diff --git a/blog-service/2017/12-31.md b/blog-service/2017/12-31.md index 204469e6e9..324851b1f2 100644 --- a/blog-service/2017/12-31.md +++ b/blog-service/2017/12-31.md @@ -519,7 +519,7 @@ This capability is called quantization. The quantization interval aligns your ti **PCI Compliance for Linux App.** The Sumo Logic App for Payment Card Industry (PCI) Compliance for Linux offers dashboards to monitor systems, account and users activity to ensure that login activity and privileged users are within the expected ranges. The PCI Compliance for Linux App covers PCI requirements 02, 07, 08 and 10. See [PCI Compliance for Linux App](/docs/integrations/pci-compliance/linux). -**PCI Compliance for Windows App.** The Sumo Logic App for Payment Card Industry (PCI) Compliance for Windows offers dashboards to monitor systems, account and users activity to ensure that login activity and privileged users are within the expected ranges. The PCI Compliance for Windows App covers PCI requirements 02, 06, 08 and 10. [See PCI Compliance for Windows App](/docs/integrations/microsoft-azure/windows-legacy-pci-compliance). +**PCI Compliance for Windows App.** The Sumo Logic App for Payment Card Industry (PCI) Compliance for Windows offers dashboards to monitor systems, account and users activity to ensure that login activity and privileged users are within the expected ranges. The PCI Compliance for Windows App covers PCI requirements 02, 06, 08 and 10. [See PCI Compliance for Windows App](/docs/integrations/microsoft-azure/windows-json-pci-compliance). --- ## April 24, 2017 @@ -548,7 +548,7 @@ This capability is called quantization. The quantization interval aligns your ti **PCI Compliance for Linux App.** The Sumo Logic App for Payment Card Industry (PCI) Compliance for Linux offers dashboards to monitor systems, account and users activity to ensure that login activity and privileged users are within the expected ranges. The PCI Compliance for Linux App covers PCI requirements 02, 07, 08 and 10. See [PCI Compliance for Linux App](/docs/integrations/pci-compliance/linux). -**PCI Compliance for Windows App.** The Sumo Logic App for Payment Card Industry (PCI) Compliance for Windows offers dashboards to monitor systems, account and users activity to ensure that login activity and privileged users are within the expected ranges. The PCI Compliance for Windows App covers PCI requirements 02, 06, 08 and 10. [See PCI Compliance for Windows App](/docs/integrations/microsoft-azure/windows-legacy-pci-compliance). +**PCI Compliance for Windows App.** The Sumo Logic App for Payment Card Industry (PCI) Compliance for Windows offers dashboards to monitor systems, account and users activity to ensure that login activity and privileged users are within the expected ranges. The PCI Compliance for Windows App covers PCI requirements 02, 06, 08 and 10. [See PCI Compliance for Windows App](/docs/integrations/microsoft-azure/windows-json-pci-compliance). --- ## April 24, 2017 diff --git a/blog-service/2021/12-31.md b/blog-service/2021/12-31.md index 7169828ba5..310f289022 100644 --- a/blog-service/2021/12-31.md +++ b/blog-service/2021/12-31.md @@ -456,9 +456,9 @@ New - The Sumo Logic App for [HAProxy](/docs/integrations/web-servers/haproxy **PCI Compliance for Windows Legacy App** -Update - The [Payment Card Industry (PCI) Compliance for Windows Legacy App](/docs/integrations/microsoft-azure/windows-legacy-pci-compliance) is updated to offer dashboards to monitor system, account, and user activity to ensure that login activity and privileged users are within the expected ranges. The PCI Compliance for Windows Legacy App covers PCI requirements 2, 6, 8, and 10. +Update - The [Payment Card Industry (PCI) Compliance for Windows Legacy App](/docs/integrations/microsoft-azure/windows-json-pci-compliance) is updated to offer dashboards to monitor system, account, and user activity to ensure that login activity and privileged users are within the expected ranges. The PCI Compliance for Windows Legacy App covers PCI requirements 2, 6, 8, and 10. -**PCI ****Compliance for Windows JSON App** +**PCI Compliance for Windows JSON App** New - The [Payment Card Industry (PCI) Compliance for Windows JSON App](/docs/integrations/microsoft-azure/windows-json-pci-compliance) is released. This App offers dashboards to monitor system, account, and user activity to ensure that login activity and privileged users are within the expected ranges. The PCI Compliance for Windows JSON App covers PCI requirements 2, 6, 8, and 10. diff --git a/cid-redirects.json b/cid-redirects.json index eb6cdf7f9f..93a1d668c0 100644 --- a/cid-redirects.json +++ b/cid-redirects.json @@ -739,9 +739,9 @@ "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory_JSON": "/docs/integrations/microsoft-azure/active-directory-json", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory_JSON/Collect_Logs_for_the_Active_Directory_JSON_App": "/docs/integrations/microsoft-azure/active-directory-json", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory_JSON/Install_the_Active_Directory_JSON_App_and_view_the_Dashboards": "/docs/integrations/microsoft-azure/active-directory-json", - "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory_Legacy": "/docs/integrations/microsoft-azure/active-directory-legacy", - "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory_Legacy/Active-Directory-Legacy-App-Dashboards": "/docs/integrations/microsoft-azure/active-directory-legacy", - "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory_Legacy/Collect_Log_Files_for_the_Active_Directory_Legacy_App": "/docs/integrations/microsoft-azure/active-directory-legacy", + "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory_Legacy": "/docs/integrations/microsoft-azure/active-directory-json", + "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory_Legacy/Active-Directory-Legacy-App-Dashboards": "/docs/integrations/microsoft-azure/active-directory-json", + "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory_Legacy/Collect_Log_Files_for_the_Active_Directory_Legacy_App": "/docs/integrations/microsoft-azure/active-directory-json", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Active_Directory/Active-Directory-App-Dashboards": "/docs/integrations/microsoft-azure", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Azure_Active_Directory": "/docs/integrations/microsoft-azure/active-directory-azure", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Azure_Active_Directory/Collect_Logs_for_the_Azure_Active_Directory_App": "/docs/integrations/microsoft-azure/active-directory-azure", @@ -790,10 +790,10 @@ "/07Sumo-Logic-Apps/04Microsoft-and-Azure/PCI_Compliance_for_Windows_JSON": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/PCI_Compliance_for_Windows_JSON/Collect_Logs_for_the_PCI_Compliance_for_Windows_JSON": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/PCI_Compliance_for_Windows_JSON/Install_the_PCI_Compliance_for_Windows_JSON_App_and_view_the_Dashboards": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", - "/07Sumo-Logic-Apps/04Microsoft-and-Azure/PCI_Compliance_for_Windows/Collecting-Logs-for-the-PCI-Compliance-for-Windows-App": "/docs/integrations/microsoft-azure/windows-legacy-pci-compliance", - "/07Sumo-Logic-Apps/04Microsoft-and-Azure/PCI_Compliance_for_Windows/PCI-Compliance-for-Windows-App-Dashboards": "/docs/integrations/microsoft-azure/windows-legacy-pci-compliance", - "/07Sumo-Logic-Apps/04Microsoft-and-Azure/PCI_Compliance_for_Windows": "/docs/integrations/microsoft-azure/windows-legacy-pci-compliance", - "/07sumo-logic-apps/04microsoft-and-azure/pci_compliance_for_windows": "/docs/integrations/microsoft-azure/windows-legacy-pci-compliance", + "/07Sumo-Logic-Apps/04Microsoft-and-Azure/PCI_Compliance_for_Windows/Collecting-Logs-for-the-PCI-Compliance-for-Windows-App": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", + "/07Sumo-Logic-Apps/04Microsoft-and-Azure/PCI_Compliance_for_Windows/PCI-Compliance-for-Windows-App-Dashboards": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", + "/07Sumo-Logic-Apps/04Microsoft-and-Azure/PCI_Compliance_for_Windows": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", + "/07sumo-logic-apps/04microsoft-and-azure/pci_compliance_for_windows": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Windows_JSON": "/docs/integrations/microsoft-azure/windows-json", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Windows_JSON/Collect_Logs_for_the_Windows_JSON_App": "/docs/integrations/microsoft-azure/windows-json", "/07Sumo-Logic-Apps/04Microsoft-and-Azure/Windows_JSON/Install_the_Windows_JSON_App_and_view_the_Dashboards": "/docs/integrations/microsoft-azure/windows-json", @@ -1136,12 +1136,12 @@ "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Observable_Networks/01Collect-logs-for-the-Observable-Network-App": "/docs/integrations/security-threat-detection/observable-networks", "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Observable_Networks/Observable-Networks-App-Dashboard-and-Searches": "/docs/integrations/security-threat-detection/observable-networks", "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Opsgenie/Collect_Logs_for_Opsgenie": "/docs/integrations/saas-cloud/opsgenie", - "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_6": "/docs/integrations/security-threat-detection/palo-alto-networks-6", - "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_6/01Collect-Logs-for-the-Palo-Alto-Networks-App": "/docs/integrations/security-threat-detection/palo-alto-networks-6", - "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_6/Palo-Alto-Networks-App-Dashboards": "/docs/integrations/security-threat-detection/palo-alto-networks-6", - "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_8": "/docs/integrations/security-threat-detection/palo-alto-networks-8", - "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_8/Collect_Logs_for_the_Palo_Alto_Networks_8_App": "/docs/integrations/security-threat-detection/palo-alto-networks-8", - "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_8/Install_the_Palo_Alto_Networks_8_App_and_View_the_Dashboards": "/docs/integrations/security-threat-detection/palo-alto-networks-8", + "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_6": "/docs/integrations/security-threat-detection/palo-alto-networks-9", + "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_6/01Collect-Logs-for-the-Palo-Alto-Networks-App": "/docs/integrations/security-threat-detection/palo-alto-networks-9", + "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_6/Palo-Alto-Networks-App-Dashboards": "/docs/integrations/security-threat-detection/palo-alto-networks-9", + "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_8": "/docs/integrations/security-threat-detection/palo-alto-networks-9", + "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_8/Collect_Logs_for_the_Palo_Alto_Networks_8_App": "/docs/integrations/security-threat-detection/palo-alto-networks-9", + "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_8/Install_the_Palo_Alto_Networks_8_App_and_View_the_Dashboards": "/docs/integrations/security-threat-detection/palo-alto-networks-9", "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_9": "/docs/integrations/pci-compliance/palo-alto-networks-9", "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_9/Collect_logs_for_the_Palo_Alto_Networks_9_App": "/docs/integrations/pci-compliance/palo-alto-networks-9", "/07Sumo-Logic-Apps/22Security_and_Threat_Detection/Palo_Alto_Networks_9/Install_the_Palo_Alto_Networks_9_App_and_view_the_Dashboards": "/docs/integrations/pci-compliance/palo-alto-networks-9", @@ -1904,7 +1904,7 @@ "/cid/2324": "/docs/integrations/saas-cloud/workday", "/cid/23433": "/docs/search/search-query-language/search-operators/topk", "/cid/24000": "/docs/send-data/installed-collectors/sources/preconfigure-machine-collect-remote-windows-events", - "/cid/24841": "/docs/integrations/security-threat-detection/palo-alto-networks-8", + "/cid/24841": "/docs/integrations/security-threat-detection/palo-alto-networks-9", "/cid/25611": "/docs/integrations/saas-cloud/akamai-cloud-monitor", "/cid/25612": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/azure-event-hubs-source", "/cid/25613": "/docs/cse/ingestion/ingestion-sources-for-cloud-siem/carbon-black", @@ -2053,9 +2053,9 @@ "/cid/5010": "/", "/cid/5011": "/docs/manage/users-roles/users/multi-account-access", "/cid/5012": "/docs/search/search-query-language/math-expressions/acos", - "/cid/5013": "/docs/integrations/microsoft-azure/active-directory-legacy", - "/cid/5014": "/docs/integrations/microsoft-azure/active-directory-legacy", - "/cid/5015": "/docs/integrations/microsoft-azure/active-directory-legacy", + "/cid/5013": "/docs/integrations/microsoft-azure/active-directory-json", + "/cid/5014": "/docs/integrations/microsoft-azure/active-directory-json", + "/cid/5015": "/docs/integrations/microsoft-azure/active-directory-json", "/cid/5016": "/docs/send-data/choose-collector-source", "/cid/5017": "/docs/send-data/hosted-collectors/microsoft-source/ms-office-audit-source", "/cid/5018": "/docs/send-data/hosted-collectors/amazon-aws/amazon-s3-audit-source", @@ -2218,8 +2218,8 @@ "/cid/5252": "/docs/integrations/web-servers/nginx", "/cid/5253": "/docs/integrations/web-servers/nginx", "/cid/5254": "/docs/dashboards/panels/single-value-charts", - "/cid/5255": "/docs/integrations/security-threat-detection/palo-alto-networks-6", - "/cid/5256": "/docs/integrations/security-threat-detection/palo-alto-networks-6", + "/cid/5255": "/docs/integrations/security-threat-detection/palo-alto-networks-9", + "/cid/5256": "/docs/integrations/security-threat-detection/palo-alto-networks-9", "/cid/5262": "/docs/search/get-started-with-search/suggested-searches/apache-access-parser", "/cid/52621": "/docs/integrations/amazon-aws/redshift-ulm", "/cid/5263": "/docs/search/get-started-with-search/suggested-searches/apache-errors-parser", @@ -2243,7 +2243,7 @@ "/cid/5283": "/docs/integrations/pci-compliance", "/cid/5284": "/docs/integrations/pci-compliance", "/cid/5286": "/docs/get-started/library", - "/cid/5287": "/docs/integrations/microsoft-azure/windows-legacy-pci-compliance", + "/cid/5287": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", "/cid/5289": "/docs/get-started/library", "/cid/5294": "/docs/get-started/library", "/cid/5301": "/docs/manage/partitions/data-tiers", @@ -3477,9 +3477,9 @@ "/07Sumo-Logic-Apps/24Web_Servers/Nginx_Ingress_ULM/Install_the_Nginx_Ingress_App_and_View_the_Dashboards": "/docs/integrations/web-servers/nginx-ingress", "/07Sumo-Logic-Apps/24Web_Servers/Nginx_Ingress_ULM/Nginx_Ingress_Alerts": "/docs/integrations/web-servers/nginx-ingress", "/07Sumo-Logic-Apps/24Web_Servers/Nginx_Plus_Ingress/Install_the_Nginx_Plus_Ingress_App,_Alerts,_and_View_the_Dashboards": "/docs/integrations/web-servers/nginx-plus-ingress", - "/07Sumo-Logic-Apps/24Web_Servers/Nginx_ULM": "/docs/integrations/web-servers/nginx-legacy", - "/07Sumo-Logic-Apps/24Web_Servers/Nginx_ULM/Global_Intelligence_for_Nginx": "/docs/integrations/web-servers/nginx-legacy", - "/07Sumo-Logic-Apps/24Web_Servers/Nginx_ULM/Install_the_Nginx_ULM_App_and_View_the_Dashboards": "/docs/integrations/web-servers/nginx-legacy", + "/07Sumo-Logic-Apps/24Web_Servers/Nginx_ULM": "/docs/integrations/web-servers/nginx", + "/07Sumo-Logic-Apps/24Web_Servers/Nginx_ULM/Global_Intelligence_for_Nginx": "/docs/integrations/web-servers/nginx", + "/07Sumo-Logic-Apps/24Web_Servers/Nginx_ULM/Install_the_Nginx_ULM_App_and_View_the_Dashboards": "/docs/integrations/web-servers/nginx", "/07Sumo-Logic-Apps/24Web_Servers/Nginx/Global_Intelligence_for_Nginx_App": "/docs/integrations/global-intelligence/nginx", "/APIs/Search-Job-A": "/docs/api/search-job", "/APIs/02Search_Job_API": "/docs/api/search-job", @@ -3894,5 +3894,10 @@ "/docs/manage/partitions-data-tiers/searching-data-tiers": "/docs/manage/partitions/data-tiers/searching-data-tiers", "/docs/manage/partitions-data-tiers/flex-pricing/estimate-and-actual-scan-data": "/docs/manage/partitions/flex/estimate-scan-data", "/docs/manage/partitions/flex/estimate-and-actual-scan-data": "/docs/manage/partitions/flex/estimate-scan-data", - "/docs/platform-services/automation-service/app-central/integrations/snowflake": "/docs/platform-services/automation-service/app-central/integrations" + "/docs/platform-services/automation-service/app-central/integrations/snowflake": "/docs/platform-services/automation-service/app-central/integrations", + "/docs/integrations/security-threat-detection/palo-alto-networks-6": "/docs/integrations/security-threat-detection/palo-alto-networks-9", + "/docs/integrations/security-threat-detection/palo-alto-networks-8":"/docs/integrations/security-threat-detection/palo-alto-networks-9", + "/docs/integrations/microsoft-azure/windows-legacy-pci-compliance": "/docs/integrations/microsoft-azure/windows-json-pci-compliance", + "/docs/integrations/web-servers/nginx-legacy": "/docs/integrations/web-servers/nginx", + "/docs/integrations/microsoft-azure/active-directory-legacy": "/docs/integrations/microsoft-azure/active-directory-json" } diff --git a/docs/get-started/faq.md b/docs/get-started/faq.md index 20c673b41c..4fc7d84db2 100644 --- a/docs/get-started/faq.md +++ b/docs/get-started/faq.md @@ -37,7 +37,7 @@ The following table lists data types and some of the popular sources that produc | Databases |
-JFrog Artifactory is a universal artifact repository manager that integrates with CI/CD and DevOps tools to provide artifact tracking. The Sumo Logic apps for Artifactory 6 and Artifactory 7 provide insight into your JFrog Artifactory binary repository. Our preconfigured dashboards provide an overview of your system as well as Traffic, Requests and Access, Download Activity, Cache Deployment Activity, and Non-Cached Deployment Activity.
+JFrog Artifactory is a universal artifact repository manager that integrates with CI/CD and DevOps tools to provide artifact tracking. The Sumo Logic app for Artifactory 7 provides insight into your JFrog Artifactory binary repository. Our preconfigured dashboards provide an overview of your system as well as Traffic, Requests and Access, Download Activity, Cache Deployment Activity, and Non-Cached Deployment Activity.
If you _do not_ have a Sumo Logic account and want to get up and running quickly, the [JFrog Artifactory Sumo Logic integration](#if-you-do-not-have-a-sumo-logic-account) is the most convenient way to get started. It allows you to access Sumo Logic directly from Artifactory.
@@ -20,149 +20,6 @@ If you have an existing Sumo Logic account, you can still use the integration, h
* If you're using Artifactory Online, you'll need use the [integration](#artifactory-online-sumo-logic-integration) (our [app](#installing-the-artifactory-app) is not compatible with Artifactory Online).
* If you're using Artifactory On-Premise, you can use our [app](#installing-the-artifactory-app) or the [integration](#artifactory-online-sumo-logic-integration).
-
-## Artifactory 6
-
-### Log types
-
-The Sumo Logic app for Artifactory 6 collects data from the following logs:
-
-* `artifactory.log`. The main Artifactory log file that contains data on Artifactory server activity.
-* `access.log`. The security log containing important information about accepted and denied requests, configuration changes, and password reset requests. The originating IP address for each event is also recorded.
-* `request.log`. Generic HTTP traffic information similar to the Apache HTTPd request log.
-* `traffic.log`. A log that contains information about site traffic and file sizes.
-
-For more details about Artifactory logs, refer to the [JFrog Logging documentation](https://www.jfrog.com/confluence/display/RTF/Artifactory+Log+Files) and [Artifactory Log Files](https://www.jfrog.com/confluence/display/RTF6X/Artifactory+Log+Files#ArtifactoryLogFiles-RequestLog).
-
-Sumo Logic reads logs in the directory `/var/opt/jfrog/artifactory/logs`:
-* `artifactory.log`
-* `access.log`
-* `request.log`
-* `traffic.*.log`
-
-
-### Sample logs
-
-```json
-20170113185444|17|REQUEST|1.1.1.1|anonymous|GET|/cloudera-repos/org/slf4j/slf4j-log4j12/1.7.5/slf4j-log4j12-1.7.5.jar|HTTP/1.1|200|8869
-```
-
-```json
-20170113185444|0|DOWNLOAD|1.1.1.1|cloudera-repos:org/apache/spark/spark-catalyst_2.11/2.0.1/spark-catalyst_2.11-2.0.1.jar.sha1|40
-```
-
-```json
-2017-01-13 18:54:12,121 [ACCEPTED DEPLOY] pypi-remote-cache:.pypi/test.html for billythekid/1.1.1.1.
-```
-
-### Sample queries
-
-```sql title="Data Transfer Over Time"
-_sourceCategory=*artifactory*
-| where _sourceCategory matches "*artifactory/traffic"
-| parse regex
-"(?| Log source | -File Path | -Source Category | -
| Artifactory Server | -/var/opt/jfrog/artifactory/logs/artifactory.log | -artifactory/console | -
| Access | -/var/opt/jfrog/artifactory/logs/access.log | -artifactory/access | -
| Request | -/var/opt/jfrog/artifactory/logs/request.log | -artifactory/request | -
| Traffic | -/var/opt/jfrog/artifactory/logs/traffic.*.log | -artifactory/traffic | -
-
-
-### Service Activity
-
-
-
-**Top 10 Messages.** Displays the top 10 messages reported in your system with message text and count in a table for the past 24 hours.
-
-**Rights Management.** Reports the events for rights assigned or removed in timeslices of one hour for the past 24 hours using a combination line chart.
-
-**Messages Over Time by Category.** Provides details on the messages reported by your system by category in timeslices of one hour over the last 24 hours, displayed in a combination line chart.
-
-**Logon/off Activity.** Displays details on remote and interactive logon and logoff activity in timeslices of one hour for the past 24 hours using a stacked column chart.
-
-**Object Creation.** Reports on creation events for users, computers, groups, and objects in timeslices of one hour for the past 24 hours using a stacked column chart.
-
-**Object Deletion.** Reports on deletion events for users, computers, groups, and objects in timeslices of one hour for the past 24 hours using a combination line chart.
-
-
-### Service Failures
-
-
-
-**Successes vs Failures.** Displays the number of messages generated by your system for success vs failure in timeslices of one hour over the past 24 hours, in a stacked column chart.
-
-**Admin Activity by Category.** Shows the administrator activity by category and count for the past 24 hours in a table.
-
-**Audit Failures Over Time.** Displays the type and number of failures in timeslices of one hour for the past 24 hours in a stacked column chart.
-
-**All Failures by IP.** Provides the IP addresses where failures have occurred along with the number of failures over the last 24 hours in a table.
diff --git a/docs/integrations/microsoft-azure/index.md b/docs/integrations/microsoft-azure/index.md
index 2722bccc8a..af51fed138 100644
--- a/docs/integrations/microsoft-azure/index.md
+++ b/docs/integrations/microsoft-azure/index.md
@@ -387,13 +387,6 @@ This guide has documentation for all of the apps that Sumo Logic provides for Mi
A guide to the Sumo Logic app for Microsoft Teams.
-A guide to the Sumo Logic app for PCI Compliance for Windows Legacy.
-
-
-This guide helps you set up Sumo Logic Collectors, and install the PCI Compliance for Windows Legacy application, so you can begin monitoring your usage and determine if you are meeting Compliance benchmarks.
-
-## Log types
-
-The PCI Compliance For Windows Legacy App uses Windows Security Event and System Event logs. It does not work with third-party logs.
-
-### Sample log messages
-
-```
-instance of Win32_NTLogEvent
-{
- Category = 13571;
- CategoryString = "MPSSVC Rule-Level Policy Change";
- ComputerName = "aphrodite.sumolab.org";
- EventCode = 4957;
- EventIdentifier = 4957;
- EventType = 5;
- InsertionStrings = {"CoreNet-IPHTTPS-In", "Core Networking - IPHTTPS (TCP-In)", "Local Port"};
- Logfile = "Security";
- Message = "Windows Firewall did not apply the following rule:
-
- Rule Information:
- ID: CoreNet-IPHTTPS-In
- Name: Core Networking - IPHTTPS (TCP-In)
-
- Error Information:
- Reason: Local Port resolved to an empty set.";
- RecordNumber = 1441653878;
- SourceName = "Microsoft-Windows-Security-Auditing";
- TimeGenerated = "20130411232352.140400-000";
- TimeWritten = "20130411232352.140400-000";
- Type = "Audit Failure";
-};
-```
-
-
-### Sample queries
-
-```sql title="Recent Policy Changes"
-_sourceCategory=OS/Windows/Events "Policy Change"
-| parse regex "CategoryString = \"(?
-
-* **User Account Created.** Aggregation table of the number of user accounts created in the last 24 hours.
-* **User Account Deleted.** Aggregation table of the number of user accounts deleted in the last 24 hours.
-* **User Account Enabled.** Aggregation table of the number of user accounts enabled in the last 24 hours.
-* **User Account Disabled.** Aggregation table of the number of user accounts disabled in the last 24 hours.
-* **User Account Locked.** Aggregation table of the number of user accounts locked in the last 24 hours.
-* **Actions by Privileged Accounts.** Aggregation table of the number of actions taken by privileged accounts over the last 24 hours.
-
-* **Tampering Audit Logs.** Aggregation table of the number of destination hosts whose logs were modified or cleared in the last 24 hours.
-* **System Time Change.** Aggregation table of the number of services with a change to their system time over the last 24 hours.
-* **Policy Changes.** Aggregation table of the number of services with policy changes over the last 24 hours.
-* **System Restarted.** Aggregation table of the number of services started over the last 24 hours.
-* **Service Stopped.** Aggregation table of the number of services stopped over the last 24 hours.
-* **Service Execution Trend.** Trend of the different services being executed over time.
-
-
-### Windows - PCI Req 02, 10 - Login Activity
-
-Track login successes and failures.
-
-
-
-* **Failed Logins.** Count of failed logins over the last 24 hours.
-* **Failed Logins.** Aggregation table of the date,
-* **Successful logins.** Total number of successful logins over the last 24 hours. Compare to Failed Logins to determine if the number of failed logins to successful logins is consistent with normal behavior or indicative of an attack.
-* **Successful logins.** Aggregation table of successful logins, including date, time, event code, error code, and count.
-
-* **Default Login-Failure.** Aggregation table of failed default logins.
-* **Default Login-Success.** Aggregation table of successful default logins.
-
-
-### Windows - PCI Req 08 - Other User Activity
-
-
-Track user activities such as password changes, password resets, excessive failed access attempts, unlocked accounts, and disabled accounts.
-
-
-
-* **User Account Password Changes.** Displays an aggregation table of the times passwords were changed, the destination host, destination user, source host, and source user, source domain, error message, error code, and the number of events that occurred.
-* **User Account Password Reset.** Displays an aggregation table of the times passwords were reset, the destination host, destination user, source host, and source user, source domain, error message, error code, and the number of events that occurred.
-* **Excessive Failed Access Attempts.** Displays an aggregation table of the excessive failed access attempts, the destination host, destination user, source host, and source user, source domain, error message, error code, and the number of events that occurred.
-* **User Account Unlocked.** Displays an aggregation table of the times a user account was unlocked the destination host, destination user, source host, and source user, source domain, error message, error code, and the number of events that occurred.
-* **User Account Disabled but not deleted.** Displays an aggregation table of the times a user account was unlocked, the destination host, destination user, source host, and source user, source domain, error message, error code, and the number of events that occurred.
-
-
-### Windows - PCI Req 06 - Windows Updates Activity
-
-Track your Windows Update activities.
-
-
-
-* **All Windows Updates.** Aggregation table displaying all updated hosts in the past 24 hours, success/failure of that update, and any relevant error codes.
-* **Recent Windows Update Failures.** Aggregation table displaying all update failures in the last 7 days, update that failed, time of failure, and current status.
-* **Windows Update Trend.** Bar chart that displays 7-day trend of updates success and failure time sliced by hour.
-* **Windows Update Summary by Host.** Aggregation table of the hosts and a count of that host’s update success or failure for the past 7 days.
-* **Windows Update Summary.** Aggregation table of the latest Windows updates for the last 7 days and a count of their successes and failures
diff --git a/docs/integrations/pci-compliance/index.md b/docs/integrations/pci-compliance/index.md
index a36d7af29b..83e089d771 100644
--- a/docs/integrations/pci-compliance/index.md
+++ b/docs/integrations/pci-compliance/index.md
@@ -71,11 +71,4 @@ With the Sumo Logic apps for PCI Compliance, you can meet evolving PCI requireme
A guide to the Sumo Logic app for PCI Compliance for Windows JSON.
- A guide to the Sumo Logic app for PCI Compliance for Windows Legacy.
-
| [Acquia](https://www.acquia.com/) | App: [Acquia](/docs/integrations/saas-cloud/acquia/) |
-|
| [Active Directory](https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc961809(v=technet.10)) | Apps:
| [Active Directory](https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-2000-server/cc961809(v=technet.10)) | Apps:
| [Abnormal Security](https://abnormalsecurity.com/) | Automation integration: [Abnormal Security](/docs/platform-services/automation-service/app-central/integrations/abnormal-security/)
| [Abuse.ch](https://abuse.ch/) | Automation integrations:
| [AbuseIPDB](https://www.abuseipdb.com/) | Automation integration: [AbuseIPDB](/docs/platform-services/automation-service/app-central/integrations/abuseipdb/) |
@@ -466,7 +466,7 @@ Types of integrations:
|
| [Netskope](https://www.netskope.com/) | Apps:
| [Neustar](https://www.home.neustar/) | Automation integration: [Neustar IP GeoPoint](/docs/platform-services/automation-service/app-central/integrations/neustar-ip-geopoint/) |
|
| [New Relic](https://newrelic.com/) | Webhook: [Webhook Connection for New Relic](/docs/alerts/webhook-connections/new-relic/) |
-|
| [Nginx](https://www.nginx.com/) | Apps:
| [Nginx](https://www.nginx.com/) | Apps:
| [Nginx Plus](https://www.nginx.com/products/nginx/) | Apps:
| [Nmap](https://nmap.org/) | Automation integration: [Nmap](/docs/platform-services/automation-service/app-central/integrations/nmap/) |
|
| [Nobl9](https://www.nobl9.com/) | Webhook: [Nobl9](/docs/integrations/webhooks/nobl9/) |
@@ -497,7 +497,7 @@ Types of integrations:
| Logo | Vendors and Products | Integrations |
| :-- | :-- | :-- |
|
| [PagerDuty](https://www.pagerduty.com/) | Apps:
| [Palo Alto Networks](https://www.paloaltonetworks.com/) | Apps:
| [Palo Alto Networks](https://www.paloaltonetworks.com/) | Apps:
| [Palo Alto Networks Prisma Cloud (formerly Evident.io ESP)](https://www.paloaltonetworks.com/prisma/cloud) | App: [Evident.io ESP](/docs/integrations/security-threat-detection/evident-security-platform/)
| [PaperTrail](https://www.papertrail.com/) | Webhook: [PaperTrail](/docs/integrations/webhooks/papertrail/) |
|
| [Phantombuster](https://phantombuster.com/) | Automation integration: [Phantombuster](/docs/platform-services/automation-service/app-central/integrations/phantombuster/) |
@@ -616,7 +616,7 @@ Types of integrations:
| :-- | :-- | :-- |
|
| [Watchguard](https://www.watchguard.com/) | Automation integration: [Panda EDR](/docs/platform-services/automation-service/app-central/integrations/panda-edr/) |
|
| [WhoisXML](https://main.whoisxmlapi.com/) | Automation integration: [WhoisXML](/docs/platform-services/automation-service/app-central/integrations/whoisxml/) |
-|
| [Windows](https://www.microsoft.com/en-us/windows) | Apps:
| [Windows](https://www.microsoft.com/en-us/windows) | Apps:
| [WithSecure](https://www.withsecure.com/en/home) | Automation integrations:
| [Wittra](https://www.wittra.io/) | Automation integration: [Wittra](/docs/platform-services/automation-service/app-central/integrations/wittra/) |
|
| [Workday](https://www.workday.com/) | App: [Workday](/docs/integrations/saas-cloud/workday/) A guide to the Sumo Logic app for Observable Networks.
-})
A guide to the Sumo Logic app for Palo Alto Networks 6.
-})
A guide to the Sumo Logic app for Palo Alto Networks 8.
-})
-
-The Palo Alto Networks 6 app provides four dashboards, giving you several ways to discover threats, consumption, traffic patterns, and other security-driven issues, providing additional insight for investigations.
-
-## Log types
-
-Parsing in the Palo Alto Networks 6 app for PAN 6 is based on the [PAN-OS Syslog integration](https://live.paloaltonetworks.com/t5/forums/searchpage/tab/message?q=PAN-OS+Syslog+integration&filter=labels&search_type=thread).
-
-
-### Sample log messages
-
-```json
-<12>Dec 22 13:22:14 PA-5050 1,2016/12/22 13:22:14,002201002211,THREAT,vulnerability,1,2016/12/22 13:22:14,77.200.181.165,208.74.205.51,0.0.0.0,0.0.0.0,Alert Logging,,,web-browsing,vsys1,IDS,IDS,ethernet1/21,ethernet1/21,Sumo_Logic,2016/12/22 13:22:14,34403128,1,59305,80,0,0,0x80000000,tcp,alert,"1794",HTTP SQL Injection Attempt(38195),any,medium,client-to-server,128764886,0x0,NL,US,0,,1345817091864062106,,,1,,,,,,,,0
-
-<11>Dec 22 13:08:28 PA-5050 1,2016/12/22 13:08:28,002201002211,THREAT,vulnerability,1,2016/12/22 13:08:28,46.148.24.108,208.74.205.51,0.0.0.0,0.0.0.0,Alert Logging,,,web-browsing,vsys1,IDS,IDS,ethernet1/21,ethernet1/21,Sumo_Logic,2016/12/22 13:08:28,34645066,1,38899,80,0,0,0x80000000,tcp,alert,"message",HTTP /etc/passwd Access Attempt(30852),any,high,client-to-server,128763724,0x0,UA,US,0,,1345817091864061211,,,1,,,,,,,,0
-<14>Dec 22 16:24:05 AO-PA500-01.domain.local 1,2016/12/22 16:24:04,009401007189,TRAFFIC,drop,1,2016/12/22 16:24:04,45.55.255.28,184.18.215.26,0.0.0.0,0.0.0.0,deny untrust - logging,,,not-applicable,vsys1,untrust,untrust,ethernet1/1,,Log-Forwarding-01,2016/12/22 16:24:04,0,1,29272,2083,0,0,0x0,tcp,deny,92,92,0,1,2016/12/22 16:24:04,0,any,0,372320422,0x0,US,US,0,1,0,policy-deny,0,0,0,0,,AO-PA500-01,from-policy
-```
-
-
-
-### Sample queries
-
-```sql title="Threat Type by Severity"
-_sourceCategory=palo_alto_network | parse "*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*" as f1,recvTime,serialNum,type,subtype,f2,genTime,src_ip,dest_ip,natsrc_ip,natdest_ip,ruleName,src_user,dest_user,app,vsys,src_zone,dest_zone,ingress_if,egress_if,logProfile,f3,sessionID,repeatCnt,src_port,dest_port,natsrc_port,natdest_port,flags,protocol,action,misc,threatID,cat,severity,direction,seqNum,action_flags,src_loc,dest_loc,f4,content_type | count as count by subtype,severity | transpose row severity column subtype
-```
-
-
-## Collecting Logs for the Palo Alto Networks 6 app
-
-This section provides instructions on how to collect logs for the Palo Alto Networks 6 app, as well as log and query samples.
-
-
-### Prerequisites
-
-* Configure Syslog Monitoring for your Palo Alto Networks device, as described in [Configure Syslog Monitoring](https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/monitoring/use-syslog-for-monitoring/configure-syslog-monitoring) in Palo Alto Networks help.
-* This app supports Palo Alto Networks v6.
-
-
-### Configure a Collector
-
-Configure an [Installed Collector](/docs/send-data/installed-collectors) or a Hosted source for Syslog-ng or Rsyslog.
-
-
-### Configure a Source
-
-For Syslog, configure the Source fields:
-
-1. **Name**. (Required) A name is required.
-2. **Description.** Optional.
-3. **Protocol**. UDP or TCP
-4. **Port**. Port number.
-5. **Source Category**. (Required) The Source Category metadata field is a fundamental building block to organize and label Sources. For details, see [Best Practices](/docs/send-data/best-practices).
-6. Click **Save**.
-
-For a Hosted source, use advanced settings as necessary, but save the endpoint URL associated in order to configure Palo Alto Networks.
-
-
-### Field Extraction Rules
-
-When creating a Field Extraction Rule, you have the option to select from a template for Palo Alto Networks.
-
-It is recommended that you add **THREAT** as a keyword in the scope for the rule.
-
-```sql
-parse "*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*"
-as f1,recvTime,serialNum,type,subtype,f2,genTime,src_ip,dest_ip,natsrc_ip,natdest_ip,
-ruleName,src_user,dest_user,app,vsys,src_zone,dest_zone,ingress_if,egress_if,logProfile,
-f3,sessionID,repeatCnt,src_port,dest_port,natsrc_port,natdest_port,flags,protocol,action,
-misc,threatID,cat,severity,direction,seqNum,action_flags,src_loc,dest_loc,f4,content_type
-```
-
-
-## Installing the Palo Alto Networks 6 app
-
-Now that you have set up collection for Palo Alto Networks, install the Sumo Logic app for Palo Alto Networks to use the preconfigured searches and dashboards that provide insight into your data.
-
-import AppInstall from '../../reuse/apps/app-install.md';
-
-
-
-**Source Host Locations.** Using a geolocation query, this Panel maps the location of source hosts using their IP addresses.
-
-**Threat Type by Severity.** Breaks down the number of threats, ranked by severity; threat types are divided into separate categories (such as Vulnerabilities and URL). Threat types displayed in this Panel include Low, Informational, High, and Critical.
-
-**Bandwidth Consumption (Bytes) by Virtual System.** Displays the bandwidth of virtual systems, making it easy to see which systems are consuming the most bandwidth.
-
-**Bandwidth Consumption (Percentage) by App.** Each app deployed by your organization is represented in an overall breakdown of how apps are consuming bandwidth.
-
-
-### Threat Analysis
-
-
-
-**Threat Type.** Get an idea of the number of threats as well as the type of threats detected by Palo Alto Networks. Top Destination IPs. Shows the top 10 destination IPs (the IPs that have made the most attempts).
-
-Top Destination IPs. Ranks the top 10 destination IPs as a bar chart.
-
-**Severity by Protocol.** View the number of threats sorted by severity (Critical, High, Low, or Informational).
-
-**App by Severity.** Shows the breakdown of threats per app, sorted by threat level (Critical, High, Informational, and Low).
-
-**Top Source IPs.** Ranks the top 10 source IPs hitting your firewall as a bar chart.
-
-**Threat by Category.** The query behind this Panel parses the threat ID and category from your Palo Alto Network logs, then returns the number of threats sorted by category.
-
-
-### Traffic Monitoring
-
-The Traffic Monitoring Dashboard includes several Panels that display information about incoming and outgoing traffic, including bytes sent and received.
-
-
-
-**Events by Protocol.** Displays the breakdown of events, sorted by protocol (ICMP, TCP, UDP, HOPOPT).
-
-**Top Destination IPs by Events.** Using a geolocation query, this Panel maps which IPs are being accessed outside the network for all event types.
-
-**Top 10 Apps by Bytes Sent.** Shows which apps are being sent the most bytes.
-
-**Apps by Action.** This Panel queries all traffic types and then displays each app per drop, denial, and success.
-
-**Top Source IPs by Events.** Displays the top 10 IPs generating events.
-
-**Top 10 Apps by Bytes Received.** Traffic from the 10 most active apps is shown, making unexpected upticks in traffic easy to identify.
-
-**Bytes Sent/Received Overtime.** Keep an eye on the overall inbound and outbound traffic in your deployment.
-
-**Triggered Rules by Virtual System.** Including all existing trigger rules, this Panel displays traffic from each virtual system in your deployment.
-
-
-### Generic
-
-This advanced Dashboard includes specialized, targeted Panels that are typically used by IT Admins.
-
-
-
-**Top 10 Source IPs by Byte.** Watch for unexpected spikes in traffic from the top 10 Source IP addresses.
-
-**High Severity Threat Distribution.** Displays the severity of threats over the past hour.
-
-**High Severity Threats by Destination & ID.** Counted by the number of threats coming from specific destinations and IP addresses, Critical and High severity threats are shown.
-
-**Bandwidth Consumption by App.** View the total bandwidth consumed by each app in one place.
-
-**Threat Distribution.** Displays the source of threats as well as the number of threats over the past 24 hours.
-
-**High Severity Threats by Source & ID.** No need to guess where Critical and High threats are coming from. This Panel displays each threat source.
diff --git a/docs/integrations/security-threat-detection/palo-alto-networks-8.md b/docs/integrations/security-threat-detection/palo-alto-networks-8.md
deleted file mode 100644
index ffd0d31768..0000000000
--- a/docs/integrations/security-threat-detection/palo-alto-networks-8.md
+++ /dev/null
@@ -1,316 +0,0 @@
----
-id: palo-alto-networks-8
-title: Palo Alto Networks 8
-sidebar_label: Palo Alto Networks 8
-description: The Palo Alto Networks 8 app gives you visibility into firewall and traps activity, including information about firewall configuration changes, details about rejected and accepted firewall traffic, traffic events that match the Correlation Objects and Security Profiles you have configured in PAN, and events logged by the Traps Endpoint Security Manager.
----
-
-import useBaseUrl from '@docusaurus/useBaseUrl';
-
-
-
-Palo Alto Networks (PAN) 8 provides a next generation firewall and the Traps Endpoint Security Manager. The Palo Alto Networks 8 app gives you visibility into firewall and traps activity, including information about firewall configuration changes, details about rejected and accepted firewall traffic, traffic events that match the Correlation Objects and Security Profiles you have configured in PAN, and events logged by the Traps Endpoint Security Manager.
-
-## Log types
-
-Parsing in the Sumo Logic app for PAN 8 is based on the [PAN-OS Syslog Integration](https://live.paloaltonetworks.com/t5/Tech-Note-Articles/PAN-OS-Syslog-Integration/ta-p/55323) and uses the following log types:
-
-| Log type | -Description | -Supported log format | -For more information | -
| Traffic | -Entries for the start and end of each session, including date and time; source and destination zones, addresses and ports; application name; security rule applied to the traffic flow; rule action (allow, deny, or drop); ingress and egress interface; number of bytes; and session end reason. | -Syslog | -Traffic Logs | -
| Threat | -Events logged when traffic matches one of the Security Profiles attached to a security rule on the firewall. | -Syslog | -Threat Logs | -
| System | -Information about system events on the Palo Alto Networks Device. | -Syslog | -System Logs | -
| Config Logs | -Information about Palo Alto Networks Device configuration changes. | -Syslog | -Configuration | -
| Correlation | -Events logged by firewall when patterns and thresholds defined in a Correlation Object match the traffic patterns on your network. | -Syslog | -Correlation Logs | -
| TrapsV4 | -Events logged by the Traps Endpoint Security component. | -Common Event Format (CEF) | -CEF Format | -
-
-### Configuration Analysis
-
-**Description:** See information about changes to your firewall configurations, including a breakdown of submitted, succeeded, and failed configuration updates; the trend of configuration update statuses; the top 10 IPs used for configuration changes; the top 10 admin users; and the top 10 commands executed.
-
-**Use case:** Use this dashboard to learn about firewall configuration changes. You can identify who performed a configuration change, and the system from which the configuration change was made. The dashboard also helps you identify failed and successful configurations changes. If you observe a sudden change in device behavior, you can check this dashboard to investigate whether a configuration change might be to blame.
-
-
-
-### Correlation Analysis
-
-**Description:** See information about correlated events, including breakdowns of correlated events by severity, category, source user, and object; events by source IP; and recent correlation feeds.
-
-**Use case:** Use this dashboard to identify hosts that are compromised, very likely compromised, likely compromised, or possibly compromised, based on correlation events.
-
-
-
-### High Severity Threats
-
-**Description:** See information about the top 10 source IPs by bytes; high and critical severity threats by destination ID, and by Source ID; threat distribution by severity; bandwidth consumption by app; and outlier analysis of allowed and rejected requests.
-
-**Use case:** Use this dashboard to identify the impact of high severity threats, including the most involved source and destination IPs. You can identify threats affecting multiple IPs, IPs affected by multiple threats, and identify source IPs or users which are responsible for generating high severity threats or are impacted by high severity threats.
-
-
-
-### System Monitoring
-
-**Description:** See breakdowns of events by subtype, module, severity, and EventID; objects by severity level and event type; and recent logs to the system feed.
-
-**Use case:** Use this dashboard to identify system issues like hardware failures, HA failures, link down status, dropped connections with external devices, firmware / software upgrades, password change notifications, log in/log off, administrator name or password change, any configuration change, and other minor events.
-
-
-
-### Threat Overview
-
-**Description:** See breakdowns of each threat type by severity; threat analytics, including threat outliers and a time comparison of current threats versus threats in the previous hour, day, and previous week; threats affecting the most destination IPs; IPs generating multiple threats; and IPs observing multiple threats.
-
-**Use case:** Use this dashboard to identify threat subtypes. Based on what you learn, you can drill down for additional detail in the “Threat Analysis” dashboard. You can also use this dashboard to identify threats that affect multiple IPs, IPs affected by multiple threats, and narrow in on source IPs or users that are responsible for generating threats or are impacted by threats.
-
-
-
-### Threat Analysis
-
-**Description:** See analytics and details about threats, including the count of threats whose severity is greater that “Informational”; breakdowns of threats by subtype and severity; and recent critical and non-critical threat feeds.
-
-**Use case:** Use this dashboard to get detailed information on threats identified, rules fired, actions, trends, threat outliers, and threat directions.
-
-
-
-
-### Traffic Monitoring
-
-**Description:** See information about firewall traffic, including protocol usage; top source IPs, apps, destination IPs, source users, and destination ports; and outlier analysis of rejected and accepted traffic.
-
-**Use case:** Use this dashboard to detect sudden changes in allowed or rejected traffic in the outlier panels. To investigate outliers, look for a corresponding change in rules configuration on the Configuration Analysis dashboard.
-
-You can also monitor the types of content being accessed by various apps and virtual systems. You can track the bandwidth consumed by specific apps and take corrective action as necessary. Using the geolocation map, you can track source and destination locations and determine whether a location is expected, and block it, as appropriate.
-
-
-
-### Traffic Insight - File Activity
-
-**Description:** See information about firewall requests that involved file uploads or downloads, including upload/download event counts; top file types, file names, and apps; and time comparison and outlier analysis of download and upload traffic.
-
-**Use case:** Use this dashboard to monitor end users’ file upload and download activities. You can track suspicious file types being uploaded or downloaded through various apps. It also provides insight into sudden changes in activities though outliers. You can compare the current activity trend with the the previous hour, the same time yesterday, and the same time last week with the time compare panel.
-
-
-
-### Traffic Insight - Web Activity
-
-**Description:** See information about firewall requests that involved web browsing activities, including event count; top content types, apps, and URLs; and time comparison and outlier analysis of web browsing activity.
-
-**Use case:** Use this dashboard to monitor end users’ file web browsing activities. You can track URLs and the content being browsed using various apps. It also provides insight into sudden changes in activities though outliers. You can compare the current activity trend with the the previous hour, the same time yesterday, and the same time last week with the time compare panel.
-
-
-
-### Traps V4 Monitoring
-
-**Description:** See information about trap events, including a count of trap events, a breakdown of trap events by severity, and a breakdown by Traps ESM and Traps Agent.
-
-**Use case:** Use this dashboard to identify how end points have been attacked. You can monitor ransomware threats and new exploits. You can also track agent installs/uninstalls, upgrades, service statuses, access violations, and prevention events.
-
-
diff --git a/docs/integrations/web-servers/index.md b/docs/integrations/web-servers/index.md
index 62ac5efb78..4939e61c60 100644
--- a/docs/integrations/web-servers/index.md
+++ b/docs/integrations/web-servers/index.md
@@ -50,13 +50,6 @@ This guide has documentation for Sumo apps for web servers.
The Nginx Ingress app is a unified logs and metrics app that helps you monitor the availability, performance, health, and resource utilization of your Nginx Ingress web servers.
- The Sumo Logic App for Nginx (Legacy) support logs for Open Source Nginx, Nginx Plus, as well as Metrics for Open Source Nginx.
-
-
-Nginx (Legacy) is a web server that can be used as a reverse proxy, load balancer, mail proxy, and HTTP cache. The Sumo Logic app for Nginx (Legacy) support logs for Open Source Nginx, Nginx Plus, as well as Metrics for Open Source Nginx.
-
-The Sumo Logic app for Nginx (Legacy) helps you monitor webserver activity in Nginx. The preconfigured dashboards provide information about site visitors, including the location of visitors, devices/operating systems, and browsers used; and information about server activity, including bots observed and error information.
-
-## Log and Metrics Types
-
-The Sumo Logic app for Nginx assumes the NCSA extended/combined log file format for Access logs and the default Nginx error log file format for error logs.
-
-All Dashboards (except the Error logs Analysis dashboard) assume the Access log format. The Error logs Analysis Dashboard assumes both Access and Error log formats, so as to correlate information between the two. For more details on Nginx logs, see [Module ngx_http_log_module](https://nginx.org/en/docs/http/ngx_http_log_module.html).
-
-The Sumo Logic app for Nginx assumes Prometheus format Metrics for Requests and Connections. For Nginx Server metrics, Stub_Status Module from Nginx Configuration is used. For more details on Nginx Metrics, see https://nginx.org/libxslt/en/docs/http/ngx_http_stub_status_module.html.
-
-
-### Sample log messages
-
-```txt title="Access Log Example"
-50.1.1.1 - example [23/Sep/2016:19:00:00 +0000] "POST /api/is_individual HTTP/1.1" 200 58 "-"
-"python-requests/2.7.0 CPython/2.7.6 Linux/3.13.0-36-generic"
-```
-
-```txt title="Error Log Example"
-2016/09/23 19:00:00 [error] 1600#1600: *61413 open() "/srv/core/client/dist/client/favicon.ico"
-failed (2: No such file or directory), client: 101.1.1.1, server: _, request: "GET /favicon.ico
-HTTP/1.1", host: "example.com", referrer: "https://abc.example.com/"
-```
-
-### Sample queries
-
-This sample query is from the **Requests by Clients** panel of the **Nginx (Legacy) - Overview** dashboard.
-
-```
-_sourceCategory = Labs/Nginx/Logs
-| json field=_raw "log" as nginx_log_message nodrop
-| if (isEmpty(nginx_log_message), _raw, nginx_log_message) as nginx_log_message
-| parse regex field=nginx_log_message "(?
-
-### Error Logs Analysis
-
-The **Nginx (Legacy) - Error Logs Analysis** dashboard provides a high-level view of log level breakdowns, comparisons, and trends. The panels also show the geographic locations of clients and clients with critical messages, new connections and outliers, client requests, request trends, and request outliers.
-
-Use this dashboard to:
-* Track requests from clients. A request is a message asking for a resource, such as a page or an image.
-* Track and view client geographic locations generating errors.
-* Track critical alerts and emergency error alerts.
-
-
-
-### Logs Timeline Analysis
-
-The **Nginx (Legacy) - Logs Timeline Analysis** dashboard provides a high-level view of the activity and health of Nginx servers on your network. Dashboard panels display visual graphs and detailed information on traffic volume and distribution, responses over time, as well as time comparisons for visitor locations and server hits.
-
-Use this dashboard to:
-* To understand the traffic distribution across servers, provide insights for resource planning by analyzing data volume and bytes served.
-* Gain insights into originated traffic location by region. This can help you allocate compute resources to different regions according to their needs.
-
-
-
-### Outlier Analysis
-
-The **Nginx (Legacy) - Outlier Analysis** dashboard provides a high-level view of Nginx server outlier metrics for bytes served, number of visitors, and server errors. You can select the time interval over which outliers are aggregated, then hover the cursor over the graph to display detailed information for that point in time.
-
-Use this dashboard to:
-* Detect outliers in your infrastructure with Sumo Logic’s machine learning algorithm.
-* To identify outliers in incoming traffic and the number of errors encountered by your servers.
-
-You can use schedule searches to send alerts to yourself whenever there is an outlier detected by Sumo Logic.
-
-
-
-### Threat Intel
-
-The **Nginx (Legacy) - Threat Intel** dashboard provides an at-a-glance view of threats to Nginx servers on your network. Dashboard panels display the threat count over a selected time period, geographic locations where threats occurred, source breakdown, actors responsible for threats, severity, and a correlation of IP addresses, method, and status code of threats.
-
-Use this dashboard to:
-* To gain insights and understand threats in incoming traffic and discover potential IOCs. Incoming traffic requests are analyzed using the [Sumo - Crowdstrikes](/docs/integrations/security-threat-detection/threat-intel-quick-analysis#threat-intel-faq) threat feed.
-
-
-
-### Web Server Operations
-
-The **Nginx (Legacy) - Web Server Operations** dashboard provides a high-level view combined with detailed information on the top ten bots, geographic locations, and data for clients with high error rates, server errors over time, and non 200 response code status codes. Dashboard panels also show information on server error logs, error log levels, error responses by a server, and the top URIs responsible for 404 responses.
-
-Use this dashboard to:
-* Gain insights into Client, Server Responses on Nginx Server. This helps you identify errors in Nginx Server.
-* To identify geo locations of all Client errors. This helps you identify client location causing errors and helps you to block client IPs.
-
-
-
-### Visitor Access Types
-
-The **Nginx (Legacy) - Visitor Access Types** dashboard provides insights into visitor platform types, browsers, and operating systems, as well as the most popular mobile devices, PC and Mac versions used.
-
-Use this dashboard to:
-* Understand which platform and browsers are used to gain access to your infrastructure.
-* These insights can be useful for planning in which browsers, platforms, and operating systems (OS) should be supported by different software services.
-
-
-
-### Visitor Locations
-
-The **Nginx (Legacy)- Visitor Locations** dashboard provides a high-level view of Nginx visitor geographic locations both worldwide and in the United States. Dashboard panels also show graphic trends for visits by country over time and visits by US region over time.
-
-Use this dashboard to:
-* Gain insights into geographic locations of your user base. This is useful for resource planning in different regions across the globe.
-
-
-
-### Visitor Traffic Insight
-
-The **Nginx (Legacy) - Visitor Traffic Insight** dashboard provides detailed information on the top documents accessed, top referrers, top search terms from popular search engines, and the media types served.
-
-Use this dashboard to:
-* Understand the type of content that is frequently requested by users.
-* Help in allocating IT resources according to the content types.
-
-
-
-
-## Nginx (Legacy) Alerts
-
-Sumo Logic has provided out-of-the-box alerts available through [Sumo Logic monitors](/docs/alerts/monitors) to help you quickly determine if the Nginx server is available and performing as expected. These alerts are built based on logs and metrics datasets and have preset thresholds based on industry best practices and recommendations. They are as follows:
-
-| Alert Name | Alert Description | Alert Condition | Recover Condition |
-|:---|:---|:---|:---|
-| Nginx - Dropped Connections | This alert fires when we detect dropped connections for a given Nginx server. | > 0 | < = 0 |
-| Nginx - Critical Error Messages | This alert fires when we detect critical error messages for a given Nginx server. | > 0 | < = 0 |
-| Nginx - Access from Highly Malicious Sources | This alert fires when an Nginx is accessed from highly malicious IP addresses. | > 0 | < = 0 |
-| Nginx - High Client (HTTP 4xx) Error Rate | This alert fires when there are too many HTTP requests (>5%) with a response status of 4xx. | > 0 | < = 0 |
-| Nginx - High Server (HTTP 5xx) Error Rate | This alert fires when there are too many HTTP requests (>5%) with a response status of 5xx. | > 0 | < = 0 |
diff --git a/docs/send-data/collect-from-other-data-sources/collect-metrics-telegraf/telegraf-collection-architecture.md b/docs/send-data/collect-from-other-data-sources/collect-metrics-telegraf/telegraf-collection-architecture.md
index 86a0f1a77b..03c44d5649 100644
--- a/docs/send-data/collect-from-other-data-sources/collect-metrics-telegraf/telegraf-collection-architecture.md
+++ b/docs/send-data/collect-from-other-data-sources/collect-metrics-telegraf/telegraf-collection-architecture.md
@@ -30,7 +30,7 @@ The metrics collection pipeline for using Telegraf in a non-Kubernetes environme
#### For applications that do not expose metrics
Some applications may not expose their metrics for another system to access, in which case you'll need to configure the application to expose the metrics so that Telegraf can collect them. Some examples:
-* To collect metrics from Nginx, you'd need to configure it to expose metrics in the Nginx configuration file. For more information, see [Collecting Logs and Metrics for Nginx (Legacy)](/docs/integrations/web-servers/nginx-legacy/#collecting-logs-and-metrics-for-nginx-legacy).
+* To collect metrics from Nginx, you'd need to configure it to expose metrics in the Nginx configuration file. For more information, see [Collecting Logs and Metrics for Nginx](/docs/integrations/web-servers/nginx).
* To collect JMX metrics from a Java application, you'd need to configure the application to use [Jolokia](https://jolokia.org/agent.html), a JMX-HTTP bridge. For more information, see [Collecting Metrics for JMX](/docs/integrations/app-development/jmx/#collecting-metrics-for-jmx).
You select an existing HTTP Source on a Hosted Collection as the destination for the Telegraf-collected metrics, or configure a new collector and source, as desired.
diff --git a/sidebars.ts b/sidebars.ts
index 71124d78cd..6e720c5e2c 100644
--- a/sidebars.ts
+++ b/sidebars.ts
@@ -1922,7 +1922,6 @@ integrations: [
],
},
'integrations/microsoft-azure/active-directory-json',
- 'integrations/microsoft-azure/active-directory-legacy',
'integrations/microsoft-azure/active-directory-azure',
'integrations/microsoft-azure/audit',
'integrations/microsoft-azure/arm-integration-faq',
@@ -1975,7 +1974,6 @@ integrations: [
'integrations/microsoft-azure/office-365',
'integrations/microsoft-azure/sql-server',
'integrations/microsoft-azure/teams',
- 'integrations/microsoft-azure/windows-legacy-pci-compliance',
'integrations/microsoft-azure/windows-json-pci-compliance',
'integrations/microsoft-azure/windows-json',
'integrations/microsoft-azure/windows-legacy',
@@ -2244,7 +2242,6 @@ integrations: [
'integrations/pci-compliance/palo-alto-networks-9',
'integrations/pci-compliance/palo-alto-networks-10',
'integrations/microsoft-azure/windows-json-pci-compliance',
- 'integrations/microsoft-azure/windows-legacy-pci-compliance',
],
},
{
@@ -2333,8 +2330,6 @@ integrations: [
'integrations/security-threat-detection/netskope-legacy-collection',
'integrations/security-threat-detection/netskope',
'integrations/security-threat-detection/observable-networks',
- 'integrations/security-threat-detection/palo-alto-networks-6',
- 'integrations/security-threat-detection/palo-alto-networks-8',
'integrations/security-threat-detection/palo-alto-networks-9',
'integrations/security-threat-detection/sailpoint',
'integrations/security-threat-detection/threat-intel-quick-analysis',
@@ -2431,7 +2426,6 @@ integrations: [
'integrations/web-servers/iis-10',
'integrations/web-servers/nginx',
'integrations/web-servers/nginx-ingress',
- 'integrations/web-servers/nginx-legacy',
'integrations/web-servers/nginx-plus',
'integrations/web-servers/nginx-plus-ingress',
'integrations/web-servers/squid-proxy',