1Password Source
The 1Password Source provides a secure endpoint to receive Sign-in Attempts and Item Usage from the 1Password Event API.
The 1Password Source provides a secure endpoint to receive Sign-in Attempts and Item Usage from the 1Password Event API.
Learn how to collect abnormal threat and case logs from the Abnormal Security source.
Learn how to retrieve Airtable audit logs into the Sumo Logic environment.
The Akamai SIEM API Source provides a secure endpoint to receive security events generated on the Akamai platform by leveraging the V1 SIEM API.
Learn how to fetch device and alerts logs from Armis platform and send it to Sumo Logic.
Learn how to retrieve Asana audit logs into the Sumo Logic environment.
Learn how to retrieve Atlassian audit logs into the Sumo Logic environment.
The Automox Source provides a secure endpoint to receive all events objects, audit trail events, and device inventory details from the Automox platform.
Learn how to retrieve cost and usage reports from AWS Cost Explorer into the Sumo Logic environment.
From April 30, 2025, Sumo Logic will no longer support adding a source using this Azure Event Hubs source. Existing Azure Event Hubs source configurations will still work for some time, but we recommend you migrate to the Azure Event Hubs Source for Logs.
Learn how to collect event logs from the Bitwarden API.
The Box API integration ingests events from the Get Events API.
Description goes here.
The Carbon Black Cloud Source provides a secure endpoint to receive data from the Carbon Black Cloud, Enriched Event Search, and Alerts APIs.
The Carbon Black Inventory Source provides a secure endpoint to receive data from the CB Devices API.
The Cisco AMP Source for Sumo Logic provides a secure endpoint to receive data from the Cisco Amp System Log API.
The Cisco Meraki Source for Sumo Logic provides a secure endpoint to receive data from the Cisco Meraki Organization.
The Cisco Vulnerability Management Source provides a secure endpoint to receive assets data from the Asset API and vulnerability data from the Vulnerability API.
Learn how to collect System Log from the Citrix Cloud and send it to Sumo Logic.
The Cloud SIEM AWS EC2 Inventory Source provides a secure endpoint to receive event data from the EC2 describe instances API.
States
Learn how to collect sessions, file events, and audit logs from the Code42 Incydr.
The Confluent Cloud Metrics source aims to collect metric data from the Confluent Cloud Metrics platform API and send them to Sumo Logic.
Learn how to collect device information from the CrowdStrike FDR and send it to Sumo Logic.
The CrowdStrike Falcon Data Replicator (FDR) Source provides a secure endpoint to ingest Falcon Data Replicator events using the S3 ingestion capability by consumed SQS notifications of new S3 objects.
Learn how to collect file integrity monitoring logs from the CrowdStrike FileVantage platform.
The CrowdStrike Source provides a secure endpoint to receive event data from the CrowdStrike Streams API.
Learn how to collect combined endpoint vulnerabilities data from the CrowdStrike Spotlight platform.
Learn how to collect combined endpoint vulnerabilities data from the CrowdStrike platform.
This integration accesses CyberArk SIEM integration API to retrieve audit events.
This integration accesses CyberArk EPMs API to retrieve administrative audit events from every Set in the environment.
The Cybereason Source provides a secure endpoint to receive authentication logs from the Cybereason Malops API.
Learn how to collect export data from the Digital Guardian and send it to Sumo Logic.
Learn how to collect customer event data from the DocuSign and send it to Sumo Logic.
The Dropbox Source provides a secure endpoint to receive team events from the Get Events API.
Learn how to configure the Druva Cyber Resilience Cloud-to-Cloud source setup in your Sumo Logic environment.
Learn how to configure the Druva Cloud-to-Cloud source setup in your Sumo Logic environment.
The Duo Source provides a secure endpoint to receive authentication logs from the Duo Authentication Logs API.
The Sumo Logic Gmail Trace Logs source pulls the Gmail log from the BigQuery using BigQuery Library APIs and ingests them into the Sumo Logic to store, analyze, and alert.
Learn how to collect data using the BigQuery API.
This integration collects threat indicators using the Intel471 API and sends them to Sumo Logic for analysis.
Learn how to collect data from the Jamf platform.
Learn how to collect data from the JFrog Xray platform.
Learn how to collect events data from the JumpCloud Directory Insight.
Learn how to configure the Kaltura Cloud-to-Cloud source setup using the Sumo logic environment.
The Kandji Source provides a secure endpoint to receive threat details, devices list, device activities, device details, and device app information from the Kandji platform.
Learn how to configure the KnowBe4 Cloud-to-Cloud source setup using the Sumo logic environment.
Learn how to collect indicators list from Mandiant Threat Intel platform.
The Microsoft Exchange Trace Logs Source collects email trace logs from the Office 365 reporting web service.
The Microsoft Graph Azure AD Reporting Source collects Directory Audit, Sign-in, and Provisioning data from the Microsoft Graph API Security endpoint.
The Microsoft Graph Identity Protection Source collects Risk Detection and Risky User from the Microsoft Graph Identity Protection API.
The Microsoft Graph Security API Source provides a secure endpoint to receive alerts from the Microsoft Graph Security API endpoint.
The Mimecast source collects SIEM, DLP, Audit, and Hold Message List data from the Mimecast API.
The Netskope Source provides a secure endpoint to receive event data from the Netskope API.
Our Netskope WebTx API integration ingests Web Transaction logs from Netskope Event Stream.
The Sophos Central Source provides a secure endpoint to receive authentication logs from the Sophos Central APIs.
The Sumo Collection Source aims to collect the list of the collectors and their sources and send them to Sumo Logic.
Learn how to collect incident and incident events using the Symantec Endpoint Security source.
The Symantec Web Security Service Source provides a secure endpoint to receive WSS Access logs from the Symantec WSS API.
The Sysdig Secure Source aims to collect the scan results from the scanner using Sysdig API and send them to Sumo Logic.
The Tenable Source provides a secure endpoint to ingest audit-log events, vulnerability, and asset data from the Tenable.io APIs.
Learn how to collect event logs using the Trellix mVision ePO.
Learn how to collect alert details from Trend Micro platform.
Learn how to collect admin audit events using Webex API.
The Sumo Logic source integration for Workday facilitates retrieving sign-on logs and activity logs from the Workday API.
Learn how to collect audit logs using the Zendesk API.
Learn how to collect audit logs and network activity data from Zero Networks Segment.
This integration collects threat indicators using the ZeroFox API and sends them to Sumo Logic for analysis.