Skip to content

Commit e81b7ea

Browse files
committed
Corrected spelling errors
1 parent 44838ee commit e81b7ea

File tree

3 files changed

+20
-20
lines changed

3 files changed

+20
-20
lines changed

blog-service/2024-12-11-apps.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Crowdstrike Falcon FileVantage (Apps)
2+
title: CrowdStrike Falcon FileVantage (Apps)
33
image: https://help.sumologic.com/img/sumo-square.png
44
keywords:
55
- crowdstrike-falcon-filevantage
@@ -11,4 +11,4 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1111

1212
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
1313

14-
We're excited to introduce the new Crowdstrike Falcon FileVantage app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Crowdstrike FileVantage source that collects FileVantage logs from CrowdStrike. It enables the detection of unauthorized or high-risk file changes, policy violations, and suspicious activities that may indicate potential threats or compliance breaches. [Learn more](/docs/integrations/saas-cloud/crowdstrike-falcon-filevantage/).
14+
We're excited to introduce the new CrowdStrike Falcon FileVantage app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud CrowdStrike FileVantage source that collects FileVantage logs from CrowdStrike. It enables the detection of unauthorized or high-risk file changes, policy violations, and suspicious activities that may indicate potential threats or compliance breaches. [Learn more](/docs/integrations/saas-cloud/crowdstrike-falcon-filevantage/).

docs/integrations/product-list/product-list-a-l.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
168168
| <img src={useBaseUrl('img/integrations/databases/couchbase-logo.png')} alt="Thumbnail icon" width="50"/> | [Couchbase](https://www.couchbase.com/) | Apps:<br/>- [Couchbase](/docs/integrations/databases/couchbase/) <br/>- [Couchbase - OpenTelemetry](/docs/integrations/databases/opentelemetry/couchbase-opentelemetry/) |
169169
| <img src={useBaseUrl('img/integrations/misc/cribl-logo.png')} alt="Thumbnail icon" width="75"/> | [Cribl](https://cribl.io/) | Automation integration: [Cribl](/docs/platform-services/automation-service/app-central/integrations/cribl/) <br/>Partner integration: [Cribl](https://docs.cribl.io/stream/destinations-sumo-logic/) |
170170
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/criminal-ip.png')} alt="Thumbnail icon" width="100"/> | [Criminal IP](https://www.criminalip.io/) | Automation integration: [Criminal IP](/docs/platform-services/automation-service/app-central/integrations/criminal-ip) |
171-
| <img src={useBaseUrl('img/integrations/security-threat-detection/crowdstrike.png')} alt="Thumbnail icon" width="75"/> | [CrowdStrike](https://www.crowdstrike.com/) | Apps: <br/>- [CrowdStrike Falcon Endpoint Protection](/docs/integrations/security-threat-detection/crowdstrike-falcon-endpoint-protection/) <br/>- [Crowdstrike Falcon FileVantage](/docs/integrations/saas-cloud/crowdstrike-falcon-filevantage/) <br/>- [Threat Intel Quick Analysis](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/) <br/>- [CrowdStrike FDR Host Inventory](/docs/integrations/saas-cloud/crowdstrike-fdr-host-inventory) <br/>- [CrowdStrike Spotlight](/docs/integrations/saas-cloud/crowdstrike-spotlight) <br/>Automation integrations: <br/>- [CrowdStrike Falcon](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon/) <br/>- [CrowdStrike Falcon Discover](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-discover/) <br/>- [CrowdStrike Falcon Intelligence](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-intelligence/) <br/>- [CrowdStrike Falcon Sandbox](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-sandbox/) <br/>Cloud SIEM integrations: <br/>- [CrowdStrike](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/79ade329-b6d4-43ae-8db1-2a9cc45c0fb0.md) <br/>- [PreemptSecurity](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/15c77a62-0fbb-4a60-9fae-ead49ec423f9.md) <br/>Collectors:<br/>- [CrowdStrike Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-source/) <br/>- [Crowdstrike FDR Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-fdr-source/)<br/>- [CrowdStrike FDR Host Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-fdr-host-inventory-source/) <br/>- [CrowdStrike FileVantage Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-filevantage-source/)<br/>- [CrowdStrike Spotlight Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-spotlight-source/) |
171+
| <img src={useBaseUrl('img/integrations/security-threat-detection/crowdstrike.png')} alt="Thumbnail icon" width="75"/> | [CrowdStrike](https://www.crowdstrike.com/) | Apps: <br/>- [CrowdStrike Falcon Endpoint Protection](/docs/integrations/security-threat-detection/crowdstrike-falcon-endpoint-protection/) <br/>- [CrowdStrike Falcon FileVantage](/docs/integrations/saas-cloud/crowdstrike-falcon-filevantage/) <br/>- [Threat Intel Quick Analysis](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/) <br/>- [CrowdStrike FDR Host Inventory](/docs/integrations/saas-cloud/crowdstrike-fdr-host-inventory) <br/>- [CrowdStrike Spotlight](/docs/integrations/saas-cloud/crowdstrike-spotlight) <br/>Automation integrations: <br/>- [CrowdStrike Falcon](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon/) <br/>- [CrowdStrike Falcon Discover](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-discover/) <br/>- [CrowdStrike Falcon Intelligence](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-intelligence/) <br/>- [CrowdStrike Falcon Sandbox](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-sandbox/) <br/>Cloud SIEM integrations: <br/>- [CrowdStrike](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/79ade329-b6d4-43ae-8db1-2a9cc45c0fb0.md) <br/>- [PreemptSecurity](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/15c77a62-0fbb-4a60-9fae-ead49ec423f9.md) <br/>Collectors:<br/>- [CrowdStrike Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-source/) <br/>- [Crowdstrike FDR Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-fdr-source/)<br/>- [CrowdStrike FDR Host Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-fdr-host-inventory-source/) <br/>- [CrowdStrike FileVantage Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-filevantage-source/)<br/>- [CrowdStrike Spotlight Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-spotlight-source/) |
172172
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/cuckoo.png')} alt="Thumbnail icon" width="75"/> | [Cuckoo](https://cuckoo.readthedocs.io/en/latest/#) | Automation integration: [Cuckoo](/docs/platform-services/automation-service/app-central/integrations/cuckoo/) |
173173
| <img src={useBaseUrl('img/send-data/cyberark.png')} alt="Thumbnail icon" width="50"/> | [CyberArk](https://www.cyberark.com/) | Automation integrations: <br/>- [CyberArk AAM](/docs/platform-services/automation-service/app-central/integrations/cyberark-aam/) <br/>- [CyberArk PAM](/docs/platform-services/automation-service/app-central/integrations/cyberark-pam) <br/>Cloud SIEM integration: [CyberArk](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/8a3d333e-ffad-49ed-9edd-0cf1c797b24f.md) <br/>Collector: [CyberArk EPM Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cyberark-source/) |
174174
| <img src={useBaseUrl('/img/platform-services/automation-service/app-central/logos/cyberint.png')} alt="cyberint" width="75"/> | [CyberInt](https://cyberint.com/) | Automation integration: [Cyberint](/docs/platform-services/automation-service/app-central/integrations/cyberint) |

docs/integrations/saas-cloud/crowdstrike-falcon-filevantage.md

Lines changed: 17 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
id: crowdstrike-falcon-filevantage
3-
title: Crowdstrike Falcon FileVantage
4-
sidebar_label: Crowdstrike Falcon FileVantage
3+
title: CrowdStrike Falcon FileVantage
4+
sidebar_label: CrowdStrike Falcon FileVantage
55
description: Analyze CrowdStrike Falcon FileVantage data to identify unauthorized file changes, policy violations, and unusual activity indicating potential threats or compliance breaches.
66
---
77

@@ -24,10 +24,10 @@ Use cases for the CrowdStrike Falcon FileVantage app include:
2424
- **Threat investigation**. Investigate suspicious file modifications to uncover potential breaches or insider threats.
2525
- **Host Activity Analysis**. Analyze file changes at the host level to identify risky behaviors or compromised endpoints.
2626

27-
The Sumo Logic app for Crowdstrike Falcon FileVantage is an essential tool for security teams. It provides the visibility and intelligence needed to detect and respond to file-related threats, ensuring data integrity and compliance across the organization.
27+
The Sumo Logic app for CrowdStrike Falcon FileVantage is an essential tool for security teams. It provides the visibility and intelligence needed to detect and respond to file-related threats, ensuring data integrity and compliance across the organization.
2828

2929
:::info
30-
This app includes [built-in monitors](#crowdstrike-fdr-host-inventory-alerts). For details on creating custom monitors, refer to [Create monitors for CrowdStrike FDR Host Inventory app](#create-monitors-for-crowdstrike-fdr-host-inventory-app).
30+
This app includes [built-in monitors](#crowdstrike-falcon-filevantage-monitors). For details on creating custom monitors, refer to [Create monitors for CrowdStrike Falcon FileVantage app](#create-monitors-for-crowdstrike-falcon-filevantage-app).
3131
:::
3232

3333
## Log types
@@ -115,27 +115,27 @@ _sourceCategory="Labs/CrowdStrikeFalconFileVantage" entity_type file
115115

116116
## Set up collection
117117

118-
Follow the instructions provided to set up [Cloud-to-Cloud Integration for Crowdstrike Falcon FileVantage Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-filevantage-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Crowdstrike Falcon FileVantage app is properly integrated and configured to collect and analyze your Crowdstrike Falcon FileVantage data.
118+
Follow the instructions provided to set up [Cloud-to-Cloud Integration for CrowdStrike Falcon FileVantage Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-filevantage-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your CrowdStrike Falcon FileVantage app is properly integrated and configured to collect and analyze your CrowdStrike Falcon FileVantage data.
119119

120-
## Installing the Crowdstrike Falcon FileVantage app
120+
## Installing the CrowdStrike Falcon FileVantage app
121121

122122
import AppInstall2 from '../../reuse/apps/app-install-v2.md';
123123

124124
<AppInstall2/>
125125

126-
## Viewing Crowdstrike Falcon FileVantage dashboards
126+
## Viewing CrowdStrike Falcon FileVantage dashboards
127127

128128
import ViewDashboards from '../../reuse/apps/view-dashboards.md';
129129

130130
<ViewDashboards/>
131131

132132
### Overview
133133

134-
The **Crowdstrike Falcon FileVantage - Overview** dashboard provides a comprehensive overview of file and directory activity, helping security analysts monitor file integrity and identify potential risks. It provides a total count of the file changes, categorizing them by severity—**Critical**, **High**, **Medium**, and **Low**—to prioritize investigations. Suppressed changes, which are ignored due to predefined policies, are also highlighted.
134+
The **CrowdStrike Falcon FileVantage - Overview** dashboard provides a comprehensive overview of file and directory activity, helping security analysts monitor file integrity and identify potential risks. It provides a total count of the file changes, categorizing them by severity—**Critical**, **High**, **Medium**, and **Low**—to prioritize investigations. Suppressed changes, which are ignored due to predefined policies, are also highlighted.
135135

136136
Key metrics include file change types (**WRITE**, **RENAME**, **READ** **PERMISSION**, **OTHERS**, **DELETE**), displayed in an easy-to-read pie chart for quick analysis. The dashboard tracks changes by operating system, identifies top hosts and users making changes, and highlights threats or anomalies.
137137

138-
The dashboard also shows the monitoring rules that triggered the most changes, assisting in policy refinement. A detailed table of recent file activities, including timestamps, hostnames, file paths, severities, and associated policies, is provided. Overall, the dashboard strengthens the detection and response to unauthorized or suspicious file activities. <br/> <img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Crowdstrike+Falcon+FileVantage/Crowdstrike+Falcon+FileVantage+dashboard.png')} alt="Crowdstrike Falcon FileVantage Overview" />
138+
The dashboard also shows the monitoring rules that triggered the most changes, assisting in policy refinement. A detailed table of recent file activities, including timestamps, hostnames, file paths, severities, and associated policies, is provided. Overall, the dashboard strengthens the detection and response to unauthorized or suspicious file activities. <br/> <img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Crowdstrike+Falcon+FileVantage/Crowdstrike+Falcon+FileVantage+dashboard.png')} alt="CrowdStrike Falcon FileVantage Overview" />
139139

140140

141141
### Security
@@ -146,29 +146,29 @@ The dashboard tracks high-risk actions over time, enabling security teams to ide
146146

147147
Additionally, security analysts can review file deletions with specific details, including file paths, user names, and originating countries. The severity trends are visually represented, providing a clear overview of security incidents over time and helping teams identify escalation points.
148148

149-
While the dashboard provides placeholders for tracking malicious file changes and directory changes, data in these sections requires specific configuration based on the environment. Finally, the **Host-Based Change Monitoring** table offers detailed insights into the hosts and host groups involved in file changes, assisting in pinpointing areas that need further investigation. Overall, this dashboard is a vital tool for ensuring file integrity and effectively mitigating risks. <br/> <img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Crowdstrike+Falcon+FileVantage/Crowdstrike+Falcon+FileVantage+Security.png')} alt="Crowdstrike Falcon FileVantage Security" />
149+
While the dashboard provides placeholders for tracking malicious file changes and directory changes, data in these sections requires specific configuration based on the environment. Finally, the **Host-Based Change Monitoring** table offers detailed insights into the hosts and host groups involved in file changes, assisting in pinpointing areas that need further investigation. Overall, this dashboard is a vital tool for ensuring file integrity and effectively mitigating risks. <br/> <img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Crowdstrike+Falcon+FileVantage/Crowdstrike+Falcon+FileVantage+Security.png')} alt="CrowdStrike Falcon FileVantage Security" />
150150

151-
## Create monitors for Crowdstrike Falcon FileVantage app
151+
## Create monitors for CrowdStrike Falcon FileVantage app
152152

153153
import CreateMonitors from '../../reuse/apps/create-monitors.md';
154154

155155
<CreateMonitors/>
156156

157-
### Crowdstrike Falcon FileVantage monitors
157+
### CrowdStrike Falcon FileVantage monitors
158158

159159
| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition |
160160
|:--|:--|:--|:--|
161-
| `Crowdstrike Falcon FileVantage - Changes from Embargoed Geo Locations` | This alert identifies file activity originating from locations considered restricted or embargoed by the organization. It helps detect potentially unauthorized access or data exfiltration attempts from high-risk geographic areas. | Critical | Count > 0 |
162-
| `Crowdstrike Falcon FileVantage - Suppressed Changes` | This alert captures file changes that have been intentionally excluded or suppressed due to pre-defined policies or filters. It provides visibility into the suppressed events for auditing or validation purposes. | Critical | Count > 0|
163-
| `Crowdstrike Falcon FileVantage - Critical Changes` | This alert tracks high-severity file modifications, deletions, or access attempts flagged as critical by CrowdStrike Falcon FileVantage. These changes could indicate potential security incidents, such as unauthorized access or malicious activity. | Critical | Count > 0|
161+
| `CrowdStrike Falcon FileVantage - Changes from Embargoed Geo Locations` | This alert identifies file activity originating from locations considered restricted or embargoed by the organization. It helps detect potentially unauthorized access or data exfiltration attempts from high-risk geographic areas. | Critical | Count > 0 |
162+
| `CrowdStrike Falcon FileVantage - Suppressed Changes` | This alert captures file changes that have been intentionally excluded or suppressed due to pre-defined policies or filters. It provides visibility into the suppressed events for auditing or validation purposes. | Critical | Count > 0|
163+
| `CrowdStrike Falcon FileVantage - Critical Changes` | This alert tracks high-severity file modifications, deletions, or access attempts flagged as critical by CrowdStrike Falcon FileVantage. These changes could indicate potential security incidents, such as unauthorized access or malicious activity. | Critical | Count > 0|
164164

165-
## Upgrade/Downgrade the Crowdstrike Falcon FileVantage app (Optional)
165+
## Upgrade/Downgrade the CrowdStrike Falcon FileVantage app (Optional)
166166

167167
import AppUpdate from '../../reuse/apps/app-update.md';
168168

169169
<AppUpdate/>
170170

171-
## Uninstalling the Crowdstrike Falcon FileVantage app (Optional)
171+
## Uninstalling the CrowdStrike Falcon FileVantage app (Optional)
172172

173173
import AppUninstall from '../../reuse/apps/app-uninstall.md';
174174

0 commit comments

Comments
 (0)