Skip to content

Commit 5e2ef29

Browse files
committed
Trust Login (Apps)
1 parent 5abab6b commit 5e2ef29

File tree

6 files changed

+209
-1
lines changed

6 files changed

+209
-1
lines changed

blog-service/2025-02-14-apps.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: Trust Login (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- apps
6+
- trust-login
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We're excited to introduce the new Trust Login app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Trust Login source that collects report logs from the Trust Login platform, enabling security analysts monitor authentication events, user activities, and respond to potential security threats across your organization. [Learn more](/docs/integrations/saas-cloud/trust-login/).

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1843,6 +1843,7 @@
18431843
"/cid/1961": "/docs/integrations/amazon-aws/elasticache",
18441844
"/cid/1962": "/docs/integrations/saas-cloud/cloudflare",
18451845
"/cid/1995": "/docs/integrations/saas-cloud/code42-incydr",
1846+
"/cid/1971": "/docs/integrations/saas-cloud/trust-login",
18461847
"/cid/1963": "/docs/integrations/sumo-apps/enterprise-audit",
18471848
"/cid/1964": "/docs/integrations/security-threat-detection/f5-big-ip-ltm",
18481849
"/cid/1965": "/docs/integrations/security-threat-detection/netskope",

docs/integrations/product-list/product-list-m-z.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
184184
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/threatq.png')} alt="Thumbnail icon" width="75"/> | [ThreatQ](https://www.threatq.com/) | Automation integration: [ThreatQ](/docs/platform-services/automation-service/app-central/integrations/threatq/) |
185185
| <img src={useBaseUrl('img/send-data/trellix-logo.png')} alt="Thumbnail icon" width="75"/> | [Trellix](https://www.trellix.com/en-us/index.html) | Automation integrations: <br/>- [FireEye AX](/docs/platform-services/automation-service/app-central/integrations/fireeye-ax/) <br/>- [FireEye Central Management (CM)](/docs/platform-services/automation-service/app-central/integrations/fireeye-central-management-cm/) <br/>- [FireEye Email Security (EX)](/docs/platform-services/automation-service/app-central/integrations/fireeye-email-security-ex/) <br/>- [FireEye Endpoint Security (HX)](/docs/platform-services/automation-service/app-central/integrations/fireeye-endpoint-security-hx/) <br/>- [FireEye Helix](/docs/platform-services/automation-service/app-central/integrations/fireeye-helix/) <br/>- [FireEye Network Security (NX)](/docs/platform-services/automation-service/app-central/integrations/fireeye-network-security-nx/) <br/>Cloud SIEM integrations: <br/>- [FireEye](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/1430ab5c-7b8b-44e9-a8ec-83076fa374eb.md) <br/>- [Trellix](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/9bec8407-4182-46ec-99dd-2adfade15652.md) <br/>Collector: [Trellix mVision ePO Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/trellix-mvisio-epo-source/) |
186186
| <img src={useBaseUrl('https://upload.wikimedia.org/wikipedia/commons/f/f4/Trend_Micro_logo.svg')} alt="Thumbnail icon" width="75"/> | [Trend Micro](https://www.trendmicro.com/en_us/business.html) | Apps: <br/>- [Trend Micro Deep Security](/docs/integrations/security-threat-detection/trend-micro-deep-security/) <br/>- [Trend Micro Vision One](/docs/integrations/saas-cloud/trend-micro-vision-one/) <br/>Automation integrations: <br/>- [Trend Micro Deep Security](/docs/platform-services/automation-service/app-central/integrations/trend-micro-deep-security/) <br/>- [Trend Micro Vision One](/docs/platform-services/automation-service/app-central/integrations/trend-micro-vision-one/) <br/>Cloud SIEM integration: [Trend Micro](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/8af48b83-18bf-4233-ad51-db37baca0313.md) <br/>Collector: [Trend Micro Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/trend-micro-source)|
187-
| <img src={useBaseUrl('img/send-data/trust-login-icon.png')} alt="Thumbnail icon" width="50"/> | [Trust Login](https://trustlogin.com/en/) | Collector: [Trust Login Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/trust-login-source) |
187+
| <img src={useBaseUrl('img/send-data/trust-login-icon.png')} alt="Thumbnail icon" width="50"/> | [Trust Login](https://trustlogin.com/en/) | App: [Trust Login](/docs/integrations/saas-cloud/trust-login) <br/>Collector: [Trust Login Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/trust-login-source) |
188188
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/tufin-securechange.png')} alt="Thumbnail icon" width="75"/> | [Tufin](https://www.tufin.com/) | Automation integrations: <br/>- [Tufin SecureChange](/docs/platform-services/automation-service/app-central/integrations/tufin-securechange/) <br/>- [Tufin SecureTrack V2](/docs/platform-services/automation-service/app-central/integrations/tufin-securetrack-v2/) |
189189

190190
## U

docs/integrations/saas-cloud/index.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -339,6 +339,12 @@ Learn about the Sumo Logic apps for SaaS and Cloud applications.
339339
<p>Analyze alert logs to detect potential security risks.</p>
340340
</div>
341341
</div>
342+
<div className="box smallbox card">
343+
<div className="container">
344+
<a href="/docs/integrations/saas-cloud/trust-login"><img src={useBaseUrl('img/send-data/trust-login-icon.png')} alt="icon" width="100"/><h4>Trust Login</h4></a>
345+
<p>Analyze authentication events, user activities, and potential security threats.</p>
346+
</div>
347+
</div>
342348
<div className="box smallbox card">
343349
<div className="container">
344350
<a href="/docs/integrations/saas-cloud/vmware-workspace-one"><img src={useBaseUrl('img/send-data/vmware_workspace_one.png')} alt="icon" width="100"/><h4>VMware Workspace ONE</h4></a>
Lines changed: 186 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,186 @@
1+
---
2+
id: trust-login
3+
title: Trust Login
4+
sidebar_label: Trust Login
5+
description: The Trust Login app for Sumo Logic provides security analysts with insights into authentication events, user activities, and potential security threats.
6+
---
7+
8+
import useBaseUrl from '@docusaurus/useBaseUrl';
9+
10+
<img src={useBaseUrl('img/send-data/trust-login-icon.png')} alt="Trust-Login-icon" width="50" />
11+
12+
The Trust Login app for Sumo Logic helps security analysts monitor authentication events, user activities, and potential security threats. It provides real-time tracking of login attempts, account changes, and policy updates to detect anomalies. Dashboards offer event breakdowns, trends, and time-based comparisons for faster incident response and investigations. Geo-location tracking identifies login attempts from high-risk regions, improving threat detection, while the app's alert mechanism highlight unusual activities, like suspicious logins and geo-location events, enabling proactive threat mitigation. By centralizing security insights, the app improves visibility, streamlines investigations, and strengthens security.
13+
14+
:::info
15+
This app includes [built-in monitors](#trust-login-alerts). For details on creating custom monitors, refer to the [Create monitors for Trust Login app](#create-monitors-for-the-trust-login-app).
16+
:::
17+
18+
## Log types
19+
20+
This app uses Sumo Logic’s [Trust Login Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/trust-login-source/) to collect incidents and events logs from the Trust Login platform.
21+
22+
## Sample log message
23+
24+
```json title="Report Log"
25+
{
26+
"id": "eb764e67-a338-481b-b57a-8f51461463ca",
27+
"created_at": "2024-07-23T01:14:11.376+09:00",
28+
"updated_at": "0001-01-01T00:00:00Z",
29+
"tenant_id": "a4992f54-808d-4959-8d31-52b20d415f51",
30+
"subject": {
31+
"id": "b1a4aec3-45d6-49dc-9e8f-c0954ebdffd9",
32+
"type": "user",
33+
"data": {
34+
"email": "[email protected]",
35+
"first_name": "",
36+
"full_name": "6 qa",
37+
"ip_address": null,
38+
"last_name": ""
39+
}
40+
},
41+
"objects": [
42+
{
43+
"id": "b1a4aec3-45d6-49dc-9e8f-c0954ebdffd9",
44+
"type": "Membership",
45+
"data": {
46+
"email": "[email protected]",
47+
"first_name": "qa",
48+
"last_name": "6"
49+
}
50+
}
51+
],
52+
"event": {
53+
"type": "suspended",
54+
"context_data": {
55+
"log_msg": "[email protected]"
56+
},
57+
"category": "general",
58+
"producer": "portal"
59+
}
60+
}
61+
```
62+
63+
## Sample queries
64+
65+
```sql title="Events by Category"
66+
_sourceCategory=TrustLoginAppTest
67+
| json "id", "event.type", "event.category", "event.producer", "subject.type", "objects", "subject.data.full_name", "subject.data.ip_address", "created_at", "event.context_data.log_msg", "subject.data.email", "subject.id", "subject.data.first_name", "subject.data.last_name" as event_id, event_type, event_category, event_producer, subject_type, objects, subject_full_name, subject_ip_address, created_at, event_msg, subject_email, subject_id, subject_first_name, subject_last_name nodrop
68+
| parse regex field=objects "(?<objects>\{(?:[^\{\}]|\{[^\{\}]*\})*\})" multi
69+
| json field=objects "type", "data.email" as object_type, object_email nodrop
70+
71+
// global filters
72+
| where event_category matches "{{event_category}}"
73+
| where event_producer matches "{{event_producer}}"
74+
| where event_type matches "{{event_type}}"
75+
| where object_type matches "{{object_type}}"
76+
| where subject_type matches "{{subject_type}}"
77+
78+
| count by event_id, event_category
79+
| count by event_category
80+
| sort by _count, event_category
81+
```
82+
83+
```sql title="Events Over Time by Type"
84+
_sourceCategory=TrustLoginAppTest
85+
| json "id", "event.type", "event.category", "event.producer", "subject.type", "objects", "subject.data.full_name" as event_id, event_type, event_category, event_producer, subject_type, objects, subject_full_name nodrop
86+
| parse regex field=objects "(?<objects>\{(?:[^\{\}]|\{[^\{\}]*\})*\})" multi
87+
| json field=objects "type" as object_type nodrop
88+
89+
// global filters
90+
| where event_category matches "{{event_category}}"
91+
| where event_producer matches "{{event_producer}}"
92+
| where event_type matches "{{event_type}}"
93+
| where object_type matches "{{object_type}}"
94+
| where subject_type matches "{{subject_type}}"
95+
96+
| timeslice 1d
97+
| count by event_id, event_type, _timeslice
98+
| count as frequency by _timeslice, event_type
99+
| fillmissing timeslice, values all in event_type
100+
| transpose row _timeslice column event_type
101+
```
102+
103+
```sql title="Top 10 User"
104+
_sourceCategory=TrustLoginAppTest
105+
| json "id", "event.type", "event.category", "event.producer", "subject.type", "objects", "subject.data.full_name" as event_id, event_type, event_category, event_producer, subject_type, objects, subject_full_name nodrop
106+
| parse regex field=objects "(?<objects>\{(?:[^\{\}]|\{[^\{\}]*\})*\})" multi
107+
| json field=objects "type" as object_type nodrop
108+
109+
// global filters
110+
| where event_category matches "{{event_category}}"
111+
| where event_producer matches "{{event_producer}}"
112+
| where event_type matches "{{event_type}}"
113+
| where object_type matches "{{object_type}}"
114+
| where subject_type matches "{{subject_type}}"
115+
116+
| where !isBlank(subject_full_name)
117+
| count by subject_full_name, event_id
118+
| count as frequency by subject_full_name
119+
| sort by frequency, subject_full_name
120+
| limit 10
121+
```
122+
123+
## Collection configuration and app installation
124+
125+
import CollectionConfiguration from '../../reuse/apps/collection-configuration.md';
126+
127+
<CollectionConfiguration/>
128+
129+
:::important
130+
Use the [Cloud-to-Cloud Integration for Trust Login](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/trust-login-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Trust Login app is properly integrated and configured to collect and analyze your Trust Login data.
131+
:::
132+
133+
### Create a new collector and install the app
134+
135+
import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md';
136+
137+
<AppCollectionOPtion1/>
138+
139+
### Use an existing collector and install the app
140+
141+
import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md';
142+
143+
<AppCollectionOPtion2/>
144+
145+
### Use an existing source and install the app
146+
147+
import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md';
148+
149+
<AppCollectionOPtion3/>
150+
151+
## Viewing the Trust Login dashboards​​
152+
153+
import ViewDashboards from '../../reuse/apps/view-dashboards.md';
154+
155+
<ViewDashboards/>
156+
157+
### Events Overview
158+
159+
The **Trust Login - Events Overview** dashboard provides security analysts an overview of authentication events, user activities, and system changes. It features visualizations like event breakdowns, trends, and geo-location tracking to help detect suspicious behavior.<br/><img src='https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Trust+Login/Trust+Login+-+Events+Overview.png' alt="Trust-Login-Events-Overview" />
160+
161+
## Create monitors for the Trust Login app
162+
163+
import CreateMonitors from '../../reuse/apps/create-monitors.md';
164+
165+
<CreateMonitors/>
166+
167+
### Trust Login alerts
168+
169+
The Trend Micro Vision One monitors serve as a security tool, concentrating on observing essential operations and unusual occurrences within the Trend Micro Platform. These notifications offer instantaneous insight into significant events, allowing security personnel to swiftly react to deviations or breaches.
170+
171+
| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition |
172+
|:--|:--|:--|:--|
173+
| `Unusual account status changes` | This alert is triggered when an unusual event is performed frequently. It can help detect potential security threats like account takeovers or insider threats. | Critical | Count > 3 |
174+
| `Embargoed Geo Location of Events` | This alert is triggered when an event is detected from a location identified as high-risk. This helps you to monitor activity from unusual or restricted geographic locations, enhancing your ability to identify suspicious activity. | Critical | Count > 0|
175+
176+
## Upgrading/Downgrading the Trust Login app (Optional)
177+
178+
import AppUpdate from '../../reuse/apps/app-update.md';
179+
180+
<AppUpdate/>
181+
182+
## Uninstalling the Trust Login app (Optional)
183+
184+
import AppUninstall from '../../reuse/apps/app-uninstall.md';
185+
186+
<AppUninstall/>

sidebars.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2496,6 +2496,7 @@ integrations: [
24962496
'integrations/saas-cloud/symantec-web-security-service',
24972497
'integrations/saas-cloud/tenable',
24982498
'integrations/saas-cloud/trend-micro-vision-one',
2499+
'integrations/saas-cloud/trust-login',
24992500
'integrations/saas-cloud/vmware-workspace-one',
25002501
'integrations/saas-cloud/webex',
25012502
'integrations/saas-cloud/workday',

0 commit comments

Comments
 (0)