Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 12 additions & 0 deletions blog-service/2025-08-20-apps.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
---
title: Vectra (Apps)
image: https://help.sumologic.com/img/reuse/rss-image.jpg
keywords:
- apps
- vectra
hide_table_of_contents: true
---

import useBaseUrl from '@docusaurus/useBaseUrl';

We're excited to introduce the new Vectra app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud [Vectra source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vectra-source/) to collect the detections from the Vectra platform. It provides security analysts with visibility into security threats detected across networks, cloud environments, and endpoints. [Learn more](/docs/integrations/saas-cloud/vectra/).
1 change: 1 addition & 0 deletions cid-redirects.json
Original file line number Diff line number Diff line change
Expand Up @@ -1644,6 +1644,7 @@
"/cid/10211": "/docs/integrations/saas-cloud/microsoft-azure-ad-inventory",
"/cid/10203": "/docs/integrations/saas-cloud/microsoft-graph-security-v1",
"/cid/10205": "/docs/integrations/saas-cloud/microsoft-graph-security-v2",
"/cid/10212": "/docs/integrations/saas-cloud/vectra",
"/cid/10206": "/docs/integrations",
"/cid/10204": "/docs/integrations/saas-cloud/cato-networks",
"/cid/10198": "/docs/integrations/saas-cloud/microsoft-graph-azure-ad-reporting",
Expand Down
2 changes: 1 addition & 1 deletion docs/integrations/product-list/product-list-m-z.md
Original file line number Diff line number Diff line change
Expand Up @@ -205,7 +205,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
| :-- | :-- | :-- |
| <img src={useBaseUrl('img/integrations/web-servers/varnish-cache.png')} alt="Thumbnail icon" width="75"/> | [Varnish](https://www.varnish-software.com/) | Apps: <br/>- [Varnish](/docs/integrations/web-servers/varnish/) <br/>- [Varnish - OpenTelemetry](/docs/integrations/web-servers/opentelemetry/varnish-opentelemetry/) |
| <img src={useBaseUrl('img/integrations/misc/varonis-logo.png')} alt="Thumbnail icon" width="75"/> | [Varonis](https://www.varonis.com/) | Cloud SIEM integration: [Varonis](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/20270f89-127e-4055-96ec-56045e67e163.md) |
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/vectra.png')} alt="Thumbnail icon" width="75"/> | [Vectra](https://www.vectra.ai/) | Automation integration: [Vectra](/docs/platform-services/automation-service/app-central/integrations/vectra/) <br/>Collector: [Vectra Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vectra-source) <br/>Cloud SIEM integration: [Vectra](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/7a3d1a5c-ba67-4597-971f-7057e8f6c8bb.md) |
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/vectra.png')} alt="Thumbnail icon" width="75"/> | [Vectra](https://www.vectra.ai/) | App: [Vectra](/docs/integrations/saas-cloud/vectra) <br/> Automation integration: [Vectra](/docs/platform-services/automation-service/app-central/integrations/vectra/) <br/>Collector: [Vectra Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vectra-source) <br/>Cloud SIEM integration: [Vectra](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/7a3d1a5c-ba67-4597-971f-7057e8f6c8bb.md) |
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/virustotal.png')} alt="Thumbnail icon" width="75"/> | [VirusTotal](https://www.virustotal.com/) | Automation integrations: <br/>- [VirusTotal](/docs/platform-services/automation-service/app-central/integrations/virustotal/) <br/>- [VirusTotal V3](/docs/platform-services/automation-service/app-central/integrations/virustotal-v3/) |
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/vmray.png')} alt="Thumbnail icon" width="75"/> | [VMRay](https://www.vmray.com/) | Automation integration: [VMRay](/docs/platform-services/automation-service/app-central/integrations/vmray/) |
| <img src={useBaseUrl('img/integrations/containers-orchestration/vmware.png')} alt="Thumbnail icon" width="50"/> | [VMware](https://www.vmware.com/) | Apps: <br/>- [Carbon Black Cloud](/docs/integrations/security-threat-detection/carbon-black-cloud/) <br/>- [VMware](/docs/integrations/containers-orchestration/vmware/) <br/>- [VMware Legacy](/docs/integrations/containers-orchestration/vmware-legacy/) <br/>- [VMware Carbon Black](/docs/integrations/security-threat-detection/vmware-carbon-black/) <br/>- [VMWare - OpenTelemetry Collector](/docs/integrations/containers-orchestration/opentelemetry/vmware-opentelemetry/) <br/>- [VMware Workspace ONE](/docs/integrations/saas-cloud/vmware-workspace-one/) <br/>Automation integrations: <br/>- [Lastline Analyst](/docs/platform-services/automation-service/app-central/integrations/lastline-analyst/) <br/>- [VMware Carbon Black Cloud Endpoint Standard](/docs/platform-services/automation-service/app-central/integrations/vmware-carbon-black-cloud-endpoint-standard/) <br/>- [VMware Carbon Black Cloud Endpoint Standard V2](/docs/platform-services/automation-service/app-central/integrations/vmware-carbon-black-cloud-endpoint-standard-v2/) <br/>- [VMware Carbon Black Cloud Enterprise EDR](/docs/platform-services/automation-service/app-central/integrations/vmware-carbon-black-cloud-enterprise-edr/) <br/>- [VMware Carbon Black Cloud Platform](/docs/platform-services/automation-service/app-central/integrations/vmware-carbon-black-cloud-platform/) <br/>- [VMware vSphere](/docs/platform-services/automation-service/app-central/integrations/vmware-vsphere/) <br/>- [VMware Workspace ONE](/docs/platform-services/automation-service/app-central/integrations/vmware-workspace-one/) <br/>Cloud SIEM integrations: <br/>- [Carbon Black](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/c2ea2e5e-92f2-49e8-9812-64e60dba63a2.md) <br/>- [VMware](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/fbf25b91-89f1-45c4-903d-664b328bc6e0.md) <br/>Collectors: <br/>- [Carbon Black Cloud Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/carbon-black-cloud-source/) <br/>- [Carbon Black Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/carbon-black-inventory-source/) <br/>- [Collect Metrics from VMware vRealize Operations Manager 8 Enterprise](/docs/send-data/collect-from-other-data-sources/collect-metrics-vrealize-operations-manager/) <br/>- [VMware AirWatch Integration for Sumo Logic](/docs/send-data/collect-from-other-data-sources/vmware-airwatch-integration/) <br/>- [VMware vRealize Log Insight](/docs/send-data/collect-from-other-data-sources/vmware-vrealize-log-insight/)<br/>- [VMware Workspace One Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vmware-workspace-one-source/) <br/>Partner integration: [VMware Tanzu](https://docs.vmware.com/en/Sumo-Logic-Nozzle-for-VMware-Tanzu/services/sumologic-nozzle-vmware-tanzu/index.html) |
Expand Down
6 changes: 6 additions & 0 deletions docs/integrations/saas-cloud/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -417,6 +417,12 @@ Learn about the Sumo Logic apps for SaaS and Cloud applications.
<p>Analyze authentication events, user activities, and potential security threats.</p>
</div>
</div>
<div className="box smallbox card">
<div className="container">
<a href="/docs/integrations/saas-cloud/vectra"><img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/vectra.png')} alt="icon" width="100"/><h4>Vectra</h4></a>
<p>Gain visibility into security threats detected across networks, cloud environments, and endpoints.</p>
</div>
</div>
<div className="box smallbox card">
<div className="container">
<a href="/docs/integrations/saas-cloud/vmware-workspace-one"><img src={useBaseUrl('img/send-data/vmware_workspace_one.png')} alt="icon" width="100"/><h4>VMware Workspace ONE</h4></a>
Expand Down
222 changes: 222 additions & 0 deletions docs/integrations/saas-cloud/vectra.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,222 @@
---
id: vectra
title: Vectra
sidebar_label: Vectra
description: The Vectra app for Sumo Logic provides security analysts with visibility into security threats detected across networks, cloud environments, and endpoints.
---

import useBaseUrl from '@docusaurus/useBaseUrl';

<img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/vectra.png')} alt="Vectra-icon" width="70" />

The Vectra app offers comprehensive visibility into security threats detected across networks, cloud environments, and endpoints. It consolidates threat intelligence from multiple sources, categorizing detections by their severity, type, and behavior, while providing detailed contextual data to accelerate investigations. With interactive dashboards and targeted monitoring tools, security teams can track trends, pinpoint high-risk activities, and measure remediation effectiveness. By combining threat scoring, detection timelines, and enriched metadata, the app empowers proactive threat hunting, rapid incident response, and continuous improvement of security posture.

:::info
This app includes [built-in monitors](#vectra-alerts). For details on creating custom monitors, refer to the [Create monitors for Vectra app](#create-monitors-for-the-vectra-app).
:::

## Log types

This app uses Sumo Logic’s [Vectra Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vectra-source/) to collect detections from the Vectra platform.

### Sample log message

```json title="Detection"
{
"summary": {
"user_agents": [
"Microsoft Azure CLI",
"Microsoft Azure CLI"
],
"browser": [
"Chrome 138.0.0",
"Chrome"
],
"operating_system": [
"Linux",
"Linux"
],
"workloads": [
"Azure Resource Manager",
"AzureActiveDirectory"
],
"operations": [
"UserLoggedIn"
],
"src_ips": [
"80.117.40.124"
],
"description": "This account was seen using a scripting engine to access services in Azure AD which is unusual for the account. Unusual usage of scripting engines in Azure AD and Microsoft 365 can be indicative of a compromised account."
},
"data_source": {
"type": "o365",
"connection_name": "M365-Demo",
"connection_id": "s9s9c5cj"
},
"filtered_by_rule": false,
"src_account": {
"id": 1034,
"name": "O365:demolab.vectra.ai",
"url": "https://37373829274.cc1.portal.vectra.ai/api/v3.3/accounts/1034",
"threat": 30,
"certainty": 90,
"privilege_level": null,
"privilege_category": null
},
"threat": 70,
"last_timestamp": "2025-08-12T18:29:21Z",
"is_targeting_key_asset": false,
"sensor_name": "Vectra X",
"filtered_by_ai": false,
"id": 3586,
"c_score": 60,
"src_ip": null,
"assigned_date": null,
"filtered_by_user": false,
"is_custom_model": false,
"assigned_to": null,
"detection_category": "lateral_movement",
"note_modified_timestamp": null,
"created_timestamp": "2025-08-12T18:53:29Z",
"note": null,
"is_marked_custom": false,
"url": "https://37373829274.cc1.portal.vectra.ai/api/v3.3/detections/3586",
"state": "active",
"detection": "Azure AD Unusual Scripting Engine Usage",
"triage_rule_id": null,
"groups": [],
"category": "lateral_movement",
"first_timestamp": "2025-08-12T18:29:21Z",
"certainty": 60,
"t_score": 70,
"tags": [],
"note_modified_by": null,
"detection_url": "https://37373829274.cc1.portal.vectra.ai/api/v3.3/detections/3586",
"description": null,
"notes": [],
"detection_type": "Azure AD Unusual Scripting Engine Usage",
"custom_detection": null,
"sensor": "s9s9c5cj",
"targets_key_asset": false,
"is_triaged": false,
"src_host": null,
"type": "account",
"grouped_details": [
{
"workload": "Azure Resource Manager",
"user_agent": "Microsoft Azure CLI",
"operating_system": "Linux",
"browser": "Chrome 138.0.0",
"operations": [
"UserLoggedIn"
],
"operations_count": 1,
"src_ips": [
"80.117.40.124"
],
"first_timestamp": "2025-08-12T18:29:21Z",
"last_timestamp": "2025-08-12T18:29:21Z"
},
{
"workload": "AzureActiveDirectory",
"user_agent": "Microsoft Azure CLI",
"operating_system": "Linux",
"browser": "Chrome",
"operations": [
"UserLoggedIn"
],
"operations_count": 1,
"src_ips": [
"80.117.40.124"
],
"first_timestamp": "2025-08-12T18:29:21Z",
"last_timestamp": "2025-08-12T18:29:21Z"
}
]
}
```

### Sample queries

```sql title="Total Detections"
_sourceCategory="Labs/Vectra"
| json "id","last_timestamp","first_timestamp","state","t_score","c_score","category","type","summary.operations[*]","grouped_details[*].src_ips[*]","detection_url","assigned_to","detection","certainty","src_account.id","src_account.name","src_account.url","src_account.threat","src_account.certainty" as id,last_timestamp,first_timestamp,state,t_score,c_score,category,type,operations,src_ips,detection_url,assigned_to,detection,certainty,src_account_id,src_account_name,src_account_url,src_account_threat,src_account_certainty nodrop
| if (t_score>=70,"critical",if(t_score>=41 and t_score<=69, "medium", if(t_score<=40,"low","unknown"))) as severity

// global filters
| where isNull(state) or state matches "{{state}}"
| where isNull(category) or category matches "{{category}}"
| where isNull(severity) or severity matches "{{severity}}"
| where isNull(type) or type matches "{{type}}"
| where isNull(certainty) or certainty matches "{{certainty}}"

// panel specific
| count by id
| count
```

## Collection configuration and app installation

import CollectionConfiguration from '../../reuse/apps/collection-configuration.md';

<CollectionConfiguration/>

:::important
Use the [Cloud-to-Cloud Integration for Vectra](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/vectra-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Vectra app is properly integrated and configured to collect and analyze your Vectra data.
:::

### Create a new collector and install the app

import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md';

<AppCollectionOPtion1/>

### Use an existing collector and install the app

import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md';

<AppCollectionOPtion2/>

### Use an existing source and install the app

import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md';

<AppCollectionOPtion3/>

## Viewing the Vectra dashboards​​

import ViewDashboards from '../../reuse/apps/view-dashboards.md';

<ViewDashboards/>

### Overview

The **Vectra - Overview** dashboard offers a consolidated, real-time summary of all detected threats, enabling security teams to quickly assess the current threat landscape. It breaks down detections by severity(critical, medium, low), category, type, and resolution state, providing both counts and visual distributions. Time-based trend charts reveal spikes or patterns in threat activity, while geo-location maps identify where hosts are operating, including those in embargoed regions that may pose compliance risks. Additional panels highlight the top-impacted users, frequently targeted operations, and relevant detection sources, with direct links for in-depth investigation. This dashboard serves as the central entry point for monitoring threats, understanding scope, and prioritizing security actions.<br/><img src='https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Vectra/Vectra-Overview.png' alt="Vectra-Overview" style={{border:'1px solid gray'}} />

### Security

The **Vectra - Security** dashboard focuses on advanced and high-severity threats that require immediate attention. It highlights critical threat detections, command-and-control activities, and account-based privilege escalation attempts, as well as anomalies in Azure AD operations. Persistent threats are tracked with metrics on time-to-remediation, enabling teams to assess response efficiency. Each panels are designed to surface patterns that indicate targeted attacks, lateral movement, or ongoing compromise attempts. By consolidating these high-priority insights, the dashboard helps security analysts quickly isolate urgent incidents, understand attack context, and coordinate effective containment and remediation strategies.<br/><img src='https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Vectra/Vectra-Security.png' alt="Vectra-Security" style={{border:'1px solid gray'}} />

## Create monitors for the Vectra app

import CreateMonitors from '../../reuse/apps/create-monitors.md';

<CreateMonitors/>

### Vectra alerts

| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition |
|:--|:--|:--|:--|
| `Critical Threat Detections` | This alert is triggered when one or more threat detections with a threat score above 70 are identified. These detections indicate the most severe security risks and necessitate immediate investigation and remediation to prevent potential compromise or damage. | Critical | Count > 0 |

## Upgrading/Downgrading the Vectra app (Optional)

import AppUpdate from '../../reuse/apps/app-update.md';

<AppUpdate/>

## Uninstalling the Vectra app (Optional)

import AppUninstall from '../../reuse/apps/app-uninstall.md';

<AppUninstall/>
1 change: 1 addition & 0 deletions sidebars.ts
Original file line number Diff line number Diff line change
Expand Up @@ -2605,6 +2605,7 @@ integrations: [
'integrations/saas-cloud/tenable',
'integrations/saas-cloud/trend-micro-vision-one',
'integrations/saas-cloud/trust-login',
'integrations/saas-cloud/vectra',
'integrations/saas-cloud/vmware-workspace-one',
'integrations/saas-cloud/webex',
'integrations/saas-cloud/workday',
Expand Down