|
| 1 | +--- |
| 2 | +id: zero-networks-segment |
| 3 | +title: Zero Networks Segment |
| 4 | +sidebar_label: Zero Networks Segment |
| 5 | +description: The Zero Networks Segment app for Sumo Logic provides deep visibility into network activity and segmentation policies, helping security teams detect anomalies, assess risk, and validate zero‑trust enforcement to strengthen overall network security. |
| 6 | +--- |
| 7 | + |
| 8 | +import useBaseUrl from '@docusaurus/useBaseUrl'; |
| 9 | + |
| 10 | +<img src={useBaseUrl('img/send-data/zero-networks-icon.png')} alt="zero-networks-icon" width="40" /> |
| 11 | + |
| 12 | +The Zero Networks Segment app provides unified visibility into network activity, policy actions, and user behavior across your environment. By combining telemetry from connections, enforcement events, and configuration changes, it enables a clear understanding of how assets, users, and applications interact within a zero trust framework. |
| 13 | + |
| 14 | +The app surfaces key metrics such as top devices, active users, protocols, ports, and traffic types to reveal operational patterns and dependencies. Risk-oriented insights highlight high-threat destinations, unsafe processes, and connection outcomes, helping teams quickly identify and contain potential exposures. Governance information tracks who created rules, when MFA was applied, and how enforcement sources contributed to changes. |
| 15 | + |
| 16 | +Together, these views deliver real-time awareness of network usage and security posture, enabling organizations to validate segmentation policies, reduce attack surfaces, and sustain a trusted, well-monitored network environment. |
| 17 | + |
| 18 | +:::info |
| 19 | +This app includes [built-in monitors](#zero-networks-segment-alerts). For details on creating custom monitors, refer to [Create monitors for Zero Networks Segment app](#create-monitors-for-the-zero-networks-segment-app). |
| 20 | +::: |
| 21 | + |
| 22 | +## Log types |
| 23 | + |
| 24 | +This app uses Sumo Logic’s [Zero Networks Segment Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/zero-networks-segment-source) to collect Audit logs and Network Activity logs from the Zero Networks Segment platform. |
| 25 | + |
| 26 | +## Sample log message |
| 27 | + |
| 28 | +<details> |
| 29 | +<summary>Audit Log</summary> |
| 30 | + |
| 31 | +```json |
| 32 | +{ |
| 33 | + "timestamp": 1764075603256, |
| 34 | + "isoTimestamp": "2025-11-25T18:30:03.256Z", |
| 35 | + "auditType": 9, |
| 36 | + "enforcementSource": 6, |
| 37 | + "userRole": 4, |
| 38 | + "destinationEntitiesList": [ |
| 39 | + { |
| 40 | + "id": "b:110002", |
| 41 | + "name": "All protected assets" |
| 42 | + } |
| 43 | + ], |
| 44 | + "details": "{\"rule\":{\"localEntityNames\":{\"id\":\"b:110002\",\"name\":\"All protected assets\"},\"remoteEntityNames\":[{\"id\":\"b:110001\",\"name\":\"Any asset\"}],\"ports\":[{\"protocol_type\":6,\"ports\":\"62246\"}],\"expiration\":1764075603256,\"description\":\"\",\"localProcesses\":[\"*\"],\"created_by\":{\"id\":\"m:13c49a4eb4fa90bbb948b6c8de5175ad2d36cfbc\",\"name\":\"ModuleTesting\"},\"enforcementSource\":6,\"createdAt\":1764075603256,\"usedMfaMethod\":0,\"excludedLocalEntityNames\":[],\"state\":1,\"updatedAt\":1764075603256,\"updatedBy\":{},\"approvedAt\":0,\"approvedBy\":{},\"ruleClass\":2}}", |
| 45 | + "reportedObjectId": "a3864c59-e263-4d12-a73e-595cf2103f6c", |
| 46 | + "reportedObjectGeneration": 129335988, |
| 47 | + "performedBy": { |
| 48 | + "id": "m:13c49a4eb4fa90bbb948b6c8de5175ad2d36cfbc", |
| 49 | + "name": "ModuleTesting" |
| 50 | + } |
| 51 | +} |
| 52 | +``` |
| 53 | +</details> |
| 54 | + |
| 55 | +<details> |
| 56 | +<summary>Network Activity Log</summary> |
| 57 | + |
| 58 | +```json |
| 59 | +{ |
| 60 | + "timestamp": 1764075429582, |
| 61 | + "protocol": 17, |
| 62 | + "state": 3, |
| 63 | + "trafficType": 3, |
| 64 | + "dst": { |
| 65 | + "assetId": "b:X1003", |
| 66 | + "fqdn": "time.windows.com", |
| 67 | + "ip": "193.124.185.120", |
| 68 | + "port": 123, |
| 69 | + "processName": "", |
| 70 | + "processPath": "", |
| 71 | + "ipThreatScore": 0 |
| 72 | + }, |
| 73 | + "src": { |
| 74 | + "assetId": "a:d:SRV-TIME01", |
| 75 | + "assetSrc": 1, |
| 76 | + "networkProtectionState": 1, |
| 77 | + "assetType": 2, |
| 78 | + "eventRecordId": 600013, |
| 79 | + "fqdn": "NTP-Sync01", |
| 80 | + "ip": "193.124.185.120", |
| 81 | + "port": 54312, |
| 82 | + "processId": 412, |
| 83 | + "processName": "svchost.exe (412)", |
| 84 | + "processPath": "C:\\Windows\\System32\\svchost.exe (412)", |
| 85 | + "userId": "S-1-5-18", |
| 86 | + "userName": "NT AUTHORITY\\SYSTEM", |
| 87 | + "user": { |
| 88 | + "sid": "S-1-5-18", |
| 89 | + "name": "NT AUTHORITY\\SYSTEM" |
| 90 | + }, |
| 91 | + "ipThreatScore": 0 |
| 92 | + }, |
| 93 | + "inboundRuleMatches": [], |
| 94 | + "outboundRuleMatches": [], |
| 95 | + "reason": 6, |
| 96 | + "ipSpace": 0 |
| 97 | +} |
| 98 | +``` |
| 99 | +</details> |
| 100 | + |
| 101 | +## Sample queries |
| 102 | + |
| 103 | +```sql title="Total Audit Logs" |
| 104 | +_sourceCategory="zero-networks-app" auditType |
| 105 | +| json "auditType", "details", "timestamp", "reportedObjectId", "performedBy.name", "performedBy.id", "destinationEntitiesList[*]", "enforcementSource", "userRole", "isoTimestamp" as audit_type, details, timestamp, reported_object_id, actor, actor_id, destination_entities_list, enforcement_source, user_role, iso_timestamp nodrop |
| 106 | + |
| 107 | +| where audit_type matches "*" |
| 108 | +| where enforcement_source matches "*" |
| 109 | +| where user_role matches "*" |
| 110 | + |
| 111 | +| count by audit_type, details, timestamp, reported_object_id |
| 112 | +| count |
| 113 | +``` |
| 114 | + |
| 115 | +## Collection configuration and app installation |
| 116 | + |
| 117 | +import CollectionConfiguration from '../../reuse/apps/collection-configuration.md'; |
| 118 | + |
| 119 | +<CollectionConfiguration/> |
| 120 | + |
| 121 | +:::important |
| 122 | +Use the [Cloud-to-Cloud Integration for Zero Networks Segment Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/zero-networks-segment-source) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Zero Networks Segment app is properly integrated and configured to collect and analyze your Zero Networks Segment data. |
| 123 | +::: |
| 124 | + |
| 125 | +### Create a new collector and install the app |
| 126 | + |
| 127 | +import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md'; |
| 128 | + |
| 129 | +<AppCollectionOPtion1/> |
| 130 | + |
| 131 | +### Use an existing collector and install the app |
| 132 | + |
| 133 | +import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md'; |
| 134 | + |
| 135 | +<AppCollectionOPtion2/> |
| 136 | + |
| 137 | +### Use an existing source and install the app |
| 138 | + |
| 139 | +import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md'; |
| 140 | + |
| 141 | +<AppCollectionOPtion3/> |
| 142 | + |
| 143 | +## Viewing the Zero Networks Segment dashboards |
| 144 | + |
| 145 | +import ViewDashboards from '../../reuse/apps/view-dashboards.md'; |
| 146 | + |
| 147 | +<ViewDashboards/> |
| 148 | + |
| 149 | +### Network Activities |
| 150 | + |
| 151 | +The **Zero Networks Segment - Network Activities** view offers a comprehensive snapshot of how users, devices, and applications communicate across the network. It tracks total source and destination devices, unique active users, connection volumes, and top domains, ports, and processes to reveal usage trends and dependencies. By correlating state, protocol, and traffic‑type distributions with geographic source and destination mapping, it highlights how data flows through internal, external, and Internet segments and helps uncover anomalies or unexpected communication paths. Consolidating these insights provides real‑time awareness of network behavior, enabling teams to validate segmentation effectiveness, identify misconfigurations, and maintain a secure, efficient, and well‑monitored network environment. <br/><img src={useBaseUrl('img/integrations/saas-cloud/Zero-Networks-Segment-Network-Activities.png')} alt="Zero-Networks-Segment-Network-Activities" /> |
| 152 | + |
| 153 | +### Security |
| 154 | + |
| 155 | +The **Zero Networks Segment - Security** view provides a comprehensive picture of the organization’s threat posture and enforcement activity, unifying every indicator of risk into a single operational perspective. It tracks high‑risk connections, threat‑score distributions, and connection reasons to reveal which endpoints, users, or processes are engaging in potentially unsafe communications. Visual metrics categorize network events by threat severity, connection outcome, and justification reason, exposing patterns that signal policy violations, misconfigurations, or emerging threats. Detailed tables connect threat levels to specific destinations, processes, and users, allowing analysts to pinpoint the sources of elevated risk. Global mapping identifies traffic to and from embargoed or untrusted regions, while information on multi‑factor authentication usage and unmonitored rule creation highlights compliance gaps or policy bypasses. Together, these insights give security and operations teams real‑time awareness of exposure, enabling proactive mitigation, enforcement validation, and continuous assurance of Zero Trust segmentation controls. <br/><img src={useBaseUrl('img/integrations/saas-cloud/Zero-Networks-Segment-Security.png')} alt="Zero-Networks-Segment-Security" /> |
| 156 | + |
| 157 | +### Audits Events |
| 158 | + |
| 159 | +The **Zero Networks Segment - Audits Events** view provides unified visibility into all policy, configuration, and access-control changes occurring across the Zero Networks environment. It captures every audit event from rule creation, update, and approval to enforcement source actions, linking each to the responsible actor, affected assets, and time of change. Metrics track total audits, top users, and most modified assets, while visual distributions by audit type, user role, enforcement source, and rule state reveal who is making changes and through which system components. Temporal views highlight spikes in activity, exposing patterns that may signal configuration drift or unauthorized updates. Detailed tables correlate users, assets, and actions to support fast investigation and compliance verification. By bringing policy-level governance together in one place, this view enables teams to maintain accountability, trace decision history, and ensure that every modification to Zero Trust segmentation rules aligns with organizational security and compliance standards. <br/><img src={useBaseUrl('img/integrations/saas-cloud/Zero-Networks-Segment-Audit-Events.png')} alt="Zero-Networks-Segment-Audit-Events" /> |
| 160 | + |
| 161 | +## Create monitors for the Zero Networks Segment app |
| 162 | + |
| 163 | +import CreateMonitors from '../../reuse/apps/create-monitors.md'; |
| 164 | + |
| 165 | +<CreateMonitors/> |
| 166 | + |
| 167 | +### Zero Networks Segment alerts |
| 168 | + |
| 169 | +| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition | |
| 170 | +|:--|:--|:--|:--| |
| 171 | +| `Zero Networks Segment - Sources from Embargoed Locations` | Generates an alert when one or more source IP addresses originate from embargoed or restricted geographies. This helps identify unauthorized or non‑compliant traffic entering the network from high-risk regions | Critical | Count > 0 | |
| 172 | +| `Zero Networks Segment - Destinations from Embargoed Locations` | Triggers when outbound connections are detected to destinations associated with embargoed countries or sanctioned regions. Such connections may represent policy violations or potential data exfiltration attempts. | Critical | Count > 0 | |
| 173 | +| `Zero Networks Segment - High Risk Connections` | Alerts when network sessions involve destinations with a threat score greater than 50 indicating known malicious infrastructure or suspicious domains that require immediate investigation. | Critical | Count > 0 | |
| 174 | + |
| 175 | +## Upgrading/Downgrading the Zero Networks Segment app (Optional) |
| 176 | + |
| 177 | +import AppUpdate from '../../reuse/apps/app-update.md'; |
| 178 | + |
| 179 | +<AppUpdate/> |
| 180 | + |
| 181 | +## Uninstalling the Zero Networks Segment app (Optional) |
| 182 | + |
| 183 | +import AppUninstall from '../../reuse/apps/app-uninstall.md'; |
| 184 | + |
| 185 | +<AppUninstall/> |
0 commit comments