# Sumo Logic

The Dropzone AI Platform integrates with [Sumo Logic](https://www.sumologic.com/), a cloud based machine data analytics product. Integrating Sumo Logic with Dropzone allows Dropzone to automatically investigate security incidents using the data within Sumo Logic.

## Create an API Key

Sumo Logic requires an API key to enable.

To obtain an API Key, do the following:

* Login as an administrator to the Sumo Logic at the appropriate URL, e.g. <http://service.sumologic.com>
* In the bottom left hand corner of the Sumo Logic homepage, click on Administration > Security

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-549f02bd67f5c2e9f2d9a5903ed3e3b58529c06a%2Fsumo-logic-api-1.png?alt=media" alt=""><figcaption><p>Navigate to Administration</p></figcaption></figure>

* Click "Add Access Key"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-376a2fe9982089bf0037493f46411e51a579ca5d%2Fsumo-logic-api-2.png?alt=media" alt=""><figcaption><p>Add access key</p></figcaption></figure>

* Name the Access Key something memorable, such as Dropzone AI, then click "Save"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-454c1649b4561bf48b4a1aef184cbeb6c06cee05%2Fsumo-logic-api-3.png?alt=media" alt=""><figcaption><p>Name and Save API</p></figcaption></figure>

* Copy the Access ID and Access Key shown for use later in the Dropzone UI where they are called "Access ID" and "Access Key" respectively, then click "Done"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-f07cced94430f06655f0f5d459ce0573eb456518%2Fsumo-logic-api-4.png?alt=media" alt=""><figcaption><p>Copy API Key and Secret</p></figcaption></figure>

## Enable Sumo Logic

To enable the Alert Source integration, you'll need the following information:

| Dropzone Field         | Source                                                   |
| ---------------------- | -------------------------------------------------------- |
| Access ID              | The "Access ID" value you copied earlier                 |
| Access Key             | The "Access Key" value you copied earlier                |
| API Hostname           | Your Sumo Logic API hostname, e.g. api.us2.sumologic.com |
| Sumo Logic UI Hostname | Your Sumo Logic Hostname, e.g. service.us2.sumologic.com |

To enable the Alert Source integration, do the following:

* Navigate to your Dropzone AI tenant home page e.g. https\://*mycompany*.dropzone.app
* In the bottom left hand corner, navigate to Settings > Integrations

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-b3f07f902b1402dadc7abbd8bb62f9c204547390%2Fui-integrations-dropdown.png?alt=media" alt=""><figcaption><p>Integrations Dropdown</p></figcaption></figure>

* Click "Available"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-434641ec6d4e45051842f86164f485d6bd289424%2Fapp_system_integrations_available.png?alt=media" alt=""><figcaption><p>Click Available</p></figcaption></figure>

* In the Search bar, search Sumo Logic, then click "Configure"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-185eae6a232e0721ac46706b49162934efdf9dea%2Fapp_system_integrations_available_sumologic.png?alt=media" alt=""><figcaption><p>The Sumo Logic Tile</p></figcaption></figure>

* Under the Alert Source header, input your Access ID, Access Key, API Domain, and Sumo Logic Hostname

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-fb4e1c0cb56de58cd99f4f53c11511bb53d2bc54%2Fapp_system_integrations_available_sumologic_alert_config.png?alt=media" alt=""><figcaption><p>The Sumo Logic alert source configuration (pt 1)</p></figcaption></figure>

* In the "Sumo Logic Alert Search Queries" section, you must input [Sumo Logic-specific search query terms](https://help.sumologic.com/docs/search/get-started-with-search/build-search/search-syntax-overview/) to select alerts to investigate. To do so, click "Add Item," then input the query details
  * For example, if your MS Defender alerts are sent to a source category named msgraph-security, you would add the following query: `_sourceCategory=msgraph-security`

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-c973724294a9d5b6dec6c0cdd5a5380b3c9a794f%2Fapp_system_integrations_available_sumologic_alert_config_1.png?alt=media" alt=""><figcaption><p>The Sumo Logic Alert Source Configuration (pt 2)</p></figcaption></figure>

* If you wish to enable Sumo Logic's Cloud SIEM, check the box labeled "Enabled" in the Cloud SIEM section, then select the severity levels you wish Dropzone to investigate
* If you wish to exclude [incident statuses](https://help.sumologic.com/docs/cse/get-started-with-cloud-siem/cse-heads-up-display/#3-insights-by-status) from investigation, click "Add Item" under "Excluded Statuses" and input each status by name
* If you wish to exclude any alerts that may be generated from a [Prelude Security](https://www.preludesecurity.com/platform/security-control-validation) attack simulations, check the box labeled "Exclude Prelude Security Alerts"

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-2f048fb1d447b3996deb90f8a28a634cc100a611%2Fapp_system_integrations_available_sumologic_alert_config_2.png?alt=media" alt=""><figcaption><p>The Sumo Logic Alert Source Configuration (pt 3)</p></figcaption></figure>

* In the "Alert Title Filtering" section, you may choose to include or exclude alerts in investigation. To do so, select whether to include or exclude the alert from the dropdown, then click "Add Item" and input a python regex pattern to filter the alerts by title. Continue clicking "Add Item" until down

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-2a04f7a02fe558697c75a69bc9de308d4e518e41%2Fapp_system_integrations_available_sumologic_alert_config_5.png?alt=media" alt=""><figcaption><p>The Sumo Logic Alert Source Configuration (pt 4)</p></figcaption></figure>

* In the Data Tiers section, select which Sumo Logic [data tiers](https://help.sumologic.com/docs/manage/partitions/data-tiers/) you wish for Dropzone to be able to investigate. By default, only the Continuous tier is utilized

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-f88884dbb7bc313a5e6fe2c62f9947e385991031%2Fapp_system_integrations_available_sumologic_alert_config_4.png?alt=media" alt=""><figcaption><p>The Sumo Logic Alert Source Configuration (pt 5)</p></figcaption></figure>

* Input your desired poll interval and lookback

<figure><img src="https://435022081-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FmBVcKuiytGCsIDpL70BC%2Fuploads%2Fgit-blob-2eea10002fa65adf35eeaee35f631bd2c99fb7ec%2Fapp_system_integrations_available_sumologic_alert_config_3.png?alt=media" alt=""><figcaption><p>The Sumo Logic Alert Source Configuration (pt 6)</p></figcaption></figure>

* Click "Test & Save" to finish

If you have any errors or questions, engage your Dropzone AI support representative.
