1Password Source
The 1Password Source provides a secure endpoint to receive Sign-in Attempts and Item Usage from the 1Password Event API.
The 1Password Source provides a secure endpoint to receive Sign-in Attempts and Item Usage from the 1Password Event API.
Learn how to collect abnormal threat and case logs from the Abnormal Security source.
Learn how to retrieve Airtable audit logs into the Sumo Logic environment.
The Akamai SIEM API Source provides a secure endpoint to receive security events generated on the Akamai platform by leveraging the V1 SIEM API.
Learn how to fetch device and alerts logs from Armis platform and send it to Sumo Logic.
Learn how to retrieve Asana audit logs into the Sumo Logic environment.
Learn how to retrieve cost and usage reports from AWS Cost Explorer into the Sumo Logic environment.
Collecting data from Azure Event Hubs using this Cloud-to-Cloud collection method has a supported throughput limit of 1MB/S (86GB/day) for a named Event Hub egress rate. We recommend using the Azure Event Hubs Source for Logs if you require higher throughput.
The Box API integration ingests events from the Get Events API.
Description goes here.
The Carbon Black Cloud Source provides a secure endpoint to receive data from the Carbon Black Cloud, Enriched Event Search, and Alerts APIs.
The Carbon Black Inventory Source provides a secure endpoint to receive data from the CB Devices API.
The Cisco AMP Source for Sumo Logic provides a secure endpoint to receive data from the Cisco Amp System Log API.
The Cisco Meraki Source for Sumo Logic provides a secure endpoint to receive data from the Cisco Meraki Organization.
The Cisco Vulnerability Management Source provides a secure endpoint to receive assets data from Asset API and vulnerabilities data from Vulnerability API.
Learn how to collect System Log from the Citrix Cloud and send it to Sumo Logic.
The Cloud SIEM AWS EC2 Inventory Source provides a secure endpoint to receive event data from the EC2 describe instances API.
States
Learn how to collect inventory from the AWS APIs and transform them into the CloudQuery schema and send it to Sumo Logic.
Learn how to collect alerts, file events, and audit logs from the Code42 Incydr.
Learn how to set up a Config Based C2C to collect data into the Sumo Logic environment.
Learn how to collect device information from the CrowdStrike FDR and send it to Sumo Logic.
The CrowdStrike Falcon Data Replicator (FDR) Source provides a secure endpoint to ingest Falcon Data Replicator events using the S3 ingestion capability by consumed SQS notifications of new S3 objects.
Learn how to collect file integrity monitoring logs from the CrowdStrike FileVantage platform.
The CrowdStrike Source provides a secure endpoint to receive event data from the CrowdStrike Streams API.
Learn how to collect combined endpoint vulnerabilities data from the CrowdStrike Spotlight platform.
This integration accesses CyberArk EPMs API to retrieve administrative audit events from every Set in the environment.
The Cybereason Source provides a secure endpoint to receive authentication logs from the Cybereason Malops API.
Learn how to collect customer event data from the DocuSign and send it to Sumo Logic.
The Dropbox Source provides a secure endpoint to receive team events from the Get Events API.
Learn how to configure the Druva Cyber Resilience Cloud-to-Cloud source setup in your Sumo Logic environment.
Learn how to configure the Druva Cloud-to-Cloud source setup in your Sumo Logic environment.
The Duo Source provides a secure endpoint to receive authentication logs from the Duo Authentication Logs API.
The Sumo Logic Gmail Trace Logs source pulls the Gmail log from the BigQuery using BigQuery Library APIs and ingests them into the Sumo Logic to store, analyze, and alert.
Learn how to collect data using the BigQuery API.
Learn how to collect data from the JFrog Xray platform.
Learn how to collect events data from the JumpCloud Directory Insight.
Learn how to configure the Kaltura Cloud-to-Cloud source setup using the Sumo logic environment.
Learn how to configure the KnowBe4 Cloud-to-Cloud source setup using the Sumo logic environment.
The Microsoft Exchange Trace Logs Source collects email trace logs from the Office 365 reporting web service.
The Microsoft Graph Azure AD Reporting Source collects Directory Audit, Sign-in, and Provisioning data from the Microsoft Graph API Security endpoint.
The Microsoft Graph Identity Protection Source collects Risk Detection and Risky User from the Microsoft Graph Identity Protection API.
The Microsoft Graph Security API Source provides a secure endpoint to receive alerts from the Microsoft Graph Security API endpoint.
The Mimecast source collects SIEM, DLP, Audit, and Hold Message List data from the Mimecast API.
The Netskope Source provides a secure endpoint to receive event data from the Netskope API.
Our Netskope WebTx API integration ingests Web Transaction logs from Netskope Event Stream.
The Sophos Central Source provides a secure endpoint to receive authentication logs from the Sophos Central APIs.
Learn how to set up a STIX/TAXII 1.x client to collect threat intelligence indicators into the Sumo Logic environment.
Learn how to set up a STIX/TAXII 2.x client to collect threat intelligence indicators into the Sumo Logic environment.
The Symantec Web Security Service Source provides a secure endpoint to receive WSS Access logs from the Symantec WSS API.
The Tenable Source provides a secure endpoint to ingest audit-log events, vulnerability, and asset data from the Tenable.io APIs.
Learn how to collect event logs using the Trellix mVision ePO.
Learn how to collect admin audit events using Webex API.
The Sumo Logic source integration for Workday facilitates retrieving sign-on logs and activity logs from the Workday API.
Learn how to collect audit logs and network activity data from Zero Networks Segment.