|
| 1 | +--- |
| 2 | +id: jumpcloud-directory-insights |
| 3 | +title: JumpCloud Directory Insights |
| 4 | +sidebar_label: Jumpcloud Directory Insights |
| 5 | +description: The Sumo Logic app for JumpCloud Directory Insights provides a comprehensive visibility into authentication events, user activities, and security-related actions within your JumpCloud-managed environment. |
| 6 | +--- |
| 7 | + |
| 8 | +import useBaseUrl from '@docusaurus/useBaseUrl'; |
| 9 | + |
| 10 | +<img src={useBaseUrl('img/send-data/jumpcloud-directory-insights-logo.png')} alt="jumpcloud-directory-insights" width="100"/> |
| 11 | + |
| 12 | +The Sumo Logic app for JumpCloud Directory Insights provides comprehensive visibility into user activities, authentication events, and security actions in the JumpCloud managed environment. By using JumpCloud Directory Insights logs, this app enables IT administrators and security analysts to monitor access, detect anomalies, and respond to security threats efficiently. |
| 13 | + |
| 14 | +With pre-configured dashboards, the app delivers insights into user authentication trends, directory modifications, policy enforcement, and security incidents. Analysts can track failed login attempts, privileged access changes, and account lockouts in real time to improve security and ensure organizational policy compliance. |
| 15 | + |
| 16 | +:::info |
| 17 | +This app includes [built-in monitors](#jumpcloud-directory-insights-monitors). For details on creating custom monitors, refer to the [Create monitors for JumpCloud Directory Insights app](#create-monitors-for-the-jumpcloud-directory-insights-app). |
| 18 | +::: |
| 19 | + |
| 20 | +## Log types |
| 21 | + |
| 22 | +This app uses Sumo Logic’s [JumpCloud Directory Insights Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/jumpcloud-directory-insights-source) to collect the logs from the JumpCloud Directory Insights platform. |
| 23 | + |
| 24 | +### Sample log message |
| 25 | + |
| 26 | +<details> |
| 27 | +<summary>Event Log</summary> |
| 28 | + |
| 29 | +```json |
| 30 | +[ |
| 31 | + { |
| 32 | + "initiated_by": { |
| 33 | + "id": "64949312a2930fd2c93b2667", |
| 34 | + "type": "admin", |
| 35 | + |
| 36 | + }, |
| 37 | + "geoip": { |
| 38 | + "country_code": "US", |
| 39 | + "timezone": "America/Los_Angeles", |
| 40 | + "latitude": 37.7797, |
| 41 | + "continent_code": "NA", |
| 42 | + "region_name": "California", |
| 43 | + "longitude": -122.4159, |
| 44 | + "region_code": "CA" |
| 45 | + }, |
| 46 | + "resource": { |
| 47 | + "displayName": "Sumo Logic", |
| 48 | + "id": "64949312a2930fd2c93b2669", |
| 49 | + "type": "organization" |
| 50 | + }, |
| 51 | + "changes": [ |
| 52 | + { |
| 53 | + "field": "customer", |
| 54 | + "to": false |
| 55 | + }, |
| 56 | + { |
| 57 | + "field": "displayName", |
| 58 | + "to": "Sumo Logic" |
| 59 | + }, |
| 60 | + { |
| 61 | + "field": "features", |
| 62 | + "to": { |
| 63 | + "systemInsights": { |
| 64 | + "enableNewLinux": true, |
| 65 | + "enableNewWindows": true, |
| 66 | + "createdAt": "2023-06-22T18:29:38.966Z", |
| 67 | + "enableNewDarwin": true, |
| 68 | + "enabled": true, |
| 69 | + "updatedAt": "2023-06-22T18:29:38.966Z" |
| 70 | + }, |
| 71 | + "directoryInsightsPremium": { |
| 72 | + "createdAt": "2023-06-22T18:29:38.967Z", |
| 73 | + "enabled": false, |
| 74 | + "updatedAt": "2023-06-22T18:29:38.967Z" |
| 75 | + } |
| 76 | + } |
| 77 | + }, |
| 78 | + { |
| 79 | + "field": "id", |
| 80 | + "to": "64949312a2930fd2c93b2669" |
| 81 | + }, |
| 82 | + { |
| 83 | + "field": "logoUrl", |
| 84 | + "to": null |
| 85 | + }, |
| 86 | + { |
| 87 | + "field": "maxSystemUsers", |
| 88 | + "to": 10 |
| 89 | + }, |
| 90 | + { |
| 91 | + "field": "settings.contactEmail", |
| 92 | + |
| 93 | + }, |
| 94 | + { |
| 95 | + "field": "settings.contactName", |
| 96 | + "to": "Siri Oaklander" |
| 97 | + }, |
| 98 | + { |
| 99 | + "field": "settings.deviceIdentificationEnabled", |
| 100 | + "to": false |
| 101 | + }, |
| 102 | + { |
| 103 | + "field": "settings.disableGoogleLogin", |
| 104 | + "to": false |
| 105 | + }, |
| 106 | + { |
| 107 | + "field": "settings.enableManagedUID", |
| 108 | + "to": false |
| 109 | + }, |
| 110 | + { |
| 111 | + "field": "settings.enableUserPortalAgentInstall", |
| 112 | + "to": false |
| 113 | + }, |
| 114 | + { |
| 115 | + "field": "settings.name", |
| 116 | + "to": "Sumo Logic" |
| 117 | + }, |
| 118 | + { |
| 119 | + "field": "settings.newSystemUserStateDefaults", |
| 120 | + "to": { |
| 121 | + "applicationImport": "STAGED", |
| 122 | + "manualEntry": "STAGED", |
| 123 | + "csvImport": "STAGED" |
| 124 | + } |
| 125 | + }, |
| 126 | + { |
| 127 | + "field": "settings.passwordPolicy", |
| 128 | + "to": { |
| 129 | + "minLength": 8, |
| 130 | + "minChangePeriodInDays": 0, |
| 131 | + "enableResetLockoutCounter": false, |
| 132 | + "enablePasswordExpirationInDays": false, |
| 133 | + "enableMaxHistory": false, |
| 134 | + "enableDaysAfterExpirationToSelfRecover": true, |
| 135 | + "enableMaxLoginAttempts": true, |
| 136 | + "needsSymbolic": true, |
| 137 | + "daysAfterExpirationToSelfRecover": -1, |
| 138 | + "needsNumeric": true, |
| 139 | + "needsUppercase": true, |
| 140 | + "enableMinLength": true, |
| 141 | + "enableRecoveryEmail": false, |
| 142 | + "resetLockoutCounterMinutes": 30, |
| 143 | + "allowUsernameSubstring": false, |
| 144 | + "maxHistory": 3, |
| 145 | + "maxLoginAttempts": 6, |
| 146 | + "passwordExpirationInDays": 90, |
| 147 | + "enableDaysBeforeExpirationToForceReset": false, |
| 148 | + "enableMinChangePeriodInDays": false, |
| 149 | + "needsLowercase": true, |
| 150 | + "lockoutTimeInSeconds": 600, |
| 151 | + "daysBeforeExpirationToForceReset": 10, |
| 152 | + "effectiveDate": "2023-06-22T14:27:14.338Z", |
| 153 | + "enableLockoutTimeInSeconds": true |
| 154 | + } |
| 155 | + }, |
| 156 | + { |
| 157 | + "field": "settings.systemUsersCanEdit", |
| 158 | + "to": true |
| 159 | + }, |
| 160 | + { |
| 161 | + "field": "settings.userPortal", |
| 162 | + "to": { |
| 163 | + "idleSessionDurationMinutes": 60 |
| 164 | + } |
| 165 | + } |
| 166 | + ], |
| 167 | + "useragent": { |
| 168 | + "os": "Mac OS X", |
| 169 | + "minor": "0", |
| 170 | + "os_minor": "15", |
| 171 | + "os_major": "10", |
| 172 | + "os_version": "10.15.7", |
| 173 | + "version": "112.0.0.0", |
| 174 | + "os_patch": "7", |
| 175 | + "patch": "0", |
| 176 | + "os_full": "Mac OS X 10.15.7", |
| 177 | + "major": "112", |
| 178 | + "name": "Chrome", |
| 179 | + "os_name": "Mac OS X", |
| 180 | + "device": "Mac" |
| 181 | + }, |
| 182 | + "auth_method": "other", |
| 183 | + "event_type": "organization_create", |
| 184 | + "service": "directory", |
| 185 | + "organization": "64949312a2930fd2c93b2669", |
| 186 | + "@version": "1", |
| 187 | + "client_ip": "23.118.110.219", |
| 188 | + "id": "64949312a2930fd2c93b266e", |
| 189 | + "timestamp": "2023-06-22T18:29:38.985Z" |
| 190 | + } |
| 191 | +] |
| 192 | +``` |
| 193 | +</details> |
| 194 | + |
| 195 | +### Sample queries |
| 196 | + |
| 197 | +```sql title="Top 10 Services" |
| 198 | +_sourceCategory="Labs/JumpCloud" |
| 199 | +| json "id", "timestamp", "service", "event_type", "client_ip", "success", "initiated_by.type", "auth_method", "useragent.os_full", "geoip.region_name", "resource.name" as id, event_time, service, event_type, ip, success, event_initiator, auth_method, device, region_name, resource_name nodrop |
| 200 | + |
| 201 | +// global filters |
| 202 | +| where service matches "{{service}}" |
| 203 | +| where event_type matches "{{event_type}}" |
| 204 | +| where region_name matches "{{region_name}}" OR isBlank(region_name) |
| 205 | + |
| 206 | +| where !isBlank(service) |
| 207 | +| count by id, service |
| 208 | +| count as frequency by service |
| 209 | +| sort by frequency, service |
| 210 | +| limit 10 |
| 211 | +``` |
| 212 | + |
| 213 | +## Collection configuration and app installation |
| 214 | + |
| 215 | +import CollectionConfiguration from '../../reuse/apps/collection-configuration.md'; |
| 216 | + |
| 217 | +<CollectionConfiguration/> |
| 218 | + |
| 219 | +:::important |
| 220 | +Use the [Cloud-to-Cloud Integration for JumpCloud Directory Insights Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/jumpcloud-directory-insights-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your JumpCloud Directory Insights app is properly integrated and configured to collect and analyze your JumpCloud Directory Insights data. |
| 221 | +::: |
| 222 | + |
| 223 | +### Create a new collector and install the app |
| 224 | + |
| 225 | +import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md'; |
| 226 | + |
| 227 | +<AppCollectionOPtion1/> |
| 228 | + |
| 229 | +### Use an existing collector and install the app |
| 230 | + |
| 231 | +import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md'; |
| 232 | + |
| 233 | +<AppCollectionOPtion2/> |
| 234 | + |
| 235 | +### Use an existing source and install the app |
| 236 | + |
| 237 | +import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md'; |
| 238 | + |
| 239 | +<AppCollectionOPtion3/> |
| 240 | + |
| 241 | +## Viewing the JumpCloud Directory Insights dashboards |
| 242 | + |
| 243 | +import ViewDashboards from '../../reuse/apps/view-dashboards.md'; |
| 244 | + |
| 245 | +<ViewDashboards/> |
| 246 | + |
| 247 | +### Overview |
| 248 | + |
| 249 | +The **JumpCloud Directory Insights - Overview** dashboard provides a comprehensive view of directory activity, including user authentications, administrative changes, and system modifications. It highlights authentication trends by tracking successful and failed logins over time, helping IT teams identify patterns. This dashboard also provides insights into user provisioning, de-provisioning, and group membership changes, offering visibility into directory structure updates. Additionally, it includes administrator actions such as password resets and policy modifications to monitor privileged activities. |
| 250 | + |
| 251 | +<img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/JumpCloud+Directory+Insights/JumpCloud+Directory+Insights+-+Overview.png')} alt="JumpCloud Directory Insights-Overview" style={{border: '1px solid gray'}} width="800" /> |
| 252 | + |
| 253 | +### Security Overview |
| 254 | + |
| 255 | +The **JumpCloud Directory Insights - Security Overview** dashboard focuses on security-related events, emphasizing failed login attempts, account lockouts, and privilege escalations. It provides geographic insights into authentication activities, helping you to detect suspicious login locations. This dashboard also tracks high-risk events such as MFA failures and unauthorized access attempts to enhance security monitoring. By analyzing login behaviors and access trends, it helps security teams identify potential threats and enforce compliance policies. |
| 256 | + |
| 257 | +<img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/JumpCloud+Directory+Insights/JumpCloud+Directory+Insights+-+Security+Overview.png')} alt="JumpCloud Directory Insights-Security Overview" style={{border: '1px solid gray'}} width="800" /> |
| 258 | + |
| 259 | +## Create monitors for the JumpCloud Directory Insights app |
| 260 | + |
| 261 | +import CreateMonitors from '../../reuse/apps/create-monitors.md'; |
| 262 | + |
| 263 | +<CreateMonitors/> |
| 264 | + |
| 265 | +### JumpCloud Directory Insights monitors |
| 266 | + |
| 267 | +| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition | |
| 268 | +|:--|:--|:--|:--| |
| 269 | +| `JumpCloud Directory Insights - Alerts Created` | This alert is triggered when potential security risks, configuration issues, or critical system events requiring investigation are identified. | Critical | Count > 3 | |
| 270 | +| `JumpCloud Directory Insights - Disabled MFA` | This alert is triggered when unauthorized flags or accidental removal of MFA are identified. This could expose accounts to compromise and immediate review is recommended to ensure compliance and security. | Critical | Count > 0 | |
| 271 | +| `JumpCloud Directory Insights - Events from Embargoed Locations` | This alert is triggered when logins or actions from embargoed locations are detected, suggesting potential unauthorized access. Investigate to confirm legitimacy or block malicious actors. | Critical | Count > 0 | |
| 272 | +| `JumpCloud Directory Insights - Impossible Logins` | This alert is triggered when the user account is compromised. For example, a user logging in from two distant locations consecutively. Immediate investigation is required to rule out credential theft. | Critical | Count > 0 | |
| 273 | +| `JumpCloud Directory Insights - Unsuccessful Logins` | This alert is triggered when credentials are misconfigured, or when brute-force attacks and credential stuffing are detected. Review source IPs and lock accounts if suspicious activity is confirmed. | Critical | Count > 1 | |
| 274 | +| `JumpCloud Directory Insights - Unsuccessful SSOs` | This alert is triggered by misconfigurations in identity providers or malicious attempts to bypass SSO. Check SSO logs to identify the cause or any threats. | Critical | Count > 1 | |
| 275 | + |
| 276 | +## Upgrade/Downgrade the JumpCloud Directory Insights app (Optional) |
| 277 | + |
| 278 | +import AppUpdate from '../../reuse/apps/app-update.md'; |
| 279 | + |
| 280 | +<AppUpdate/> |
| 281 | + |
| 282 | +## Uninstalling the JumpCloud Directory Insights app (Optional) |
| 283 | + |
| 284 | +import AppUninstall from '../../reuse/apps/app-uninstall.md'; |
| 285 | + |
| 286 | +<AppUninstall/> |
0 commit comments