diff --git a/cid-redirects.json b/cid-redirects.json index 9ea150239f..ba54a5f6e8 100644 --- a/cid-redirects.json +++ b/cid-redirects.json @@ -1331,9 +1331,9 @@ "/07Sumo-Logic-Apps/26Apps_for_Sumo/PCI_Compliance_through_Professional_Services/PCI-Reports": "/docs/integrations/pci-compliance", "/07Sumo-Logic-Apps/26Apps_for_Sumo/PCI_Compliance/PCI-Reports": "/docs/integrations/pci-compliance", "/07Sumo-Logic-Apps/26Apps_for_Sumo/Request_Enterprise_Apps": "/docs/integrations", - "/07Sumo-Logic-Apps/26Apps_for_Sumo/Security_Analytics_App": "/docs/integrations/sumo-apps/security-analytics", - "/07Sumo-Logic-Apps/26Apps_for_Sumo/Security_Analytics_App/Security-Analytics-App-Dashboards": "/docs/integrations/sumo-apps/security-analytics", - "/07Sumo-Logic-Apps/26Apps_for_Sumo/Security_Analytics_App/Using-the-Sumo-Logic-App-for-Security-Analytics": "/docs/integrations/sumo-apps/security-analytics", + "/07Sumo-Logic-Apps/26Apps_for_Sumo/Security_Analytics_App": "/docs/integrations/sumo-apps", + "/07Sumo-Logic-Apps/26Apps_for_Sumo/Security_Analytics_App/Security-Analytics-App-Dashboards": "/docs/integrations/sumo-apps", + "/07Sumo-Logic-Apps/26Apps_for_Sumo/Security_Analytics_App/Using-the-Sumo-Logic-App-for-Security-Analytics": "/docs/integrations/sumo-apps", "/07Sumo-Logic-Apps/Apps_and_Sumo_Logic_Account_Plans": "/docs/integrations/account-plans", "/07Sumo-Logic-Apps/AWS_API_Gateway": "/docs/integrations/amazon-aws/api-gateway", "/07Sumo-Logic-Apps/Cloud_Security_Monitoring_and_Analytics": "/docs/integrations/cloud-security-monitoring-analytics", @@ -2512,8 +2512,8 @@ "/cid/5335": "/docs/search", "/cid/5336": "/docs/send-data/collection/search-for-a-collector-or-source", "/cid/5339": "/docs/search/behavior-insights/logreduce", - "/cid/5340": "/docs/integrations/sumo-apps/security-analytics", - "/cid/5341": "/docs/integrations/sumo-apps/security-analytics", + "/cid/5340": "/docs/integrations/sumo-apps", + "/cid/5341": "/docs/integrations/sumo-apps", "/cid/5342": "/docs/alerts/webhook-connections/servicenow", "/cid/5344": "/docs/search/get-started-with-search/search-page/set-messages-tab-preferences", "/cid/5345": "/docs/search/get-started-with-search/build-search/set-time-range", @@ -2521,7 +2521,7 @@ "/cid/5348": "/docs/send-data/installed-collectors", "/cid/5349": "/docs/alerts/scheduled-searches/create-real-time-alert", "/cid/5350": "/docs/alerts/webhook-connections/servicenow/set-up-connections", - "/cid/5351": "/docs/integrations/sumo-apps/security-analytics", + "/cid/5351": "/docs/integrations/sumo-apps", "/cid/5352": "/docs/integrations/pci-compliance", "/cid/5353": "/docs/search/get-started-with-search/search-basics", "/cid/5356": "/docs/dashboards/panels/modify-chart", @@ -4273,7 +4273,7 @@ "/docs/cse/cloud-siem/mapping-map-record-fields-to-schema": "/docs/cse/schema/create-structured-log-mapping", "/docs/cse/cloud-siem/entities": "/docs/cse/records-signals-entities-insights", "/docs/cse/introduction-to-cloud-siem": "/docs/cse/get-started-with-cloud-siem", - "/docs/integrations/sumo-apps/security-foundations": "/docs/integrations/sumo-apps/security-analytics", + "/docs/integrations/sumo-apps/security-foundations": "/docs/integrations/sumo-apps", "/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs/collect-with-amazon-kinesis": "/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs", "/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs/collect-with-collector-script": "/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs", "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/ms-graph-azure-ad-reporting-source": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-azure-ad-reporting-source", @@ -4415,5 +4415,6 @@ "/docs/manage/manage-subscription/manage-org-settings": "/docs/manage/manage-subscription/create-and-manage-orgs/manage-org-settings", "/docs/integrations/amazon-aws/elastic-load-balancing": "/docs/integrations/amazon-aws/classic-load-balancer", "/docs/integrations/microsoft-azure/microsoft-defender-for-cloud": "/docs/integrations/microsoft-azure/azure-security-defender-for-cloud", - "/docs/integrations/azure": "/docs/integrations/microsoft-azure" + "/docs/integrations/azure": "/docs/integrations/microsoft-azure", + "/docs/integrations/sumo-apps/security-analytics": "/docs/integrations/sumo-apps" } diff --git a/docs/integrations/product-list/product-list-m-z.md b/docs/integrations/product-list/product-list-m-z.md index 5fc1403999..823a850929 100644 --- a/docs/integrations/product-list/product-list-m-z.md +++ b/docs/integrations/product-list/product-list-m-z.md @@ -163,7 +163,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [ | Thumbnail icon | [Strimzi](https://strimzi.io/) | App: [Strimzi Kafka](/docs/integrations/containers-orchestration/strimzi-kafka/) | | Thumbnail icon | [Stripe](https://stripe.com/) | Webhook: [Stripe](/docs/integrations/webhooks/stripe/) | | Thumbnail icon | [Sucuri](https://sucuri.net/) | Cloud SIEM integration: [Sucuri](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/cdfd2ba0-77eb-4e11-b071-6f4d01fda607.md) | -| Thumbnail icon | [Sumo Logic](https://www.sumologic.com/) | Apps:
- [Enterprise Audit - Cloud SIEM](/docs/integrations/sumo-apps/cse/)
- [Flex](/docs/integrations/sumo-apps/flex/)
- [Sumo Collection](/docs/integrations/saas-cloud/sumo-collection)
- [Sumo Logic Audit](/docs/integrations/sumo-apps/audit/)
- [Sumo Logic Data Volume](/docs/integrations/sumo-apps/data-volume/)
- [Sumo Logic Enterprise Audit](/docs/integrations/sumo-apps/enterprise-audit/) (multiple apps)
- [Sumo Logic Enterprise Search Audit](/docs/integrations/sumo-apps/enterprise-search-audit/)
- [Sumo Logic Infrequent Data Tier](/docs/integrations/sumo-apps/infrequent-data-tier/)
- [Sumo Logic Kickstart Data](/docs/integrations/sumo-apps/kickstart-data)
- [Sumo Logic Log Analysis QuickStart](/docs/integrations/sumo-apps/log-analysis-quickstart/)
- [Sumo Logic Security Analytics](/docs/integrations/sumo-apps/security-analytics/)
Automation integrations:
- [Automation Tools](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-automation-tools/)
- [Basic Tools](/docs/platform-services/automation-service/app-central/integrations/basic-tools/)
- [ESMTP](/docs/platform-services/automation-service/app-central/integrations/esmtp/)
- [HTTP Tools](/docs/platform-services/automation-service/app-central/integrations/http-tools/)
- [Incident Tools](/docs/platform-services/automation-service/app-central/integrations/incident-tools/)
- [IMAP](/docs/platform-services/automation-service/app-central/integrations/imap/)
- [Mail Tools](/docs/platform-services/automation-service/app-central/integrations/mail-tools/)
- [POP3](/docs/platform-services/automation-service/app-central/integrations/pop3/)
- [SMTP V3](/docs/platform-services/automation-service/app-central/integrations/smtp-v3/)
- [Sumo Logic Cloud SIEM](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-cloud-siem/)
- [Sumo Logic Cloud SIEM Internal](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-cloud-siem-internal/)
- [Sumo Logic Log Analytics](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics/)
- [Sumo Logic Log Analytics Internal](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics-internal/)
- [Sumo Logic Notifications](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications/)
- [Sumo Logic Notifications by Gmail](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications-by-gmail/)
- [Sumo Logic Notifications by Microsoft](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications-by-microsoft)
- [Triage Tools](/docs/platform-services/automation-service/app-central/integrations/triage-tools/)
- [ZIP Tools](/docs/platform-services/automation-service/app-central/integrations/zip-tools/)
Cloud SIEM integration: [Sumo Logic](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/34A5019C-7BEC-4BF8-A3B7-C38D567126C6.md)
Collector:
- [Sumo Collection](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/sumo-collection-source)
- [Universal Connector](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/universal-connector-source)
Community app: [Cloud Security Posture Management (CSPM) for Sumo Logic](https://github.com/SumoLogic/sumologic-content/tree/master/CSPM)
Webhooks:
- [Scheduled Searches for Webhook Connections](/docs/alerts/webhook-connections/schedule-searches-webhook-connections/)
- [Using the Audit Index with Webhook Connections](/docs/alerts/webhook-connections/audit-index/)
- [Webhook Connection for Cloud SOAR](/docs/alerts/webhook-connections/cloud-soar/) | +| Thumbnail icon | [Sumo Logic](https://www.sumologic.com/) | Apps:
- [Enterprise Audit - Cloud SIEM](/docs/integrations/sumo-apps/cse/)
- [Flex](/docs/integrations/sumo-apps/flex/)
- [Sumo Collection](/docs/integrations/saas-cloud/sumo-collection)
- [Sumo Logic Audit](/docs/integrations/sumo-apps/audit/)
- [Sumo Logic Data Volume](/docs/integrations/sumo-apps/data-volume/)
- [Sumo Logic Enterprise Audit](/docs/integrations/sumo-apps/enterprise-audit/) (multiple apps)
- [Sumo Logic Enterprise Search Audit](/docs/integrations/sumo-apps/enterprise-search-audit/)
- [Sumo Logic Infrequent Data Tier](/docs/integrations/sumo-apps/infrequent-data-tier/)
- [Sumo Logic Kickstart Data](/docs/integrations/sumo-apps/kickstart-data)
- [Sumo Logic Log Analysis QuickStart](/docs/integrations/sumo-apps/log-analysis-quickstart/)
Automation integrations:
- [Automation Tools](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-automation-tools/)
- [Basic Tools](/docs/platform-services/automation-service/app-central/integrations/basic-tools/)
- [ESMTP](/docs/platform-services/automation-service/app-central/integrations/esmtp/)
- [HTTP Tools](/docs/platform-services/automation-service/app-central/integrations/http-tools/)
- [Incident Tools](/docs/platform-services/automation-service/app-central/integrations/incident-tools/)
- [IMAP](/docs/platform-services/automation-service/app-central/integrations/imap/)
- [Mail Tools](/docs/platform-services/automation-service/app-central/integrations/mail-tools/)
- [POP3](/docs/platform-services/automation-service/app-central/integrations/pop3/)
- [SMTP V3](/docs/platform-services/automation-service/app-central/integrations/smtp-v3/)
- [Sumo Logic Cloud SIEM](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-cloud-siem/)
- [Sumo Logic Cloud SIEM Internal](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-cloud-siem-internal/)
- [Sumo Logic Log Analytics](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics/)
- [Sumo Logic Log Analytics Internal](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-log-analytics-internal/)
- [Sumo Logic Notifications](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications/)
- [Sumo Logic Notifications by Gmail](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications-by-gmail/)
- [Sumo Logic Notifications by Microsoft](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-notifications-by-microsoft)
- [Triage Tools](/docs/platform-services/automation-service/app-central/integrations/triage-tools/)
- [ZIP Tools](/docs/platform-services/automation-service/app-central/integrations/zip-tools/)
Cloud SIEM integration: [Sumo Logic](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/34A5019C-7BEC-4BF8-A3B7-C38D567126C6.md)
Collector:
- [Sumo Collection](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/sumo-collection-source)
- [Universal Connector](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/universal-connector-source)
Community app: [Cloud Security Posture Management (CSPM) for Sumo Logic](https://github.com/SumoLogic/sumologic-content/tree/master/CSPM)
Webhooks:
- [Scheduled Searches for Webhook Connections](/docs/alerts/webhook-connections/schedule-searches-webhook-connections/)
- [Using the Audit Index with Webhook Connections](/docs/alerts/webhook-connections/audit-index/)
- [Webhook Connection for Cloud SOAR](/docs/alerts/webhook-connections/cloud-soar/) | | Thumbnail icon | [Superwise](https://superwise.ai/) | Webhook: [Superwise](/docs/integrations/webhooks/superwise/) | | Thumbnail icon | [Symantec](https://sep.securitycloud.symantec.com/v2/landing) | App:
- [Symantec Endpoint Security Service](/docs/integrations/saas-cloud/symantec-endpoint-security-service/)
- [Symantec Web Security Service](/docs/integrations/saas-cloud/symantec-web-security-service/)
Automation integrations:
- [Javelin AD Protect](/docs/platform-services/automation-service/app-central/integrations/javelin-ad-protect/)
- [Symantec DeepSight](/docs/platform-services/automation-service/app-central/integrations/symantec-deepsight/)
- [Symantec EDR](/docs/platform-services/automation-service/app-central/integrations/symantec-edr/)
- [Symantec Endpoint Protection](/docs/platform-services/automation-service/app-central/integrations/symantec-endpoint-protection/)
- [Symantec Endpoint Protection Cloud](/docs/platform-services/automation-service/app-central/integrations/symantec-endpoint-protection-cloud/)
- [Symantec Secure Web Gateway (Bluecoat)](/docs/platform-services/automation-service/app-central/integrations/symantec-secure-web-gateway-bluecoat/)
- [Symantec WebPulse](/docs/platform-services/automation-service/app-central/integrations/symantec-webpulse/)
Collectors:
- [Symantec Endpoint Security Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-endpoint-security-source/)
- [Symantec Web Security Service Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-web-security-service-source/)
Cloud SIEM integration: [Symantec](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/64c7f49c-f95a-4f4a-8540-56ec5fb1d96b.md)
Community app: [Sumo Logic for Symantec WSS](https://github.com/SumoLogic/sumologic-content/tree/master/Symantec/WSS) | | Thumbnail icon | [Sysdig](https://sysdig.com/) | App: [Sysdig Secure](/docs/integrations/saas-cloud/sysdig-secure/)
Cloud SIEM integration: [Sysdig](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/c4de0854-e718-45e1-a4c8-63623755aa43.md)
Collector: [Sysdig Secure](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/sysdig-secure-source.md) | diff --git a/docs/integrations/sumo-apps/index.md b/docs/integrations/sumo-apps/index.md index d18fd140e6..a5bfe2f21c 100644 --- a/docs/integrations/sumo-apps/index.md +++ b/docs/integrations/sumo-apps/index.md @@ -12,7 +12,7 @@ Sumo Logic provides a number of apps you can use to monitor your Sumo org, for i **Requesting Sumo Logic Enterprise Apps** -Enterprise apps, such as the [Sumo Logic App for Security Analytics](/docs/integrations/sumo-apps/security-analytics), are for Sumo Logic Enterprise accounts only and cannot be self-installed. A paid Professional Services contract is required for installment and configuration. +Enterprise apps are for Sumo Logic Enterprise accounts only and cannot be self-installed. A paid Professional Services contract is required for installment and configuration. You may upgrade your account at any time. In these instances, an admin can request an estimate. @@ -79,10 +79,4 @@ Once a request has been submitted, a support ticket is automatically opened. A r

A guide to the Sumo Logic Log Analysis QuickStart app.

-
-
- Thumbnail icon

Security Analytics

-

A guide to the Sumo Logic app for Security Analytics.

-
-
diff --git a/docs/integrations/sumo-apps/security-analytics.md b/docs/integrations/sumo-apps/security-analytics.md deleted file mode 100644 index 40ebfc95d2..0000000000 --- a/docs/integrations/sumo-apps/security-analytics.md +++ /dev/null @@ -1,283 +0,0 @@ ---- -id: security-analytics -title: Sumo Logic Security Analytics App -sidebar_label: Security Analytics -description: Allows you to easily see and manage your system's status, including a security operations overview, network, system and change, user monitoring, and vulnerabilities on endpoints. ---- - -import useBaseUrl from '@docusaurus/useBaseUrl'; - -Thumbnail icon - -The Sumo Logic App for Security Analytics provides Dashboards that allow you to easily see and manage your system's status, including a security operations overview, network, system and change, user monitoring, and vulnerabilities on endpoints. This data is collected from your Collectors and Sources.​ - -## Prerequisites - -* **For Sumo Logic Enterprise Security and Enterprise Suite accounts only.** For more information, see [Apps for Sumo Logic](/docs/integrations/sumo-apps). - - -## Security Analytics App Dashboards - -This data is collected from your Collectors and Sources for instant analysis of any events. - - -### Security Operations Overview - -test - -**Network Incidents.** Displays the number of incidents detected over the last 24 hours in a single value chart. Click the chart to drill down to the **Network Overview Dashboard** for more information. - -**Vulnerability.** Provides the incident count by severity High or Critical for the past 24 hours in a single value chart. Click the chart to drill down to the **Vulnerabilities on Endpoints** Dashboard for more information. - -**System Incidents.** Shows the number of system incidents over the last 24 hours in a single value chart. Click the chart to drill down to the **System and Change** Dashboard for more information. - -**User Activity.** Displays the amount of user activity in kbytes for the past 24 hours in a single value chart. Click the chart to drill down to the **User Monitoring** Dashboard for more information. - -**Inbound Network Activity by Location.** Performs a geo lookup search and displays the inbound network activity by location for the last 12 hours on a map of the world. - -**Incidents Over Time.** Displays the type and number of incidents in a timeline using timeslices of one hour for the last 12 hours. - -**Incidents by Severity.** Shows the number of incidents by their severity designation in a bar chart for the last 12 hours. - -**Anomaly Event Distribution.** Provides information on the distribution of Anomaly events in column chart on a timeline for the past 24 hours. Click the chart to drill down into the **Anomaly Detection Summary** Dashboard. - - -### Network Status - -test - -**Incident Count.** Counts the number of incidents detected over the last 24 hours and displays them in a single value chart. - -**Incidents for Review.** Displays important incidents from the last 24 hours in a table with columns that list the incident's time, message text, source host IP address, destination host IP address, application, and severity. Scroll to see the entire table contents. - -**Outbound Network Activity by Protocol.** Provides information on outbound and inbound network traffic by protocol, displayed in a stacked column chart on a time line in timeslices of four hours for the last 12 hours. - -**Top Applications with Most Network Activities.** Shows the top 10 applications with the most network activity displayed in a pie chart. - -**Top Active Internal Hosts.** Lists the top 10 active internal hosts and their number of events for the last three hours, displayed in a bar chart. - -**Top 10 Applications by Bytes.** Shows the top 10 applications and their network use in bytes over the last 24 hours. - -**Anomaly Event Distribution.** Displays the distribution of Anomaly events for the last 12 hours, using a column chart on a timeline using timeslices of 15 minutes. - - -### System and Change - -test - -**Incident Count.** Displays the number of incidents detected as a change in a single value chart for the last 24 hours. - -**Top 10 Incidents.** Shows the top 10 incidents in a table that includes the source host, destination host, severity, log message text, and the number of incidents for the past 24 hours. - -**Anomaly Event Distribution.** Displays the distribution of Anomaly events in a column chart using timeslices of 30 minutes on a timeline for the last 24 hours. - -**Incident Count by Classification.** Displays the number an type of incidents by classification for the last 24 hours in a pie chart. - -**Most Recent Application Update Failures.** Provides information on any recent application update failures for the past 12 hours in a table, including the destination host, the update type, and the latest status. - -**Update Summary.** Displays a summary of updates for the last 24 hours in a table including the update text, and its success or failure. - -**Configuration and Policy Changes.** Shows any configuration and policy changes for the last 24 hours in a table, including information on the message text, source host, source user, target user, target host, and severity. - - -### User Monitoring - -test - - -**User Activity.** Displays user activity in kbytes for the last 24 hours in a single value chart. - -**Incidents for Review.** Provides information on incidents that have occurred in the last three hours. in a table including time, user, message text and the severity. - -**Top Users with Access Activity.** Shows the top users of the system and their activity for the last three hours in a bar chart. - -**Top User Activity.** Displays the top 10 users of the system and their activity for the last six hours in a bar chart. - -**User Activity by Hour.** Provides information on user activity by user by hour in a stacked column cart on a timeline using timeslices of one hour for the last six hours. - -**All Access Attempts to Environment.** Lists all attempts to access the environment in a table for the last three hours, including the user name, destination host, message text, time of the latest attempt, and the time of the earliest attempt. - -**Anomaly Event Distribution.** Displays the distribution of Anomaly events in a column chart using timeslices of 30 minutes on a timeline for the last 12 hours. - - -### Vulnerabilities on Endpoints - -test - -**Incident Count by Vulnerabilities.** Displays the number of incidents reported as High or Critical for the past 24 hours in a single value chart. - -**Incident Count by Virus.** Shows the number of virus incidents reported for the last 24 hours in a single value chart. - -**Incident Count by Type.** Provides the number of incidents by type for the last 12 hours in a pie chart. - -**Top 10 Vulnerabilities.** Counts the top 10 vulnerabilities by name displayed in a bar chart for the past 24 hours. - -**Top 10 Viruses Failed to be Cleaned.** Lists names and number of the top 10 viruses that were unable to be removed from the environment for the last 24 hours, displayed in a bar chart. - -**Vulnerability Summary.** Shows the summary of vulnerabilities detected over the last three hours in a table, including information on the destination host, the described vulnerability, and its severity designation. - -**Top 10 Incidents.** Details the top 10 incidents in a table for the past 24 hours, including information on the source host, severity, message, action, and the number of incidents. - -**Actions Taken on Viruses Found.** Details the number of actions taken to remedy viruses found in the environment for the last 24 hours, displayed in a bar chart. - -**Critical Vulnerabilities by Host.** Displays incidents with a severity of critical for the past six hours in a table, including information on the destination host and the number of vulnerabilities. - -**Top 10 Threats by Systems Infected.** Lists the names and number of top 10 threats by systems that are infected with viruses in the last three hours, displayed in a bar chart. - - -### Anomaly Detection Summary - -test - -**Anomalous Events.** Counts the number of Anomaly events detected for the last three hours, and displays them in a single value chart. - -**Events by Anomaly Report.** Displays the results of Anomaly Reports by report name and the count of events by number for the last 12 hours in a bar chart. - -**Event Distribution by Report.** Displays the number of events by report name for the last three hours in a pie chart. - -**Incident by Severity.** Shows the number of Anomaly events by severity in timeslices of 5 minutes for the past 12 hours. Displayed in a column chart on a timeline. - -**Events by Classification.** Counts the events by type, either classified or known event, or unclassified new event, for the last three hours. Displays the information in a pie chart. - -**Events by Count.** Counts the number of events and displays them in a bar chart in timeslices of 24 hours for the past three days. - - - -## Using the Sumo Logic App for Security Analytics - -This App is available for Sumo Logic Enterprise accounts only, and requires a paid Professional Services contract to install and configure. You may upgrade your account at any time. If you'd like more information on this App, please request it by clicking the [Request](/docs/integrations/sumo-apps/security-analytics/#using-the-sumo-logic-app-for-security-analytics) button in the Apps section of the Library, or contact your Sumo Logic sales representative at sales@sumologic.com. - - -The Sumo Logic app for Security Analytics provides Dashboards that allow you to easily see and manage your system's status, including a security operations overview, network, system and change, user monitoring, and vulnerabilities on endpoints. This data is collected from your Collectors and Sources, and Sumo Logic Anomaly Detection is applied to it, for instant analysis of any events. - -For complete details, see [Sumo Logic App for Security Analytics](/docs/integrations/sumo-apps/security-analytics). - - -### Getting Security Incident Details - -In the Security Analytics App, on the Network Status Dashboard, the Incident Count or Incidents for Review Panels provide information on all security incidents. You can also drill down from these Panels to the Search page and see more details on those incidents in the Messages tab. - -**To see incident details in the Messages tab:** - -1. Click the **Incidents for Review Panel** to open the query in the Search page. -2. Click the **Messages** tab. -3. More details for the incident are included in the Message field. - - -### Security Use Cases - -The following table provides a list of security use cases, incidents covered, and relevant devices and sources. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Security Analytics Use CaseSecurity Incidents Relevant Devices and Sources
User Monitoring
  • Login Failures followed by success from the same username
  • -
  • High amount of login failures for the same username
Windows 2008 servers, Active Directory, Linux, Google Apps, Novell Access Manager, RSA
User Monitoring
  • Group Created
  • -
  • Group Deleted
  • -
  • Group Membership changed
Windows, Active Directory, Google Apps
User Monitoring
  • User Created on Domain or Application
  • -
  • User Created on Local Server
  • -
  • User Deleted
  • -
  • User Modified
Windows, Active Directory, Google Apps, Linux
Systems and Changes
  • Configuration Changes
  • -
  • OS Update
Windows, Active Directory, Linux
Network Overview
  • Excessive firewall denies/accepts
  • -
  • Single local source scanning multiple destinations on well known database
  • -
  • FTP ports
  • -
  • Email ports
  • -
  • SSH and Web Server ports
Checkpoint
Vulnerabilities on Endpoints
  • Multiple vulnerabilities detected
  • -
  • Same vulnerability detected on multiple hosts
  • -
  • Vulnerability found
Qualys
Vulnerabilities on Endpoints
  • Same virus detected on multiple hosts
  • -
  • Virus found
Forefront
- - - -### Incident Messages and Searches - -This table maps incident messages to the preconfigured Security Analytics App searches that report on them. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Incident Message Value Incident Search
Brute Force Login SA - Incident - Brute Force Login Attempt
Excessive firewall deniesSA - Incident - Excessive Firewall Denies
High number of malware IDS alerts SA - Incident - High Number of Malware IDS Alerts
Large number of denied connections SA - Incident - High Volume of Denied Connections
Increased failed remote loginsSA - Incident - Increase in Failed Remote Login Attempts
Multiple failed loginsSA - Incident - Multiple Failed Logins by a User in Last 15mins
Potential DDos attacksSA - Incident - Potential DDos Attack
Potential scan or attack through multiple attack vectorsSA - Incident - Potential Scan or Attack through Multiple Vectors
Potential web application scan or attackSA - Incident - Potential Web Application Attack
Potential successful brute force login SA - Incident - Successful Login after Multiple Failed Logins
Suspicious SSL Traffic Hike from ...SA - Incident - Suspicious SSL Traffic
diff --git a/docs/security/additional-security-features/threat-detection-and-investigation.md b/docs/security/additional-security-features/threat-detection-and-investigation.md index f208917d22..1e59d30869 100644 --- a/docs/security/additional-security-features/threat-detection-and-investigation.md +++ b/docs/security/additional-security-features/threat-detection-and-investigation.md @@ -12,7 +12,6 @@ To use Sumo Logic for threat detection and investigation, you can use [pre-built ## Pre-built apps for threat detection and investigation [Install](/docs/get-started/apps-integrations) the following apps to get dashboards, queries, and alerting for security monitoring and threat investigation. -* [**Security Analytics**](/docs/integrations/sumo-apps/security-analytics/). App for alert analysis and Entity risk assessment. * [**Security and threat detection**](/docs/integrations/security-threat-detection/). Apps for security products, such as firewall tools, endpoint protection applications, and security automation and orchestration programs. For ex ample, the [Threat Intel Quick Analysis](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/) app comes preloaded with queries and dashboards that leverage Sumo Logic [threat intelligence](/docs/security/threat-intelligence/). * [**Cloud security monitoring and analytics**](/docs/integrations/cloud-security-monitoring-analytics/). Apps that provide security insights for data sources such as Windows, Linux, AWS CloudTrail, AWS VPC Flows, and Palo Alto Networks Firewalls. * [**Global Intelligence Service**](/docs/integrations/global-intelligence/). Apps that provide real-time security intelligence for detection, prioritization, investigation, and workflow. diff --git a/sidebars.ts b/sidebars.ts index 44c8d7a70e..0832ebd011 100644 --- a/sidebars.ts +++ b/sidebars.ts @@ -2661,7 +2661,6 @@ integrations: [ 'integrations/sumo-apps/infrequent-data-tier', 'integrations/sumo-apps/kickstart-data', 'integrations/sumo-apps/log-analysis-quickstart', - 'integrations/sumo-apps/security-analytics', ], }, {