You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .clabot
+2-1Lines changed: 2 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -192,7 +192,8 @@
192
192
"fguimond",
193
193
"rmeyer-legato",
194
194
"jagan2221",
195
-
"pankaj101A"
195
+
"pankaj101A",
196
+
"prajalb"
196
197
],
197
198
"message": "Thank you for your contribution! As this is an open source project, we require contributors to sign our Contributor License Agreement and do not have yours on file. To proceed with your PR, please [sign your name here](https://forms.gle/YgLddrckeJaCdZYA6) and we will add you to our approved list of contributors.",
Copy file name to clipboardExpand all lines: blog-service/2025-10-15-manage.md
-4Lines changed: 0 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,3 @@ hide_table_of_contents: true
11
11
We're excited to annouce the new **AutoPause** feature for Scheduled Views, designed to enhance system performance and optimize resource usage.
12
12
13
13
With AutoPause, any Scheduled View that remains inactive for 90 consecutive days (that is, not queried or referenced) will be automatically flagged and paused. To ensure you're informed ahead of time, Scheduled View owners and active account administrators will receive email and in-app notifications 21 days and 7 days before the scheduled pause. If no action is taken, the view will be automatically paused on the 90th day, followed by a final alert. [Learn more](/docs/manage/scheduled-views/pause-disable-scheduled-views/).
14
-
15
-
:::note
16
-
This feature is currently available only for Canada (Central), Asia Pacific (Tokyo), and Asia Pacific (Seoul) regions.
We're excited to announce the release of our new cloud-to-cloud source for Varonis. This source securely collects alerts from the Varonis platform and sends them to Sumo Logic for streamlined analysis. [Learn more](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/varonis-source).
12
+
We're excited to announce the release of our new cloud-to-cloud source for Varonis Alerts. This source securely collects alerts from the Varonis platform and sends them to Sumo Logic for streamlined analysis. [Learn more](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/varonis-source).
Copy file name to clipboardExpand all lines: docs/security/index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ Sumo Logic security solutions support the entire spectrum of security use cases,
11
11
***[Logs for Security](/docs/security/additional-security-features/)**<br/>Provides enhanced insight for security analysts into threat activity via logs. Collect security log and event data from your infrastructure and applications, on-premises and in-cloud. Analyze your security data with pre-built and custom dashboards, out-of-the-box security apps, and robust queries.
12
12
***Threat detection, investigation, and response**<br/>After you have collected logs for security, you can use them with the following solutions for threat detection, investigation, and response:
13
13
***[Cloud SIEM](/docs/cse/)**<br/>Gives SOC (security operations center) analysts prioritized and contextualized actionable threats with automated security workflows. Out-of-the-box automated detection reduces manual work, saving valuable resource time and enabling your team to be more effective by allowing them to focus on higher-value security functions.
14
-
***[Cloud SOAR](/docs/cloud-soar/)**<br/>Fully automates triage, investigation, and remediation of threats for any security professional. The open integrations framework allows you to connect to a multitude of third-party applications. The platform provides full incident response lifecycle management with machine learning and threat hunting, accelerating mean time to respond (MTTR). |
14
+
***[Cloud SOAR](/docs/cloud-soar/)**<br/>Fully automates triage, investigation, and remediation of threats for any security professional. The open integrations framework allows you to connect to a multitude of third-party applications. The platform provides full incident response lifecycle management with machine learning and threat hunting, accelerating mean time to respond (MTTR).
The Sumo Logic source for Varonis enables you to collect alerts from Varonis into Sumo Logic. This integration helps you to collect real-time intelligent alerts about suspicious activity across your files, emails, and data stores. Powered by advanced threat detection and behavioral analytics, these alerts help security teams quickly identify insider threats, ransomware, and data breaches. With clear context and actionable insights, Varonis alerts enable faster response and stronger protection of your most sensitive information.
16
+
The Sumo Logic source for Varonis Alerts enables you to collect alerts from Varonis into Sumo Logic. This integration helps you to collect real-time intelligent alerts about suspicious activity across your files, emails, and data stores. Powered by advanced threat detection and behavioral analytics, these alerts help security teams quickly identify insider threats, ransomware, and data breaches. With clear context and actionable insights, Varonis Alerts enable faster response and stronger protection of your most sensitive information.
17
17
18
18
## Data collected
19
19
@@ -25,7 +25,7 @@ The Sumo Logic source for Varonis enables you to collect alerts from Varonis int
25
25
26
26
### Vendor configuration
27
27
28
-
The Varonis source requires you to provide the Varonis **Domain URL** and **API Key** to configure the source.
28
+
The Varonis Alerts source requires you to provide the Varonis **Domain URL** and **API Key** to configure the source.
29
29
30
30
#### Domain URL
31
31
@@ -39,12 +39,12 @@ To collect the API Key, follow the below steps:
39
39
40
40
### Source configuration
41
41
42
-
When you create a Varonis Source, you add it to a Hosted Collector. Before creating the Source, identify the Hosted Collector you want to use or create a new Hosted Collector. For instructions, see [Configure a Hosted Collector and Source](/docs/send-data/hosted-collectors/configure-hosted-collector).
42
+
When you create a Varonis Alerts Source, you add it to a Hosted Collector. Before creating the Source, identify the Hosted Collector you want to use or create a new Hosted Collector. For instructions, see [Configure a Hosted Collector and Source](/docs/send-data/hosted-collectors/configure-hosted-collector).
43
43
44
-
To configure Varonis Source:
44
+
To configure Varonis Alerts Source:
45
45
1.[**New UI**](/docs/get-started/sumo-logic-ui). In the Sumo Logic main menu select **Data Management**, and then under **Data Collection** select **Collection**. You can also click the **Go To...** menu at the top of the screen and select **Collection**.<br/>[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Collection > Collection**.
46
46
1. On the Collectors page, click **Add Source** next to a Hosted Collector.
47
-
1. Search for and select the **Varonis** icon.
47
+
1. Search for and select the **Varonis Alerts** icon.
48
48
1. Enter a **Name** to display for the Source in Sumo Logic. The description is optional.
49
49
1. (Optional) For **Source Category**, enter any string to tag the output collected from the Source. Category metadata is stored in a searchable field called `_sourceCategory`.
50
50
1. (Optional) **Fields**. Click the **+Add Field** link to define the fields you want to associate. Each field needs a name (key) and value.
0 commit comments