|
| 1 | +--- |
| 2 | +id: trellix-mvision-epo |
| 3 | +title: Trellix mVision ePO |
| 4 | +sidebar_label: Trellix mVision ePO |
| 5 | +description: The Trellix mVision ePO app for Sumo Logic enables security analysts to detect, analyze, and respond to threats to reduce false negatives, accelerate investigations, and strengthen endpoint protection. |
| 6 | +--- |
| 7 | + |
| 8 | +import useBaseUrl from '@docusaurus/useBaseUrl'; |
| 9 | + |
| 10 | +<img src={useBaseUrl('img/send-data/trellix-logo.png')} alt="Trust-Login-icon" width="90" /> |
| 11 | + |
| 12 | +The Sumo Logic app for Trellix mVision ePO provides centralized visibility into endpoint threats, enabling security teams to detect, analyze, and respond to risks across their environment. It aggregates data on detections, remediation failures, severity, and suspicious behaviors to highlight high-priority incidents and defense gaps. |
| 13 | + |
| 14 | +By analyzing threat categories, attack types, geolocation, and detection methods, the app reveals patterns of malicious activity, risky endpoints, and unusual network behavior. Features such as C2 callback detection, embargoed region activity, file quarantines, and user-targeted attacks offer actionable insights into threat propagation and impacted assets. |
| 15 | + |
| 16 | +With comprehensive summaries, trend analysis, geographical mapping, and device-level detail, the app helps organizations prioritize threats, reduce false negatives, accelerate investigations, and strengthen endpoint protection. |
| 17 | + |
| 18 | +:::info |
| 19 | +This app includes [built-in monitors](#trellix-mvision-epo-alerts). For details on creating custom monitors, refer to [Create monitors for Trellix mVision ePO app](#create-monitors-for-the-trellix-mvision-epo-app). |
| 20 | +::: |
| 21 | + |
| 22 | +## Log types |
| 23 | + |
| 24 | +This app uses Sumo Logic’s [Trellix mVision ePO Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/trellix-mvisio-epo-source/) to collect event logs from the Trellix mVision ePO platform. |
| 25 | + |
| 26 | +## Sample log message |
| 27 | + |
| 28 | +<details> |
| 29 | +<summary>Event Log</summary> |
| 30 | + |
| 31 | +```json |
| 32 | +{ |
| 33 | + "id": "b311da30-82ef-40ae-a1c7-74h6s4", |
| 34 | + "type": "MVEvents", |
| 35 | + "links": { |
| 36 | + "self": "/epo/v2/events/b311da30-82ef-40ae-a1c7-74h6s4" |
| 37 | + }, |
| 38 | + "attributes": { |
| 39 | + "timestamp": "2023-06-09T16:40:49.510Z", |
| 40 | + "autoguid": "b04478e5-424c-44b0-ba78-f5e27dff4b3c", |
| 41 | + "detectedutc": "1686285700000", |
| 42 | + "receivedutc": "1686328849509", |
| 43 | + "agentguid": "a8c0a97d-f57c-43fc-b611-92499cb40846", |
| 44 | + "analyzer": "ENDP_AM_1070", |
| 45 | + "analyzername": "Trellix Endpoint Security", |
| 46 | + "analyzerversion": "10.7.0.5786", |
| 47 | + "analyzerhostname": "DESKTOP", |
| 48 | + "analyzeripv4": "172.20.10.2", |
| 49 | + "analyzeripv6": "/0:0:0:0:0:ffff:ac14:a02", |
| 50 | + "analyzermac": "a87eeabc2b1d", |
| 51 | + "analyzerdatversion": "5186.0", |
| 52 | + "analyzerengineversion": "6600.9927", |
| 53 | + "analyzerdetectionmethod": "On-Access Scan", |
| 54 | + "sourcehostname": null, |
| 55 | + "sourceipv4": "172.20.10.2", |
| 56 | + "sourceipv6": "/0:0:0:0:0:ffff:ac14:a02", |
| 57 | + "sourcemac": null, |
| 58 | + "sourceusername": null, |
| 59 | + "sourceprocessname": "C:\\Windows\\explorer.exe", |
| 60 | + "sourceurl": null, |
| 61 | + "targethostname": null, |
| 62 | + "targetipv4": "172.20.10.2", |
| 63 | + "targetipv6": "/0:0:0:0:0:ffff:ac14:a02", |
| 64 | + "targetmac": null, |
| 65 | + "targetusername": "DESKTOP\\Sumo", |
| 66 | + "targetport": null, |
| 67 | + "targetprotocol": null, |
| 68 | + "targetprocessname": null, |
| 69 | + "targetfilename": "C:\\Users\\Sumo\\AppData\\Local\\Temp\\Temp1_7ev3n.zip\\[email protected]", |
| 70 | + "threatcategory": "av.detect", |
| 71 | + "threateventid": 1027, |
| 72 | + "threatseverity": "2", |
| 73 | + "threatname": "Ransomware-HIZ!9F8BC96C96D4", |
| 74 | + "threattype": "trojan", |
| 75 | + "threatactiontaken": "IDS_ALERT_ACT_TAK_DEL", |
| 76 | + "threathandled": true, |
| 77 | + "nodepath": "1\\1048078\\1116857", |
| 78 | + "targethash": "9f8bc96c96d43ecb69f883388d228754", |
| 79 | + "sourceprocesshash": null, |
| 80 | + "sourceprocesssigned": null, |
| 81 | + "sourceprocesssigner": null, |
| 82 | + "sourcefilepath": null |
| 83 | + } |
| 84 | + } |
| 85 | +``` |
| 86 | +</details> |
| 87 | + |
| 88 | +## Sample queries |
| 89 | + |
| 90 | +```sql title="Total Threat Detections" |
| 91 | +_sourceCategory="Trellix-mVision-ePO" |
| 92 | +| json "id", "attributes.threathandled", "attributes.threatseverity", "attributes.threattype", "attributes.threatcategory", "attributes.analyzerdetectionmethod", "attributes.targethostname", "attributes.threatname", "attributes.analyzeripv4", "attributes.timestamp", "attributes.sourcehostname", "attributes.sourceusername", "attributes.sourceprocessname", "attributes.targetprocessname", "attributes.threatactiontaken", "attributes.targetfilename", "attributes.targethash", "attributes.sourceipv4", "attributes.targetipv4", "attributes.targetport", "attributes.targetprotocol", "attributes.sourceurl", "attributes.targetusername", "attributes.targetipv6" as id, threat_handled, threat_severity, threat_type, threat_category, analyzer_detection_method, target_hostname, threat_name, analyzer_ipv4, timestamp, source_hostname, source_username, source_processname, target_processname, threat_action_taken, target_filename, target_hash, source_ipv4, target_ipv4, target_port, target_protocol, source_url, target_username, target_ipv6 nodrop |
| 93 | + |
| 94 | +| if ((threat_severity matches "1"), "Low", threat_severity) as threat_severity |
| 95 | +| if ((threat_severity matches "2" or threat_severity matches "3"), "Medium", threat_severity) as threat_severity |
| 96 | +| if ((threat_severity matches "4"), "High", threat_severity) as threat_severity |
| 97 | + |
| 98 | +| where threat_severity matches "{{threat_severity}}" |
| 99 | +| where threat_name matches "{{threat_name}}" |
| 100 | +| where threat_category matches "{{threat_category}}" |
| 101 | +| where threat_type matches "{{threat_type}}" |
| 102 | + |
| 103 | +| count by id |
| 104 | +| count |
| 105 | +``` |
| 106 | + |
| 107 | +## Collection configuration and app installation |
| 108 | + |
| 109 | +import CollectionConfiguration from '../../reuse/apps/collection-configuration.md'; |
| 110 | + |
| 111 | +<CollectionConfiguration/> |
| 112 | + |
| 113 | +:::important |
| 114 | +Use the [Cloud-to-Cloud Integration for Trellix mVision ePO](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/trellix-mvisio-epo-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Trellix mVision ePO app is properly integrated and configured to collect and analyze your Trellix mVision ePO data. |
| 115 | +::: |
| 116 | + |
| 117 | +### Create a new collector and install the app |
| 118 | + |
| 119 | +import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md'; |
| 120 | + |
| 121 | +<AppCollectionOPtion1/> |
| 122 | + |
| 123 | +### Use an existing collector and install the app |
| 124 | + |
| 125 | +import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md'; |
| 126 | + |
| 127 | +<AppCollectionOPtion2/> |
| 128 | + |
| 129 | +### Use an existing source and install the app |
| 130 | + |
| 131 | +import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md'; |
| 132 | + |
| 133 | +<AppCollectionOPtion3/> |
| 134 | + |
| 135 | +## Viewing the Trellix mVision ePO dashboards |
| 136 | + |
| 137 | +import ViewDashboards from '../../reuse/apps/view-dashboards.md'; |
| 138 | + |
| 139 | +<ViewDashboards/> |
| 140 | + |
| 141 | +### Security |
| 142 | + |
| 143 | +The **Trellix mVision ePO - Security** dashboard offers a unified view of endpoint threat activity and overall security posture. It tracks total detections, failed remediations, severity levels, and detection trends, helping teams quickly assess threat impact and scale. |
| 144 | + |
| 145 | +The dashboard provides real-time insights into suspicious processes, malicious file quarantines, C2 callbacks, user-targeted attacks, and unusual network port usage. It highlights threat activity by type, category, detection method, and affected endpoints, with geographical visualizations, including threats from embargoed regions, for added context. |
| 146 | + |
| 147 | +By consolidating this information, the dashboard enables faster threat detection, analysis, and response, reducing dwell time and enhancing endpoint defenses.<br/><img src='https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Trellix-mVision-ePO/Trellix+mVision+ePO+-+Security.png' alt="Trellix-mVision-ePO–Security-Dashboard" /> |
| 148 | + |
| 149 | +## Create monitors for the Trellix mVision ePO app |
| 150 | + |
| 151 | +import CreateMonitors from '../../reuse/apps/create-monitors.md'; |
| 152 | + |
| 153 | +<CreateMonitors/> |
| 154 | + |
| 155 | +### Trellix mVision ePO alerts |
| 156 | + |
| 157 | +| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition | |
| 158 | +|:--|:--|:--|:--| |
| 159 | +| `Trellix mVision ePO - High-Severity Malware Detected` | This alert is triggered when malware with critical severity is detected. It helps prioritize threats that require immediate attention and investigation. | Critical | Count > 0 | |
| 160 | +| `Trellix mVision ePO – High-Severity Threat Not Remediated` | This alert is triggered when high-severity threats are detected but not successfully remediated. This alert helps you to identify persistent threats or failed containment efforts. | Critical | Count > 0| |
| 161 | +| `Trellix mVision ePO – Unusual Network Port Used in Malicious Activity` | This alert is triggered when high-severity threat events use unusual network ports outside standard ranges (80, 22, 443, 53, 3389). This alert helps you detect potential secret communication channels. | Critical | Count > 0| |
| 162 | +| `Trellix mVision ePO - Repeated Infections on Same Host` | This alert is triggered when more than three threat events occur on the same endpoint within one hour. This alert helps you to detect repeated compromise or reinfection of a host. | Critical | Count > 0| |
| 163 | +| `Trellix mVision ePO - Multiple Hosts Affected by Same Threat` | This alert is triggered when the same threat indicator appears across more than five unique hosts within 30 minutes. This alert helps you to detect a widespread or rapidly propagating attack. | Critical | Count > 0| |
| 164 | + |
| 165 | +## Upgrading/Downgrading the Trellix mVision ePO app (Optional) |
| 166 | + |
| 167 | +import AppUpdate from '../../reuse/apps/app-update.md'; |
| 168 | + |
| 169 | +<AppUpdate/> |
| 170 | + |
| 171 | +## Uninstalling the Trellix mVision ePO app (Optional) |
| 172 | + |
| 173 | +import AppUninstall from '../../reuse/apps/app-uninstall.md'; |
| 174 | + |
| 175 | +<AppUninstall/> |
0 commit comments