Skip to content
Merged
Show file tree
Hide file tree
Changes from 11 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
14 changes: 14 additions & 0 deletions blog-service/2025-01-28-apps.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
---
title: VMware Workspace ONE (Apps)
image: https://help.sumologic.com/img/sumo-square.png
keywords:
- apps
- vmware-workspace-one
hide_table_of_contents: true
---

import useBaseUrl from '@docusaurus/useBaseUrl';

<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>

We're excited to introduce the new VMware Workspace ONE app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud VMware Workspace ONE source that collects audit logs data from the VMware Workspace ONE platform. This app helps security analysts monitor device compliance, encryption, and overall security status, offering a powerful solution for effective risk analysis, policy enforcement, and device security. [Learn more](/docs/integrations/saas-cloud/vmware-workspace-one/).
1 change: 1 addition & 0 deletions cid-redirects.json
Original file line number Diff line number Diff line change
Expand Up @@ -1602,6 +1602,7 @@
"/cid/10207": "/docs/integrations/saas-cloud/symantec-endpoint-security-service",
"/cid/10197": "/docs/integrations/saas-cloud/symantec-web-security-service",
"/cid/6016": "/docs/integrations/saas-cloud/trend-micro-vision-one",
"/cid/6024": "/docs/integrations/saas-cloud/vmware-workspace-one",
"/cid/10112": "/docs/integrations/app-development/jfrog-xray",
"/cid/10113": "/docs/observability/root-cause-explorer",
"/cid/10116": "/docs/manage/fields",
Expand Down
2 changes: 1 addition & 1 deletion docs/integrations/product-list/product-list-m-z.md
Original file line number Diff line number Diff line change
Expand Up @@ -203,7 +203,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/vectra.png')} alt="Thumbnail icon" width="75"/> | [Vectra](https://www.vectra.ai/) | Automation integration: [Vectra](/docs/platform-services/automation-service/app-central/integrations/vectra/) <br/>Cloud SIEM integration: [Vectra](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/7a3d1a5c-ba67-4597-971f-7057e8f6c8bb.md) |
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/virustotal.png')} alt="Thumbnail icon" width="75"/> | [VirusTotal](https://www.virustotal.com/) | Automation integration: [VirusTotal](/docs/platform-services/automation-service/app-central/integrations/virustotal/) |
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/vmray.png')} alt="Thumbnail icon" width="75"/> | [VMRay](https://www.vmray.com/) | Automation integration: [VMRay](/docs/platform-services/automation-service/app-central/integrations/vmray/) |
| <img src={useBaseUrl('img/integrations/containers-orchestration/vmware.png')} alt="Thumbnail icon" width="50"/> | [VMware](https://www.vmware.com/) | Apps: <br/>- [Carbon Black Cloud](/docs/integrations/security-threat-detection/carbon-black-cloud/) <br/>- [VMware](/docs/integrations/containers-orchestration/vmware/) <br/>- [VMware Legacy](/docs/integrations/containers-orchestration/vmware-legacy/) <br/>- [VMware Carbon Black](/docs/integrations/security-threat-detection/vmware-carbon-black/) <br/>- [VMWare - OpenTelemetry Collector](/docs/integrations/containers-orchestration/opentelemetry/vmware-opentelemetry/) <br/>Automation integrations: <br/>- [Lastline Analyst](/docs/platform-services/automation-service/app-central/integrations/lastline-analyst/) <br/>- [VMware Carbon Black Cloud Endpoint Standard](/docs/platform-services/automation-service/app-central/integrations/vmware-carbon-black-cloud-endpoint-standard/) <br/>- [VMware Carbon Black Cloud Endpoint Standard V2](/docs/platform-services/automation-service/app-central/integrations/vmware-carbon-black-cloud-endpoint-standard-v2/) <br/>- [VMware Carbon Black Cloud Enterprise EDR](/docs/platform-services/automation-service/app-central/integrations/vmware-carbon-black-cloud-enterprise-edr/) <br/>- [VMware Carbon Black Cloud Platform](/docs/platform-services/automation-service/app-central/integrations/vmware-carbon-black-cloud-platform/) <br/>- [VMware vSphere](/docs/platform-services/automation-service/app-central/integrations/vmware-vsphere/) <br/>- [VMware Workspace ONE](/docs/platform-services/automation-service/app-central/integrations/vmware-workspace-one/) <br/>Cloud SIEM integrations: <br/>- [Carbon Black](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/c2ea2e5e-92f2-49e8-9812-64e60dba63a2.md) <br/>- [VMware](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/fbf25b91-89f1-45c4-903d-664b328bc6e0.md) <br/>Collectors: <br/>- [Carbon Black Cloud Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/carbon-black-cloud-source/) <br/>- [Carbon Black Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/carbon-black-inventory-source/) <br/>- [Carbon Black Cloud - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/carbon-black/)<br/>- [Collect Metrics from VMware vRealize Operations Manager 8 Enterprise](/docs/send-data/collect-from-other-data-sources/collect-metrics-vrealize-operations-manager/) <br/>- [VMware AirWatch Integration for Sumo Logic](/docs/send-data/collect-from-other-data-sources/vmware-airwatch-integration/) <br/>- [VMware vRealize Log Insight](/docs/send-data/collect-from-other-data-sources/vmware-vrealize-log-insight/)<br/>- [VMware Workspace One Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vmware-workspace-one-source/) <br/>Partner integration: [VMware Tanzu](https://docs.vmware.com/en/Sumo-Logic-Nozzle-for-VMware-Tanzu/services/sumologic-nozzle-vmware-tanzu/index.html) |
| <img src={useBaseUrl('img/integrations/containers-orchestration/vmware.png')} alt="Thumbnail icon" width="50"/> | [VMware](https://www.vmware.com/) | Apps: <br/>- [Carbon Black Cloud](/docs/integrations/security-threat-detection/carbon-black-cloud/) <br/>- [VMware](/docs/integrations/containers-orchestration/vmware/) <br/>- [VMware Legacy](/docs/integrations/containers-orchestration/vmware-legacy/) <br/>- [VMware Carbon Black](/docs/integrations/security-threat-detection/vmware-carbon-black/) <br/>- [VMWare - OpenTelemetry Collector](/docs/integrations/containers-orchestration/opentelemetry/vmware-opentelemetry/) <br/>- [VMware Workspace ONE](/docs/integrations/saas-cloud/vmware-workspace-one/) <br/>Automation integrations: <br/>- [Lastline Analyst](/docs/platform-services/automation-service/app-central/integrations/lastline-analyst/) <br/>- [VMware Carbon Black Cloud Endpoint Standard](/docs/platform-services/automation-service/app-central/integrations/vmware-carbon-black-cloud-endpoint-standard/) <br/>- [VMware Carbon Black Cloud Endpoint Standard V2](/docs/platform-services/automation-service/app-central/integrations/vmware-carbon-black-cloud-endpoint-standard-v2/) <br/>- [VMware Carbon Black Cloud Enterprise EDR](/docs/platform-services/automation-service/app-central/integrations/vmware-carbon-black-cloud-enterprise-edr/) <br/>- [VMware Carbon Black Cloud Platform](/docs/platform-services/automation-service/app-central/integrations/vmware-carbon-black-cloud-platform/) <br/>- [VMware vSphere](/docs/platform-services/automation-service/app-central/integrations/vmware-vsphere/) <br/>- [VMware Workspace ONE](/docs/platform-services/automation-service/app-central/integrations/vmware-workspace-one/) <br/>Cloud SIEM integrations: <br/>- [Carbon Black](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/c2ea2e5e-92f2-49e8-9812-64e60dba63a2.md) <br/>- [VMware](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/fbf25b91-89f1-45c4-903d-664b328bc6e0.md) <br/>Collectors: <br/>- [Carbon Black Cloud Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/carbon-black-cloud-source/) <br/>- [Carbon Black Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/carbon-black-inventory-source/) <br/>- [Carbon Black Cloud - Cloud SIEM](/docs/cse/ingestion/ingestion-sources-for-cloud-siem/carbon-black/)<br/>- [Collect Metrics from VMware vRealize Operations Manager 8 Enterprise](/docs/send-data/collect-from-other-data-sources/collect-metrics-vrealize-operations-manager/) <br/>- [VMware AirWatch Integration for Sumo Logic](/docs/send-data/collect-from-other-data-sources/vmware-airwatch-integration/) <br/>- [VMware vRealize Log Insight](/docs/send-data/collect-from-other-data-sources/vmware-vrealize-log-insight/)<br/>- [VMware Workspace One Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vmware-workspace-one-source/) <br/>Partner integration: [VMware Tanzu](https://docs.vmware.com/en/Sumo-Logic-Nozzle-for-VMware-Tanzu/services/sumologic-nozzle-vmware-tanzu/index.html) |
| <img src={useBaseUrl('img/integrations/misc/votiro-logo.png')} alt="Thumbnail icon" width="50"/> | [Votiro](https://votiro.com/) | Partner integration: [Votiro](https://github.com/SumoLogic/sumologic-public-partner-apps/tree/master/Votiro#votiro) |

## W
Expand Down
6 changes: 6 additions & 0 deletions docs/integrations/saas-cloud/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -327,6 +327,12 @@ Learn about the Sumo Logic apps for SaaS and Cloud applications.
<p>Analyze alert logs to detect potential security risks.</p>
</div>
</div>
<div className="box smallbox card">
<div className="container">
<a href="/docs/integrations/saas-cloud/vmware-workspace-one"><img src={useBaseUrl('img/send-data/vmware_workspace_one.png')} alt="icon" width="100"/><h4>VMware Workspace ONE</h4></a>
<p>Analyze device compliance, encryption, and security status to spot risks and keep devices secure.</p>
</div>
</div>
<div className="box smallbox card">
<div className="container">
<a href="/docs/integrations/saas-cloud/webex"><img src={useBaseUrl('img/send-data/webex-logo.png')} alt="icon" width="70"/><h4>Webex</h4></a>
Expand Down
227 changes: 227 additions & 0 deletions docs/integrations/saas-cloud/vmware-workspace-one.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,227 @@
---
id: vmware-workspace-one
title: VMware Workspace ONE
sidebar_label: VMware Workspace ONE
description: The VMware Workspace ONE app for Sumo Logic helps security analysts with valuable insights into various security and compliance aspects.
---

import useBaseUrl from '@docusaurus/useBaseUrl';

<img src={useBaseUrl('img/send-data/vmware_workspace_one.png')} alt="vmware-workspace-one-logo" width="50" />

The Sumo Logic app for VMware Workspace ONE helps security analysts in monitoring device compliance, encryption, and overall security status. It provides dashboards that display non-compliant or compromised devices, along with data encryption deficiencies. Additionally, geolocation panels track device locations and identify instances of roaming in restricted areas.

The app includes out-of-the-box alerts that notify analysts about critical security issues, such as compromised devices, non-compliance, and unauthorized roaming. These features enable analysts to identify and address risks, enforce security policies, and maintain a secure ecosystem for enterprise devices.

:::info
This app includes [built-in monitors](#vmware-workspace-one-monitors). For details on creating custom monitors, refer to the [Create monitors for VMware Workspace ONE app](#create-monitors-for-the-vmware-workspace-one-app).
:::

## Log types

This app uses Sumo Logic’s VMware Workspace ONE Source to collect [audit logs](https://help.sumologic.com/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vmware-workspace-one-source/) from the VMware Workspace ONE platform.

## Sample log message

<details>
<summary>Audit Log</summary>

```json
{
"AcLineStatus": 1,
"AssetNumber": "827BE1C5AEC05C378C61C44103E9D3FCB2EC354D",
"AvailableDeviceCapacity": 1,
"AvailablePhysicalMemory": 4,
"BatteryLevel": "abcd",
"ComplianceStatus": "NonCompliant",
"ComplianceSummary": {
"DeviceCompliance": [
{
"ActionTaken": [
{
"ActionType": 0
}
],
"CompliantStatus": true,
"Id": {
"Value": 1
},
"LastComplianceCheck": "2025-01-15T03:15:26.8528889+01:00",
"NextComplianceCheck": "2025-01-15T03:01:26.8528889+01:00",
"PolicyDetail": "compliance policy for device compromised status including application list contains rule",
"PolicyName": "application list compliance policy",
"Uuid": "2851e9e5-2084-433c-a741-dae0856295ff"
}
]
},
"CompromisedStatus": true,
"DataEncryptionYN": "N",
"DataProtectionStatus": 5,
"DepTokenSource": 0,
"DeviceCapacity": 1,
"DeviceCellularNetworkInfo": [
{
"CardId": "Text value",
"CarrierName": "Text value",
"DeviceMCC": {

},
"IsRoaming": true,
"PhoneNumber": "Text value"
}
],
"DeviceFriendlyName": "users iPhone iOS 10.3.2 ",
"DeviceMCC": {
"CurrentMCC": "Text value",
"SIMMCC": "Text value"
},
"DeviceManufacturerId": 1,
"DeviceNetworkInfo": [
{
"ConnectionType": "Text value",
"IPAddress": "221.192.199.49",
"MACAddress": "Text value",
"Name": "Text value",
"Vendor": "Text value"
}
],
"DeviceReportedName": "5CD6473R77 - Demo HP Chromebook",
"EasId": "6Q93UFOQ7H0K39JPMFPTEMJQ3K",
"EnrolledViaDEP": true,
"EnrollmentStatus": "Enrolled",
"EnrollmentUserUuid": "00000000-0000-0000-0000-000000000000",
"HostName": "zs-MacBook-Air",
"Id": {
"Value": 0
},
"Imei": "356766060039613",
"IsActivationLockEnabled": true,
"IsCloudBackupEnabled": true,
"IsDeviceDNDEnabled": true,
"IsDeviceLocatorEnabled": true,
"IsNetworkTethered": true,
"IsRemoteManagementEnabled": "abcd",
"IsRoaming": true,
"IsSecurityPatchUpdate": true,
"IsSupervised": true,
"LastBluetoothSampleTime": "2022-06-03T03:01:26.8528889+01:00",
"LastComplianceCheckOn": "2022-06-03T03:01:26.8528889+01:00",
"LastCompromisedCheckOn": "2022-06-03T03:01:26.8528889+01:00",
"LastEnrolledOn": "2022-06-03T03:01:26.8528889+01:00",
"LastNetworkLANSampleTime": "2022-06-03T03:01:26.8528889+01:00",
"LastSeen": "2022-06-03T03:01:26.8528889+01:00",
"LastSystemSampleTime": "2022-06-03T03:01:26.8528889+01:00",
"LocalHostName": "zs-MacBook-Air.mshome.net",
"LocationGroupId": {
"Name": "Text value",
"Uuid": "6d82a40e-dcc1-46de-9fc2-33c9ad2f8797"
},
"LocationGroupName": "locationgroup1",
"MacAddress": "485A3F880798",
"ManagedBy": 0,
"Model": "iPhone",
"ModelId": {

},
"OEMInfo": "Samsung",
"OSBuildVersion": "17G65",
"OperatingSystem": "10.3.2",
"Ownership": "C",
"PhoneNumber": "+14045550100",
"Platform": "Apple",
"PlatformId": {

},
"ProcessorArchitecture": 5,
"SecurityPatchDate": "2022-06-03T03:01:26.8629122+01:00",
"SerialNumber": "R51G844T90R",
"SystemIntegrityProtectionEnabled": true,
"SystemUpdateReceivedTime": "2022-06-03T03:01:26.8629122+01:00",
"TotalPhysicalMemory": 3,
"Udid": "827BE1C5AEC05C378C61C44103E9D3FCB2EC354D",
"UserApprovedEnrollment": true,
"UserEmailAddress": "[email protected]",
"UserId": {

},
"UserName": "user1",
"Uuid": "8a2ca18c-8b1c-4783-bc18-2ccb61110e4f",
"VirtualMemory": 2,
"WifiSsid": "guest"
}
```
</details>

## Sample queries

```sql title="Total Devices"
_sourcecategory = "VMWare"
| json "Ownership", "UserEmailAddress", "IsDeviceDNDEnabled", "LocationGroupName", "Imei", "SystemIntegrityProtectionEnabled", "DeviceFriendlyName", "ProcessorArchitecture", "IsRoaming", "ComplianceStatus", "UserName", "LastComplianceCheckOn", "IsDeviceLocatorEnabled", "HostName", "IsCloudBackupEnabled", "LastEnrolledOn", "DeviceReportedName", "SerialNumber", "IsActivationLockEnabled", "CompromisedStatus", "OperatingSystem", "Model", "DataProtectionStatus", "SecurityPatchDate", "LocalHostName", "IsSupervised", "Platform", "LocationGroupId.Name", "OSBuildVersion", "TotalPhysicalMemory", "OEMInfo", "LastCompromisedCheckOn", "UserId.Uuid", "UserId.Name", "EnrollmentStatus", "DataEncryptionYN" as ownership,user_email, is_dnd_enabled, location_group_name, imei, is_system_protection_enabled, device_name, architecture, is_roaming, compliance_status, user_name, last_compliance_checked_on, is_device_location_enabled, hostname, is_cloud_backup_enabled, last_enrolled_on, device_reported_name, serial_number, is_activation_lock_enabled, compromised_status, os, model, data_protection_status, security_patch_date, local_hostname, is_supervised, platform, location_groupid_name, os_build_version, total_physical_mem, oem_info, last_compromised_checked_on, uuid, user_name1, entrollment_status, data_encryption nodrop
| json "DeviceNetworkInfo[0].IPAddress" as ip nodrop
```

## Collection configuration and app installation

import CollectionConfiguration from '../../reuse/apps/collection-configuration.md';

<CollectionConfiguration/>

:::important
Use the [Cloud-to-Cloud Integration for VMware Workspace ONE Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vmware-workspace-one-source) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your VMware Workspace ONE app is properly integrated and configured to collect and analyze your VMware Workspace ONE data.
:::

### Create a new collector and install the app

import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md';

<AppCollectionOPtion1/>

### Use an existing collector and install the app

import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md';

<AppCollectionOPtion2/>

### Use an existing source and install the app

import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md';

<AppCollectionOPtion3/>

## Viewing the VMware Workspace ONE dashboards​​

import ViewDashboards from '../../reuse/apps/view-dashboards.md';

<ViewDashboards/>

### Overview

The **VMware Workspace ONE - Overview** dashboard provides valuable insights into various security and compliance aspects. It displays the device information that has compromised statuses, gaps in data encryption, and device compliance. This dashboard provides insights into non-compliant devices and users, compromised devices and users, and non-data encrypted devices and users. Additionally, the geolocation panels provide a clear view of device locations and reveal any instances of roaming in restricted regions.<br/><img src='https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/VMWare+Workspace+ONE/VMWare+Workspace+ONE+-+Overview.png' alt="VMware-Workspace-ONE-Overview" />

## Create monitors for the VMware Workspace ONE app

import CreateMonitors from '../../reuse/apps/create-monitors.md';

<CreateMonitors/>

### VMware Workspace ONE monitors

The VMware Workspace ONE monitors act as a security tool that focuses on tracking critical operations and identifying unusual activities within the VMware Workspace ONE platform. These notifications provide real-time insights into significant events, enabling security personnel to quickly respond to any deviations or breaches.

| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition |
|:--|:--|:--|:--|
| `Compromised Devices` | This alert is triggered when any devices marked as compromised in Workspace ONE are identified. It monitors the `compromised_status` field to initiate actions when devices are flagged, allowing analysts to promptly secure affected devices.| Critical | Count > 0 |
| `Non-Compliance Devices` | This alert is triggered when devices do not meet compliance standards as indicated by the `compliance_status` field. It ensures that devices adhere to organizational policies and regulatory requirements. | Critical | Count > 0|
| `Roaming Devices from Embargoed Countries` | This alert is triggered when devices are identified roaming in restricted or embargoed regions. It helps mitigate risks linked to unauthorized device movement in high-risk areas. | Critical | Count > 0|

## Upgrading/Downgrading the VMware Workspace ONE app (Optional)

import AppUpdate from '../../reuse/apps/app-update.md';

<AppUpdate/>

## Uninstalling the VMware Workspace ONE app (Optional)

import AppUninstall from '../../reuse/apps/app-uninstall.md';

<AppUninstall/>
Loading
Loading