Skip to content

Commit c0335f2

Browse files
authored
Update digital-guardian-arc.md
1 parent 90b6986 commit c0335f2

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

docs/integrations/saas-cloud/digital-guardian-arc.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
id: digital-guardian-arc
33
title: Digital Guardian ARC
44
sidebar_label: Digital Guardian ARC
5-
description: The Sumo Logic App for Digital Guardian Advanced Reporting and Analytics (ARC) provides a comprehensive suite of dashboards and alerts to help security analysts monitor, detect, and respond to critical events within their data protection environment.
5+
description: The Sumo Logic app for Digital Guardian ARC provides a comprehensive suite of dashboards and alerts to help security analysts monitor, detect, and respond to critical events within their data protection environment.
66
---
77

88
import useBaseUrl from '@docusaurus/useBaseUrl';
@@ -11,16 +11,16 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1111

1212
The Sumo Logic app for Digital Guardian ARC provides a comprehensive suite of dashboards and alerts to help security analysts monitor, detect, and respond to critical events within their data protection environment. Designed to integrate seamlessly with Digital Guardian's Advanced Reporting and Analytics (ARC), this app offers actionable insights into endpoint activities, user behavior, and policy violations to enhance data security.
1313

14-
Key features for Digital Guardian ARC app include:
14+
Key features of the Digital Guardian ARC app include:
1515

1616
- **Real-time activity monitoring**. Gain visibility into activities such as file creations, modifications, and deletions, categorized by operation type, file types accessed, and protocols used.
17-
- **Risk-based alerts**. Preconfigured alerts for blocked events, failed login attempts, and user activities originating from high-risk locations allow analysts to detect and respond to potential threats in real-time.
17+
- **Risk-based alerts**. Pre-configured alerts for blocked events, failed login attempts, and user activities originating from high-risk locations allow analysts to detect and respond to potential threats in real-time.
1818
- **Policy enforcement analytics**. The app provides insights into rule violation events, helping organizations monitor adherence to security policies and identify areas for improvement.
1919
- **User and host analysis**. Interactive charts display the top users, applications, and systems contributing to security events, helping analysts pinpoint risky behaviors or potential insider threats.
2020
- **Geolocation insights**. Visualize sender and recipient activities from high-risk or suspicious locations with geolocation maps, enabling targeted threat investigation and response.
2121
- **Signature issuer intelligence**. Monitor digital signatures for files and applications to ensure authenticity and detect any potential tampering or unauthorized software.
2222

23-
Use cases for Digital Guardian ARC app include:
23+
Use cases for the Digital Guardian ARC app include:
2424

2525
- **Identify unauthorized activities**. Detect and investigate unauthorized file access, data exfiltration attempts, or suspicious behavior within the environment.
2626
- **Enforce compliance**. Track and address violations of security rules to maintain regulatory compliance and internal policy adherence.
@@ -35,7 +35,7 @@ This app also includes [built-in monitors](#digital-guardian-arc-monitors). For
3535

3636
## Log types
3737

38-
This App uses Sumo Logic’s [Digital Guardian ARC Source](https://help.sumologic.com/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/digital-guardian-source/) to collect event logs from Digital Guardian ARC.
38+
This app uses Sumo Logic’s [Digital Guardian ARC Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/digital-guardian-source/) to collect event logs from Digital Guardian ARC.
3939

4040
### Sample log messages
4141

@@ -310,7 +310,7 @@ This App uses Sumo Logic’s [Digital Guardian ARC Source](https://help.sumologi
310310
```
311311
</details>
312312

313-
### Sample queries
313+
### Sample query
314314

315315
```sql title="Activities By Protocol"
316316
_sourceCategory="Labs/DigitalGuardian"
@@ -344,7 +344,7 @@ import ViewDashboards from '../../reuse/apps/view-dashboards.md';
344344

345345
### Overview
346346

347-
The **Digital Guardian ARC - Overview** dashboard offers a centralized view of data activities, enabling security analysts to monitor and secure sensitive information effectively. It highlights critical metrics such as total activities, blocked actions, unauthorized PKI activities, and rule violations for immediate visibility into security events. Analysts can track network activity by protocol (e.g., HTTP, IPsec) and identify operational types like file creation, deletion, and transfer. File type access insights help detect malicious files or unauthorized usage, while top users, computers, and applications provide a snapshot of entities generating the most activity.
347+
The **Digital Guardian ARC - Overview** dashboard offers a centralized view of data activities, enabling security analysts to monitor and secure sensitive information effectively. It highlights critical metrics such as total activities, blocked actions, unauthorized PKI activities, and rule violations for immediate visibility into security events. Analysts can track network activity by protocol (for example, HTTP, IPsec) and identify operational types like file creation, deletion, and transfer. File type access insights helps you to detect malicious files or unauthorized usage, while top users, computers, and applications provide a snapshot of entities generating the most activity.
348348

349349
The dashboard includes geolocation maps for sender and recipient activity to identify unusual or risky data transfers across regions. It also highlights potentially risky geographies associated with flagged behaviors. Authentication insights, such as failed login attempts, enable analysts to investigate credential misuse or brute-force attempts. Process monitoring lists metadata like file size, path, and user domain to identify risky operations. Historical activity trends help detect abnormal surges or patterns.
350350

@@ -362,8 +362,8 @@ import CreateMonitors from '../../reuse/apps/create-monitors.md';
362362
|:--|:--|:--|:--|
363363
| `Blocked Events` | This alert is fired when there are blocked events. | Critical | Count > 0 |
364364
| `Failed Login Attempt` | This alert tracks repeated failed login attempts on monitored systems. It aids in identifying brute-force attacks, credential stuffing, or unauthorized access attempts, allowing analysts to take corrective actions to secure accounts and investigate potential insider threats. | Critical | Count > 3|
365-
| `Recipient Activities from Risky Locations` | This alert identifies activities involving recipients located in regions flagged as risky or suspicious. It enables analysts to assess potential data exfiltration risks or unauthorized sharing of sensitive information, strengthening data protection measures. | Critical | Count > 0 |
366-
| `Rule Violation Events` | This alert highlights incidents where monitored systems or users have violated predefined security rules. It provides insights into non-compliant behavior, supporting analysts in enforcing organizational security policies and maintaining compliance standards. | Critical | Count > 0 |
365+
| `Recipient Activities from Risky Locations` | This alert identifies activities involving recipients located in regions flagged as risky or suspicious. It enables analysts to assess potential data exfiltration risks or unauthorized sharing of sensitive information, thereby strengthening data protection measures. | Critical | Count > 0 |
366+
| `Rule Violation Events` | This alert highlights incidents, where monitored systems or users, have violated predefined security rules. It provides insights into non-compliant behavior, supporting analysts in enforcing organizational security policies and maintaining compliance standards. | Critical | Count > 0 |
367367
| `Sender Activities from Risky Locations` | This alert tracks activities initiated by senders located in high-risk geographic regions. It helps analysts detect and respond to potential threats involving unauthorized data transmission, insider threats, or compromised systems in critical locations. | Count > 0 |
368368

369369
## Upgrade/downgrade the Digital Guardian ARC app (optional)
@@ -376,4 +376,4 @@ import AppUpdate from '../../reuse/apps/app-update.md';
376376

377377
import AppUninstall from '../../reuse/apps/app-uninstall.md';
378378

379-
<AppUninstall/>
379+
<AppUninstall/>

0 commit comments

Comments
 (0)