Skip to content
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -118,3 +118,16 @@ To resolve these errors:
:::info
Click [here](/docs/c2c/info) for more information about Cloud-to-Cloud sources.
:::

## App installation

Once you understand how and where 1Password data is collected, you can visualize and analyze that data by installing the Sumo Logic app for [1Password](/docs/integrations/saas-cloud/1password/).

Installing the 1Password app enables you to:
- Centralize visibility into 1Password sign-in and item usage activity.
- Monitor authentication success and failures to spot suspicious access.
- Analyze events by user, app, type, and geo-location for faster investigation.
- Detect outliers and sign-in threats indicating risky behavior.
- Track critical security and audit changes (accounts, emails, groups, roles).
- Highlight high-risk locations through geographic activity insights.
- Secure shared vaults with actionable access and threat intelligence.
Original file line number Diff line number Diff line change
Expand Up @@ -149,3 +149,15 @@ Sources can be configured using UTF-8 encoded JSON files with the Collector Ma
:::info
Click [here](/docs/c2c/info) for more information about Cloud-to-Cloud sources.
:::

## App installation

Once you understand how and where Cisco Meraki data is collected, you can visualize and analyze that data by installing the Sumo Logic app for [Cisco Meraki](/docs/integrations/saas-cloud/cisco-meraki-c2c/).

Installing the Cisco Meraki app enables you to:
- Gain real-time visibility into network events and admin activities from Cisco Meraki.
- Detect potential network issues and security events early for faster investigation.
- Monitor and optimize network performance with actionable insights.
- Enhance security posture by identifying suspicious or risky activities.
- Respond proactively to threats and reduce operational downtime.
- Support efficient network administration and maintain a reliable, secure infrastructure.
Original file line number Diff line number Diff line change
Expand Up @@ -115,3 +115,14 @@ https://github.com/SumoLogic/sumologic-documentation/blob/main/static/files/c2c/
:::info
Click [here](/docs/c2c/info) for more information about Cloud-to-Cloud sources.
:::

## App installation

Once you understand how and where CrowdStrike data is collected, you can visualize and analyze that data by installing the Sumo Logic app for [CrowdStrike Falcon Endpoint Protection](/docs/integrations/security-threat-detection/crowdstrike-falcon-endpoint-protection/).

Installing the CrowdStrike Falcon Endpoint Protection app enables you to:
- Provides visibility into your endpoint security posture using data from the CrowdStrike Falcon Endpoint Protection platform.
- Helps analyze indicators of compromise (IOCs) by affected users, tactics, techniques, and objectives.
- Identifies hosts across your network with the highest malware detections.
- Includes prebuilt dashboards to detect threats and security incidents.
- Enables drill-down investigations for faster threat analysis and response.
Original file line number Diff line number Diff line change
Expand Up @@ -108,3 +108,15 @@ https://github.com/SumoLogic/sumologic-documentation/blob/main/static/files/c2c/
:::info
Click [here](/docs/c2c/info) for more information about Cloud-to-Cloud sources.
:::

## App installation

Once you understand how and where Duo data is collected, you can visualize and analyze that data by installing the Sumo Logic app for [Duo Security](/docs/integrations/security-threat-detection/duo-security/).

Installing the Duo Security app enables you to:
- Gain centralized visibility into authentication, admin, and telephony logs from Duo Security.
- Monitor successful and failed authentications to quickly spot suspicious access attempts.
- Analyze events by application, user, authentication factor, and geo-location for faster investigations.
- Track administrator activities to maintain security and compliance.
- Detect outliers and potential authentication threats through built-in threat analysis.
- Strengthen overall identity and access security posture with actionable insights.
Original file line number Diff line number Diff line change
Expand Up @@ -110,3 +110,14 @@ https://github.com/SumoLogic/sumologic-documentation/blob/main/static/files/c2c/
:::info
Click [here](/docs/c2c/info) for more information about Cloud-to-Cloud sources.
:::

## App installation

Once you understand how and where Google Workspace AlertCenter data is collected, you can visualize and analyze that data by installing the Sumo Logic app for [Google Workspace](/docs/integrations/google/workspace/install-app-dashboards/).

Installing the Google Workspace app enables you to:
- Monitor admin and user activities across all Google Workspace applications from one place.
- Analyze Google Drive usage and login activity for better usage and access visibility.
- Gain full visibility into Alert Center alerts to investigate and correlate security events.
- Detect and monitor potential threats across Workspace apps with unified dashboards.
- Simplify security monitoring and compliance with prebuilt, comprehensive dashboards.
Original file line number Diff line number Diff line change
Expand Up @@ -139,3 +139,14 @@ https://github.com/SumoLogic/sumologic-documentation/blob/main/static/files/c2c/
:::info
Click [here](/docs/c2c/info) for more information about Cloud-to-Cloud sources.
:::

## App installation

Once you understand how and where Microsoft Azure AD Inventory data is collected, you can visualize and analyze that data by installing the Sumo Logic app for [Microsoft Azure AD Inventory](/docs/integrations/saas-cloud/microsoft-azure-ad-inventory/).

Installing the Microsoft Azure AD Inventory app enables you to:
- Monitor user sign-in activity to detect unauthorized or risky access.
- Track user demographics and behavior for better identity governance.
- Gain visibility into device inventory and device management.
- Identify non-compliant or unmanaged devices proactively.
- Support threat detection, compliance, and continuous security oversight across your Azure AD environment.
Original file line number Diff line number Diff line change
Expand Up @@ -146,3 +146,8 @@ The "**Unauthorized request - Account is not provisioned**" error occurs when Mi
:::info
Click [here](/docs/c2c/info) for more information about Cloud-to-Cloud sources.
:::

## App installation

The Microsoft Graph Security API source in Sumo Logic serves as a single, unified entry point for ingesting Microsoft security signals and installing multiple security apps, helping you understand each app based on their security monitoring needs.

Original file line number Diff line number Diff line change
Expand Up @@ -105,3 +105,15 @@ Click [here](/docs/c2c/info) for more information about Cloud-to-Cloud sources.
## Limitation

During a polling interval, an Okta Source will make a request for every 1,000 logs available. The Okta API uses paging and only 1,000 logs are returned at a time.

## App installation

Once you understand how and where Okta data is collected, you can visualize and analyze that data by installing the Sumo Logic app for [Okta](/docs/integrations/saml/okta).

Installing the Okta app enables you to:
- Monitor administrative actions performed in Okta.
- Track failed and successful login attempts.
- Analyze user activity across applications accessed through Okta.
- Gain visibility into application usage and access patterns.
- Review user events and authentication behavior.
- Monitor Multi-Factor Authentication (MFA) activity through preconfigured dashboards.
Original file line number Diff line number Diff line change
Expand Up @@ -118,3 +118,14 @@ https://github.com/SumoLogic/sumologic-documentation/blob/main/static/files/c2c/
:::info
Click [here](/docs/c2c/info) for more information about Cloud-to-Cloud sources.
:::

## App installation

Once you understand how and where SentinelOne Mgmt API data is collected, you can visualize and analyze that data by installing the Sumo Logic app for [SentinelOne](/docs/integrations/saas-cloud/sentinelone/).

Installing the SentinelOne app enables you to:
- Ingest SentinelOne endpoint data in real time from agents into Sumo Logic for centralized analysis.
- Gain clear visibility into endpoint security posture, including threats, endpoint activity, and system health from SentinelOne.
- Detect and investigate suspicious behavior faster to respond quickly to security incidents.
- Use prebuilt, customizable dashboards to visualize threats and key security metrics at a glance.
- Monitor and prioritize what matters most by tailoring dashboards to your organization’s security needs.
Original file line number Diff line number Diff line change
Expand Up @@ -159,3 +159,14 @@ Each page adds to the overall number of API calls needed and adds time due to th
:::info
Click [here](/docs/c2c/info) for more information about Cloud-to-Cloud sources.
:::

## App installation

Once you understand how and where Slack data is collected, you can visualize and analyze that data by installing the Sumo Logic app for [Slack](/docs/integrations/saas-cloud/slack/).

Installing the Slack app enables you to:
- Monitor Slack user, channel, and access activity across supported workspace plans.
- Analyze public channel activity to understand collaboration trends and usage.
- Track workspace access logs for security and auditing purposes.
- Gain centralized visibility into Slack operations through prebuilt analytics.
- Support security monitoring and compliance for team collaboration environments.