2019-01-01-preview",
+ "isSnapshot": false,
+ "interval": "00:00:00"
+ },
+ "id": "/subscriptions/1111111-1111-1111-111-11111111/providers/Microsoft.Security/regulatoryComplianceStandards/Microsoft-cloud-security-benchmark/regulatoryComplianceControls/LT.2/regulatoryComplianceAssessments/56a83a6e-c417-42ec-b567-1e6fcb3d09a9",
+ "name": "56a83a6e-c417-42ec-b567-1e6fcb3d09a9",
+ "type": "Microsoft.Security/regulatoryComplianceStandards/regulatoryComplianceControls/regulatoryComplianceAssessments",
+ "properties": {
+ "description": "Azure Kubernetes Service clusters should have Defender profile enabled",
+ "state": "Failed",
+ "scope": "Subscription",
+ "passedResources": 1,
+ "failedResources": 1,
+ "skippedResources": 0,
+ "assessmentType": "AssessmentResult",
+ "assessmentDetailsLink": "https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/56a83a6e-c417-42ec-b567-1e6fcb3d09a9/initiativeId/Microsoft-cloud-security-benchmark"
+ }
+}
+```
+
+
+## Sample queries
+
+```sql title="Alerts"
+_sourceCategory=azure/defender SystemAlertId
+| json field=_raw "SystemAlertId" as alert_id
+| dedup alert_id
+| json field=_raw "ExtendedProperties.EffectiveSubscriptionId" as subscription_id
+| json "AlertUri", "ExtendedProperties", "RemediationSteps", "Entities", "Description", "AlertDisplayName", "CompromisedEntity", "AzureResourceId", "Status", "Severity", "ProcessingEndTime", "ProductName", "AlertType", "VendorName" as alert_url,alert_properties, alert_investigation_steps, alert_entities, alert_description, alert_name, alert_compromised_entity, alert_resource_id, alert_status, alert_severity, alert_created_time, alert_product_name, alert_type, alert_vendor_name nodrop
+| json field=alert_properties "resourceType" as affected_resource_type nodrop
+| json field=alert_properties "CompromisedEntity" as affected_resource nodrop
+
+| tourl(AlertUri,alert_name) as alert_name
+| replace(alert_investigation_steps,"[\"", "" ) as alert_investigation_steps
+| replace(alert_investigation_steps,"\"]", "" ) as alert_investigation_steps
+| replace(alert_investigation_steps,"\",\"", "\n" ) as alert_investigation_steps
+| replace (alert_investigation_steps, "
", "\n") as alert_investigation_steps
+| replace (alert_investigation_steps, /\d\./, "\n --") as alert_investigation_steps
+| replace (alert_investigation_steps, "", "") as alert_investigation_steps
+| replace(alert_investigation_steps,"\\n", "\n" ) as next_steps
+| replace(next_steps,"\\u2022", "\n --" ) as next_steps
+
+
+| count by alert_created_time, alert_name, alert_description, alert_type, alert_product_name, alert_severity,alert_status, affected_resource_type, affected_resource,next_steps
+
+| fields - _count
+```
+
+```sql title="Security Recommendation"
+_sourceCategory=azure/defender "Microsoft.Security/assessments"
+| where type = "Microsoft.Security/assessments"
+| json field=_raw "id"
+| parse regex field=id "assessments\/(?
.+)"
+
+| dedup by recommendation_id
+| json "securityEventDataEnrichment", "tenantId", "location", "properties" as security_event_data_enrichment, tenant_id, location, properties
+| json field=properties "links.azurePortal" , "metadata.threats", "metadata.implementationEffort", "metadata.userImpact", "metadata.severity", "metadata.categories", "metadata.remediationDescription", "metadata.description", "metadata.policyDefinitionId", "metadata.assessmentType", "metadata.displayName" ,"status.firstEvaluationDate" as azure_portal_link, threats,implementation_effort, user_impact,severity, categories,remediation_description, description, policy_definitionId, assessment_type, display_name, recommendation_eval_date nodrop
+| replace(categories,"[\"", "" ) as categories
+| replace(categories,"\"]", "" ) as categories
+| replace(threats,"[", "" ) as threats
+| replace(threats,"]", "" ) as threats
+| replace(threats,"\"", "" ) as threats
+| replace(threats,"," ,"\n" ) as threats
+
+| replace(recommendation_eval_date,/(\.\d+Z)/, "") as recommendation_eval_date
+| replace(recommendation_eval_date,"T", " ") as date
+
+| if (contains(azure_portal_link, "https://"), azure_portal_link, concat("https://", azure_portal_link )) as link
+| if (isNull(display_name), "NA", display_name ) as display_name
+| tourl(link,display_name) as recommendation
+| json field=properties "resourceDetails.resourceType" as affected_resource_type
+| json field=properties "resourceDetails.resourceName" as affected_resource_name
+
+
+| replace (remediation_description, "
", "\n") as remediation_description
+| replace (remediation_description, /\d\./, "\n --") as remediation_description
+| replace (remediation_description, "", "") as next_steps
+| count by date, tenant_id, recommendation , severity, threats, categories ,affected_resource_type, affected_resource_name, next_steps
+
+| fields - _count
+```
+
+```sql title="Regulatory compliance"
+_sourceCategory=azure/defender "Microsoft.Security/regulatoryComplianceStandards/regulatoryComplianceControls/regulatoryComplianceAssessments"
+| json "properties.assessmentDetailsLink", "securityEventDataEnrichment.isSnapshot", "name" as assesment_link, is_snapshot, id
+| dedup by id
+| where type = "Microsoft.Security/regulatoryComplianceStandards/regulatoryComplianceControls/regulatoryComplianceAssessments"
+| where is_snapshot = "false"
+| parse regex field=assesment_link "initiativeId\/(?.+)"
+| json "properties.assessmentType", "properties.skippedResources", "properties.failedResources", "properties.passedResources", "properties.scope", "properties.state", "properties.description" as assessment_type, skipped_resources, failed_resources, passed_resources, scope, state, description
+| tourl (assesment_link,description ) as compliance
+
+| json field=_raw "id" as subscription_id
+| parse regex field=subscription_id "subscriptions\/(?.+)\/providers"
+
+// Global filters
+| where subscription_id matches "*"
+| where compliance_type matches "*"
+| where state matches "*"
+| where compliance_type matches "Microsoft-cloud-security-benchmark*"
+| count by compliance, compliance_type,state, passed_resources, failed_resources, skipped_resources
+| fields - _count
+```
+
+## Installing the Microsoft Defender for Cloud app
+
+import AppInstall from '../../reuse/apps/app-install.md';
+
+
+
+## Viewing the Microsoft Defender for Cloud app
+
+import ViewDashboards from '../../reuse/apps/view-dashboards.md';
+
+
+
+### Alerts
+
+The **Microsoft Defender for Cloud - Alerts** dashboard provides a centralized view for monitoring high-priority security alerts across Azure resources. It categorizes alerts by severity, emphasizing high and critical alerts to help analysts prioritize threats. A time trend chart highlights alert volumes over recent days, providing insight into unusual activity or potential incidents. The geographical map pinpoints the locations of alerts, identifying potential threats from high-risk regions or embargoed countries.
+
+An affected resources table lists impacted Azure services, such as virtual machines and storage accounts, to assess the scope of incidents. The dashboard also summarizes frequent alert types, enabling recognition of recurring issues like privilege escalation or malware detections. A top action plan provides recommended steps for addressing severe alerts, helping analysts respond swiftly and effectively. Lastly, an alert summary offers detailed descriptions of recent high-severity events, supporting deeper investigation and remediation efforts. This dashboard equips security teams with the insights needed to protect their Azure environment from emerging threats.
+
+
+
+### Regulatory Compliance
+
+The **Microsoft Defender for Cloud - Regulatory Compliance** dashboard provides Azure security analysts with a comprehensive view of their organization's compliance status across key regulatory standards. It highlights overall compliance pass percentages for frameworks such as FedRAMP, CIS Azure Foundations, PCI DSS 4, and Microsoft Cloud Security Benchmark. Analysts can easily monitor adherence levels and quickly identify gaps in compliance through visually engaging summaries.
+
+The dashboard offers detailed breakdowns of passed, failed, and skipped controls for each framework, helping analysts pinpoint specific areas requiring remediation. For FedRAMP compliance, it provides insights into government workload readiness, while for PCI DSS 4, it focuses on safeguarding payment-related data. The CIS Azure Foundations section ensures alignment with security best practices, and the Microsoft Cloud Security Benchmark highlights adherence to recommended Azure configurations.
+
+This dashboard empowers teams to prioritize remediation efforts, track progress over time, and strengthen their cloud security posture. With actionable insights and a focus on simplifying regulatory alignment, the dashboard is an essential resource for achieving and maintaining compliance in Azure environments.
+
+
+
+### Security Recommendations
+
+The **Microsoft Defender for Cloud - Security Recommendations** dashboard helps Azure cloud security analysts identify, prioritize, and address security risks across Azure resources. It provides a clear breakdown of recommendations by risk level (High, Medium, and Low) to ensure focus on critical issues. Analysts can track recommendation trends over time to monitor recurring or escalating vulnerabilities.
+
+The dashboard highlights affected resources, such as Virtual Machines, Storage Accounts, and Apps, allowing quick action on impacted areas. It categorizes recommendations by threats, including data exfiltration, unauthorized access, and account breaches, helping teams understand attack patterns. Analysts can also view recommendations by resource type, such as Compute, Networking, or Containers, for efficient resource-specific remediation.
+
+Detailed remediation steps are included in the Top Action Plans, providing clear guidance for resolving high-risk vulnerabilities. This dashboard empowers security teams to proactively secure their Azure environment, streamline remediation workflows, and maintain compliance with organizational security goals.
+
+
+
+## Create monitors for Microsoft Defender for Cloud app
+
+import CreateMonitors from '../../reuse/apps/create-monitors.md';
+
+
+
+### Microsoft Defender for Cloud monitors
+
+| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition |
+|:--|:--|:--|:--|
+| `Alert from Embargoed Countries` | This alert is triggered when activities or access attempts are detected from countries or regions under embargo or subject to restrictions. It highlights potential geopolitical risks or unauthorized access attempts from flagged locations. | Critical | Count > 0 |
+| `Critical Alert` | This is a high-priority alert that is triggered when a serious issue or threat is detected within your Azure environment. These alerts often correspond to malicious activities, severe configuration vulnerabilities, or critical system failures requiring immediate attention. | Critical | Count > 0|
+| `Critical Security Recommendation` | This alert is triggered when a high-risk vulnerability or misconfiguration is detected in your Azure resources. It provides actionable insights for strengthening your cloud security posture. | Critical | Count > 0 |
+
+## Troubleshooting
+
+### Verify Event Hub data flow
+
+If your configured Event Hub instance is not successfully sending data to Sumo Logic. Follow the below steps to troubleshoot the issue:
+
+1. Navigate to the **Event Hub Instance Blade** in the Azure portal and select the **Data Explorer (preview)** tab to send sample events.
+1. In the **Data Explorer (preview)** page, click **Send event** and preview the sample events.
+1. Verify if those events are being sent to the [Sumo Logic by Live Tailing](/docs/search/live-tail/about-live-tail/). If the data matches, then the Event Hub instance will successfully send data to Sumo Logic.
+
+### Validate alerts at Event Hub
+
+If you are not receiving any alerts from the Microsoft Defender to the Event Hub instance, first make sure that the generated sample alerts are received in your configured Event Hub instance. This ensures the connection between Defender and Event Hub is functioning correctly. To test the pipeline by sending sample alerts from Microsoft Defender, follow the below steps:
+
+1. In the **Microsoft Defender** console, select **Security Alerts** under **General** section.
+1. In the **Security Alerts** page, select the **Sample Alerts** tab.
+1. Click on **Create sample alerts** to receive the sample alerts. This validates that the sample alerts are forwarded to the configured Event Hub instance.
+
+
+
+:::info
+There may be a delay in forwarding alerts from Microsoft Defender to the Event Hub instance. If you experience significant delays, reach out to Azure Support for assistance.
+:::
+
+## Upgrade/Downgrade the Microsoft Defender for Cloud app (Optional)
+
+import AppUpdate from '../../reuse/apps/app-update.md';
+
+
+
+## Uninstalling the Microsoft Defender for Cloud app (Optional)
+
+import AppUninstall from '../../reuse/apps/app-uninstall.md';
+
+
\ No newline at end of file
diff --git a/docs/integrations/product-list/product-list-a-l.md b/docs/integrations/product-list/product-list-a-l.md
index 554f2ee01d..e6569dc858 100644
--- a/docs/integrations/product-list/product-list-a-l.md
+++ b/docs/integrations/product-list/product-list-a-l.md
@@ -237,7 +237,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
| | [Forcepoint Web Security](https://www.forcepoint.com/) | Automation integration: [Forcepoint Web Security](/docs/platform-services/automation-service/app-central/integrations/forcepoint-web-security/)
Cloud SIEM integration: [Forcepoint](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/d87adcd6-ae92-4195-9a13-f111175b4e57.md) |
| | [Forescout eyeSight](https://www.forescout.com/products/eyesight/) | Automation integration: [Forescout eyeSight](/docs/platform-services/automation-service/app-central/integrations/forescout-eyesight/) |
| | [Fortinet](https://www.fortinet.com/products/next-generation-firewall) | Automation integrations:
- [FortiAnalyzer](/docs/platform-services/automation-service/app-central/integrations/fortianalyzer/)
- [FortiGate](/docs/platform-services/automation-service/app-central/integrations/fortigate/)
- [FortiMail](/docs/platform-services/automation-service/app-central/integrations/fortimail/)
- [FortiProxy](/docs/platform-services/automation-service/app-central/integrations/fortiproxy/)
- [FortiSandbox](/docs/platform-services/automation-service/app-central/integrations/fortisandbox/)
- [FortiSIEM](/docs/platform-services/automation-service/app-central/integrations/fortisiem/)
- [FortiWeb V2](/docs/platform-services/automation-service/app-central/integrations/fortiweb-v2/)
- [FortiWeb](/docs/platform-services/automation-service/app-central/integrations/fortiweb/)
Cloud SIEM integration: [Fortinet](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/fb9941c5-6624-4175-af84-9e8127134889.md)
Collector: [Fortigate Firewall - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/fortigate-firewall/)
Community app: [Sumo Logic for Fortinet Fortigate Firewall](https://github.com/SumoLogic/sumologic-content/tree/master/Fortinet/Fortigate_Firewall) |
-| | [Fortra](https://www.phishlabs.com/) | Automation integrations:
- [PhishLabs DRP](/docs/platform-services/automation-service/app-central/integrations/phishlabs-drp/)
- [PhishLabs EIR - Incident Data](/docs/platform-services/automation-service/app-central/integrations/phishlabs-eir-incident-data/)
- [PhishLabs EIR - IOC Feed](/docs/platform-services/automation-service/app-central/integrations/phishlabs-eir-ioc-feed/)
Cloud SIEM integration: [Digital Guardian](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/c10788a1-0da8-483c-b87a-e6351984fab5.md)
Collector: [Digital Guardian Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/digital-guardian-source/) |
+| | [Fortra](https://www.phishlabs.com/) | App:
- [Digital Guardian ARC](/docs/integrations/saas-cloud/digital-guardian-arc/)
Automation integrations:
- [PhishLabs DRP](/docs/platform-services/automation-service/app-central/integrations/phishlabs-drp/)
- [PhishLabs EIR - Incident Data](/docs/platform-services/automation-service/app-central/integrations/phishlabs-eir-incident-data/)
- [PhishLabs EIR - IOC Feed](/docs/platform-services/automation-service/app-central/integrations/phishlabs-eir-ioc-feed/)
Cloud SIEM integration: [Digital Guardian](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/c10788a1-0da8-483c-b87a-e6351984fab5.md)
Collector: [Digital Guardian Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/digital-guardian-source/) |
| | [Freshworks](https://www.freshworks.com/) | Automation integrations:
- [FreshDesk](/docs/platform-services/automation-service/app-central/integrations/freshdesk/)
- [Freshservice](/docs/platform-services/automation-service/app-central/integrations/freshservice/) |
## G
diff --git a/docs/integrations/product-list/product-list-m-z.md b/docs/integrations/product-list/product-list-m-z.md
index d11fe3f7a1..7a2054042c 100644
--- a/docs/integrations/product-list/product-list-m-z.md
+++ b/docs/integrations/product-list/product-list-m-z.md
@@ -25,7 +25,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
| | [MaxMind](https://www.maxmind.com/en/home) | Automation integration: [MaxMind V2](/docs/platform-services/automation-service/app-central/integrations/maxmind-v2/) |
| | [McAfee](https://www.mcafee.com/) | Automation integrations:
- [McAfee ATD](/docs/platform-services/automation-service/app-central/integrations/mcafee-atd/)
- [McAfee ESM](/docs/platform-services/automation-service/app-central/integrations/mcafee-esm/)
- [McAfee MVISION](/docs/platform-services/automation-service/app-central/integrations/mcafee-mvision/)
- [McAfee Network Security Platform Manager (NSM)](/docs/platform-services/automation-service/app-central/integrations/mcafee-network-security-platform-manager-nsm/)
- [McAfee Web Gateway](/docs/platform-services/automation-service/app-central/integrations/mcafee-web-gateway/)
Cloud SIEM integration: [McAfee](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/20dec895-f649-4959-9717-104fb68bb5b4.md) |
| | [Memcached](https://memcached.org/) | Apps:
- [Memcached](/docs/integrations/databases/memcached/)
- [Memcached - OpenTelemetry](/docs/integrations/databases/opentelemetry/memcached-opentelemetry/) |
-| | [Microsoft](https://www.microsoft.com/) | Apps:
- [Azure Active Directory](/docs/integrations/microsoft-azure/active-directory-azure/)
- [Microsoft Azure AD Inventory](/docs/integrations/saas-cloud/microsoft-azure-ad-inventory)
- [Microsoft Dynamics 365](/docs/integrations/microsoft-azure/microsoft-dynamics365-customer-insights/)
- [Microsoft Exchange Trace Logs](/docs/integrations/saas-cloud/microsoft-exchange-trace-logs/)
- [Microsoft Graph Azure AD Reporting](/docs/integrations/saas-cloud/microsoft-graph-azure-ad-reporting/)
- [Microsoft Graph Identity Protection](/docs/integrations/microsoft-azure/microsoft-graph-identity-protection/)
- [Microsoft Graph Security V1](/docs/integrations/saas-cloud/microsoft-graph-security-v1/)
- [Microsoft Graph Security V2](/docs/integrations/saas-cloud/microsoft-graph-security-v2/)
- [Microsoft Office 365](/docs/integrations/microsoft-azure/office-365/)
- [Microsoft SQL Server](/docs/integrations/microsoft-azure/sql-server/)
- [Microsoft SQL Server - OpenTelemetry](/docs/integrations/microsoft-azure/opentelemetry/sql-server-opentelemetry)
- [Microsoft SQL Server for Linux - OpenTelemetry](/docs/integrations/microsoft-azure/opentelemetry/sql-server-linux-opentelemetry)
- [Microsoft Teams](/docs/integrations/microsoft-azure/teams/)
Automation integrations:
- [Active Directory](/docs/platform-services/automation-service/app-central/integrations/active-directory/)
- [Active Directory v2](/docs/platform-services/automation-service/app-central/integrations/active-directory-v2/)
- [Microsoft 365 Defender](/docs/platform-services/automation-service/app-central/integrations/microsoft-365-defender/)
- [Microsoft Azure Log Analytics](/docs/platform-services/automation-service/app-central/integrations/microsoft-azure-log-analytics/)
- [Microsoft Azure Security Center](/docs/platform-services/automation-service/app-central/integrations/microsoft-azure-security-center/)
- [Microsoft Defender ATP](/docs/platform-services/automation-service/app-central/integrations/microsoft-defender-atp/)
- [Microsoft EWS](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews/)
- [Microsoft EWS Daemon](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews-daemon/)
- [Microsoft EWS Extension](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews-extension/)
- [Microsoft Graph Security](/docs/platform-services/automation-service/app-central/integrations/microsoft-graph-security/)
- [Microsoft OneDrive](/docs/platform-services/automation-service/app-central/integrations/microsoft-onedrive/)
- [Microsoft Sharepoint](/docs/platform-services/automation-service/app-central/integrations/microsoft-sharepoint/)
- [Microsoft Sentinel](/docs/platform-services/automation-service/app-central/integrations/microsoft-sentinel/)
- [MSSQL](/docs/platform-services/automation-service/app-central/integrations/mssql/)
- [Microsoft Teams](/docs/platform-services/automation-service/app-central/integrations/microsoft-teams/)
Cloud SIEM integration: [Microsoft](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/2b002817-fd14-49b3-a3fe-c9761275b931.md)
Collectors:
- [Active Directory JSON - Classic Collector](/docs/integrations/microsoft-azure/active-directory-json/)
- [Active Directory JSON - OpenTelemetry Collector](/docs/integrations/microsoft-azure/opentelemetry/active-directory-json-opentelemetry/)
- [Microsoft 365 Audit (Office 365 Audit) - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-audit-office/)
- [Microsoft Azure AD Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-azure-ad-inventory-source/)
- [Microsoft Exchange Trace Logs](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-exchange-trace-logs/)
- [Microsoft Office 365 Audit Source](/docs/send-data/hosted-collectors/microsoft-source/ms-office-audit-source/)
- [Microsoft Graph Azure AD Reporting Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-azure-ad-reporting-source/)
- [Microsoft Graph Identity Protection Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-identity-protection-source/)
- [Microsoft Graph Security API Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/)
- [Windows Active Directory Inventory Source](/docs/send-data/installed-collectors/sources/windows-active-directory-inventory-source/)
Community app: [Sumo Logic Microsoft Defender for EndPoint](https://github.com/SumoLogic/sumologic-content/tree/master/Microsoft/Defender_4_EndPoint)
Webhook: [Webhook Connection for Microsoft Teams](/docs/alerts/webhook-connections/microsoft-teams/) |
+| | [Microsoft](https://www.microsoft.com/) | Apps:
- [Azure Active Directory](/docs/integrations/microsoft-azure/active-directory-azure/)
- [Microsoft Azure AD Inventory](/docs/integrations/saas-cloud/microsoft-azure-ad-inventory)
- [Microsoft Defender for Cloud](/docs/integrations/microsoft-azure/microsoft-defender-for-cloud/)
- [Microsoft Dynamics 365](/docs/integrations/microsoft-azure/microsoft-dynamics365-customer-insights/)
- [Microsoft Exchange Trace Logs](/docs/integrations/saas-cloud/microsoft-exchange-trace-logs/)
- [Microsoft Graph Azure AD Reporting](/docs/integrations/saas-cloud/microsoft-graph-azure-ad-reporting/)
- [Microsoft Graph Identity Protection](/docs/integrations/microsoft-azure/microsoft-graph-identity-protection/)
- [Microsoft Graph Security V1](/docs/integrations/saas-cloud/microsoft-graph-security-v1/)
- [Microsoft Graph Security V2](/docs/integrations/saas-cloud/microsoft-graph-security-v2/)
- [Microsoft Office 365](/docs/integrations/microsoft-azure/office-365/)
- [Microsoft SQL Server](/docs/integrations/microsoft-azure/sql-server/)
- [Microsoft SQL Server - OpenTelemetry](/docs/integrations/microsoft-azure/opentelemetry/sql-server-opentelemetry)
- [Microsoft SQL Server for Linux - OpenTelemetry](/docs/integrations/microsoft-azure/opentelemetry/sql-server-linux-opentelemetry)
- [Microsoft Teams](/docs/integrations/microsoft-azure/teams/)
Automation integrations:
- [Active Directory](/docs/platform-services/automation-service/app-central/integrations/active-directory/)
- [Active Directory v2](/docs/platform-services/automation-service/app-central/integrations/active-directory-v2/)
- [Microsoft 365 Defender](/docs/platform-services/automation-service/app-central/integrations/microsoft-365-defender/)
- [Microsoft Azure Log Analytics](/docs/platform-services/automation-service/app-central/integrations/microsoft-azure-log-analytics/)
- [Microsoft Azure Security Center](/docs/platform-services/automation-service/app-central/integrations/microsoft-azure-security-center/)
- [Microsoft Defender ATP](/docs/platform-services/automation-service/app-central/integrations/microsoft-defender-atp/)
- [Microsoft EWS](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews/)
- [Microsoft EWS Daemon](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews-daemon/)
- [Microsoft EWS Extension](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews-extension/)
- [Microsoft Graph Security](/docs/platform-services/automation-service/app-central/integrations/microsoft-graph-security/)
- [Microsoft OneDrive](/docs/platform-services/automation-service/app-central/integrations/microsoft-onedrive/)
- [Microsoft Sharepoint](/docs/platform-services/automation-service/app-central/integrations/microsoft-sharepoint/)
- [Microsoft Sentinel](/docs/platform-services/automation-service/app-central/integrations/microsoft-sentinel/)
- [MSSQL](/docs/platform-services/automation-service/app-central/integrations/mssql/)
- [Microsoft Teams](/docs/platform-services/automation-service/app-central/integrations/microsoft-teams/)
Cloud SIEM integration: [Microsoft](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/2b002817-fd14-49b3-a3fe-c9761275b931.md)
Collectors:
- [Active Directory JSON - Classic Collector](/docs/integrations/microsoft-azure/active-directory-json/)
- [Active Directory JSON - OpenTelemetry Collector](/docs/integrations/microsoft-azure/opentelemetry/active-directory-json-opentelemetry/)
- [Microsoft 365 Audit (Office 365 Audit) - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-audit-office/)
- [Microsoft Azure AD Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-azure-ad-inventory-source/)
- [Microsoft Exchange Trace Logs](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-exchange-trace-logs/)
- [Microsoft Office 365 Audit Source](/docs/send-data/hosted-collectors/microsoft-source/ms-office-audit-source/)
- [Microsoft Graph Azure AD Reporting Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-azure-ad-reporting-source/)
- [Microsoft Graph Identity Protection Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-identity-protection-source/)
- [Microsoft Graph Security API Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/)
- [Windows Active Directory Inventory Source](/docs/send-data/installed-collectors/sources/windows-active-directory-inventory-source/)
Community app: [Sumo Logic Microsoft Defender for EndPoint](https://github.com/SumoLogic/sumologic-content/tree/master/Microsoft/Defender_4_EndPoint)
Webhook: [Webhook Connection for Microsoft Teams](/docs/alerts/webhook-connections/microsoft-teams/) |
| | [Mimecast](https://www.mimecast.com/) | App: [Mimecast](/docs/integrations/saas-cloud/mimecast/)
Automation integration: [Mimecast](/docs/platform-services/automation-service/app-central/integrations/mimecast/)
Cloud SIEM integration: [Mimecast](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/7BC43DFE-C5DD-4766-88E7-C163D82BBBF8.md)
Collector: [Mimecast Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/mimecast-source/)
Partner integration: [Mimecast app for Sumo Logic](https://github.com/SumoLogic/sumologic-public-partner-apps/tree/master/Mimecast) |
| | [Miro](https://miro.com/) | App: [Miro](/docs/integrations/saas-cloud/miro/)
Cloud SIEM integration: [Miro](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/9f149da1-2831-465f-8bb1-a5950ccaec0c.md)
Collector: [Miro Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/miro-source/) |
| | [MISP](https://www.misp-project.org/) | Automation integration: [MISP](/docs/platform-services/automation-service/app-central/integrations/misp/)
Community app: [Sumo Logic for MISP](https://github.com/SumoLogic/sumologic-content/tree/master/MISP) |
@@ -160,7 +160,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
| | [Strimzi](https://strimzi.io/) | App: [Strimzi Kafka](/docs/integrations/containers-orchestration/strimzi-kafka/) |
| | [Stripe](https://stripe.com/) | Webhook: [Stripe](/docs/integrations/webhooks/stripe/) |
| | [Sucuri](https://sucuri.net/) | Cloud SIEM integration: [Sucuri](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/cdfd2ba0-77eb-4e11-b071-6f4d01fda607.md) |
-| | [Sumo Logic](https://www.sumologic.com/) | Apps:
- [Enterprise Audit - Cloud SIEM](/docs/integrations/sumo-apps/cse/)
- [Sumo Logic Audit App](/docs/integrations/sumo-apps/audit/)
- [Sumo Logic Data Volume App](/docs/integrations/sumo-apps/data-volume/)
- [Sumo Logic Enterprise Audit Apps](/docs/integrations/sumo-apps/enterprise-audit/) (multiple apps)
- [Sumo Logic Enterprise Search Audit App](/docs/integrations/sumo-apps/enterprise-search-audit/)
- [Sumo Logic Infrequent Data Tier App](/docs/integrations/sumo-apps/infrequent-data-tier/)
- [Sumo Logic Log Analysis QuickStart App](/docs/integrations/sumo-apps/log-analysis-quickstart/)
- [Sumo Logic Security Analytics App](/docs/integrations/sumo-apps/security-analytics/)
Automation integrations:
- [Automation Tools](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-automation-tools/)
- [Basic Tools](/docs/platform-services/automation-service/app-central/integrations/basic-tools/)
- [ESMTP](/docs/platform-services/automation-service/app-central/integrations/esmtp/)
- [HTTP Tools](/docs/platform-services/automation-service/app-central/integrations/http-tools/)
- [Incident Tools](/docs/platform-services/automation-service/app-central/integrations/incident-tools/)
- [IMAP](/docs/platform-services/automation-service/app-central/integrations/imap/)
- [Mail Tools](/docs/platform-services/automation-service/app-central/integrations/mail-tools/)
- [POP3](/docs/platform-services/automation-service/app-central/integrations/pop3/)
- [SMTP V3](/docs/platform-services/automation-service/app-central/integrations/smtp-v3/)
- [Sumo Logic Cloud SIEM](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-cloud-siem/)
- [Sumo Logic Cloud SIEM Internal](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-cloud-siem-internal/)
- [Sumo Logic Log Analytics](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics/)
- [Sumo Logic Log Analytics Internal](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics-internal/)
- [Sumo Logic Notifications](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications/)
- [Sumo Logic Notifications by Gmail](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications-by-gmail/)
- [Triage Tools](/docs/platform-services/automation-service/app-central/integrations/triage-tools/)
- [ZIP Tools](/docs/platform-services/automation-service/app-central/integrations/zip-tools/)
Cloud SIEM integration: [Sumo Logic](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/34A5019C-7BEC-4BF8-A3B7-C38D567126C6.md)
Community app: [Cloud Security Posture Management (CSPM) for Sumo Logic](https://github.com/SumoLogic/sumologic-content/tree/master/CSPM) |
+| | [Sumo Logic](https://www.sumologic.com/) | Apps:
- [Enterprise Audit - Cloud SIEM](/docs/integrations/sumo-apps/cse/)
- [Sumo Logic Audit App](/docs/integrations/sumo-apps/audit/)
- [Sumo Logic Data Volume App](/docs/integrations/sumo-apps/data-volume/)
- [Sumo Logic Enterprise Audit Apps](/docs/integrations/sumo-apps/enterprise-audit/) (multiple apps)
- [Sumo Logic Enterprise Search Audit App](/docs/integrations/sumo-apps/enterprise-search-audit/)
- [Sumo Logic Infrequent Data Tier App](/docs/integrations/sumo-apps/infrequent-data-tier/)
- [Sumo Logic Log Analysis QuickStart App](/docs/integrations/sumo-apps/log-analysis-quickstart/)
- [Sumo Logic Security Analytics App](/docs/integrations/sumo-apps/security-analytics/)
Automation integrations:
- [Automation Tools](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-automation-tools/)
- [Basic Tools](/docs/platform-services/automation-service/app-central/integrations/basic-tools/)
- [ESMTP](/docs/platform-services/automation-service/app-central/integrations/esmtp/)
- [HTTP Tools](/docs/platform-services/automation-service/app-central/integrations/http-tools/)
- [Incident Tools](/docs/platform-services/automation-service/app-central/integrations/incident-tools/)
- [IMAP](/docs/platform-services/automation-service/app-central/integrations/imap/)
- [Mail Tools](/docs/platform-services/automation-service/app-central/integrations/mail-tools/)
- [POP3](/docs/platform-services/automation-service/app-central/integrations/pop3/)
- [SMTP V3](/docs/platform-services/automation-service/app-central/integrations/smtp-v3/)
- [Sumo Logic Cloud SIEM](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-cloud-siem/)
- [Sumo Logic Cloud SIEM Internal](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-cloud-siem-internal/)
- [Sumo Logic Log Analytics](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics/)
- [Sumo Logic Log Analytics Internal](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics-internal/)
- [Sumo Logic Notifications](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications/)
- [Sumo Logic Notifications by Gmail](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications-by-gmail/)
- [Triage Tools](/docs/platform-services/automation-service/app-central/integrations/triage-tools/)
- [ZIP Tools](/docs/platform-services/automation-service/app-central/integrations/zip-tools/)
Cloud SIEM integration: [Sumo Logic](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/34A5019C-7BEC-4BF8-A3B7-C38D567126C6.md)
Collector: [Universal Connector](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/universal-connector-source)
Community app: [Cloud Security Posture Management (CSPM) for Sumo Logic](https://github.com/SumoLogic/sumologic-content/tree/master/CSPM) |
| | [Superwise](https://superwise.ai/) | Webhook: [Superwise](/docs/integrations/webhooks/superwise/) |
| | [Symantec](https://sep.securitycloud.symantec.com/v2/landing) | App: [Symantec Web Security Service](/docs/integrations/saas-cloud/symantec-web-security-service/)
Automation integrations:
- [Javelin AD Protect](/docs/platform-services/automation-service/app-central/integrations/javelin-ad-protect/)
- [Symantec DeepSight](/docs/platform-services/automation-service/app-central/integrations/symantec-deepsight/)
- [Symantec EDR](/docs/platform-services/automation-service/app-central/integrations/symantec-edr/)
- [Symantec Endpoint Protection](/docs/platform-services/automation-service/app-central/integrations/symantec-endpoint-protection/)
- [Symantec Endpoint Protection Cloud](/docs/platform-services/automation-service/app-central/integrations/symantec-endpoint-protection-cloud/)
- [Symantec Secure Web Gateway (Bluecoat)](/docs/platform-services/automation-service/app-central/integrations/symantec-secure-web-gateway-bluecoat/)
- [Symantec WebPulse](/docs/platform-services/automation-service/app-central/integrations/symantec-webpulse/)
Collectors:
- [Symantec Endpoint Security Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-endpoint-security-source/)
- [Symantec Web Security Service Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-web-security-service-source/)
- [Symantec Proxy Secure Gateway - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/symantec-proxy-secure-gateway/)
- [Symantec Proxy Secure Gateway (Blue Coat Proxy) - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/symantec-proxy-secure-gateway-blue-coat-proxy/)
Cloud SIEM integration: [Symantec](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/64c7f49c-f95a-4f4a-8540-56ec5fb1d96b.md)
Community app: [Sumo Logic for Symantec WSS](https://github.com/SumoLogic/sumologic-content/tree/master/Symantec/WSS) |
| | [Sysdig](https://sysdig.com/) | Cloud SIEM integration: [Sysdig](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/c4de0854-e718-45e1-a4c8-63623755aa43.md) |
diff --git a/docs/integrations/saas-cloud/digital-guardian-arc.md b/docs/integrations/saas-cloud/digital-guardian-arc.md
new file mode 100644
index 0000000000..7a2d175908
--- /dev/null
+++ b/docs/integrations/saas-cloud/digital-guardian-arc.md
@@ -0,0 +1,379 @@
+---
+id: digital-guardian-arc
+title: Digital Guardian ARC
+sidebar_label: Digital Guardian ARC
+description: The Sumo Logic app for Digital Guardian ARC provides a comprehensive suite of dashboards and alerts to help security analysts monitor, detect, and respond to critical events within their data protection environment.
+---
+
+import useBaseUrl from '@docusaurus/useBaseUrl';
+
+
+
+The Sumo Logic app for Digital Guardian ARC provides a comprehensive suite of dashboards and alerts to help security analysts monitor, detect, and respond to critical events within their data protection environment. Designed to integrate seamlessly with Digital Guardian's Advanced Reporting and Analytics (ARC), this app offers actionable insights into endpoint activities, user behavior, and policy violations to enhance data security.
+
+Key features of the Digital Guardian ARC app include:
+
+- **Real-time activity monitoring**. Gain visibility into activities such as file creations, modifications, and deletions, categorized by operation type, file types accessed, and protocols used.
+- **Risk-based alerts**. Pre-configured alerts for blocked events, failed login attempts, and user activities originating from high-risk locations allow analysts to detect and respond to potential threats in real-time.
+- **Policy enforcement analytics**. The app provides insights into rule violation events, helping organizations monitor adherence to security policies and identify areas for improvement.
+- **User and host analysis**. Interactive charts display the top users, applications, and systems contributing to security events, helping analysts pinpoint risky behaviors or potential insider threats.
+- **Geolocation insights**. Visualize sender and recipient activities from high-risk or suspicious locations with geolocation maps, enabling targeted threat investigation and response.
+- **Signature issuer intelligence**. Monitor digital signatures for files and applications to ensure authenticity and detect any potential tampering or unauthorized software.
+
+Use cases for the Digital Guardian ARC app include:
+
+- **Identify unauthorized activities**. Detect and investigate unauthorized file access, data exfiltration attempts, or suspicious behavior within the environment.
+- **Enforce compliance**. Track and address violations of security rules to maintain regulatory compliance and internal policy adherence.
+- **Monitor risky user behavior**. Proactively address risky activities, such as failed logins or data transfers to/from suspicious locations.
+- **Accelerate incident response**. Leverage real-time alerts and detailed activity logs to respond to potential threats or breaches quickly.
+
+The Sumo Logic app for Digital Guardian ARC is an essential tool for security teams. It provides the visibility and intelligence needed to safeguard sensitive data, enforce security policies, and mitigate risks in real-time.
+
+:::info
+This app also includes [built-in monitors](#digital-guardian-arc-monitors). For details on creating custom monitors, refer to [Create monitors for Digital Guardian ARC app](#create-monitors-for-digital-guardian-arc-app).
+:::
+
+## Log types
+
+This app uses Sumo Logic’s [Digital Guardian ARC Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/digital-guardian-source/) to collect event logs from Digital Guardian ARC.
+
+### Sample log messages
+
+
+Event Log
+
+```json
+{
+ "ca_ct": "-",
+ "dev_bt": "-",
+ "dev_devclass": "-",
+ "dev_dt": "-",
+ "dev_friendlyname": "-",
+ "dev_prdid": "-",
+ "dev_prdname": "-",
+ "dev_rempolicy": "-",
+ "dev_sernum": "-",
+ "dev_suppredfail": "-",
+ "dev_vendor": "-",
+ "dev_vendorid": "-",
+ "dg_agent_version": "7.9.1.0126",
+ "dg_alert.alert_aid": "-",
+ "dg_alert.alert_al": "-",
+ "dg_alert.alert_at": "-",
+ "dg_alert.alert_bc": "-",
+ "dg_alert.alert_did": "-",
+ "dg_alert.alert_etl": "-",
+ "dg_alert.alert_ss": "-",
+ "dg_alert.alert_ur": "-",
+ "dg_alert.alert_wb": "-",
+ "dg_alert.dg_category": "-",
+ "dg_alert.dg_category_name": "-",
+ "dg_alert.dg_detection_source": "-",
+ "dg_alert.dg_name": "-",
+ "dg_alert.dg_policy.dg_category": "-",
+ "dg_alert.dg_policy.dg_category_name": "-",
+ "dg_alert.dg_policy.dg_name": "-",
+ "dg_alert.dg_policy.p_pn": "-",
+ "dg_alert.dg_policy.p_t": "-",
+ "dg_alert.dg_rule_action_type": "-",
+ "dg_alert.uad_medid": "-",
+ "dg_alert_survey_name": "-",
+ "dg_alert_survey_response": "-",
+ "dg_app_type": "-",
+ "dg_attachments.dg_file_size": "-",
+ "dg_attachments.dg_src_dir": "-",
+ "dg_attachments.dg_src_file_name": "-",
+ "dg_attachments.uad_br": "-",
+ "dg_attachments.uad_bw": "-",
+ "dg_attachments.uad_dvn": "-",
+ "dg_attachments.uad_sdt": "-",
+ "dg_attachments.uad_sea": "-",
+ "dg_attachments.uad_sfc": "-",
+ "dg_attachments.uad_sir": "-",
+ "dg_attachments.uad_sp": "-",
+ "dg_class.cad_pt": "-",
+ "dg_class.cad_tc": "2",
+ "dg_class.dg_category_name": "tag",
+ "dg_class.dg_ci": "cf69eedf-2135-4ef1-857d-19d0f8111584",
+ "dg_class.dg_ct": "Content Pattern",
+ "dg_class.dg_name": "custom_phonenumber",
+ "dg_class.dg_source_file": "Source File",
+ "dg_cn": "microsoft corporation",
+ "dg_custom_data.dg_name": "-",
+ "dg_custom_data.dg_scope": "-",
+ "dg_custom_data.dg_type": "-",
+ "dg_custom_data.dg_values": "-",
+ "dg_dh": "-",
+ "dg_display": "File Recycle",
+ "dg_doc_repo_type": "-",
+ "dg_dst_dev.dev_bt": "RAID",
+ "dg_dst_dev.dev_customid": "\"",
+ "dg_dst_dev.dev_devclass": "\"",
+ "dg_dst_dev.dev_dt": "Fixed",
+ "dg_dst_dev.dev_friendlyname": "sk hynix sc311 sata 256gb",
+ "dg_dst_dev.dev_prdid": "\"",
+ "dg_dst_dev.dev_prdname": "sk hynix sc311 sata 256gb",
+ "dg_dst_dev.dev_rempolicy": "Expect No Removal",
+ "dg_dst_dev.dev_sernum": "ms8an69151ca1av1u",
+ "dg_dst_dev.dev_suppredfail": "No",
+ "dg_dst_dev.dg_dh": "-",
+ "dg_dst_dir": "c:\\$recycle.bin\\s-1-5-21-1573680173-1931375354-1090983491-38523",
+ "dg_dst_file_ext": "pdf",
+ "dg_dst_file_name": "$r4ztwqq.pdf",
+ "dg_dyn_sev": "-",
+ "dg_ehc": "-",
+ "dg_erv": "-",
+ "dg_ewb": "-",
+ "dg_file_category": "-",
+ "dg_file_size": "36.0 KB",
+ "dg_fin": "explorer",
+ "dg_first": "True",
+ "dg_fon": "explorer.exe",
+ "dg_fv": "10.0.19041.4648 (winbuild.160101.0800)",
+ "dg_guid": "b1dc5a3b-5cf4-11ef-8780-1856806434ed",
+ "dg_hc": "No",
+ "dg_imagemd5": "-",
+ "dg_lc": "© microsoft corporation. all rights reserved.",
+ "dg_local_timestamp": "2024-08-17 06:59:18 PM",
+ "dg_mac_address": "00:FF:9A:E6:D1:B0",
+ "dg_machine_name": "sw\\J1ZC9T2",
+ "dg_machine_type": "Windows",
+ "dg_md5": "d264f62721590f14bc54344f48a05912",
+ "dg_mid": "f59f9f5b-2f5f-92a9-3d4b-f0f7edff4dc6",
+ "dg_parent_name": "userinit.exe",
+ "dg_pid": 16600,
+ "dg_pn": "microsoft® windows® operating system",
+ "dg_proc_dir": "c:\\windows",
+ "dg_proc_file_ext": "exe",
+ "dg_proc_file_name": "explorer.exe",
+ "dg_processed_time": 1723939890637,
+ "dg_provider": "-",
+ "dg_pv": "10.0.19041.4648",
+ "dg_recipients.dg_rec_email_domain": "-",
+ "dg_recipients.uad_dir": "-",
+ "dg_recipients.uad_mr": "-",
+ "dg_recipients.uad_sir": "-",
+ "dg_reg_op_type": "-",
+ "dg_rv": "-",
+ "dg_sensor_type": "-",
+ "dg_sha1": "79047B0448500CCEA28EFCEFA4ADF8C8B6FB1737",
+ "dg_sha256": "350570713E0A7E3733F59623F880A442E98979B29A8D59B95555625A38ED1054",
+ "dg_src_dev.dev_bt": "RAID",
+ "dg_src_dev.dev_customid": "\"",
+ "dg_src_dev.dev_devclass": "\"",
+ "dg_src_dev.dev_dt": "Fixed",
+ "dg_src_dev.dev_friendlyname": "sk hynix sc311 sata 256gb",
+ "dg_src_dev.dev_prdid": "\"",
+ "dg_src_dev.dev_prdname": "sk hynix sc311 sata 256gb",
+ "dg_src_dev.dev_rempolicy": "Expect No Removal",
+ "dg_src_dev.dev_sernum": "ms8an69151ca1av1u",
+ "dg_src_dev.dev_suppredfail": "No",
+ "dg_src_dev.dev_vendor": "\"",
+ "dg_src_dev.dg_dh": "-",
+ "dg_src_dir": "c:\\users\\eah915\\downloads",
+ "dg_src_file_ext": "pdf",
+ "dg_src_file_name": "eam quarterly security inspection template 12_7_2017 (2).pdf",
+ "dg_time": "2024-08-17 11:59:18 PM",
+ "dg_total_size": "-",
+ "dg_url_context_path": "-",
+ "dg_url_host": "-",
+ "dg_url_port": "-",
+ "dg_url_scheme": "-",
+ "dg_user": "eah915",
+ "dg_utype": "File Recycle",
+ "dg_vt_status": "-",
+ "dg_wdb": "No",
+ "dg_wrv": "No",
+ "di_cn": "-",
+ "di_fcl": "-",
+ "di_fd": "-",
+ "di_fml": "-",
+ "di_fv": "-",
+ "di_imagename": "-",
+ "di_imagesha1": "-",
+ "di_imagesha256": "-",
+ "di_imagesize": "-",
+ "di_lc": "-",
+ "di_pf": "-",
+ "di_pn": "-",
+ "di_pv": "-",
+ "pi_cmdln": "C:\\WINDOWS\\Explorer.EXE",
+ "pi_dn": "SW",
+ "pi_dsi": "Microsoft Windows Production PCA 2011",
+ "pi_dspb": "-",
+ "pi_dspn": "Microsoft Windows",
+ "pi_dss": "Signed Trusted No Revoke Check",
+ "pi_dssb": "Microsoft Windows",
+ "pi_dsvs": "-",
+ "pi_fal": "2024-08-10 07:04:51 AM",
+ "pi_fau": "2024-08-10 12:04:51 PM",
+ "pi_fcl": "2024-07-17 01:59:07 PM",
+ "pi_fcu": "2024-07-17 06:59:07 PM",
+ "pi_fd": "windows explorer",
+ "pi_fml": "2024-08-09 07:39:22 PM",
+ "pi_fmods": "-",
+ "pi_fmu": "2024-08-10 12:39:22 AM",
+ "pi_fp": "c:\\windows\\explorer.exe",
+ "pi_fs": "5.5 MB",
+ "pi_in": "explorer.exe",
+ "pi_maxthrds": "-",
+ "pi_ncons": "-",
+ "pi_nda": "No",
+ "pi_ph": "823c3b2e-eb1d-01da-d840-00008050b8bb",
+ "pi_pin": "userinit.exe",
+ "pi_pki": "No",
+ "pi_pmd5": "7c90dc5c-1878-aafb-658f-c9f2abb238f1",
+ "pi_ps": "0",
+ "pi_rmods": "-",
+ "pi_thrds": "-",
+ "pi_vs": "No",
+ "ua_ad": "-",
+ "ua_appun": "-",
+ "ua_ar": "No",
+ "ua_dnsq": "-",
+ "ua_drpt": "-",
+ "ua_drsn": "-",
+ "ua_eeu": "2024-08-17 11:59:18 PM",
+ "ua_efs": "-",
+ "ua_fr": "-",
+ "ua_fun": "-",
+ "ua_hn": "-",
+ "ua_imagebase": "-",
+ "ua_la": "No",
+ "ua_ldfai": "-",
+ "ua_ldfrf": "-",
+ "ua_ldfrt": "-",
+ "ua_ldfui": "-",
+ "ua_lp": "-",
+ "ua_md": "No",
+ "ua_meid": "cfc09e86-a4e6-1035-5fc0-806e7fce78b2",
+ "ua_ms": "-",
+ "ua_msb": "-",
+ "ua_nda": "-",
+ "ua_ndt": "-",
+ "ua_ndu": "-",
+ "ua_ob": "-",
+ "ua_pa": "-",
+ "ua_pt": "-",
+ "ua_ra": "-",
+ "ua_rp": "-",
+ "ua_sa": "-",
+ "ua_sc": "-",
+ "ua_sci": "-",
+ "ua_scn": "-",
+ "ua_scr": "-",
+ "ua_scrs": "-",
+ "ua_scrt": "-",
+ "ua_sct": "-",
+ "ua_scu": "-",
+ "ua_scv": "-",
+ "ua_shn": "-",
+ "ua_sme": "-",
+ "ua_sms": "-",
+ "ua_sn": "-",
+ "ua_up": "-",
+ "ua_we": "-",
+ "ua_wi": "-",
+ "uad_br": "36.0 KB",
+ "uad_bw": "36.0 KB",
+ "uad_cf": "-",
+ "uad_dbt": "RAID",
+ "uad_dcf": "No",
+ "uad_dcru": "-",
+ "uad_ddt": "Fixed",
+ "uad_dea": "None",
+ "uad_dfc": "No",
+ "uad_dir": "No",
+ "uad_dlau": "-",
+ "uad_dmou": "-",
+ "uad_dp": "c:\\$recycle.bin\\s-1-5-21-1573680173-1931375354-1090983491-38523\\$r4ztwqq.pdf",
+ "uad_fat": "-",
+ "uad_fattm": "-",
+ "uad_fh": "-",
+ "uad_fown": "-",
+ "uad_ft": "-",
+ "uad_hkad": "-",
+ "uad_hkby": "-",
+ "uad_hkom": "-",
+ "uad_pn": "-",
+ "uad_regdp": "-",
+ "uad_regsp": "-",
+ "uad_regvt": "-",
+ "uad_sbt": "USB",
+ "uad_sc": "No",
+ "uad_sdt": "Fixed",
+ "uad_sea": "None",
+ "uad_sfc": "No",
+ "uad_sir": "No",
+ "uad_sp": "c:\\users\\eah915\\downloads\\eam quarterly security inspection template 12_7_2017 (2).pdf"
+}
+```
+
+
+### Sample query
+
+```sql title="Activities By Protocol"
+_sourceCategory="Labs/DigitalGuardian"
+| json "dg_guid", "dg_utype", "dg_cn", "dg_user", "dg_machine_name", "dg_proc_file_name", "dg_time", "ua_pt" as id, operation_type, company_name, user, computer, application_name, time, protocol nodrop
+
+/// global variables
+| where operation_type matches "{{operation_type}}"
+| where company_name matches "{{company_name}}"
+
+| where !(protocol matches "-") AND !isBlank(protocol)
+| count by id, time, protocol
+| count as frequency by protocol
+| sort by frequency
+```
+
+## Set up collection
+
+To set up the [Digital Guardian Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/digital-guardian-source), follow the instructions provided. These instructions will guide you through the process of creating a source using the Digital Guardian Source category, which you will need to use when installing the app. By following these steps, you can ensure that your Digital Guardian ARC app is properly integrated and configured to collect and analyze your Digital Guardian ARC data.
+
+## Installing the Digital Guardian ARC app
+
+import AppInstall2 from '../../reuse/apps/app-install-v2.md';
+
+
+
+## Viewing the Digital Guardian ARC dashboard
+
+import ViewDashboards from '../../reuse/apps/view-dashboards.md';
+
+
+
+### Overview
+
+The **Digital Guardian ARC - Overview** dashboard offers a centralized view of data activities, enabling security analysts to monitor and secure sensitive information effectively. It highlights critical metrics such as total activities, blocked actions, unauthorized PKI activities, and rule violations for immediate visibility into security events. Analysts can track network activity by protocol (for example, HTTP, IPsec) and identify operational types like file creation, deletion, and transfer. File type access insights helps you to detect malicious files or unauthorized usage, while top users, computers, and applications provide a snapshot of entities generating the most activity.
+
+The dashboard includes geolocation maps for sender and recipient activity to identify unusual or risky data transfers across regions. It also highlights potentially risky geographies associated with flagged behaviors. Authentication insights, such as failed login attempts, enable analysts to investigate credential misuse or brute-force attempts. Process monitoring lists metadata like file size, path, and user domain to identify risky operations. Historical activity trends help detect abnormal surges or patterns.
+
+This tool is particularly effective for detecting incidents, managing insider threats, and ensuring compliance by tracking rule-violated activities. It supports threat-hunting efforts by correlating risky behaviors with geolocation and operational context. The focus on endpoint activity, unauthorized operations, and certificate analysis strengthens an organization’s data security posture. Security analysts can leverage these insights to identify and mitigate risks proactively, securing critical assets and sensitive data. The dashboard integrates seamlessly with Digital Guardian ARC, enabling a robust framework for real-time monitoring and investigation.
+
+## Create monitors for Digital Guardian ARC app
+
+import CreateMonitors from '../../reuse/apps/create-monitors.md';
+
+
+
+### Digital Guardian ARC monitors
+
+| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition |
+|:--|:--|:--|:--|
+| `Blocked Events` | This alert is fired when there are blocked events. | Critical | Count > 0 |
+| `Failed Login Attempt` | This alert tracks repeated failed login attempts on monitored systems. It aids in identifying brute-force attacks, credential stuffing, or unauthorized access attempts, allowing analysts to take corrective actions to secure accounts and investigate potential insider threats. | Critical | Count > 3|
+| `Recipient Activities from Risky Locations` | This alert identifies activities involving recipients located in regions flagged as risky or suspicious. It enables analysts to assess potential data exfiltration risks or unauthorized sharing of sensitive information, thereby strengthening data protection measures. | Critical | Count > 0 |
+| `Rule Violation Events` | This alert highlights incidents, where monitored systems or users, have violated predefined security rules. It provides insights into non-compliant behavior, supporting analysts in enforcing organizational security policies and maintaining compliance standards. | Critical | Count > 0 |
+| `Sender Activities from Risky Locations` | This alert tracks activities initiated by senders located in high-risk geographic regions. It helps analysts detect and respond to potential threats involving unauthorized data transmission, insider threats, or compromised systems in critical locations. | Critical | Count > 0 |
+
+## Upgrade/downgrade the Digital Guardian ARC app (optional)
+
+import AppUpdate from '../../reuse/apps/app-update.md';
+
+
+
+## Uninstalling the Digital Guardian ARC app (optional)
+
+import AppUninstall from '../../reuse/apps/app-uninstall.md';
+
+
diff --git a/docs/integrations/saas-cloud/index.md b/docs/integrations/saas-cloud/index.md
index 931f322bf1..99031e8479 100644
--- a/docs/integrations/saas-cloud/index.md
+++ b/docs/integrations/saas-cloud/index.md
@@ -111,6 +111,12 @@ Learn about the Sumo Logic apps for SaaS and Cloud applications.
Gather real-time visibility into the vulnerabilities.