diff --git a/blog-service/2025-03-28-apps.md b/blog-service/2025-03-28-apps.md
new file mode 100644
index 0000000000..e101259477
--- /dev/null
+++ b/blog-service/2025-03-28-apps.md
@@ -0,0 +1,13 @@
+---
+title: CyberArk Audit (Apps)
+image: https://help.sumologic.com/img/sumo-square.png
+keywords:
+ - apps
+ - cyberark-audit
+hide_table_of_contents: true
+---
+
+import useBaseUrl from '@docusaurus/useBaseUrl';
+
+
+We're excited to introduce the new CyberArk Audit app for Sumo Logic. By leveraging this app, security analysts can monitor, analyze, and visualize audit trails of user activities, security events, and anomalies to enhance security. [Learn more](/docs/integrations/saas-cloud/cyberark-audit).
\ No newline at end of file
diff --git a/cid-redirects.json b/cid-redirects.json
index 133b6b470d..f3c708899e 100644
--- a/cid-redirects.json
+++ b/cid-redirects.json
@@ -2142,6 +2142,7 @@
"/cid/4019": "/docs/send-data/installed-collectors/sources/script-action",
"/cid/4412": "/docs/integrations/saas-cloud/crowdstrike-fdr-host-inventory",
"/cid/44122": "/docs/integrations/saas-cloud/crowdstrike-spotlight",
+ "/cid/44124": "/docs/integrations/saas-cloud/cyberark-audit",
"/cid/44123": "/docs/integrations/saas-cloud/crowdstrike-falcon-filevantage",
"/cid/4020": "/docs/search/behavior-insights/logreduce",
"/cid/4021": "/docs/search/search-query-language/search-operators/accum",
diff --git a/docs/integrations/product-list/product-list-a-l.md b/docs/integrations/product-list/product-list-a-l.md
index 0f37c18c15..fedc6a2e7c 100644
--- a/docs/integrations/product-list/product-list-a-l.md
+++ b/docs/integrations/product-list/product-list-a-l.md
@@ -172,7 +172,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
|
| [Criminal IP](https://www.criminalip.io/) | Automation integration: [Criminal IP](/docs/platform-services/automation-service/app-central/integrations/criminal-ip) |
|
| [CrowdStrike](https://www.crowdstrike.com/) | Apps:
- [CrowdStrike Falcon Endpoint Protection](/docs/integrations/security-threat-detection/crowdstrike-falcon-endpoint-protection/)
- [CrowdStrike Falcon FileVantage](/docs/integrations/saas-cloud/crowdstrike-falcon-filevantage/)
- [Threat Intel Quick Analysis](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/)
- [CrowdStrike FDR Host Inventory](/docs/integrations/saas-cloud/crowdstrike-fdr-host-inventory)
- [CrowdStrike Spotlight](/docs/integrations/saas-cloud/crowdstrike-spotlight)
Automation integrations:
- [CrowdStrike Falcon](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon/)
- [CrowdStrike Falcon Discover](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-discover/)
- [CrowdStrike Falcon Intelligence](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-intelligence/)
- [CrowdStrike Falcon Sandbox](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-sandbox/)
Cloud SIEM integrations:
- [CrowdStrike](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/79ade329-b6d4-43ae-8db1-2a9cc45c0fb0.md)
- [PreemptSecurity](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/15c77a62-0fbb-4a60-9fae-ead49ec423f9.md)
Collectors:
- [CrowdStrike Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-source/)
- [Crowdstrike FDR Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-fdr-source/)
- [CrowdStrike FDR Host Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-fdr-host-inventory-source/)
- [CrowdStrike FileVantage Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-filevantage-source/)
- [CrowdStrike Spotlight Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-spotlight-source/)
- [CrowdStrike Threat Intel Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-threat-intel-source/) |
|
| [Cuckoo](https://cuckoo.readthedocs.io/en/latest/#) | Automation integration: [Cuckoo](/docs/platform-services/automation-service/app-central/integrations/cuckoo/) |
-|
| [CyberArk](https://www.cyberark.com/) | Automation integrations:
- [CyberArk AAM](/docs/platform-services/automation-service/app-central/integrations/cyberark-aam/)
- [CyberArk PAM](/docs/platform-services/automation-service/app-central/integrations/cyberark-pam)
Cloud SIEM integration: [CyberArk](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/8a3d333e-ffad-49ed-9edd-0cf1c797b24f.md)
Collector:
- [CyberArk EPM Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cyberark-source/)
- [CyberArk Audit Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cyberark-audit-source/) |
+|
| [CyberArk](https://www.cyberark.com/) | App: [CyberArk Audit](/docs/integrations/saas-cloud/cyberark-audit)
Automation integrations:
- [CyberArk AAM](/docs/platform-services/automation-service/app-central/integrations/cyberark-aam/)
- [CyberArk PAM](/docs/platform-services/automation-service/app-central/integrations/cyberark-pam)
Cloud SIEM integration: [CyberArk](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/8a3d333e-ffad-49ed-9edd-0cf1c797b24f.md)
Collector:
- [CyberArk EPM Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cyberark-source/)
- [CyberArk Audit Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cyberark-audit-source/) |
|
| [CyberInt](https://cyberint.com/) | Automation integration: [Cyberint](/docs/platform-services/automation-service/app-central/integrations/cyberint) |
|
| [Cybereason](https://www.cybereason.com/) | Automation integration: [Cybereason](/docs/platform-services/automation-service/app-central/integrations/cybereason/)
Cloud SIEM integration: [Cybereason](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/1a51cb88-ebc9-4655-bce4-3d788bf19e89.md)
Collector: [Cybereason Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cybereason-source/)
Partner integration: [Cybereason](https://github.com/SumoLogic/sumologic-public-partner-apps/tree/master/Cybereason) |
|
| [Cybersecurity Help](https://www.cybersecurity-help.cz/) | Automation integration: [Cybersecurity Help](/docs/platform-services/automation-service/app-central/integrations/cybersecurity-help/) |
diff --git a/docs/integrations/saas-cloud/cyberark-audit.md b/docs/integrations/saas-cloud/cyberark-audit.md
new file mode 100644
index 0000000000..555c371c1d
--- /dev/null
+++ b/docs/integrations/saas-cloud/cyberark-audit.md
@@ -0,0 +1,161 @@
+---
+id: cyberark-audit
+title: CyberArk Audit
+sidebar_label: CyberArk Audit
+description: The CyberArk Audit app for Sumo Logic provides insights into your organization's cybersecurity practices to strengthen security.
+---
+
+import useBaseUrl from '@docusaurus/useBaseUrl';
+
+
+
+The Sumo Logic app for CyberArk Audit is a robhust tool that provides insights into your organization's cybersecurity practices. It helps IT and security teams monitor, analyze, and visualize audit trails of user activities, security events, and anomalies. By tracking data on security events, identity management, component usage, and administrative actions, the app delivers actionable intelligence to identify and mitigate security risks, ensuring compliance with regulations and internal policies. Customizable dashboards and detailed reporting enhance its ability to strengthen security.
+
+:::info
+This app includes [built-in monitors](#cyberark-audit-monitors). For details on creating custom monitors, refer to [Create monitors for CyberArk Audit app](#create-monitors-for-cyberark-audit-app).
+:::
+
+## Log types
+
+This app uses Sumo Logic’s [CyberArk Audit source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cyberark-audit-source/) to collect the audit logs from the CyberArk Audit platform.
+
+## Sample log messages
+
+Audit Log
+
+```json
+{
+ "uuid": "c131ad7d-af67-4a80-907c-3f982ef5d3be",
+ "tenantId": "9880566d-4831-4a33-9e11-f4958deae142",
+ "timestamp": 1742370356027,
+ "username": "PVWAGWUser",
+ "applicationCode": "PAM",
+ "auditCode": "PAM00088",
+ "auditType": "Info",
+ "action": "Set Password",
+ "userId": "PVWAGWUser",
+ "source": "PVWAAPP",
+ "actionType": "Password",
+ "component": "Vault",
+ "serviceName": "Privilege Cloud",
+ "accessMethod": null,
+ "accountId": "",
+ "target": "",
+ "command": null,
+ "sessionId": null,
+ "message": "",
+ "customData": {
+ "PAM": {
+ "new_target": "",
+ "target": ""
+ }
+ },
+ "cloudProvider": null,
+ "cloudWorkspacesAndRoles": [],
+ "cloudIdentities": null,
+ "cloudAssets": null,
+ "safe": "",
+ "accountName": "",
+ "targetPlatform": "",
+ "targetAccount": "",
+ "identityType": null
+}
+```
+
+
+### Security Overview
+
+The **CyberArk Audit - Security Overview** dashboard provides focuses on security metrics related to audit events for network administrators and cybersecurity teams. It highlights high-risk activities such as password resets, suspicious threats, and multi-factor authentication (MFA) events. The dashboard shows administrative events by location, noting activities from embargoed areas. It visualizes OAuth token generation trends to identify anomalies and secure access points. Summaries of password resets, administrative events, and login attempts help detect vulnerabilities and unauthorized access, enhancing cybersecurity defense.
+
+### Logins
+
+The **CyberArk Audit - Logins** dashboard provides an overview of user authentication activities, tracking successful and failed login trends. It visualizes successful logins by location and flags access from embargoed areas, emphasizing geopolitical access restrictions. For failed logins, the dashboard identifies locations and top users involved, highlighting potential account compromises. This dashboard helps security teams strengthen authentication and prevent unauthorized access, enhancing overall cybersecurity.
+
+## Create monitors for CyberArk Audit app
+
+import CreateMonitors from '../../reuse/apps/create-monitors.md';
+
+
Gather real-time visibility into the vulnerabilities.
+})
Gather information about your organization's cybersecurity practices to strengthen security.
+