Skip to content

Commit 196ece5

Browse files
JV0812parth-sumojpipkin1kimsauce
authored
Vectra app doc (#5701)
* Vectra app doc * Update blog-service/2025-08-21-apps.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update docs/integrations/saas-cloud/vectra.md Co-authored-by: Kim (Sumo Logic) <[email protected]> * Update blog-service/2025-08-21-apps.md * Rename 2025-08-21-apps.md to 2025-08-20-apps.md --------- Co-authored-by: Parth Langalia <[email protected]> Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> Co-authored-by: Kim (Sumo Logic) <[email protected]>
1 parent a1cab89 commit 196ece5

File tree

6 files changed

+243
-1
lines changed

6 files changed

+243
-1
lines changed

blog-service/2025-08-20-apps.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
title: Vectra (Apps)
3+
image: https://help.sumologic.com/img/reuse/rss-image.jpg
4+
keywords:
5+
- apps
6+
- vectra
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
We're excited to introduce the new Vectra app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud [Vectra source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vectra-source/) to collect the detections from the Vectra platform. It provides security analysts with visibility into security threats detected across networks, cloud environments, and endpoints. [Learn more](/docs/integrations/saas-cloud/vectra/).

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1644,6 +1644,7 @@
16441644
"/cid/10211": "/docs/integrations/saas-cloud/microsoft-azure-ad-inventory",
16451645
"/cid/10203": "/docs/integrations/saas-cloud/microsoft-graph-security-v1",
16461646
"/cid/10205": "/docs/integrations/saas-cloud/microsoft-graph-security-v2",
1647+
"/cid/10212": "/docs/integrations/saas-cloud/vectra",
16471648
"/cid/10206": "/docs/integrations",
16481649
"/cid/10204": "/docs/integrations/saas-cloud/cato-networks",
16491650
"/cid/10198": "/docs/integrations/saas-cloud/microsoft-graph-azure-ad-reporting",

docs/integrations/product-list/product-list-m-z.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
205205
| :-- | :-- | :-- |
206206
| <img src={useBaseUrl('img/integrations/web-servers/varnish-cache.png')} alt="Thumbnail icon" width="75"/> | [Varnish](https://www.varnish-software.com/) | Apps: <br/>- [Varnish](/docs/integrations/web-servers/varnish/) <br/>- [Varnish - OpenTelemetry](/docs/integrations/web-servers/opentelemetry/varnish-opentelemetry/) |
207207
| <img src={useBaseUrl('img/integrations/misc/varonis-logo.png')} alt="Thumbnail icon" width="75"/> | [Varonis](https://www.varonis.com/) | Cloud SIEM integration: [Varonis](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/20270f89-127e-4055-96ec-56045e67e163.md) |
208-
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/vectra.png')} alt="Thumbnail icon" width="75"/> | [Vectra](https://www.vectra.ai/) | Automation integration: [Vectra](/docs/platform-services/automation-service/app-central/integrations/vectra/) <br/>Collector: [Vectra Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vectra-source) <br/>Cloud SIEM integration: [Vectra](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/7a3d1a5c-ba67-4597-971f-7057e8f6c8bb.md) |
208+
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/vectra.png')} alt="Thumbnail icon" width="75"/> | [Vectra](https://www.vectra.ai/) | App: [Vectra](/docs/integrations/saas-cloud/vectra) <br/> Automation integration: [Vectra](/docs/platform-services/automation-service/app-central/integrations/vectra/) <br/>Collector: [Vectra Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vectra-source) <br/>Cloud SIEM integration: [Vectra](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/7a3d1a5c-ba67-4597-971f-7057e8f6c8bb.md) |
209209
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/virustotal.png')} alt="Thumbnail icon" width="75"/> | [VirusTotal](https://www.virustotal.com/) | Automation integrations: <br/>- [VirusTotal](/docs/platform-services/automation-service/app-central/integrations/virustotal/) <br/>- [VirusTotal V3](/docs/platform-services/automation-service/app-central/integrations/virustotal-v3/) |
210210
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/vmray.png')} alt="Thumbnail icon" width="75"/> | [VMRay](https://www.vmray.com/) | Automation integration: [VMRay](/docs/platform-services/automation-service/app-central/integrations/vmray/) |
211211
| <img src={useBaseUrl('img/integrations/containers-orchestration/vmware.png')} alt="Thumbnail icon" width="50"/> | [VMware](https://www.vmware.com/) | Apps: <br/>- [Carbon Black Cloud](/docs/integrations/security-threat-detection/carbon-black-cloud/) <br/>- [VMware](/docs/integrations/containers-orchestration/vmware/) <br/>- [VMware Legacy](/docs/integrations/containers-orchestration/vmware-legacy/) <br/>- [VMware Carbon Black](/docs/integrations/security-threat-detection/vmware-carbon-black/) <br/>- [VMWare - OpenTelemetry Collector](/docs/integrations/containers-orchestration/opentelemetry/vmware-opentelemetry/) <br/>- [VMware Workspace ONE](/docs/integrations/saas-cloud/vmware-workspace-one/) <br/>Automation integrations: <br/>- [Lastline Analyst](/docs/platform-services/automation-service/app-central/integrations/lastline-analyst/) <br/>- [VMware Carbon Black Cloud Endpoint Standard](/docs/platform-services/automation-service/app-central/integrations/vmware-carbon-black-cloud-endpoint-standard/) <br/>- [VMware Carbon Black Cloud Endpoint Standard V2](/docs/platform-services/automation-service/app-central/integrations/vmware-carbon-black-cloud-endpoint-standard-v2/) <br/>- [VMware Carbon Black Cloud Enterprise EDR](/docs/platform-services/automation-service/app-central/integrations/vmware-carbon-black-cloud-enterprise-edr/) <br/>- [VMware Carbon Black Cloud Platform](/docs/platform-services/automation-service/app-central/integrations/vmware-carbon-black-cloud-platform/) <br/>- [VMware vSphere](/docs/platform-services/automation-service/app-central/integrations/vmware-vsphere/) <br/>- [VMware Workspace ONE](/docs/platform-services/automation-service/app-central/integrations/vmware-workspace-one/) <br/>Cloud SIEM integrations: <br/>- [Carbon Black](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/c2ea2e5e-92f2-49e8-9812-64e60dba63a2.md) <br/>- [VMware](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/fbf25b91-89f1-45c4-903d-664b328bc6e0.md) <br/>Collectors: <br/>- [Carbon Black Cloud Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/carbon-black-cloud-source/) <br/>- [Carbon Black Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/carbon-black-inventory-source/) <br/>- [Collect Metrics from VMware vRealize Operations Manager 8 Enterprise](/docs/send-data/collect-from-other-data-sources/collect-metrics-vrealize-operations-manager/) <br/>- [VMware AirWatch Integration for Sumo Logic](/docs/send-data/collect-from-other-data-sources/vmware-airwatch-integration/) <br/>- [VMware vRealize Log Insight](/docs/send-data/collect-from-other-data-sources/vmware-vrealize-log-insight/)<br/>- [VMware Workspace One Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vmware-workspace-one-source/) <br/>Partner integration: [VMware Tanzu](https://docs.vmware.com/en/Sumo-Logic-Nozzle-for-VMware-Tanzu/services/sumologic-nozzle-vmware-tanzu/index.html) |

docs/integrations/saas-cloud/index.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -417,6 +417,12 @@ Learn about the Sumo Logic apps for SaaS and Cloud applications.
417417
<p>Analyze authentication events, user activities, and potential security threats.</p>
418418
</div>
419419
</div>
420+
<div className="box smallbox card">
421+
<div className="container">
422+
<a href="/docs/integrations/saas-cloud/vectra"><img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/vectra.png')} alt="icon" width="100"/><h4>Vectra</h4></a>
423+
<p>Gain visibility into security threats detected across networks, cloud environments, and endpoints.</p>
424+
</div>
425+
</div>
420426
<div className="box smallbox card">
421427
<div className="container">
422428
<a href="/docs/integrations/saas-cloud/vmware-workspace-one"><img src={useBaseUrl('img/send-data/vmware_workspace_one.png')} alt="icon" width="100"/><h4>VMware Workspace ONE</h4></a>
Lines changed: 222 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,222 @@
1+
---
2+
id: vectra
3+
title: Vectra
4+
sidebar_label: Vectra
5+
description: The Vectra app for Sumo Logic provides security analysts with visibility into security threats detected across networks, cloud environments, and endpoints.
6+
---
7+
8+
import useBaseUrl from '@docusaurus/useBaseUrl';
9+
10+
<img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/vectra.png')} alt="Vectra-icon" width="70" />
11+
12+
The Vectra app offers comprehensive visibility into security threats detected across networks, cloud environments, and endpoints. It consolidates threat intelligence from multiple sources, categorizing detections by their severity, type, and behavior, while providing detailed contextual data to accelerate investigations. With interactive dashboards and targeted monitoring tools, security teams can track trends, pinpoint high-risk activities, and measure remediation effectiveness. By combining threat scoring, detection timelines, and enriched metadata, the app empowers proactive threat hunting, rapid incident response, and continuous improvement of security posture.
13+
14+
:::info
15+
This app includes [built-in monitors](#vectra-alerts). For details on creating custom monitors, refer to the [Create monitors for Vectra app](#create-monitors-for-the-vectra-app).
16+
:::
17+
18+
## Log types
19+
20+
This app uses Sumo Logic’s [Vectra Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vectra-source/) to collect detections from the Vectra platform.
21+
22+
### Sample log message
23+
24+
```json title="Detection"
25+
{
26+
"summary": {
27+
"user_agents": [
28+
"Microsoft Azure CLI",
29+
"Microsoft Azure CLI"
30+
],
31+
"browser": [
32+
"Chrome 138.0.0",
33+
"Chrome"
34+
],
35+
"operating_system": [
36+
"Linux",
37+
"Linux"
38+
],
39+
"workloads": [
40+
"Azure Resource Manager",
41+
"AzureActiveDirectory"
42+
],
43+
"operations": [
44+
"UserLoggedIn"
45+
],
46+
"src_ips": [
47+
"80.117.40.124"
48+
],
49+
"description": "This account was seen using a scripting engine to access services in Azure AD which is unusual for the account. Unusual usage of scripting engines in Azure AD and Microsoft 365 can be indicative of a compromised account."
50+
},
51+
"data_source": {
52+
"type": "o365",
53+
"connection_name": "M365-Demo",
54+
"connection_id": "s9s9c5cj"
55+
},
56+
"filtered_by_rule": false,
57+
"src_account": {
58+
"id": 1034,
59+
"name": "O365:demolab.vectra.ai",
60+
"url": "https://37373829274.cc1.portal.vectra.ai/api/v3.3/accounts/1034",
61+
"threat": 30,
62+
"certainty": 90,
63+
"privilege_level": null,
64+
"privilege_category": null
65+
},
66+
"threat": 70,
67+
"last_timestamp": "2025-08-12T18:29:21Z",
68+
"is_targeting_key_asset": false,
69+
"sensor_name": "Vectra X",
70+
"filtered_by_ai": false,
71+
"id": 3586,
72+
"c_score": 60,
73+
"src_ip": null,
74+
"assigned_date": null,
75+
"filtered_by_user": false,
76+
"is_custom_model": false,
77+
"assigned_to": null,
78+
"detection_category": "lateral_movement",
79+
"note_modified_timestamp": null,
80+
"created_timestamp": "2025-08-12T18:53:29Z",
81+
"note": null,
82+
"is_marked_custom": false,
83+
"url": "https://37373829274.cc1.portal.vectra.ai/api/v3.3/detections/3586",
84+
"state": "active",
85+
"detection": "Azure AD Unusual Scripting Engine Usage",
86+
"triage_rule_id": null,
87+
"groups": [],
88+
"category": "lateral_movement",
89+
"first_timestamp": "2025-08-12T18:29:21Z",
90+
"certainty": 60,
91+
"t_score": 70,
92+
"tags": [],
93+
"note_modified_by": null,
94+
"detection_url": "https://37373829274.cc1.portal.vectra.ai/api/v3.3/detections/3586",
95+
"description": null,
96+
"notes": [],
97+
"detection_type": "Azure AD Unusual Scripting Engine Usage",
98+
"custom_detection": null,
99+
"sensor": "s9s9c5cj",
100+
"targets_key_asset": false,
101+
"is_triaged": false,
102+
"src_host": null,
103+
"type": "account",
104+
"grouped_details": [
105+
{
106+
"workload": "Azure Resource Manager",
107+
"user_agent": "Microsoft Azure CLI",
108+
"operating_system": "Linux",
109+
"browser": "Chrome 138.0.0",
110+
"operations": [
111+
"UserLoggedIn"
112+
],
113+
"operations_count": 1,
114+
"src_ips": [
115+
"80.117.40.124"
116+
],
117+
"first_timestamp": "2025-08-12T18:29:21Z",
118+
"last_timestamp": "2025-08-12T18:29:21Z"
119+
},
120+
{
121+
"workload": "AzureActiveDirectory",
122+
"user_agent": "Microsoft Azure CLI",
123+
"operating_system": "Linux",
124+
"browser": "Chrome",
125+
"operations": [
126+
"UserLoggedIn"
127+
],
128+
"operations_count": 1,
129+
"src_ips": [
130+
"80.117.40.124"
131+
],
132+
"first_timestamp": "2025-08-12T18:29:21Z",
133+
"last_timestamp": "2025-08-12T18:29:21Z"
134+
}
135+
]
136+
}
137+
```
138+
139+
### Sample queries
140+
141+
```sql title="Total Detections"
142+
_sourceCategory="Labs/Vectra"
143+
| json "id","last_timestamp","first_timestamp","state","t_score","c_score","category","type","summary.operations[*]","grouped_details[*].src_ips[*]","detection_url","assigned_to","detection","certainty","src_account.id","src_account.name","src_account.url","src_account.threat","src_account.certainty" as id,last_timestamp,first_timestamp,state,t_score,c_score,category,type,operations,src_ips,detection_url,assigned_to,detection,certainty,src_account_id,src_account_name,src_account_url,src_account_threat,src_account_certainty nodrop
144+
| if (t_score>=70,"critical",if(t_score>=41 and t_score<=69, "medium", if(t_score<=40,"low","unknown"))) as severity
145+
146+
// global filters
147+
| where isNull(state) or state matches "{{state}}"
148+
| where isNull(category) or category matches "{{category}}"
149+
| where isNull(severity) or severity matches "{{severity}}"
150+
| where isNull(type) or type matches "{{type}}"
151+
| where isNull(certainty) or certainty matches "{{certainty}}"
152+
153+
// panel specific
154+
| count by id
155+
| count
156+
```
157+
158+
## Collection configuration and app installation
159+
160+
import CollectionConfiguration from '../../reuse/apps/collection-configuration.md';
161+
162+
<CollectionConfiguration/>
163+
164+
:::important
165+
Use the [Cloud-to-Cloud Integration for Vectra](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vectra-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Vectra app is properly integrated and configured to collect and analyze your Vectra data.
166+
:::
167+
168+
### Create a new collector and install the app
169+
170+
import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md';
171+
172+
<AppCollectionOPtion1/>
173+
174+
### Use an existing collector and install the app
175+
176+
import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md';
177+
178+
<AppCollectionOPtion2/>
179+
180+
### Use an existing source and install the app
181+
182+
import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md';
183+
184+
<AppCollectionOPtion3/>
185+
186+
## Viewing the Vectra dashboards​​
187+
188+
import ViewDashboards from '../../reuse/apps/view-dashboards.md';
189+
190+
<ViewDashboards/>
191+
192+
### Overview
193+
194+
The **Vectra - Overview** dashboard offers a consolidated, real-time summary of all detected threats, enabling security teams to quickly assess the current threat landscape. It breaks down detections by severity(critical, medium, low), category, type, and resolution state, providing both counts and visual distributions. Time-based trend charts reveal spikes or patterns in threat activity, while geo-location maps identify where hosts are operating, including those in embargoed regions that may pose compliance risks. Additional panels highlight the top-impacted users, frequently targeted operations, and relevant detection sources, with direct links for in-depth investigation. This dashboard serves as the central entry point for monitoring threats, understanding scope, and prioritizing security actions.<br/><img src='https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Vectra/Vectra-Overview.png' alt="Vectra-Overview" style={{border:'1px solid gray'}} />
195+
196+
### Security
197+
198+
The **Vectra - Security** dashboard focuses on advanced and high-severity threats that require immediate attention. It highlights critical threat detections, command-and-control activities, and account-based privilege escalation attempts, as well as anomalies in Azure AD operations. Persistent threats are tracked with metrics on time-to-remediation, enabling teams to assess response efficiency. Each panels are designed to surface patterns that indicate targeted attacks, lateral movement, or ongoing compromise attempts. By consolidating these high-priority insights, the dashboard helps security analysts quickly isolate urgent incidents, understand attack context, and coordinate effective containment and remediation strategies.<br/><img src='https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Vectra/Vectra-Security.png' alt="Vectra-Security" style={{border:'1px solid gray'}} />
199+
200+
## Create monitors for the Vectra app
201+
202+
import CreateMonitors from '../../reuse/apps/create-monitors.md';
203+
204+
<CreateMonitors/>
205+
206+
### Vectra alerts
207+
208+
| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition |
209+
|:--|:--|:--|:--|
210+
| `Critical Threat Detections` | This alert is triggered when one or more threat detections with a threat score above 70 are identified. These detections indicate the most severe security risks and necessitate immediate investigation and remediation to prevent potential compromise or damage. | Critical | Count > 0 |
211+
212+
## Upgrading/Downgrading the Vectra app (Optional)
213+
214+
import AppUpdate from '../../reuse/apps/app-update.md';
215+
216+
<AppUpdate/>
217+
218+
## Uninstalling the Vectra app (Optional)
219+
220+
import AppUninstall from '../../reuse/apps/app-uninstall.md';
221+
222+
<AppUninstall/>

sidebars.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2605,6 +2605,7 @@ integrations: [
26052605
'integrations/saas-cloud/tenable',
26062606
'integrations/saas-cloud/trend-micro-vision-one',
26072607
'integrations/saas-cloud/trust-login',
2608+
'integrations/saas-cloud/vectra',
26082609
'integrations/saas-cloud/vmware-workspace-one',
26092610
'integrations/saas-cloud/webex',
26102611
'integrations/saas-cloud/workday',

0 commit comments

Comments
 (0)