

- #SIMILAR TO CYLANCE ANTIVIRUS FOR INDIVIDUALS HOW TO#
- #SIMILAR TO CYLANCE ANTIVIRUS FOR INDIVIDUALS INSTALL#

If you want to see a preview of the dashboards included with the app before installing, click Preview Dashboards.
#SIMILAR TO CYLANCE ANTIVIRUS FOR INDIVIDUALS INSTALL#
Locate and install the app you need from the App Catalog. Now that you have set up log collection for Cylance, you can install the Cylance App. The App preconfigured searches and Dashboards provide easy-to-access analytic visualizations of your data.
#SIMILAR TO CYLANCE ANTIVIRUS FOR INDIVIDUALS HOW TO#
This section demonstrates how to install the Cylance App, as well as providing examples of each of the dashboards. The following extraction rules use different approaches. The token should end with This number is the Sumo Logic Private Enterprise Number (PEN). Under Event Types, activate the checkboxes for all events.įor SIEM, select Sumo Logic as the destination.įor Custom Token, enter the token from the Sumo Logic Cloud Syslog Source. In the Integrations section, activate the Syslog/SIEM check box. In Cylance, go to Settings > Application. For instructions, refer to the following documentation: Step 3: Configure Logging in Cylance īefore your can configure Sumo Logic to ingest logs, you must set up remote log streaming on Cylance. You will need this when you configure Cylance Syslog Settings. In the Advanced section, specify the following configurations:Ĭopy and paste the token in a secure location.and configure the following Source fields: Perform the steps in Configure a Cloud Syslog Source.To create a new Sumo Logic Hosted Collector, perform the steps in Configure a Hosted Collector. You can use the App to investigate Cylance-specific events and provide operational visibility to team members without needing to log into Cylance. The Sumo Logic App for Cylance allows you to analyze Cylance security events by type, status, and detection method. By combining the threat events data from Cylance and other data sources, you can reduce your security risk and improve your overall security posture. Cylance applies artificial intelligence, algorithmic science, and machine learning to cyber security, and provides visibility to their service through integrations with a central security analytics platform like Sumo Logic. This procedure demonstrates how to collect logs from Cylance into Sumo Logic. | transpose row _timeslice column event_name | parse field = msg "Zone: * Policy Assigned: * Policy Applied To All Devices In Zone: *" as zone, policy, PolicyAppliedToAllDevicesInZone | parse field = msg "SHA256: *" as sha nodrop | parse field = msg "Devices: *" as device_name nodrop | parse field = msg "Device: * " as device_name nodrop | parse field = msg "Policy Assigned: * Devices: *" as policy, device_name nodrop | parse field = msg "Tier: * Zones: * Agent Version: *" as tier, zone, agent_version nodrop | parse regex field = msg "Device:\s*(?*)\s*$" nodrop | parse field = msg "Provider: *" as provider nodrop | parse field = msg "Device: * was auto assigned to Zone: *" as device_name, zone nodrop | parse "Message: *," as msg nodrop | parse "Source IP: *," as src_ip nodrop | parse "User: *" as user nodrop | parse "Event Type: *, Event Name: *," as event_type, event_name nodrop _sourceCategory = * cylance * "Event Type:" AuditLog DeviceControl (Control external device like USB, storage connected to system under monitoring)įor details on the format and definitions, refer to Cylance documentation.AuditLog (User Actions performed from Cylance Web Console).Threat Classification (Threat classification by Cylance research team).ScriptControl (Script Execution control and actions).Threat (Threats identified and actioned).Device (Device Mgmt - Register, Remove, Updates, SystemSecurity).The Sumo Logic App for Cylance uses the supports the following event and log types: You can use the App to investigate Cylance-specific events and provide operational visibility to team members without logging into Cylance.Ĭylance applies artificial intelligence, algorithmic science, and machine learning to cyber security, and provides visibility to their service through integrations with a central security analytics platform like Sumo Logic. The Cylance App enables you to analyze Cylance security events by type, status, and detection method.
