diff --git a/blog-service/2024-11-28-apps.md b/blog-service/2024-11-28-apps.md index 2c1c6396a3..83f734fffb 100644 --- a/blog-service/2024-11-28-apps.md +++ b/blog-service/2024-11-28-apps.md @@ -19,6 +19,8 @@ We’re excited to announce the release of the new Azure Database for PostgreSQL [Learn more](/docs/integrations/microsoft-azure/azure-database-for-postgresql/). - **Azure Cosmos DB**. Azure Cosmos DB is a fully managed NoSQL and relational database for modern app development offering single-digit millisecond response times, automatic and instant scalability, along with guaranteed speed at any scale. This integration helps in monitoring the overall performance, failures, capacity, and operational health of all your Azure Cosmos DB resources. [Learn more](/docs/integrations/microsoft-azure/azure-cosmos-db/). +- **Azure Cosmos DB for PostgreSQL**. Azure Cosmos DB for PostgreSQL is a managed service for PostgreSQL powered by the Citus open source extension which enables you to build highly scalable relational apps. This integration helps in identifying configurations errors, analyzing executed statements, and monitoring resource usage of individual nodes in a cluster. +[Learn more](/docs/integrations/microsoft-azure/azure-cosmos-db-for-postgresql/). - **Azure App Service Environment**. An Azure App Service Environment is an Azure App Service feature that provides a fully isolated and dedicated environment for running App Service apps securely at high scale. This integration helps in monitoring your environments operational events such as upgrades, scaling, and suspensions. [Learn more](/docs/integrations/microsoft-azure/azure-app-service-environment). ### Enhancements diff --git a/blog-service/2024-12-02-apps.md b/blog-service/2024-12-02-apps.md new file mode 100644 index 0000000000..b48fe163d8 --- /dev/null +++ b/blog-service/2024-12-02-apps.md @@ -0,0 +1,16 @@ +--- +title: Digital Guardian ARC (Apps) +image: https://help.sumologic.com/img/sumo-square.png +keywords: + - digital-guardian-arc + - apps +hide_table_of_contents: true +--- + +import useBaseUrl from '@docusaurus/useBaseUrl'; + +icon + +We're excited to introduce the new Digital Guardian ARC app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Digital Guardian source that provides data protection through analytics, reporting, and workflows. This integration helps to improve real-time activity monitoring, pre-configure alerts for different events, analyze policy enforcements, provide geolocation insights to support targeted threat investigation and response, and identify potential tampering by closely monitoring digital signatures for files and applications. + +Explore our technical documentation [here](/docs/integrations/saas-cloud/digital-guardian-arc/) to learn how to set up and use the Digital Guardian ARC app for Sumo Logic. diff --git a/blog-service/2024-12-02-apps2.md b/blog-service/2024-12-02-apps2.md new file mode 100644 index 0000000000..0bd2479743 --- /dev/null +++ b/blog-service/2024-12-02-apps2.md @@ -0,0 +1,22 @@ +--- +title: Microsoft Defender for Cloud (Apps) +image: https://help.sumologic.com/img/sumo-square.png +keywords: + - microsoft-defender-for-cloud + - apps +hide_table_of_contents: true +--- + +import useBaseUrl from '@docusaurus/useBaseUrl'; + +icon + +We're excited to introduce the new Microsoft Defender for Cloud app for Sumo Logic. This app helps you to collect the alerts, security recommendation, and regulatory compliance logs using the Sumo Logic Cloud-to-Cloud Azure Event Hub Source and by configuring the continuous export using the Event Hub instance details in the Azure portal. Key features of the Microsoft Defender for Cloud app include: + +- Gain real-time visibility into security alerts across your Azure environment, categorized by severity (High, Medium, Low, and Informational). +- Monitor trends in alert activity over time to identify spikes and recurring threats. +- Leverage detailed alert summaries and remediation steps for effective threat mitigation. +- Track compliance performance across critical standards, including FedRAMP, PCI DSS 4, CIS Azure Foundations, and Microsoft Cloud Security Benchmark. +- Analyze threats by categories like data exfiltration, unauthorized access, and account breaches. + +Explore our technical documentation [here](/docs/integrations/microsoft-azure/microsoft-defender-for-cloud/) to learn how to set up and use the Microsoft Defender for Cloud app for Sumo Logic. diff --git a/blog-service/2024-12-02-copilot.md b/blog-service/2024-12-02-copilot.md new file mode 100644 index 0000000000..0a6be70a4b --- /dev/null +++ b/blog-service/2024-12-02-copilot.md @@ -0,0 +1,25 @@ +--- +title: Sumo Logic Copilot (Search) +image: https://help.sumologic.com/img/sumo-square.png +keywords: + - copilot + - artificial intelligence + - ai + - machine learning + - ml +hide_table_of_contents: true +--- + +import useBaseUrl from '@docusaurus/useBaseUrl'; + +icon + +We're excited to introduce Copilot, an AI-powered assistant that accelerates log investigations and troubleshooting. With natural language query capabilities and contextual suggestions, Copilot helps security first responders and on-call engineers resolve incidents quickly and efficiently. [Learn more](/docs/search/copilot). + +* Ask questions in plain English to generate actionable log insights. +* Get tailored suggestions relevant to your troubleshooting and investigation context. +* Leverage conversation history to save and resume sessions without losing context. +* Auto-visualize charts from search results and add them directly to dashboards. +* Use auto-complete for natural language queries to access insights faster. + +Copilot UI with the query Analyze the geographic distribution of requests by source IP diff --git a/cid-redirects.json b/cid-redirects.json index 9f0ff51625..e0b409a1a1 100644 --- a/cid-redirects.json +++ b/cid-redirects.json @@ -1573,6 +1573,7 @@ "/cid/10110": "/docs/integrations/app-development/jfrog-xray", "/cid/10111": "/docs/integrations/app-development/jfrog-xray", "/cid/10188": "/docs/integrations/saas-cloud/miro", + "/cid/10187": "/docs/integrations/saas-cloud/digital-guardian-arc", "/cid/10208": "/docs/integrations/saas-cloud/cisco-meraki-c2c", "/cid/10209": "/docs/integrations/security-threat-detection/cisco-meraki", "/cid/10210": "/docs/integrations/saas-cloud/proofpoint-tap", @@ -1824,6 +1825,7 @@ "/cid/1963": "/docs/integrations/sumo-apps/enterprise-audit", "/cid/1964": "/docs/integrations/security-threat-detection/f5-big-ip-ltm", "/cid/1965": "/docs/integrations/security-threat-detection/netskope", + "/cid/19665": "/docs/integrations/microsoft-azure/microsoft-defender-for-cloud", "/cid/1966": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/carbon-black-cloud-source", "/cid/1987": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-endpoint-security-source", "/cid/1257": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/atlassian-source", @@ -2021,6 +2023,7 @@ "/cid/10226": "/docs/integrations/containers-orchestration/opentelemetry/activemq-opentelemetry", "/cid/25631": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/tenable-source", "/cid/25632": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/workday-source", + "/cid/25633": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/universal-connector-source", "/cid/25634": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-azure-ad-inventory-source", "/cid/25635": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-azure-ad-reporting-source", "/cid/25636": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-identity-protection-source", diff --git a/docs/integrations/microsoft-azure/azure-cosmos-db-for-postgresql.md b/docs/integrations/microsoft-azure/azure-cosmos-db-for-postgresql.md index 0c3ade7bf3..844231740c 100644 --- a/docs/integrations/microsoft-azure/azure-cosmos-db-for-postgresql.md +++ b/docs/integrations/microsoft-azure/azure-cosmos-db-for-postgresql.md @@ -15,7 +15,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl'; For Azure Cosmos DB for PostgreSQL, you can collect the following logs and metrics: * **PostgreSQL Server Logs**. These logs are available for every node of a cluster and can be used to identify, troubleshoot, and repair configuration errors and suboptimal performance. -* **Audit Logs**. Audit logging of database activities is available through [pgAudit](https://www.pgaudit.org/) extension. By default, pgAudit log statements are emitted along with your regular log statements by using Postgres's standard logging facility. To learn more about the audit log format, refer to the [pgAudit documentation](https://github.com/pgaudit/pgaudit/blob/master/README.md#format). +* **Activity logs**. Provides insight into any subscription-level or management group level events that have occurred in Azure. To learn more, refer to the [Azure documentation](https://learn.microsoft.com/en-us/azure/azure-monitor/essentials/activity-log-schema). * **Metrics**. These metrics are available for every node of a cluster, and in aggregate across the nodes. For more information on supported metrics, refer to the [Azure documentation](https://learn.microsoft.com/en-us/azure/cosmos-db/postgresql/concepts-monitoring#list-of-metrics). ## Setup @@ -29,32 +29,262 @@ You must explicitly enable diagnostic settings for each Azure Cosmos DB for Post When you configure the event hubs source or HTTP source, plan your source category to ease the querying process. A hierarchical approach allows you to make use of wildcards. For example: `Azure/CosmosDBforPostgreSQL/Logs`, `Azure/CosmosDBforPostgreSQL/Metrics`. + +### Configure field in field schema + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Logs > Fields**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Logs** select **Fields**. You can also click the **Go To...** menu at the top of the screen and select **Fields**. +2. Search for the following fields: + - `tenant_name`. This field is tagged at the collector level. You can get the tenant name using the instructions in the [Microsoft Documentation](https://learn.microsoft.com/en-us/azure/active-directory-b2c/tenant-management-read-tenant-name#get-your-tenant-name). + - `location`. The region to which the resource name belongs to. + - `subscription_id`. ID associated with a subscription where the resource is present. + - `resource_group`. The resource group name where the Azure resource is present. + - `provider_name`. Azure resource provider name (for example, Microsoft.Network). + - `resource_type`. Azure resource type (for example, storage accounts). + - `resource_name`. The name of the resource (for example, storage account name). + - `service_type`. Type of the service that can be accessed with a Azure resource. + - `service_name`. Services that can be accessed with an Azure resource (for example, Azure SQL databases in Azure SQL Server). +3. Create the fields if they are not present. Refer to [Manage fields](/docs/manage/fields/#manage-fields). + +### Configure Field Extraction Rules + +Create the following Field Extraction Rules (FER) for Azure Storage by following the instructions in the [Create a Field Extraction Rule](/docs/manage/field-extractions/create-field-extraction-rule/). Create the below rules if they are not present. + +#### Azure location extraction FER + + ```sql + Rule Name: AzureLocationExtractionFER + Applied at: Ingest Time + Scope (Specific Data): tenant_name=* + ``` + + ```sql title="Parse Expression" + json "location", "properties.resourceLocation", "properties.region" as location, resourceLocation, service_region nodrop + | replace(toLowerCase(resourceLocation), " ", "") as resourceLocation + | if (!isBlank(resourceLocation), resourceLocation, location) as location + | if (!isBlank(service_region), service_region, location) as location + | if (isBlank(location), "global", location) as location + | fields location + ``` + +#### Resource ID extraction FER + + ```sql + Rule Name: AzureResourceIdExtractionFER + Applied at: Ingest Time + Scope (Specific Data): tenant_name=* + ``` + + ```sql title="Parse Expression" + json "resourceId", "ResourceId" as resourceId1, resourceId2 nodrop + | if (isBlank(resourceId1), resourceId2, resourceId1) as resourceId + | toUpperCase(resourceId) as resourceId + | parse regex field=resourceId "/SUBSCRIPTIONS/(?[^/]+)" nodrop + | parse field=resourceId "/RESOURCEGROUPS/*/" as resource_group nodrop + | parse regex field=resourceId "/PROVIDERS/(?[^/]+)" nodrop + | parse regex field=resourceId "/PROVIDERS/[^/]+(?:/LOCATIONS/[^/]+)?/(?[^/]+)/(?.+)" nodrop + | parse regex field=resource_name "(?[^/]+)(?:/PROVIDERS/[^/]+)?/(?[^/]+)/?(?.+)" nodrop + | if (isBlank(parent_resource_name), resource_name, parent_resource_name) as resource_name + | fields subscription_id, location, provider_name, resource_group, resource_type, resource_name, service_type, service_name + ``` + +### Configure metric rules + +Create the following metrics rules by following the instructions in [Create a metrics rule](/docs/metrics/metric-rules-editor/#create-a-metrics-rule). Create the below rules if they are not present. + +#### Azure observability metadata extraction flexible PostgreSQL server level + +```sql +Rule Name: AzureObservabilityMetadataExtractionAzureCosmosDBForPostgreSQLLevel +``` + +```sql title="Metric match expression" +resourceId=/SUBSCRIPTIONS/*/RESOURCEGROUPS/*/PROVIDERS/MICROSOFT.DBFORPOSTGRESQL/FLEXIBLESERVERS/* tenant_name=* +``` + +| Fields extracted | Metric rule | +|:------------------|:-------------------------| +| subscription_id | $resourceId._1 | +| resource_group | $resourceId._2 | +| provider_name | MICROSOFT.DBFORPOSTGRESQL| +| resource_type | SERVERGROUPSV2 | +| resource_name | $resourceId._3 | + + ### Configure metrics collection In this section, you will configure a pipeline for shipping metrics from Azure Monitor to an Event Hub, on to an Azure Function, and finally to an HTTP Source on a hosted collector in Sumo Logic. -1. [Configure an HTTP Source](/docs/send-data/collect-from-other-data-sources/azure-monitoring/collect-metrics-azure-monitor/#step-1-configure-an-http-source). +1. Create hosted collector and tag `tenant_name` field.
Azure Tag Tenant Name +2. [Configure an HTTP Source](/docs/send-data/collect-from-other-data-sources/azure-monitoring/collect-metrics-azure-monitor/#step-1-configure-an-http-source). 2. [Configure and deploy the ARM Template](/docs/send-data/collect-from-other-data-sources/azure-monitoring/collect-metrics-azure-monitor/#step-2-configure-azure-resources-using-arm-template). -3. [Export metrics to Event Hub](/docs/send-data/collect-from-other-data-sources/azure-monitoring/collect-metrics-azure-monitor/#step-3-export-metrics-for-a-particular-resource-to-event-hub). Perform below steps for each Azure Cosmos DB for PostgreSQL cluster that you want to monitor. - * Choose `Stream to an event hub` as destination. - * Select `AllMetrics`. - * Use the Event hub namespace created by the ARM template in Step 2 above. You can create a new Event hub or use the one created by ARM template. You can use the default policy `RootManageSharedAccessKey` as the policy name. +3. [Export metrics to Event Hub](/docs/send-data/collect-from-other-data-sources/azure-monitoring/collect-metrics-azure-monitor/#step-3-export-metrics-for-a-particular-resource-to-event-hub). Perform below steps for each Flexible PostgreSQL Server resource that you want to monitor. + 1. Choose `Stream to an event hub` as destination. + 1. Select `AllMetrics`. + 1. Use the Event hub namespace created by the ARM template in Step 2 above. You can create a new Event hub or use the one created by ARM template. You can use the default policy `RootManageSharedAccessKey` as the policy name.
Azure flexible postgresql server metrics +1. Tag the location field in the source with right location value.
Azure CosmosDB for PostgreSql Tag Location ### Configure logs collection In this section, you will configure a pipeline for shipping diagnostic logs from Azure Monitor to an Event Hub. -1. To enable audit logs perform below steps: - * [Install the pgAudit extension](https://learn.microsoft.com/en-us/azure/cosmos-db/postgresql/how-to-enable-audit#installing-pgaudit). - * [Configure audit logging](https://learn.microsoft.com/en-us/azure/cosmos-db/postgresql/how-to-enable-audit#pgaudit-settings). -2. To set up the Azure Event Hubs source in Sumo Logic, refer to [Azure Event Hubs Source for Logs](/docs/send-data/collect-from-other-data-sources/azure-monitoring/ms-azure-event-hubs-source/). -3. To create the Diagnostic settings in Azure portal, refer to the [Azure documentation](https://learn.microsoft.com/en-us/azure/cosmos-db/postgresql/howto-logging#capture-logs). Perform below steps for each Azure Cosmos DB for PostgreSQL cluster that you want to monitor. - * Choose `Stream to an event hub` as the destination. - * Select `allLogs`. - * Use the Event hub namespace and Event hub name configured in previous step in destination details section. You can use the default policy `RootManageSharedAccessKey` as the policy name. +1. To set up the Azure Event Hubs source in Sumo Logic, refer to the [Azure Event Hubs Source for Logs](/docs/send-data/collect-from-other-data-sources/azure-monitoring/ms-azure-event-hubs-source/). +2. To create the diagnostic settings in Azure portal, refer to the [Azure documentation](https://learn.microsoft.com/en-gb/azure/data-factory/monitor-configure-diagnostics). Perform the steps below for each Azure Redis cache account that you want to monitor. + 1. Choose **Stream to an event hub** as the destination. + 1. Select `allLogs`. + 1. Use the Event Hub namespace and Event Hub name configured in the previous step in the destination details section. You can use the default policy `RootManageSharedAccessKey` as the policy name.
Azure flexible postgresql server logs +3. Set server parameters as below: + - `log_statement`. Select **DDL**. + - `log_lock_waits`. Set to **ON**. If required, you can also configure `deadlock_timeout`. + - `log_connections`. Set to **ON**. + - `log_disconnections`. Set to **ON**. + - `log_duration`. Set to **ON**. If required, you can also configure `log_min_duration_statement`. + - `log_hostname`. Set to **ON**. + - `log_min_error_statement`. Set to **INFO**. + - `log_min_messages`. Set to **INFO**. + - `log_line_prefix`. Set to `%m [%p][%v] : %q[app=%a]`. + +4. Tag the location field in the source with right location value.
Azure Redis Cache Tag Location + +#### Activity Logs + +To collect activity logs, follow the instructions [here](/docs/integrations/microsoft-azure/audit). Skip this step if you are already collecting activity logs for a subscription. + +:::note +Since this source contains logs from multiple regions, ensure that you do not tag this source with the location tag. +::: + +## Installing the Azure Cosmos DB for PostgreSQL app + +Now that you have set up data collection, install the Azure Database for PostgreSQL Sumo Logic app to use the pre-configured dashboards that provide visibility into your environment for real-time analysis of overall usage. + +import AppInstallNoDataSourceV2 from '../../reuse/apps/app-install-index-apps-v2.md'; + + + +## Viewing the Azure Cosmos DB for PostgreSQL dashboards + +import ViewDashboards from '../../reuse/apps/view-dashboards.md'; + + + +### Overview + +The **Azure Cosmos DB for PostgreSQL - Overview** dashboard provides details about replication lag, active connections and query duration distribution across clusters and servers. + +Use this dashboard to: +* Track replication lag across replica clusters. +* Analyse query execution duration distribution and common errors across all servers. +* Identify clusters with max cpu usage, memory usage, and storage usage. + +Azure Cosmos DB for PostgreSQL - Overview dashboard + +### Network + +The **Azure Cosmos DB for PostgreSQL - Network** dashboard provides insights on active connections, failed Ccnnections, and network activity including ingress and egress bytes. + +Use this dashboard to: + +* Quickly identify connection errors across clusters. +* Monitor active connections, ingress, and egress trends across clusters. +* Identify abnormally long sessions. + + +Azure CosmosDB for PostgreSql - Network + +### Errors + +The **Azure Cosmos DB for PostgreSQL - Errors** dashboard provides insight into server error logs by specifically monitoring errors and database shutdown/start events. + +Use this dashboard to: + +* Quickly identify top errors across clusters and servers. +* Monitor error trends and distribution across clusters and servers. +* Identify unexpected database shutdown or start activity. + +Azure CosmosDB for PostgreSql - Errors + + +### Security + +The **Azure Cosmos DB for PostgreSQL - Security** dashboard provides insight into locations of incoming connections, failed authentications, and top database errors and warnings. + +Use this dashboard to: + +* Monitor incoming connections, failed authorization requests, and failed authentication requests. +* Track the user performing failed authentication attempts across servers. + +Azure CosmosDB for PostgreSql - Security + +### Storage + +The **Azure Cosmos DB for PostgreSQL - Storage** dashboard provides details about data usage, document count, and physical partition size by database. + +Use this dashboard to: +* Monitor the storage utilisation to decide on scaling up storage or scaling out the nodes if this metric exceeds 85 percent consistently. +* Track total storage used across the clusters. + +Azure Cosmos DB for PostgreSQL - Storage dashboard + +### Performance + +The **Azure Cosmos DB for PostgreSQL - Performance** dashboard provides insights into the performance of your Azure Cosmos DB for PostgreSQL databases. This includes metrics on query duration, server side latency, and failed queries. + +Use this dashboard to: +* Track clusters approaching the maximum IOPS capacity, to decide on adding worker nodes. +* Identify clusters using a high percentage of the clusters available memory to decide on scaling up the compute if this metric consistently exceeds 90 percent. +* Monitor the CPU usage to decide on scaling up the compute if this metric exceeds 95 percent consistently. + +Azure Cosmos DB for PostgreSQL - Performance dashboard + +### Queries + +The **Azure Cosmos DB for PostgreSQL - Queries** dashboard provides insights into the queries executed in your Azure Cosmos DB for PostgreSQL databases. + +Use this dashboard to: +* Analyze query execution duration distribution across servers. +* Identify query statements with errors. +* Monitor spike in query duration. + +Azure Cosmos DB for PostgreSQL - Queries dashboard + +### Health + +The **Azure Cosmos DB for PostgreSQL - Health** dashboard provides information of any service health incidents or resource health events associated with Azure Cosmos DB for PostgreSQL accounts in your azure account. + +Use this dashboard to: +* View recent resource and service health incidents. +* View distribution of service and resource health by incident type. +* Monitor service availability. + +Azure Cosmos DB for PostgreSQL - Health dashboard + +### Administrative Operations + +The **Azure Cosmos DB for PostgreSQL - Administrative Operations** dashboard provides details on users performing admin operations. + +Use this dashboard to: +* Identify top users performing administrative operations. +* View top 10 operations that caused the most errors. +* View recent diagnostic, network, and replication settings updates operations. + +Azure Cosmos DB for PostgreSQL - Administrative Operations dashboard + + +## Upgrade/Downgrade the Azure Cosmos DB for PostgreSQL app (Optional) + +import AppUpdate from '../../reuse/apps/app-update.md'; + + + +## Uninstalling the Azure Cosmos DB for PostgreSQL app (Optional) + +import AppUninstall from '../../reuse/apps/app-uninstall.md'; + + ## Troubleshooting ### HTTP Logs and Metrics Source used by Azure Functions To troubleshoot metrics collection, follow the instructions in [Collect Metrics from Azure Monitor > Troubleshooting metrics collection](/docs/send-data/collect-from-other-data-sources/azure-monitoring/collect-metrics-azure-monitor/#troubleshooting-metrics-collection). + diff --git a/docs/integrations/microsoft-azure/azure-database-for-postgresql.md b/docs/integrations/microsoft-azure/azure-database-for-postgresql.md index dc8483f866..9690df96c9 100644 --- a/docs/integrations/microsoft-azure/azure-database-for-postgresql.md +++ b/docs/integrations/microsoft-azure/azure-database-for-postgresql.md @@ -17,7 +17,7 @@ The below instructions applies to Azure Database for PostgreSQL with Flexible Se For Azure Database for PostgreSQL, you can collect the following logs and metrics: * **PostgreSQL Logs**. These logs can be used to identify, troubleshoot, and repair configuration errors and suboptimal performance. To learn more about the log format, refer to the [Azure documentation](https://learn.microsoft.com/en-us/azure/postgresql/flexible-server/concepts-logging#log-format). -* **Audit Logs**. Audit logging of database activities is available through [pgAudit](https://www.pgaudit.org/) extension. By default, pgAudit log statements are emitted along with your regular log statements by using Postgres's standard logging facility. To learn more about the audit log format, refer to the [pgAudit documentation](https://github.com/pgaudit/pgaudit/blob/master/README.md#format). +* **Activity logs**. Provides insight into any subscription-level or management group level events that have occurred in the Azure. To learn more, refer to the [Azure documentation](https://learn.microsoft.com/en-us/azure/azure-monitor/essentials/activity-log-schema). * **Metrics**. These metrics are available for a flexible server instance of Azure Database for PostgreSQL. For more information on supported metrics and instructions for enabling them, refer to the [Azure documentation](https://learn.microsoft.com/en-us/azure/postgresql/flexible-server/concepts-monitoring#metrics). ## Setup @@ -139,15 +139,15 @@ In this section, you will configure a pipeline for shipping diagnostic logs from 1. Use the Event Hub namespace and Event Hub name configured in the previous step in the destination details section. You can use the default policy `RootManageSharedAccessKey` as the policy name.
Azure flexible postgresql server logs 3. Set server parameters as below: - `wal_level`. Set to **logical**. - - `cron.log_statement`. Set to **ON**. - `log_statement_stats`. Set to **ON**. - - `pgaudit.log_statement_once`. Set to **ON**. - `log_statement`. Select **ALL**. - - `log_lock_waits`. Set to **ON**. + - `log_lock_waits`. Set to **ON**. Set `deadlock_timeout` - `log_recovery_conflict_waits`. Set to **ON**. + + 4. Tag the location field in the source with right location value.
Azure Redis Cache Tag Location -#### Activity Logs +#### Activity logs To collect activity logs, follow the instructions [here](/docs/integrations/microsoft-azure/audit). Skip this step if you are already collecting activity logs for a subscription. diff --git a/docs/integrations/microsoft-azure/index.md b/docs/integrations/microsoft-azure/index.md index bb9004be5b..adac828efc 100644 --- a/docs/integrations/microsoft-azure/index.md +++ b/docs/integrations/microsoft-azure/index.md @@ -317,6 +317,12 @@ This guide has documentation for all of the apps that Sumo Logic provides for Mi

A guide to the Sumo Logic app for Azure Kubernetes Service Control Plane.

+
+
+ thumbnail icon

Microsoft Defender for Cloud

+

Learn about the Sumo Logic collection process for the Microsoft Defender for Cloud service.

+
+
Thumbnail icon diff --git a/docs/integrations/microsoft-azure/microsoft-defender-for-cloud.md b/docs/integrations/microsoft-azure/microsoft-defender-for-cloud.md new file mode 100644 index 0000000000..57a74e4234 --- /dev/null +++ b/docs/integrations/microsoft-azure/microsoft-defender-for-cloud.md @@ -0,0 +1,399 @@ +--- +id: microsoft-defender-for-cloud +title: Microsoft Defender for Cloud +description: Learn about the Sumo Logic collection process for the Microsoft Defender for Cloud service. +--- + +import useBaseUrl from '@docusaurus/useBaseUrl'; + +Thumbnail icon + +The Sumo Logic app for Microsoft Defender for Cloud is a powerful solution designed to provide Azure cloud security analysts with actionable insights into their cloud security posture. By integrating with Microsoft Defender for Cloud, this app delivers advanced monitoring, alerting, and compliance tracking capabilities through purpose-built dashboards tailored to meet the needs of security teams. + +Key features of the Microsoft Defender for Cloud app include: + +- Gain real-time visibility into security alerts across your Azure environment, categorized by severity (High, Medium, Low, and Informational). +- Monitor trends in alert activity over time to identify spikes and recurring threats. +- Geolocate alerts to identify suspicious activities from embargoed or high-risk regions. +- Leverage detailed alert summaries and remediation steps for effective threat mitigation. +- Address vulnerabilities proactively by monitoring security recommendations grouped by risk levels (High, Medium, and Low). +- Visualize trends in recommendation volumes and focus on affected resources, such as Virtual Machines, Apps, and Containers. +- Analyze threats by categories like data exfiltration, unauthorized access, and account breaches. +- Follow step-by-step remediation plans to resolve high-priority risks and strengthen your overall security posture. +- Track compliance performance across critical standards, including FedRAMP, PCI DSS 4, CIS Azure Foundations, and Microsoft Cloud Security Benchmark. +- Understand pass, fail, and skip rates for specific compliance controls. +- Identify areas requiring immediate action to ensure regulatory adherence for your Azure resources. + +:::info +This app includes [built-in monitors](#microsoft-defender-for-cloud-monitors). For details on creating custom monitors, refer to [Create monitors for Microsoft Defender for Cloud app](#create-monitors-for-microsoft-defender-for-cloud-app). +::: + +## Log types + +The Microsoft Defender for Cloud app uses the following logs: + +* [Alerts](https://learn.microsoft.com/en-us/azure/defender-for-cloud/managing-and-responding-alerts) +* [Security recommendations](https://learn.microsoft.com/en-us/azure/defender-for-cloud/review-security-recommendations) +* [Regulatory compliance](https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-regulatory-compliance-standards) + +## Collection configuration + +To forward Microsoft Defender events to Sumo Logic, you can set up an efficient pipeline: **Microsoft Defender** > **Event Hub** > **Sumo Logic (Hosted Collector)**. This setup ensures that security events from Microsoft Defender are seamlessly ingested into Sumo Logic for monitoring and analysis. + +1. **[Create a Sumo Logic Azure Event Hub Source](/docs/send-data/collect-from-other-data-sources/azure-monitoring/ms-azure-event-hubs-source/)**. Configure an Event Hub source to receive events from the Azure platform. This will act as the endpoint for the data pipeline. +1. **[Set up continuous export in Azure](https://learn.microsoft.com/en-us/azure/defender-for-cloud/continuous-export)**. Within the Azure portal, configure the Microsoft Defender for Cloud to export its security events to the Event Hub instance created in the previous step. Continuous export ensures that the events such as alerts, recommendations, and regulatory compliance updates are forwarded in near real-time as shown below. + +## Sample log messages + +
+Alerts + +```json +{ + "VendorName": "Microsoft", + "AlertType": "K8S_AdmissionController", + "ProductName": "Microsoft Defender for Cloud", + "StartTimeUtc": "2024-11-20T08:32:12.950321Z", + "EndTimeUtc": "2024-11-20T08:32:12.950321Z", + "TimeGenerated": "2024-11-20T09:19:16.485Z", + "ProcessingEndTime": "2024-11-20T09:19:16.5381698Z", + "Severity": "Informational", + "Status": "New", + "ProviderAlertStatus": null, + "ConfidenceLevel": null, + "ConfidenceScore": 0.0, + "ConfidenceReasons": null, + "IsIncident": false, + "SystemAlertId": "57963b4b-3cb0-dc3a-16ed-f1e216311809", + "CorrelationKey": null, + "Intent": "Persistence, CredentialAccess", + "AzureResourceId": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/qek8dm0-azure-k8stest/providers/Microsoft.ContainerService/managedClusters/k8s--295-aks1-28-otc-dev-v4", + "WorkspaceId": null, + "WorkspaceSubscriptionId": null, + "WorkspaceResourceGroup": "", + "AgentId": "", + "CompromisedEntity": "k8s--295-aks1-28-otc-dev-v4", + "AlertDisplayName": "Creation of admission webhook configuration detected", + "Description": "Kubernetes audit log analysis detected a new admission webhook configuration. Kubernetes has two built-in generic admission controllers: MutatingAdmissionWebhook and ValidatingAdmissionWebhook. The behavior of these admission controllers is determined by an admission webhook that the user deploys to the cluster. The usage of such admission controllers can be legitimate, however attackers can use such webhooks for modifying the requests (in case of MutatingAdmissionWebhook) or inspecting the requests and gain sensitive information (in case of ValidatingAdmissionWebhook).", + "Entities": [ + { + "$id": "4", + "CloudResource": { + "$id": "5", + "ResourceId": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/qek8dm0-azure-k8stest/providers/Microsoft.ContainerService/managedClusters/k8s--295-aks1-28-otc-dev-v4", + "ResourceType": "Kubernetes Service", + "ResourceName": "k8s--295-aks1-28-otc-dev-v4", + "Metadata": { + "IsGraphCenter": true + }, + "Asset": true, + "Type": "azure-resource" + }, + "Asset": false, + "Type": "K8s-cluster" + }, + { + "$ref": "5" + } + ], + "ExtendedLinks": null, + "RemediationSteps": [ + "Review the admission controller webhook associated with this configuration. The details of the webhook configuration can be retrieved by the command:\nkubectl get mutatingwebhookconfigurations sumo1732091427516-opentelemetry-operator-mutation -o json\nIf this configuration belongs to a legitimate admission controller in the cluster, you can ignore the alert." + ], + "ExtendedProperties": { + "Resource type": "mutatingwebhookconfigurations", + "Resource name": "sumo1732091427516-opentelemetry-operator-mutation", + "Webhook configuration rules": "[{\"apiGroups\":[\"\"],\"resources\":[\"pods\"],\"operations\":[\"CREATE\"],\"apiVersions\":[\"v1\"],\"scope\":\"Namespaced\"}]", + "resourceType": "Kubernetes Service", + "EffectiveAzureResourceId": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/qek8dm0-azure-k8stest/providers/Microsoft.ContainerService/managedClusters/k8s--295-aks1-28-otc-dev-v4", + "CompromisedEntity": "k8s--295-aks1-28-otc-dev-v4", + "ProductComponentName": "Containers", + "EffectiveSubscriptionId": "1111111-1111-1111-111-11111111" + }, + "ResourceIdentifiers": [ + { + "$id": "2", + "AzureResourceId": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/qek8dm0-azure-k8stest/providers/Microsoft.ContainerService/managedClusters/k8s--295-aks1-28-otc-dev-v4", + "Type": "AzureResource", + "AzureResourceTenantId": "a39bedba-be8f-4c0f-bfe2-b8c7913501ea" + }, + { + "$id": "3", + "AadTenantId": "a39bedba-be8f-4c0f-bfe2-b8c7913501ea", + "Type": "AAD" + } + ], + "AlertUri": "https://portal.azure.com/#blade/Microsoft_Azure_Security_AzureDefenderForData/AlertBlade/alertId/57963b4b-3cb0-dc3a-16ed-f1e216311809/subscriptionId/1111111-1111-1111-111-11111111/resourceGroup/qek8dm0-azure-k8stest/referencedFrom/alertDeepLink/location/centralus" +} +``` +
+ +
+Security recommendation + +```json +{ + "assessmentEventDataEnrichment": { + "action": "Insert", + "apiVersion": "2019-01-01", + "isSnapshot": false + }, + "securityEventDataEnrichment": { + "action": "Insert", + "apiVersion": "2019-01-01", + "isSnapshot": false + }, + "tenantId": "a39bedba-be8f-4c0f-bfe2-b8c7913501ea", + "type": "Microsoft.Security/assessments", + "kind": null, + "location": null, + "id": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/AppServiceEnvV3_group/providers/Microsoft.Compute/virtualMachines/ase-ext-test/providers/Microsoft.Security/assessments/1f655fb7-63ca-4980-91a3-56dbc2b715c6", + "name": "1f655fb7-63ca-4980-91a3-56dbc2b715c6", + "tags": null, + "properties": { + "resourceDetails": { + "source": "Azure", + "id": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/AppServiceEnvV3_group/providers/Microsoft.Compute/virtualMachines/ase-ext-test", + "resourceName": "ase-ext-test", + "resourceType": "virtualMachines", + "resourceProvider": "Microsoft.Compute", + "nativeResourceId": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/AppServiceEnvV3_group/providers/Microsoft.Compute/virtualMachines/ase-ext-test" + }, + "displayName": "Vulnerabilities in security configuration on your Linux machines should be remediated (powered by Guest Configuration)", + "status": { + "code": "NotApplicable", + "cause": "UnsupportedPricingPlan", + "description": "The subscription is not onboarded to Servers Plan 2 offering", + "statusChangeDate": "2024-11-20T10:51:36.3376828Z", + "firstEvaluationDate": "2024-11-20T10:51:36.3376828Z" + }, + "additionalData": { + "subAssessmentsLink": "/subscriptions/1111111-1111-1111-111-11111111/resourceGroups/AppServiceEnvV3_group/providers/Microsoft.Compute/virtualMachines/ase-ext-test/providers/Microsoft.Security/assessments/1f655fb7-63ca-4980-91a3-56dbc2b715c6/subAssessments" + }, + "metadata": { + "displayName": "Vulnerabilities in security configuration on your Linux machines should be remediated (powered by Guest Configuration)", + "assessmentType": "BuiltIn", + "policyDefinitionId": "/providers/Microsoft.Authorization/policyDefinitions/fc9b3da7-8347-4380-8e70-0a0361d8dedd", + "description": "Remediate vulnerabilities in security configuration on your Linux machines to protect them from attacks.", + "remediationDescription": "1. Select any of the findings below.
2. On the right pane opened, follow the instructions under 'Remediation' if exist.", + "categories": [ + "Compute" + ], + "severity": "Low", + "userImpact": "Moderate", + "implementationEffort": "Moderate", + "threats": [ + "DataExfiltration", + "DataSpillage", + "AccountBreach" + ] + }, + "links": { + "azurePortal": "portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/1f655fb7-63ca-4980-91a3-56dbc2b715c6/resourceId/%2fsubscriptions%2f1111111-1111-1111-111-11111111%2fresourceGroups%2fAppServiceEnvV3_group%2fproviders%2fMicrosoft.Compute%2fvirtualMachines%2fase-ext-test" + } + } +} +``` + +
+ +
+Regulatory compliance + +```json +{ + "securityEventDataEnrichment": { + "action": "Write", + "apiVersion": "2019-01-01-preview", + "isSnapshot": false, + "interval": "00:00:00" + }, + "id": "/subscriptions/1111111-1111-1111-111-11111111/providers/Microsoft.Security/regulatoryComplianceStandards/Microsoft-cloud-security-benchmark/regulatoryComplianceControls/LT.2/regulatoryComplianceAssessments/56a83a6e-c417-42ec-b567-1e6fcb3d09a9", + "name": "56a83a6e-c417-42ec-b567-1e6fcb3d09a9", + "type": "Microsoft.Security/regulatoryComplianceStandards/regulatoryComplianceControls/regulatoryComplianceAssessments", + "properties": { + "description": "Azure Kubernetes Service clusters should have Defender profile enabled", + "state": "Failed", + "scope": "Subscription", + "passedResources": 1, + "failedResources": 1, + "skippedResources": 0, + "assessmentType": "AssessmentResult", + "assessmentDetailsLink": "https://portal.azure.com/#blade/Microsoft_Azure_Security/RecommendationsBlade/assessmentKey/56a83a6e-c417-42ec-b567-1e6fcb3d09a9/initiativeId/Microsoft-cloud-security-benchmark" + } +} +``` +
+ +## Sample queries + +```sql title="Alerts" +_sourceCategory=azure/defender SystemAlertId +| json field=_raw "SystemAlertId" as alert_id +| dedup alert_id +| json field=_raw "ExtendedProperties.EffectiveSubscriptionId" as subscription_id +| json "AlertUri", "ExtendedProperties", "RemediationSteps", "Entities", "Description", "AlertDisplayName", "CompromisedEntity", "AzureResourceId", "Status", "Severity", "ProcessingEndTime", "ProductName", "AlertType", "VendorName" as alert_url,alert_properties, alert_investigation_steps, alert_entities, alert_description, alert_name, alert_compromised_entity, alert_resource_id, alert_status, alert_severity, alert_created_time, alert_product_name, alert_type, alert_vendor_name nodrop +| json field=alert_properties "resourceType" as affected_resource_type nodrop +| json field=alert_properties "CompromisedEntity" as affected_resource nodrop + +| tourl(AlertUri,alert_name) as alert_name +| replace(alert_investigation_steps,"[\"", "" ) as alert_investigation_steps +| replace(alert_investigation_steps,"\"]", "" ) as alert_investigation_steps +| replace(alert_investigation_steps,"\",\"", "\n" ) as alert_investigation_steps +| replace (alert_investigation_steps, "
", "\n") as alert_investigation_steps +| replace (alert_investigation_steps, /\d\./, "\n --") as alert_investigation_steps +| replace (alert_investigation_steps, "", "") as alert_investigation_steps +| replace(alert_investigation_steps,"\\n", "\n" ) as next_steps +| replace(next_steps,"\\u2022", "\n --" ) as next_steps + + +| count by alert_created_time, alert_name, alert_description, alert_type, alert_product_name, alert_severity,alert_status, affected_resource_type, affected_resource,next_steps + +| fields - _count +``` + +```sql title="Security Recommendation" +_sourceCategory=azure/defender "Microsoft.Security/assessments" +| where type = "Microsoft.Security/assessments" +| json field=_raw "id" +| parse regex field=id "assessments\/(?.+)" + +| dedup by recommendation_id +| json "securityEventDataEnrichment", "tenantId", "location", "properties" as security_event_data_enrichment, tenant_id, location, properties +| json field=properties "links.azurePortal" , "metadata.threats", "metadata.implementationEffort", "metadata.userImpact", "metadata.severity", "metadata.categories", "metadata.remediationDescription", "metadata.description", "metadata.policyDefinitionId", "metadata.assessmentType", "metadata.displayName" ,"status.firstEvaluationDate" as azure_portal_link, threats,implementation_effort, user_impact,severity, categories,remediation_description, description, policy_definitionId, assessment_type, display_name, recommendation_eval_date nodrop +| replace(categories,"[\"", "" ) as categories +| replace(categories,"\"]", "" ) as categories +| replace(threats,"[", "" ) as threats +| replace(threats,"]", "" ) as threats +| replace(threats,"\"", "" ) as threats +| replace(threats,"," ,"\n" ) as threats + +| replace(recommendation_eval_date,/(\.\d+Z)/, "") as recommendation_eval_date +| replace(recommendation_eval_date,"T", " ") as date + +| if (contains(azure_portal_link, "https://"), azure_portal_link, concat("https://", azure_portal_link )) as link +| if (isNull(display_name), "NA", display_name ) as display_name +| tourl(link,display_name) as recommendation +| json field=properties "resourceDetails.resourceType" as affected_resource_type +| json field=properties "resourceDetails.resourceName" as affected_resource_name + + +| replace (remediation_description, "
", "\n") as remediation_description +| replace (remediation_description, /\d\./, "\n --") as remediation_description +| replace (remediation_description, "", "") as next_steps +| count by date, tenant_id, recommendation , severity, threats, categories ,affected_resource_type, affected_resource_name, next_steps + +| fields - _count +``` + +```sql title="Regulatory compliance" +_sourceCategory=azure/defender "Microsoft.Security/regulatoryComplianceStandards/regulatoryComplianceControls/regulatoryComplianceAssessments" +| json "properties.assessmentDetailsLink", "securityEventDataEnrichment.isSnapshot", "name" as assesment_link, is_snapshot, id +| dedup by id +| where type = "Microsoft.Security/regulatoryComplianceStandards/regulatoryComplianceControls/regulatoryComplianceAssessments" +| where is_snapshot = "false" +| parse regex field=assesment_link "initiativeId\/(?.+)" +| json "properties.assessmentType", "properties.skippedResources", "properties.failedResources", "properties.passedResources", "properties.scope", "properties.state", "properties.description" as assessment_type, skipped_resources, failed_resources, passed_resources, scope, state, description +| tourl (assesment_link,description ) as compliance + +| json field=_raw "id" as subscription_id +| parse regex field=subscription_id "subscriptions\/(?.+)\/providers" + +// Global filters +| where subscription_id matches "*" +| where compliance_type matches "*" +| where state matches "*" +| where compliance_type matches "Microsoft-cloud-security-benchmark*" +| count by compliance, compliance_type,state, passed_resources, failed_resources, skipped_resources +| fields - _count +``` + +## Installing the Microsoft Defender for Cloud app + +import AppInstall from '../../reuse/apps/app-install.md'; + + + +## Viewing the Microsoft Defender for Cloud app + +import ViewDashboards from '../../reuse/apps/view-dashboards.md'; + + + +### Alerts + +The **Microsoft Defender for Cloud - Alerts** dashboard provides a centralized view for monitoring high-priority security alerts across Azure resources. It categorizes alerts by severity, emphasizing high and critical alerts to help analysts prioritize threats. A time trend chart highlights alert volumes over recent days, providing insight into unusual activity or potential incidents. The geographical map pinpoints the locations of alerts, identifying potential threats from high-risk regions or embargoed countries. + +An affected resources table lists impacted Azure services, such as virtual machines and storage accounts, to assess the scope of incidents. The dashboard also summarizes frequent alert types, enabling recognition of recurring issues like privilege escalation or malware detections. A top action plan provides recommended steps for addressing severe alerts, helping analysts respond swiftly and effectively. Lastly, an alert summary offers detailed descriptions of recent high-severity events, supporting deeper investigation and remediation efforts. This dashboard equips security teams with the insights needed to protect their Azure environment from emerging threats. + +
Microsoft-Defender-for-Cloud-Alerts + +### Regulatory Compliance + +The **Microsoft Defender for Cloud - Regulatory Compliance** dashboard provides Azure security analysts with a comprehensive view of their organization's compliance status across key regulatory standards. It highlights overall compliance pass percentages for frameworks such as FedRAMP, CIS Azure Foundations, PCI DSS 4, and Microsoft Cloud Security Benchmark. Analysts can easily monitor adherence levels and quickly identify gaps in compliance through visually engaging summaries. + +The dashboard offers detailed breakdowns of passed, failed, and skipped controls for each framework, helping analysts pinpoint specific areas requiring remediation. For FedRAMP compliance, it provides insights into government workload readiness, while for PCI DSS 4, it focuses on safeguarding payment-related data. The CIS Azure Foundations section ensures alignment with security best practices, and the Microsoft Cloud Security Benchmark highlights adherence to recommended Azure configurations. + +This dashboard empowers teams to prioritize remediation efforts, track progress over time, and strengthen their cloud security posture. With actionable insights and a focus on simplifying regulatory alignment, the dashboard is an essential resource for achieving and maintaining compliance in Azure environments. + +
Microsoft-Defender-for-Cloud-Regulatory-Compliance + +### Security Recommendations + +The **Microsoft Defender for Cloud - Security Recommendations** dashboard helps Azure cloud security analysts identify, prioritize, and address security risks across Azure resources. It provides a clear breakdown of recommendations by risk level (High, Medium, and Low) to ensure focus on critical issues. Analysts can track recommendation trends over time to monitor recurring or escalating vulnerabilities. + +The dashboard highlights affected resources, such as Virtual Machines, Storage Accounts, and Apps, allowing quick action on impacted areas. It categorizes recommendations by threats, including data exfiltration, unauthorized access, and account breaches, helping teams understand attack patterns. Analysts can also view recommendations by resource type, such as Compute, Networking, or Containers, for efficient resource-specific remediation. + +Detailed remediation steps are included in the Top Action Plans, providing clear guidance for resolving high-risk vulnerabilities. This dashboard empowers security teams to proactively secure their Azure environment, streamline remediation workflows, and maintain compliance with organizational security goals. + +
Microsoft-Defender-for-Cloud-Security-Recommendations + +## Create monitors for Microsoft Defender for Cloud app + +import CreateMonitors from '../../reuse/apps/create-monitors.md'; + + + +### Microsoft Defender for Cloud monitors + +| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition | +|:--|:--|:--|:--| +| `Alert from Embargoed Countries` | This alert is triggered when activities or access attempts are detected from countries or regions under embargo or subject to restrictions. It highlights potential geopolitical risks or unauthorized access attempts from flagged locations. | Critical | Count > 0 | +| `Critical Alert` | This is a high-priority alert that is triggered when a serious issue or threat is detected within your Azure environment. These alerts often correspond to malicious activities, severe configuration vulnerabilities, or critical system failures requiring immediate attention. | Critical | Count > 0| +| `Critical Security Recommendation` | This alert is triggered when a high-risk vulnerability or misconfiguration is detected in your Azure resources. It provides actionable insights for strengthening your cloud security posture. | Critical | Count > 0 | + +## Troubleshooting + +### Verify Event Hub data flow + +If your configured Event Hub instance is not successfully sending data to Sumo Logic. Follow the below steps to troubleshoot the issue: + +1. Navigate to the **Event Hub Instance Blade** in the Azure portal and select the **Data Explorer (preview)** tab to send sample events.
event-hub-instance-blade +1. In the **Data Explorer (preview)** page, click **Send event** and preview the sample events.
data-explorer +1. Verify if those events are being sent to the [Sumo Logic by Live Tailing](/docs/search/live-tail/about-live-tail/). If the data matches, then the Event Hub instance will successfully send data to Sumo Logic.
live-tailing + +### Validate alerts at Event Hub + +If you are not receiving any alerts from the Microsoft Defender to the Event Hub instance, first make sure that the generated sample alerts are received in your configured Event Hub instance. This ensures the connection between Defender and Event Hub is functioning correctly. To test the pipeline by sending sample alerts from Microsoft Defender, follow the below steps: + +1. In the **Microsoft Defender** console, select **Security Alerts** under **General** section. +1. In the **Security Alerts** page, select the **Sample Alerts** tab. +1. Click on **Create sample alerts** to receive the sample alerts. This validates that the sample alerts are forwarded to the configured Event Hub instance. + +
validate-microsoft-defender-alerts + +:::info +There may be a delay in forwarding alerts from Microsoft Defender to the Event Hub instance. If you experience significant delays, reach out to Azure Support for assistance. +::: + +## Upgrade/Downgrade the Microsoft Defender for Cloud app (Optional) + +import AppUpdate from '../../reuse/apps/app-update.md'; + + + +## Uninstalling the Microsoft Defender for Cloud app (Optional) + +import AppUninstall from '../../reuse/apps/app-uninstall.md'; + + \ No newline at end of file diff --git a/docs/integrations/product-list/product-list-a-l.md b/docs/integrations/product-list/product-list-a-l.md index 554f2ee01d..e6569dc858 100644 --- a/docs/integrations/product-list/product-list-a-l.md +++ b/docs/integrations/product-list/product-list-a-l.md @@ -237,7 +237,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [ | Thumbnail icon | [Forcepoint Web Security](https://www.forcepoint.com/) | Automation integration: [Forcepoint Web Security](/docs/platform-services/automation-service/app-central/integrations/forcepoint-web-security/)
Cloud SIEM integration: [Forcepoint](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/d87adcd6-ae92-4195-9a13-f111175b4e57.md) | | Thumbnail icon | [Forescout eyeSight](https://www.forescout.com/products/eyesight/) | Automation integration: [Forescout eyeSight](/docs/platform-services/automation-service/app-central/integrations/forescout-eyesight/) | | Thumbnail icon | [Fortinet](https://www.fortinet.com/products/next-generation-firewall) | Automation integrations:
- [FortiAnalyzer](/docs/platform-services/automation-service/app-central/integrations/fortianalyzer/)
- [FortiGate](/docs/platform-services/automation-service/app-central/integrations/fortigate/)
- [FortiMail](/docs/platform-services/automation-service/app-central/integrations/fortimail/)
- [FortiProxy](/docs/platform-services/automation-service/app-central/integrations/fortiproxy/)
- [FortiSandbox](/docs/platform-services/automation-service/app-central/integrations/fortisandbox/)
- [FortiSIEM](/docs/platform-services/automation-service/app-central/integrations/fortisiem/)
- [FortiWeb V2](/docs/platform-services/automation-service/app-central/integrations/fortiweb-v2/)
- [FortiWeb](/docs/platform-services/automation-service/app-central/integrations/fortiweb/)
Cloud SIEM integration: [Fortinet](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/fb9941c5-6624-4175-af84-9e8127134889.md)
Collector: [Fortigate Firewall - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/fortigate-firewall/)
Community app: [Sumo Logic for Fortinet Fortigate Firewall](https://github.com/SumoLogic/sumologic-content/tree/master/Fortinet/Fortigate_Firewall) | -| Thumbnail icon | [Fortra](https://www.phishlabs.com/) | Automation integrations:
- [PhishLabs DRP](/docs/platform-services/automation-service/app-central/integrations/phishlabs-drp/)
- [PhishLabs EIR - Incident Data](/docs/platform-services/automation-service/app-central/integrations/phishlabs-eir-incident-data/)
- [PhishLabs EIR - IOC Feed](/docs/platform-services/automation-service/app-central/integrations/phishlabs-eir-ioc-feed/)
Cloud SIEM integration: [Digital Guardian](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/c10788a1-0da8-483c-b87a-e6351984fab5.md)
Collector: [Digital Guardian Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/digital-guardian-source/) | +| Thumbnail icon | [Fortra](https://www.phishlabs.com/) | App:
- [Digital Guardian ARC](/docs/integrations/saas-cloud/digital-guardian-arc/)
Automation integrations:
- [PhishLabs DRP](/docs/platform-services/automation-service/app-central/integrations/phishlabs-drp/)
- [PhishLabs EIR - Incident Data](/docs/platform-services/automation-service/app-central/integrations/phishlabs-eir-incident-data/)
- [PhishLabs EIR - IOC Feed](/docs/platform-services/automation-service/app-central/integrations/phishlabs-eir-ioc-feed/)
Cloud SIEM integration: [Digital Guardian](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/c10788a1-0da8-483c-b87a-e6351984fab5.md)
Collector: [Digital Guardian Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/digital-guardian-source/) | | Thumbnail icon | [Freshworks](https://www.freshworks.com/) | Automation integrations:
- [FreshDesk](/docs/platform-services/automation-service/app-central/integrations/freshdesk/)
- [Freshservice](/docs/platform-services/automation-service/app-central/integrations/freshservice/) | ## G diff --git a/docs/integrations/product-list/product-list-m-z.md b/docs/integrations/product-list/product-list-m-z.md index d11fe3f7a1..7a2054042c 100644 --- a/docs/integrations/product-list/product-list-m-z.md +++ b/docs/integrations/product-list/product-list-m-z.md @@ -25,7 +25,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [ | Thumbnail icon | [MaxMind](https://www.maxmind.com/en/home) | Automation integration: [MaxMind V2](/docs/platform-services/automation-service/app-central/integrations/maxmind-v2/) | | Thumbnail icon | [McAfee](https://www.mcafee.com/) | Automation integrations:
- [McAfee ATD](/docs/platform-services/automation-service/app-central/integrations/mcafee-atd/)
- [McAfee ESM](/docs/platform-services/automation-service/app-central/integrations/mcafee-esm/)
- [McAfee MVISION](/docs/platform-services/automation-service/app-central/integrations/mcafee-mvision/)
- [McAfee Network Security Platform Manager (NSM)](/docs/platform-services/automation-service/app-central/integrations/mcafee-network-security-platform-manager-nsm/)
- [McAfee Web Gateway](/docs/platform-services/automation-service/app-central/integrations/mcafee-web-gateway/)
Cloud SIEM integration: [McAfee](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/20dec895-f649-4959-9717-104fb68bb5b4.md) | | Thumbnail icon | [Memcached](https://memcached.org/) | Apps:
- [Memcached](/docs/integrations/databases/memcached/)
- [Memcached - OpenTelemetry](/docs/integrations/databases/opentelemetry/memcached-opentelemetry/) | -| Thumbnail icon | [Microsoft](https://www.microsoft.com/) | Apps:
- [Azure Active Directory](/docs/integrations/microsoft-azure/active-directory-azure/)
- [Microsoft Azure AD Inventory](/docs/integrations/saas-cloud/microsoft-azure-ad-inventory)
- [Microsoft Dynamics 365](/docs/integrations/microsoft-azure/microsoft-dynamics365-customer-insights/)
- [Microsoft Exchange Trace Logs](/docs/integrations/saas-cloud/microsoft-exchange-trace-logs/)
- [Microsoft Graph Azure AD Reporting](/docs/integrations/saas-cloud/microsoft-graph-azure-ad-reporting/)
- [Microsoft Graph Identity Protection](/docs/integrations/microsoft-azure/microsoft-graph-identity-protection/)
- [Microsoft Graph Security V1](/docs/integrations/saas-cloud/microsoft-graph-security-v1/)
- [Microsoft Graph Security V2](/docs/integrations/saas-cloud/microsoft-graph-security-v2/)
- [Microsoft Office 365](/docs/integrations/microsoft-azure/office-365/)
- [Microsoft SQL Server](/docs/integrations/microsoft-azure/sql-server/)
- [Microsoft SQL Server - OpenTelemetry](/docs/integrations/microsoft-azure/opentelemetry/sql-server-opentelemetry)
- [Microsoft SQL Server for Linux - OpenTelemetry](/docs/integrations/microsoft-azure/opentelemetry/sql-server-linux-opentelemetry)
- [Microsoft Teams](/docs/integrations/microsoft-azure/teams/)
Automation integrations:
- [Active Directory](/docs/platform-services/automation-service/app-central/integrations/active-directory/)
- [Active Directory v2](/docs/platform-services/automation-service/app-central/integrations/active-directory-v2/)
- [Microsoft 365 Defender](/docs/platform-services/automation-service/app-central/integrations/microsoft-365-defender/)
- [Microsoft Azure Log Analytics](/docs/platform-services/automation-service/app-central/integrations/microsoft-azure-log-analytics/)
- [Microsoft Azure Security Center](/docs/platform-services/automation-service/app-central/integrations/microsoft-azure-security-center/)
- [Microsoft Defender ATP](/docs/platform-services/automation-service/app-central/integrations/microsoft-defender-atp/)
- [Microsoft EWS](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews/)
- [Microsoft EWS Daemon](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews-daemon/)
- [Microsoft EWS Extension](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews-extension/)
- [Microsoft Graph Security](/docs/platform-services/automation-service/app-central/integrations/microsoft-graph-security/)
- [Microsoft OneDrive](/docs/platform-services/automation-service/app-central/integrations/microsoft-onedrive/)
- [Microsoft Sharepoint](/docs/platform-services/automation-service/app-central/integrations/microsoft-sharepoint/)
- [Microsoft Sentinel](/docs/platform-services/automation-service/app-central/integrations/microsoft-sentinel/)
- [MSSQL](/docs/platform-services/automation-service/app-central/integrations/mssql/)
- [Microsoft Teams](/docs/platform-services/automation-service/app-central/integrations/microsoft-teams/)
Cloud SIEM integration: [Microsoft](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/2b002817-fd14-49b3-a3fe-c9761275b931.md)
Collectors:
- [Active Directory JSON - Classic Collector](/docs/integrations/microsoft-azure/active-directory-json/)
- [Active Directory JSON - OpenTelemetry Collector](/docs/integrations/microsoft-azure/opentelemetry/active-directory-json-opentelemetry/)
- [Microsoft 365 Audit (Office 365 Audit) - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-audit-office/)
- [Microsoft Azure AD Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-azure-ad-inventory-source/)
- [Microsoft Exchange Trace Logs](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-exchange-trace-logs/)
- [Microsoft Office 365 Audit Source](/docs/send-data/hosted-collectors/microsoft-source/ms-office-audit-source/)
- [Microsoft Graph Azure AD Reporting Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-azure-ad-reporting-source/)
- [Microsoft Graph Identity Protection Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-identity-protection-source/)
- [Microsoft Graph Security API Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/)
- [Windows Active Directory Inventory Source](/docs/send-data/installed-collectors/sources/windows-active-directory-inventory-source/)
Community app: [Sumo Logic Microsoft Defender for EndPoint](https://github.com/SumoLogic/sumologic-content/tree/master/Microsoft/Defender_4_EndPoint)
Webhook: [Webhook Connection for Microsoft Teams](/docs/alerts/webhook-connections/microsoft-teams/) | +| Thumbnail icon | [Microsoft](https://www.microsoft.com/) | Apps:
- [Azure Active Directory](/docs/integrations/microsoft-azure/active-directory-azure/)
- [Microsoft Azure AD Inventory](/docs/integrations/saas-cloud/microsoft-azure-ad-inventory)
- [Microsoft Defender for Cloud](/docs/integrations/microsoft-azure/microsoft-defender-for-cloud/)
- [Microsoft Dynamics 365](/docs/integrations/microsoft-azure/microsoft-dynamics365-customer-insights/)
- [Microsoft Exchange Trace Logs](/docs/integrations/saas-cloud/microsoft-exchange-trace-logs/)
- [Microsoft Graph Azure AD Reporting](/docs/integrations/saas-cloud/microsoft-graph-azure-ad-reporting/)
- [Microsoft Graph Identity Protection](/docs/integrations/microsoft-azure/microsoft-graph-identity-protection/)
- [Microsoft Graph Security V1](/docs/integrations/saas-cloud/microsoft-graph-security-v1/)
- [Microsoft Graph Security V2](/docs/integrations/saas-cloud/microsoft-graph-security-v2/)
- [Microsoft Office 365](/docs/integrations/microsoft-azure/office-365/)
- [Microsoft SQL Server](/docs/integrations/microsoft-azure/sql-server/)
- [Microsoft SQL Server - OpenTelemetry](/docs/integrations/microsoft-azure/opentelemetry/sql-server-opentelemetry)
- [Microsoft SQL Server for Linux - OpenTelemetry](/docs/integrations/microsoft-azure/opentelemetry/sql-server-linux-opentelemetry)
- [Microsoft Teams](/docs/integrations/microsoft-azure/teams/)
Automation integrations:
- [Active Directory](/docs/platform-services/automation-service/app-central/integrations/active-directory/)
- [Active Directory v2](/docs/platform-services/automation-service/app-central/integrations/active-directory-v2/)
- [Microsoft 365 Defender](/docs/platform-services/automation-service/app-central/integrations/microsoft-365-defender/)
- [Microsoft Azure Log Analytics](/docs/platform-services/automation-service/app-central/integrations/microsoft-azure-log-analytics/)
- [Microsoft Azure Security Center](/docs/platform-services/automation-service/app-central/integrations/microsoft-azure-security-center/)
- [Microsoft Defender ATP](/docs/platform-services/automation-service/app-central/integrations/microsoft-defender-atp/)
- [Microsoft EWS](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews/)
- [Microsoft EWS Daemon](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews-daemon/)
- [Microsoft EWS Extension](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews-extension/)
- [Microsoft Graph Security](/docs/platform-services/automation-service/app-central/integrations/microsoft-graph-security/)
- [Microsoft OneDrive](/docs/platform-services/automation-service/app-central/integrations/microsoft-onedrive/)
- [Microsoft Sharepoint](/docs/platform-services/automation-service/app-central/integrations/microsoft-sharepoint/)
- [Microsoft Sentinel](/docs/platform-services/automation-service/app-central/integrations/microsoft-sentinel/)
- [MSSQL](/docs/platform-services/automation-service/app-central/integrations/mssql/)
- [Microsoft Teams](/docs/platform-services/automation-service/app-central/integrations/microsoft-teams/)
Cloud SIEM integration: [Microsoft](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/2b002817-fd14-49b3-a3fe-c9761275b931.md)
Collectors:
- [Active Directory JSON - Classic Collector](/docs/integrations/microsoft-azure/active-directory-json/)
- [Active Directory JSON - OpenTelemetry Collector](/docs/integrations/microsoft-azure/opentelemetry/active-directory-json-opentelemetry/)
- [Microsoft 365 Audit (Office 365 Audit) - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-audit-office/)
- [Microsoft Azure AD Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-azure-ad-inventory-source/)
- [Microsoft Exchange Trace Logs](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-exchange-trace-logs/)
- [Microsoft Office 365 Audit Source](/docs/send-data/hosted-collectors/microsoft-source/ms-office-audit-source/)
- [Microsoft Graph Azure AD Reporting Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-azure-ad-reporting-source/)
- [Microsoft Graph Identity Protection Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-identity-protection-source/)
- [Microsoft Graph Security API Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-security-api-source/)
- [Windows Active Directory Inventory Source](/docs/send-data/installed-collectors/sources/windows-active-directory-inventory-source/)
Community app: [Sumo Logic Microsoft Defender for EndPoint](https://github.com/SumoLogic/sumologic-content/tree/master/Microsoft/Defender_4_EndPoint)
Webhook: [Webhook Connection for Microsoft Teams](/docs/alerts/webhook-connections/microsoft-teams/) | | Thumbnail icon | [Mimecast](https://www.mimecast.com/) | App: [Mimecast](/docs/integrations/saas-cloud/mimecast/)
Automation integration: [Mimecast](/docs/platform-services/automation-service/app-central/integrations/mimecast/)
Cloud SIEM integration: [Mimecast](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/7BC43DFE-C5DD-4766-88E7-C163D82BBBF8.md)
Collector: [Mimecast Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/mimecast-source/)
Partner integration: [Mimecast app for Sumo Logic](https://github.com/SumoLogic/sumologic-public-partner-apps/tree/master/Mimecast) | | Thumbnail icon | [Miro](https://miro.com/) | App: [Miro](/docs/integrations/saas-cloud/miro/)
Cloud SIEM integration: [Miro](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/9f149da1-2831-465f-8bb1-a5950ccaec0c.md)
Collector: [Miro Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/miro-source/) | | Thumbnail icon | [MISP](https://www.misp-project.org/) | Automation integration: [MISP](/docs/platform-services/automation-service/app-central/integrations/misp/)
Community app: [Sumo Logic for MISP](https://github.com/SumoLogic/sumologic-content/tree/master/MISP) | @@ -160,7 +160,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [ | Thumbnail icon | [Strimzi](https://strimzi.io/) | App: [Strimzi Kafka](/docs/integrations/containers-orchestration/strimzi-kafka/) | | Thumbnail icon | [Stripe](https://stripe.com/) | Webhook: [Stripe](/docs/integrations/webhooks/stripe/) | | Thumbnail icon | [Sucuri](https://sucuri.net/) | Cloud SIEM integration: [Sucuri](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/cdfd2ba0-77eb-4e11-b071-6f4d01fda607.md) | -| Thumbnail icon | [Sumo Logic](https://www.sumologic.com/) | Apps:
- [Enterprise Audit - Cloud SIEM](/docs/integrations/sumo-apps/cse/)
- [Sumo Logic Audit App](/docs/integrations/sumo-apps/audit/)
- [Sumo Logic Data Volume App](/docs/integrations/sumo-apps/data-volume/)
- [Sumo Logic Enterprise Audit Apps](/docs/integrations/sumo-apps/enterprise-audit/) (multiple apps)
- [Sumo Logic Enterprise Search Audit App](/docs/integrations/sumo-apps/enterprise-search-audit/)
- [Sumo Logic Infrequent Data Tier App](/docs/integrations/sumo-apps/infrequent-data-tier/)
- [Sumo Logic Log Analysis QuickStart App](/docs/integrations/sumo-apps/log-analysis-quickstart/)
- [Sumo Logic Security Analytics App](/docs/integrations/sumo-apps/security-analytics/)
Automation integrations:
- [Automation Tools](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-automation-tools/)
- [Basic Tools](/docs/platform-services/automation-service/app-central/integrations/basic-tools/)
- [ESMTP](/docs/platform-services/automation-service/app-central/integrations/esmtp/)
- [HTTP Tools](/docs/platform-services/automation-service/app-central/integrations/http-tools/)
- [Incident Tools](/docs/platform-services/automation-service/app-central/integrations/incident-tools/)
- [IMAP](/docs/platform-services/automation-service/app-central/integrations/imap/)
- [Mail Tools](/docs/platform-services/automation-service/app-central/integrations/mail-tools/)
- [POP3](/docs/platform-services/automation-service/app-central/integrations/pop3/)
- [SMTP V3](/docs/platform-services/automation-service/app-central/integrations/smtp-v3/)
- [Sumo Logic Cloud SIEM](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-cloud-siem/)
- [Sumo Logic Cloud SIEM Internal](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-cloud-siem-internal/)
- [Sumo Logic Log Analytics](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics/)
- [Sumo Logic Log Analytics Internal](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics-internal/)
- [Sumo Logic Notifications](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications/)
- [Sumo Logic Notifications by Gmail](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications-by-gmail/)
- [Triage Tools](/docs/platform-services/automation-service/app-central/integrations/triage-tools/)
- [ZIP Tools](/docs/platform-services/automation-service/app-central/integrations/zip-tools/)
Cloud SIEM integration: [Sumo Logic](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/34A5019C-7BEC-4BF8-A3B7-C38D567126C6.md)
Community app: [Cloud Security Posture Management (CSPM) for Sumo Logic](https://github.com/SumoLogic/sumologic-content/tree/master/CSPM) | +| Thumbnail icon | [Sumo Logic](https://www.sumologic.com/) | Apps:
- [Enterprise Audit - Cloud SIEM](/docs/integrations/sumo-apps/cse/)
- [Sumo Logic Audit App](/docs/integrations/sumo-apps/audit/)
- [Sumo Logic Data Volume App](/docs/integrations/sumo-apps/data-volume/)
- [Sumo Logic Enterprise Audit Apps](/docs/integrations/sumo-apps/enterprise-audit/) (multiple apps)
- [Sumo Logic Enterprise Search Audit App](/docs/integrations/sumo-apps/enterprise-search-audit/)
- [Sumo Logic Infrequent Data Tier App](/docs/integrations/sumo-apps/infrequent-data-tier/)
- [Sumo Logic Log Analysis QuickStart App](/docs/integrations/sumo-apps/log-analysis-quickstart/)
- [Sumo Logic Security Analytics App](/docs/integrations/sumo-apps/security-analytics/)
Automation integrations:
- [Automation Tools](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-automation-tools/)
- [Basic Tools](/docs/platform-services/automation-service/app-central/integrations/basic-tools/)
- [ESMTP](/docs/platform-services/automation-service/app-central/integrations/esmtp/)
- [HTTP Tools](/docs/platform-services/automation-service/app-central/integrations/http-tools/)
- [Incident Tools](/docs/platform-services/automation-service/app-central/integrations/incident-tools/)
- [IMAP](/docs/platform-services/automation-service/app-central/integrations/imap/)
- [Mail Tools](/docs/platform-services/automation-service/app-central/integrations/mail-tools/)
- [POP3](/docs/platform-services/automation-service/app-central/integrations/pop3/)
- [SMTP V3](/docs/platform-services/automation-service/app-central/integrations/smtp-v3/)
- [Sumo Logic Cloud SIEM](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-cloud-siem/)
- [Sumo Logic Cloud SIEM Internal](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-cloud-siem-internal/)
- [Sumo Logic Log Analytics](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics/)
- [Sumo Logic Log Analytics Internal](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics-internal/)
- [Sumo Logic Notifications](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications/)
- [Sumo Logic Notifications by Gmail](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications-by-gmail/)
- [Triage Tools](/docs/platform-services/automation-service/app-central/integrations/triage-tools/)
- [ZIP Tools](/docs/platform-services/automation-service/app-central/integrations/zip-tools/)
Cloud SIEM integration: [Sumo Logic](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/34A5019C-7BEC-4BF8-A3B7-C38D567126C6.md)
Collector: [Universal Connector](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/universal-connector-source)
Community app: [Cloud Security Posture Management (CSPM) for Sumo Logic](https://github.com/SumoLogic/sumologic-content/tree/master/CSPM) | | Thumbnail icon | [Superwise](https://superwise.ai/) | Webhook: [Superwise](/docs/integrations/webhooks/superwise/) | | Thumbnail icon | [Symantec](https://sep.securitycloud.symantec.com/v2/landing) | App: [Symantec Web Security Service](/docs/integrations/saas-cloud/symantec-web-security-service/)
Automation integrations:
- [Javelin AD Protect](/docs/platform-services/automation-service/app-central/integrations/javelin-ad-protect/)
- [Symantec DeepSight](/docs/platform-services/automation-service/app-central/integrations/symantec-deepsight/)
- [Symantec EDR](/docs/platform-services/automation-service/app-central/integrations/symantec-edr/)
- [Symantec Endpoint Protection](/docs/platform-services/automation-service/app-central/integrations/symantec-endpoint-protection/)
- [Symantec Endpoint Protection Cloud](/docs/platform-services/automation-service/app-central/integrations/symantec-endpoint-protection-cloud/)
- [Symantec Secure Web Gateway (Bluecoat)](/docs/platform-services/automation-service/app-central/integrations/symantec-secure-web-gateway-bluecoat/)
- [Symantec WebPulse](/docs/platform-services/automation-service/app-central/integrations/symantec-webpulse/)
Collectors:
- [Symantec Endpoint Security Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-endpoint-security-source/)
- [Symantec Web Security Service Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-web-security-service-source/)
- [Symantec Proxy Secure Gateway - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/symantec-proxy-secure-gateway/)
- [Symantec Proxy Secure Gateway (Blue Coat Proxy) - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/symantec-proxy-secure-gateway-blue-coat-proxy/)
Cloud SIEM integration: [Symantec](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/64c7f49c-f95a-4f4a-8540-56ec5fb1d96b.md)
Community app: [Sumo Logic for Symantec WSS](https://github.com/SumoLogic/sumologic-content/tree/master/Symantec/WSS) | | Thumbnail icon | [Sysdig](https://sysdig.com/) | Cloud SIEM integration: [Sysdig](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/c4de0854-e718-45e1-a4c8-63623755aa43.md) | diff --git a/docs/integrations/saas-cloud/digital-guardian-arc.md b/docs/integrations/saas-cloud/digital-guardian-arc.md new file mode 100644 index 0000000000..7a2d175908 --- /dev/null +++ b/docs/integrations/saas-cloud/digital-guardian-arc.md @@ -0,0 +1,379 @@ +--- +id: digital-guardian-arc +title: Digital Guardian ARC +sidebar_label: Digital Guardian ARC +description: The Sumo Logic app for Digital Guardian ARC provides a comprehensive suite of dashboards and alerts to help security analysts monitor, detect, and respond to critical events within their data protection environment. +--- + +import useBaseUrl from '@docusaurus/useBaseUrl'; + +icon + +The Sumo Logic app for Digital Guardian ARC provides a comprehensive suite of dashboards and alerts to help security analysts monitor, detect, and respond to critical events within their data protection environment. Designed to integrate seamlessly with Digital Guardian's Advanced Reporting and Analytics (ARC), this app offers actionable insights into endpoint activities, user behavior, and policy violations to enhance data security. + +Key features of the Digital Guardian ARC app include: + +- **Real-time activity monitoring**. Gain visibility into activities such as file creations, modifications, and deletions, categorized by operation type, file types accessed, and protocols used. +- **Risk-based alerts**. Pre-configured alerts for blocked events, failed login attempts, and user activities originating from high-risk locations allow analysts to detect and respond to potential threats in real-time. +- **Policy enforcement analytics**. The app provides insights into rule violation events, helping organizations monitor adherence to security policies and identify areas for improvement. +- **User and host analysis**. Interactive charts display the top users, applications, and systems contributing to security events, helping analysts pinpoint risky behaviors or potential insider threats. +- **Geolocation insights**. Visualize sender and recipient activities from high-risk or suspicious locations with geolocation maps, enabling targeted threat investigation and response. +- **Signature issuer intelligence**. Monitor digital signatures for files and applications to ensure authenticity and detect any potential tampering or unauthorized software. + +Use cases for the Digital Guardian ARC app include: + +- **Identify unauthorized activities**. Detect and investigate unauthorized file access, data exfiltration attempts, or suspicious behavior within the environment. +- **Enforce compliance**. Track and address violations of security rules to maintain regulatory compliance and internal policy adherence. +- **Monitor risky user behavior**. Proactively address risky activities, such as failed logins or data transfers to/from suspicious locations. +- **Accelerate incident response**. Leverage real-time alerts and detailed activity logs to respond to potential threats or breaches quickly. + +The Sumo Logic app for Digital Guardian ARC is an essential tool for security teams. It provides the visibility and intelligence needed to safeguard sensitive data, enforce security policies, and mitigate risks in real-time. + +:::info +This app also includes [built-in monitors](#digital-guardian-arc-monitors). For details on creating custom monitors, refer to [Create monitors for Digital Guardian ARC app](#create-monitors-for-digital-guardian-arc-app). +::: + +## Log types + +This app uses Sumo Logic’s [Digital Guardian ARC Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/digital-guardian-source/) to collect event logs from Digital Guardian ARC. + +### Sample log messages + +
+Event Log + +```json +{ + "ca_ct": "-", + "dev_bt": "-", + "dev_devclass": "-", + "dev_dt": "-", + "dev_friendlyname": "-", + "dev_prdid": "-", + "dev_prdname": "-", + "dev_rempolicy": "-", + "dev_sernum": "-", + "dev_suppredfail": "-", + "dev_vendor": "-", + "dev_vendorid": "-", + "dg_agent_version": "7.9.1.0126", + "dg_alert.alert_aid": "-", + "dg_alert.alert_al": "-", + "dg_alert.alert_at": "-", + "dg_alert.alert_bc": "-", + "dg_alert.alert_did": "-", + "dg_alert.alert_etl": "-", + "dg_alert.alert_ss": "-", + "dg_alert.alert_ur": "-", + "dg_alert.alert_wb": "-", + "dg_alert.dg_category": "-", + "dg_alert.dg_category_name": "-", + "dg_alert.dg_detection_source": "-", + "dg_alert.dg_name": "-", + "dg_alert.dg_policy.dg_category": "-", + "dg_alert.dg_policy.dg_category_name": "-", + "dg_alert.dg_policy.dg_name": "-", + "dg_alert.dg_policy.p_pn": "-", + "dg_alert.dg_policy.p_t": "-", + "dg_alert.dg_rule_action_type": "-", + "dg_alert.uad_medid": "-", + "dg_alert_survey_name": "-", + "dg_alert_survey_response": "-", + "dg_app_type": "-", + "dg_attachments.dg_file_size": "-", + "dg_attachments.dg_src_dir": "-", + "dg_attachments.dg_src_file_name": "-", + "dg_attachments.uad_br": "-", + "dg_attachments.uad_bw": "-", + "dg_attachments.uad_dvn": "-", + "dg_attachments.uad_sdt": "-", + "dg_attachments.uad_sea": "-", + "dg_attachments.uad_sfc": "-", + "dg_attachments.uad_sir": "-", + "dg_attachments.uad_sp": "-", + "dg_class.cad_pt": "-", + "dg_class.cad_tc": "2", + "dg_class.dg_category_name": "tag", + "dg_class.dg_ci": "cf69eedf-2135-4ef1-857d-19d0f8111584", + "dg_class.dg_ct": "Content Pattern", + "dg_class.dg_name": "custom_phonenumber", + "dg_class.dg_source_file": "Source File", + "dg_cn": "microsoft corporation", + "dg_custom_data.dg_name": "-", + "dg_custom_data.dg_scope": "-", + "dg_custom_data.dg_type": "-", + "dg_custom_data.dg_values": "-", + "dg_dh": "-", + "dg_display": "File Recycle", + "dg_doc_repo_type": "-", + "dg_dst_dev.dev_bt": "RAID", + "dg_dst_dev.dev_customid": "\"", + "dg_dst_dev.dev_devclass": "\"", + "dg_dst_dev.dev_dt": "Fixed", + "dg_dst_dev.dev_friendlyname": "sk hynix sc311 sata 256gb", + "dg_dst_dev.dev_prdid": "\"", + "dg_dst_dev.dev_prdname": "sk hynix sc311 sata 256gb", + "dg_dst_dev.dev_rempolicy": "Expect No Removal", + "dg_dst_dev.dev_sernum": "ms8an69151ca1av1u", + "dg_dst_dev.dev_suppredfail": "No", + "dg_dst_dev.dg_dh": "-", + "dg_dst_dir": "c:\\$recycle.bin\\s-1-5-21-1573680173-1931375354-1090983491-38523", + "dg_dst_file_ext": "pdf", + "dg_dst_file_name": "$r4ztwqq.pdf", + "dg_dyn_sev": "-", + "dg_ehc": "-", + "dg_erv": "-", + "dg_ewb": "-", + "dg_file_category": "-", + "dg_file_size": "36.0 KB", + "dg_fin": "explorer", + "dg_first": "True", + "dg_fon": "explorer.exe", + "dg_fv": "10.0.19041.4648 (winbuild.160101.0800)", + "dg_guid": "b1dc5a3b-5cf4-11ef-8780-1856806434ed", + "dg_hc": "No", + "dg_imagemd5": "-", + "dg_lc": "© microsoft corporation. all rights reserved.", + "dg_local_timestamp": "2024-08-17 06:59:18 PM", + "dg_mac_address": "00:FF:9A:E6:D1:B0", + "dg_machine_name": "sw\\J1ZC9T2", + "dg_machine_type": "Windows", + "dg_md5": "d264f62721590f14bc54344f48a05912", + "dg_mid": "f59f9f5b-2f5f-92a9-3d4b-f0f7edff4dc6", + "dg_parent_name": "userinit.exe", + "dg_pid": 16600, + "dg_pn": "microsoft® windows® operating system", + "dg_proc_dir": "c:\\windows", + "dg_proc_file_ext": "exe", + "dg_proc_file_name": "explorer.exe", + "dg_processed_time": 1723939890637, + "dg_provider": "-", + "dg_pv": "10.0.19041.4648", + "dg_recipients.dg_rec_email_domain": "-", + "dg_recipients.uad_dir": "-", + "dg_recipients.uad_mr": "-", + "dg_recipients.uad_sir": "-", + "dg_reg_op_type": "-", + "dg_rv": "-", + "dg_sensor_type": "-", + "dg_sha1": "79047B0448500CCEA28EFCEFA4ADF8C8B6FB1737", + "dg_sha256": "350570713E0A7E3733F59623F880A442E98979B29A8D59B95555625A38ED1054", + "dg_src_dev.dev_bt": "RAID", + "dg_src_dev.dev_customid": "\"", + "dg_src_dev.dev_devclass": "\"", + "dg_src_dev.dev_dt": "Fixed", + "dg_src_dev.dev_friendlyname": "sk hynix sc311 sata 256gb", + "dg_src_dev.dev_prdid": "\"", + "dg_src_dev.dev_prdname": "sk hynix sc311 sata 256gb", + "dg_src_dev.dev_rempolicy": "Expect No Removal", + "dg_src_dev.dev_sernum": "ms8an69151ca1av1u", + "dg_src_dev.dev_suppredfail": "No", + "dg_src_dev.dev_vendor": "\"", + "dg_src_dev.dg_dh": "-", + "dg_src_dir": "c:\\users\\eah915\\downloads", + "dg_src_file_ext": "pdf", + "dg_src_file_name": "eam quarterly security inspection template 12_7_2017 (2).pdf", + "dg_time": "2024-08-17 11:59:18 PM", + "dg_total_size": "-", + "dg_url_context_path": "-", + "dg_url_host": "-", + "dg_url_port": "-", + "dg_url_scheme": "-", + "dg_user": "eah915", + "dg_utype": "File Recycle", + "dg_vt_status": "-", + "dg_wdb": "No", + "dg_wrv": "No", + "di_cn": "-", + "di_fcl": "-", + "di_fd": "-", + "di_fml": "-", + "di_fv": "-", + "di_imagename": "-", + "di_imagesha1": "-", + "di_imagesha256": "-", + "di_imagesize": "-", + "di_lc": "-", + "di_pf": "-", + "di_pn": "-", + "di_pv": "-", + "pi_cmdln": "C:\\WINDOWS\\Explorer.EXE", + "pi_dn": "SW", + "pi_dsi": "Microsoft Windows Production PCA 2011", + "pi_dspb": "-", + "pi_dspn": "Microsoft Windows", + "pi_dss": "Signed Trusted No Revoke Check", + "pi_dssb": "Microsoft Windows", + "pi_dsvs": "-", + "pi_fal": "2024-08-10 07:04:51 AM", + "pi_fau": "2024-08-10 12:04:51 PM", + "pi_fcl": "2024-07-17 01:59:07 PM", + "pi_fcu": "2024-07-17 06:59:07 PM", + "pi_fd": "windows explorer", + "pi_fml": "2024-08-09 07:39:22 PM", + "pi_fmods": "-", + "pi_fmu": "2024-08-10 12:39:22 AM", + "pi_fp": "c:\\windows\\explorer.exe", + "pi_fs": "5.5 MB", + "pi_in": "explorer.exe", + "pi_maxthrds": "-", + "pi_ncons": "-", + "pi_nda": "No", + "pi_ph": "823c3b2e-eb1d-01da-d840-00008050b8bb", + "pi_pin": "userinit.exe", + "pi_pki": "No", + "pi_pmd5": "7c90dc5c-1878-aafb-658f-c9f2abb238f1", + "pi_ps": "0", + "pi_rmods": "-", + "pi_thrds": "-", + "pi_vs": "No", + "ua_ad": "-", + "ua_appun": "-", + "ua_ar": "No", + "ua_dnsq": "-", + "ua_drpt": "-", + "ua_drsn": "-", + "ua_eeu": "2024-08-17 11:59:18 PM", + "ua_efs": "-", + "ua_fr": "-", + "ua_fun": "-", + "ua_hn": "-", + "ua_imagebase": "-", + "ua_la": "No", + "ua_ldfai": "-", + "ua_ldfrf": "-", + "ua_ldfrt": "-", + "ua_ldfui": "-", + "ua_lp": "-", + "ua_md": "No", + "ua_meid": "cfc09e86-a4e6-1035-5fc0-806e7fce78b2", + "ua_ms": "-", + "ua_msb": "-", + "ua_nda": "-", + "ua_ndt": "-", + "ua_ndu": "-", + "ua_ob": "-", + "ua_pa": "-", + "ua_pt": "-", + "ua_ra": "-", + "ua_rp": "-", + "ua_sa": "-", + "ua_sc": "-", + "ua_sci": "-", + "ua_scn": "-", + "ua_scr": "-", + "ua_scrs": "-", + "ua_scrt": "-", + "ua_sct": "-", + "ua_scu": "-", + "ua_scv": "-", + "ua_shn": "-", + "ua_sme": "-", + "ua_sms": "-", + "ua_sn": "-", + "ua_up": "-", + "ua_we": "-", + "ua_wi": "-", + "uad_br": "36.0 KB", + "uad_bw": "36.0 KB", + "uad_cf": "-", + "uad_dbt": "RAID", + "uad_dcf": "No", + "uad_dcru": "-", + "uad_ddt": "Fixed", + "uad_dea": "None", + "uad_dfc": "No", + "uad_dir": "No", + "uad_dlau": "-", + "uad_dmou": "-", + "uad_dp": "c:\\$recycle.bin\\s-1-5-21-1573680173-1931375354-1090983491-38523\\$r4ztwqq.pdf", + "uad_fat": "-", + "uad_fattm": "-", + "uad_fh": "-", + "uad_fown": "-", + "uad_ft": "-", + "uad_hkad": "-", + "uad_hkby": "-", + "uad_hkom": "-", + "uad_pn": "-", + "uad_regdp": "-", + "uad_regsp": "-", + "uad_regvt": "-", + "uad_sbt": "USB", + "uad_sc": "No", + "uad_sdt": "Fixed", + "uad_sea": "None", + "uad_sfc": "No", + "uad_sir": "No", + "uad_sp": "c:\\users\\eah915\\downloads\\eam quarterly security inspection template 12_7_2017 (2).pdf" +} +``` +
+ +### Sample query + +```sql title="Activities By Protocol" +_sourceCategory="Labs/DigitalGuardian" +| json "dg_guid", "dg_utype", "dg_cn", "dg_user", "dg_machine_name", "dg_proc_file_name", "dg_time", "ua_pt" as id, operation_type, company_name, user, computer, application_name, time, protocol nodrop + +/// global variables +| where operation_type matches "{{operation_type}}" +| where company_name matches "{{company_name}}" + +| where !(protocol matches "-") AND !isBlank(protocol) +| count by id, time, protocol +| count as frequency by protocol +| sort by frequency +``` + +## Set up collection + +To set up the [Digital Guardian Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/digital-guardian-source), follow the instructions provided. These instructions will guide you through the process of creating a source using the Digital Guardian Source category, which you will need to use when installing the app. By following these steps, you can ensure that your Digital Guardian ARC app is properly integrated and configured to collect and analyze your Digital Guardian ARC data. + +## Installing the Digital Guardian ARC app​​ + +import AppInstall2 from '../../reuse/apps/app-install-v2.md'; + + + +## Viewing the Digital Guardian ARC dashboard + +import ViewDashboards from '../../reuse/apps/view-dashboards.md'; + + + +### Overview + +The **Digital Guardian ARC - Overview** dashboard offers a centralized view of data activities, enabling security analysts to monitor and secure sensitive information effectively. It highlights critical metrics such as total activities, blocked actions, unauthorized PKI activities, and rule violations for immediate visibility into security events. Analysts can track network activity by protocol (for example, HTTP, IPsec) and identify operational types like file creation, deletion, and transfer. File type access insights helps you to detect malicious files or unauthorized usage, while top users, computers, and applications provide a snapshot of entities generating the most activity. + +The dashboard includes geolocation maps for sender and recipient activity to identify unusual or risky data transfers across regions. It also highlights potentially risky geographies associated with flagged behaviors. Authentication insights, such as failed login attempts, enable analysts to investigate credential misuse or brute-force attempts. Process monitoring lists metadata like file size, path, and user domain to identify risky operations. Historical activity trends help detect abnormal surges or patterns. + +This tool is particularly effective for detecting incidents, managing insider threats, and ensuring compliance by tracking rule-violated activities. It supports threat-hunting efforts by correlating risky behaviors with geolocation and operational context. The focus on endpoint activity, unauthorized operations, and certificate analysis strengthens an organization’s data security posture. Security analysts can leverage these insights to identify and mitigate risks proactively, securing critical assets and sensitive data. The dashboard integrates seamlessly with Digital Guardian ARC, enabling a robust framework for real-time monitoring and investigation.
Digital-Guardian-ARC-Overview + +## Create monitors for Digital Guardian ARC app + +import CreateMonitors from '../../reuse/apps/create-monitors.md'; + + + +### Digital Guardian ARC monitors + +| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition | +|:--|:--|:--|:--| +| `Blocked Events` | This alert is fired when there are blocked events. | Critical | Count > 0 | +| `Failed Login Attempt` | This alert tracks repeated failed login attempts on monitored systems. It aids in identifying brute-force attacks, credential stuffing, or unauthorized access attempts, allowing analysts to take corrective actions to secure accounts and investigate potential insider threats. | Critical | Count > 3| +| `Recipient Activities from Risky Locations` | This alert identifies activities involving recipients located in regions flagged as risky or suspicious. It enables analysts to assess potential data exfiltration risks or unauthorized sharing of sensitive information, thereby strengthening data protection measures. | Critical | Count > 0 | +| `Rule Violation Events` | This alert highlights incidents, where monitored systems or users, have violated predefined security rules. It provides insights into non-compliant behavior, supporting analysts in enforcing organizational security policies and maintaining compliance standards. | Critical | Count > 0 | +| `Sender Activities from Risky Locations` | This alert tracks activities initiated by senders located in high-risk geographic regions. It helps analysts detect and respond to potential threats involving unauthorized data transmission, insider threats, or compromised systems in critical locations. | Critical | Count > 0 | + +## Upgrade/downgrade the Digital Guardian ARC app (optional) + +import AppUpdate from '../../reuse/apps/app-update.md'; + + + +## Uninstalling the Digital Guardian ARC app (optional) + +import AppUninstall from '../../reuse/apps/app-uninstall.md'; + + diff --git a/docs/integrations/saas-cloud/index.md b/docs/integrations/saas-cloud/index.md index 931f322bf1..99031e8479 100644 --- a/docs/integrations/saas-cloud/index.md +++ b/docs/integrations/saas-cloud/index.md @@ -111,6 +111,12 @@ Learn about the Sumo Logic apps for SaaS and Cloud applications.

Gather real-time visibility into the vulnerabilities.

+
+
+ Thumbnail icon

Digital Guardian ARC

+

Monitor, detect, and respond to critical events.

+
+
Thumbnail icon

DocuSign

diff --git a/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon.md b/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon.md index 78e2d886e2..312ffa1288 100644 --- a/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon.md +++ b/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon.md @@ -7,8 +7,8 @@ import useBaseUrl from '@docusaurus/useBaseUrl'; crowdstrike-falcon -***Version: 1.10 -Updated: Oct 16, 2024*** +***Version: 1.12 +Updated: Nov 28, 2024*** The CrowdStrike Falcon integration allows you to pull and update Detections/Incidents, and search Incidents/Devices/Detections. @@ -29,6 +29,9 @@ The CrowdStrike Falcon integration allows you to pull and update Detections/Inci * **Search into Incidents** *(Enrichment)* - Search for incidents by providing an FQL filter, sorting, and paging details. * **Update Detections** *(Containment)* - Modify the state or assignee of Detections. +* **Update Alerts** *(Containment)* - Perform actions on Alerts identified by composite ID(s) in request. +* **Search into Alerts** *(Enrichment)* - Retrieves all Alerts IDs that match a given query. +* **Alerts CrowdStrike Falcon Daemon** *(Daemon)* - Daemon to pull CrowdStrike Alerts. ## Category @@ -56,3 +59,7 @@ EDR * October 16, 2024 (v1.10) - Added new actions + Create Indicators + Get Indicators +* November 28, 2024 (v1.12) - Added new actions + + Update Alerts + + Search into Alerts + + Alerts CrowdStrike Falcon Daemon diff --git a/docs/platform-services/threat-intelligence-indicators.md b/docs/platform-services/threat-intelligence-indicators.md index 1cc9b27cc8..b4b4c41c43 100644 --- a/docs/platform-services/threat-intelligence-indicators.md +++ b/docs/platform-services/threat-intelligence-indicators.md @@ -68,7 +68,7 @@ To access the **Threat Intelligence** tab, go to **Manage Data > Logs > Threat I Threat Intelligence tab -1. **Add Indicators**. Click to upload files that [add threat intelligence indicators](#add-indicators-in-the-threat-intelligence-tab). +1. **+ Add Indicators**. Click to upload files that [add threat intelligence indicators](#add-indicators-in-the-threat-intelligence-tab). 1. **Actions**. Select to perform additional actions: * **Edit Retention Period**. Enter the length of time in days to retain expired threat intelligence indicator files. The maximum number of days is 180. See [Change the retention period for expired indicators](#change-the-retention-period-for-expired-indicators). 1. **Source Name**. The source of the threat intelligence indicator file. @@ -89,7 +89,7 @@ You can also add threat intelligence indicators using the API or a collector. Se ::: 1. In Sumo Logic, go to **Manage Data > Logs > Threat Intelligence**. -1. Click **Add Indicators**. The dialog displays.
Add threat intelligence indicators +1. Click **+ Add Indicators**. The dialog displays.
Add threat intelligence indicators 1. Select the format of the file to be uploaded: * **Normalized JSON**. A normalized JSON file. * **CSV**. A comma-separated value (CSV) file. @@ -107,10 +107,7 @@ When you add indicators, the event is recorded in the Audit Event Index. See [Au 1. In Sumo Logic, go to **Manage Data > Logs > Threat Intelligence**. 1. Select a source in the list of sources. Details of the source appear in a sidebar. -1. Click **Delete Indicators**. The following dialog appears.
Delete threat intelligence indicators -1. Select indicators to delete from the source: - * **Delete all indicators**. Remove all indicators from the source. - * **Delete indicators matching the expression**. Enter the attribute and value to match. For example, if you want to delete indicators with certain "valid until" dates from **Sumo normalized JSON** files, for an attribute enter `validUntil` and for a value enter a date. The attributes and values you enter must match attributes and values in the indicators. +1. Click **Delete Indicators**. The following message appears: **Delete all indicators for ``**. 1. Click **Delete**. :::note diff --git a/docs/search/copilot.md b/docs/search/copilot.md index 65f9ec1e0d..8e4fbfcf48 100644 --- a/docs/search/copilot.md +++ b/docs/search/copilot.md @@ -1,7 +1,7 @@ --- id: copilot -title: Sumo Logic Copilot - Feature Preview -sidebar_label: Copilot - Preview +title: Sumo Logic Copilot +sidebar_label: Copilot description: Streamline your log analysis with Sumo Logic Copilot, our AI-based assistant designed to simplify log analysis by allowing you to ask questions in plain English and providing search suggestions without the need to write log queries. keywords: - copilot @@ -14,8 +14,8 @@ keywords: import Iframe from 'react-iframe'; import useBaseUrl from '@docusaurus/useBaseUrl'; -:::sumo Preview release -This is a Preview release. To learn more, contact your Sumo Logic account executive. To opt out, please open a [support ticket](https://support.sumologic.com/support/s/). +:::note +If you need to opt out, please open a [support ticket](https://support.sumologic.com/support/s/). ::: Sumo Logic Copilot is our AI-powered assistant that accelerates investigations and troubleshooting in logs by allowing you to ask questions in plain English and get contextual suggestions, helping first responders get to answers faster. @@ -41,7 +41,7 @@ Copilot accelerates incident response by combining prebuilt contextual insights * **Natural language queries**. Ask questions in plain English. * **Contextual suggestions**. Get suggestions relevant to your troubleshooting and investigations context. * **Conversation history**. Save and resume troubleshooting or investigation sessions without losing context. -* **Auto-visualize**. Copilot automatically generates charts from search results, which you can add directly to dashboards. +* **Auto-visualize**. Copilot automatically generates charts from search results, which you can add directly to dashboards, reducing time and effort in data interpretation. * **Log compatibility**. Copilot supports structured logs, semi-structured logs (partial JSON), and unstructured logs (e.g., Palo Alto Firewall) when Field Extraction Rules (FERs) are applied. This ensures valuable insights across a variety of log formats. * **Enhanced query experience**. Auto-complete to streamline natural language queries. @@ -60,6 +60,9 @@ Copilot is ideal for users of all skill levels: * **On-call engineers**. Accelerate time to resolution by surfacing key troubleshooting insights. * **Security engineers**. Obtain security insights rapidly for faster security incident resolution. +* **Early career professionals**. Simplifies troubleshooting with natural language queries, making incident resolution accessible to those unfamiliar with query syntax. +* **Practitioners**. Speeds up workflows with auto-complete and context-aware suggestions for frequent tasks. +* **Experts**. Provides IDE-style assistance for crafting complex queries efficiently. ## How to use Copilot @@ -112,17 +115,14 @@ Broad questions may not yield accurate results. For best outcomes, frame your qu Break your questions into smaller, specific requirements to help Copilot provide more accurate answers.
Copilot time period - - #### Tips and tricks * **Start with a broad query**. Begin with a query like `Show me the most recent logs` to understand the structure and available fields in your logs. * **Disambiguate field names**. If fields have similar names and cause confusion, explicitly specify the field (e.g., ``) to improve accuracy. * **Experiment with phrasing**. Try multiple variations of a query to provide context and receive more relevant suggestions. * **Include time or variations to add `timeslice` as a dimension**. When timeslicing data, include the term `time` in your query. For example: `Count requests, every 1m, different code challenges and user used during login attempts by time`. +* **Explore context-aware suggestions**. Use prompts like `Calculate 95th percentile latency` or `Visualize request volumes over time` to quickly surface key metrics. +* **Detect malicious activity**. Try queries like `Count register requests by 503 status code, IP, and threat confidence` to uncover potential DDoS attacks. Below are examples of how you can phrase queries if the autocompletions and contextual suggestions are not relevant to you: @@ -136,6 +136,23 @@ Below are examples of how you can phrase queries if the autocompletions and cont ::: * `Apply logreduce to logs` +More examples: + +* Detecting malicious activity: + ``` + Count logs by action. Sort the results. + Filter results by action contains Malicious. + ``` +* Advanced analysis with users and URLs: + ``` + Count logs by action, url, user. + Sort the results. Filter results by action contains Malicious. + ``` +* Root cause analysis for latency: + ``` + Calculate 95th percentile latency by service and API. + ``` + Additional prompts can trigger more advanced activities (e.g., mapping network activity against CrowdStrike): * `Analyze risk and severity of network activity` @@ -171,7 +188,7 @@ If required, select your preferred chart type, such as **Table**, **Bar**, **Col You can manually edit your log search query code if needed. -1. Click in the code editor field and edit your search. Not familiar with Sumo Logic query language? See [Search Query Language](/docs/search/search-query-language) to learn more.
Copilot time period +1. Click in the code editor field and edit your search. New to Sumo Logic query language? Learn more in the [Search Query Language](/docs/search/search-query-language) guide.
Copilot time period 1. When you're done, press Enter or click the search button.
Copilot time period :::tip @@ -196,13 +213,15 @@ If your log query contains a mix of JSON and non-JSON formatting (i.e., a log fi #### History -Often, users work on multiple incidents at the same time. To view Copilot interactions related to these incidents, click **History**.
Copilot History +Conversation History saves all previous queries and suggestions, allowing you to backtrack and refine your investigation. For example, if a status code analysis yields inconclusive results, revisit earlier queries to explore other hypotheses. -You can resume a conversation in two ways: +This functionality comes in handy when you're working on multiple incidents at the same time. To view Copilot interactions related to an incident, click **History**. +
Copilot History -First, the Resume conversation icon picks up from the last query in a conversation.
Copilot History +You can resume a conversation in two ways: -Second, you can resume from a specific query in a conversation by clicking on the row in the conversation history and then clicking on the gray area on the right side, as shown below.
Copilot History +* Click the **Resume conversation** icon to pick up from the last query in a conversation.
Copilot History +* Click on the row in the conversation history, and then click the gray area on the right side to resume from a specific query in a conversation.
Copilot History #### New Conversation diff --git a/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/index.md b/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/index.md index 02f6f13390..fa5dd949d8 100644 --- a/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/index.md +++ b/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/index.md @@ -492,6 +492,12 @@ In this section, we'll introduce the following concepts: Thumbnail icon

Trend Micro

Learn how to collect alert details from Trend Micro platform.

+
+
+
+ Thumbnail icon

Universal Connector Source

+

Learn how to set up a Universal Connector to collect data into the Sumo Logic environment.

+
diff --git a/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/config-based-source.md b/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/universal-connector-source.md similarity index 98% rename from docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/config-based-source.md rename to docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/universal-connector-source.md index 709ee2878e..52257a4be9 100644 --- a/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/config-based-source.md +++ b/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/universal-connector-source.md @@ -1,5 +1,5 @@ --- -id: config-based-source +id: universal-connector-source title: Universal Connector sidebar_label: Universal Connector description: Learn how to set up a Universal Connector to collect data into the Sumo Logic environment. @@ -9,12 +9,6 @@ import CodeBlock from '@theme/CodeBlock'; import ForwardToSiem from '/docs/reuse/forward-to-siem.md'; import useBaseUrl from '@docusaurus/useBaseUrl'; - - - - -

Beta

- With our Universal Connector cloud source, you can collect log data from vendor APIs with a modular configuration. The goal of this source is for Sumo Logic to expand the configuration modules over time giving greater compatibility with vendor APIs, but to acknowledge complex APIs will still require a specific cloud source and not be compatible with this source. ## Setup @@ -313,8 +307,8 @@ Sources can be configured using UTF-8 encoded JSON files with the Collector Ma | Parameter | Type | Value | Required | Description | | :--------- | :---------- | :-------------------------------------------- | :------- | :------------------------------- | -| schemaRef | JSON Object | `{"type":"Config Based"}` | Yes | Define the specific schema type. | -| sourceType | String | `"Config Based"` | Yes | Type of source. | +| schemaRef | JSON Object | `{"type":"Universal Connector"}` | Yes | Define the specific schema type. | +| sourceType | String | `"Universal Connector"` | Yes | Type of source. | | config | JSON Object | [Configuration object](#configuration-object) | Yes | Source type specific values. | ### Configuration Object @@ -441,6 +435,8 @@ The syntax for this function requires a timestamp format as a single argument. R | :------------------------------------------------------------- | :---------------------------------- | | `{{ .WindowEndUTC "2006-01-02T15:04:05Z" }}` | `2024-03-07T20:15:56Z` | | `{{ .WindowEndUTC "2006-01-02T15:04:05.999999Z07:00" }}` | `2024-03-07T20:15:56.905571Z` | +| `{{ .WindowEndUTC "epoch" }}` | `1709842556` | +| `{{ .WindowEndUTC "epochMilli" }}` | `1709842556000` | | `lessThan:{{ .WindowEndUTC "2006-01-02T15:04:05.999Z07:00" }}` | `lessThan:2024-03-07T20:15:56.905Z` | ### WindowEndLocation @@ -506,6 +502,8 @@ We recommend using [this code snippet](https://goplay.tools/snippet/WTFe5ZLU9PO) | :-------------------- | :------------------------------- | :------------------------------------ | | RFC 3339 | `2024-02-01T16:07:57Z` | `2006-01-02T15:04:05Z07:00` | | RFC 3339 Nano Seconds | `2024-02-01T16:07:57.541468757Z` | `2006-01-02T15:04:05.999999999Z07:00` | +| Epoch | `1706803677` | `epoch` | +| Epoch in Milliseconds | `1706803677000` | `epochMilli` | ## FAQ diff --git a/sidebars.ts b/sidebars.ts index aff125b20e..bd4d2bc50b 100644 --- a/sidebars.ts +++ b/sidebars.ts @@ -468,6 +468,7 @@ module.exports = { 'send-data/hosted-collectors/cloud-to-cloud-integration-framework/tenable-source', 'send-data/hosted-collectors/cloud-to-cloud-integration-framework/trellix-mvisio-epo-source', 'send-data/hosted-collectors/cloud-to-cloud-integration-framework/trend-micro-source', + 'send-data/hosted-collectors/cloud-to-cloud-integration-framework/universal-connector-source', 'send-data/hosted-collectors/cloud-to-cloud-integration-framework/webex-source', 'send-data/hosted-collectors/cloud-to-cloud-integration-framework/workday-source', 'send-data/hosted-collectors/cloud-to-cloud-integration-framework/zendesk-source', @@ -2145,6 +2146,7 @@ integrations: [ 'integrations/microsoft-azure/azure-synapse-analytics', 'integrations/microsoft-azure/azure-virtual-network', 'integrations/microsoft-azure/kubernetes', + 'integrations/microsoft-azure/microsoft-defender-for-cloud', 'integrations/microsoft-azure/microsoft-dynamics365-customer-insights', 'integrations/microsoft-azure/network-watcher', 'integrations/microsoft-azure/sql', @@ -2456,9 +2458,10 @@ integrations: [ 'integrations/saas-cloud/crowdstrike-fdr-host-inventory', 'integrations/saas-cloud/crowdstrike-spotlight', 'integrations/saas-cloud/datadog', - 'integrations/saas-cloud/druva', + 'integrations/saas-cloud/digital-guardian-arc', 'integrations/saas-cloud/docusign', 'integrations/saas-cloud/dropbox', + 'integrations/saas-cloud/druva', 'integrations/saas-cloud/druva-cyber-resilience', 'integrations/saas-cloud/fastly', 'integrations/saas-cloud/gmail-tracelogs', diff --git a/static/img/integrations/microsoft-azure/data-explorer.png b/static/img/integrations/microsoft-azure/data-explorer.png new file mode 100644 index 0000000000..1332a94c9b Binary files /dev/null and b/static/img/integrations/microsoft-azure/data-explorer.png differ diff --git a/static/img/integrations/microsoft-azure/event-hub-instance-blade.png b/static/img/integrations/microsoft-azure/event-hub-instance-blade.png new file mode 100644 index 0000000000..b676be4779 Binary files /dev/null and b/static/img/integrations/microsoft-azure/event-hub-instance-blade.png differ diff --git a/static/img/integrations/microsoft-azure/live-tailing.png b/static/img/integrations/microsoft-azure/live-tailing.png new file mode 100644 index 0000000000..a7d0896c7f Binary files /dev/null and b/static/img/integrations/microsoft-azure/live-tailing.png differ diff --git a/static/img/integrations/microsoft-azure/microsoft-defender-for-cloud.png b/static/img/integrations/microsoft-azure/microsoft-defender-for-cloud.png new file mode 100644 index 0000000000..76cde9a069 Binary files /dev/null and b/static/img/integrations/microsoft-azure/microsoft-defender-for-cloud.png differ diff --git a/static/img/integrations/microsoft-azure/validate-microsoft-defender-alerts.png b/static/img/integrations/microsoft-azure/validate-microsoft-defender-alerts.png new file mode 100644 index 0000000000..ab595546df Binary files /dev/null and b/static/img/integrations/microsoft-azure/validate-microsoft-defender-alerts.png differ diff --git a/static/img/platform-services/threat-intelligence-delete-indicators.png b/static/img/platform-services/threat-intelligence-delete-indicators.png deleted file mode 100644 index 6ed756637f..0000000000 Binary files a/static/img/platform-services/threat-intelligence-delete-indicators.png and /dev/null differ diff --git a/static/img/search/copilot/ga-releasenote.png b/static/img/search/copilot/ga-releasenote.png new file mode 100644 index 0000000000..9c3b89fb9b Binary files /dev/null and b/static/img/search/copilot/ga-releasenote.png differ diff --git a/static/img/search/copilot/resume-convo-history2.png b/static/img/search/copilot/resume-convo-history2.png index a637ce9817..456e85d6eb 100644 Binary files a/static/img/search/copilot/resume-convo-history2.png and b/static/img/search/copilot/resume-convo-history2.png differ diff --git a/static/img/send-data/export-logs-diagnostic-settings-cosmosdbforpostgresql.png b/static/img/send-data/export-logs-diagnostic-settings-cosmosdbforpostgresql.png new file mode 100644 index 0000000000..d9ba0db395 Binary files /dev/null and b/static/img/send-data/export-logs-diagnostic-settings-cosmosdbforpostgresql.png differ diff --git a/static/img/send-data/export-metrics-diagnostic-settings-cosmosdbforpostgresql.png b/static/img/send-data/export-metrics-diagnostic-settings-cosmosdbforpostgresql.png new file mode 100644 index 0000000000..5cf663cc1c Binary files /dev/null and b/static/img/send-data/export-metrics-diagnostic-settings-cosmosdbforpostgresql.png differ