Install the Sumo Logic App
Now that you have set up collection for Cylance, install the Sumo Logic App for Cylance to use the preconfigured searches and Dashboards to analyze your data.
To install the app:
- Select App Catalog, search for and select the app, and click Add to Library. (In the classic UI, click Library, click Apps, select the app, and click Install. If you don't find the app under Apps, it might be a preview app. Try clicking Preview to find the app.)
- Click Preview Dashboards if you'd like to see a preview of the dashboards included with the app before installing.
- In the Install Application dialog box, select the installation path (the default is the Personal folder in the library), or click New Folder to add a new folder.
- Select either of these options for the log data source.
- Choose Select from Existing Source Categories, and select the source catalog from the Source Category list.
- Choose Enter a Custom Data Filter and enter a custom source category beginning with an underscore. Example: (
- Click Add to Library.
Once an app is installed, it will appear in your Personal folder, or other folder that you specified. From here, you can share it with your organization. See Welcome to the New Library for information on working with the library in the new UI.
Panels will start to fill automatically. It's important to note that each Panel slowly fills with data matching the time range query and received since the Panel was created. Results won't immediately be available, but with a bit of time, you'll see full graphs and maps.
Cylance - Overview
The Cylance Overview Dashboard includes filters that you can use in Interactive Mode for visibility into your Cylance system.
Total Threats. Displays the total number of distinct threat events in a single value chart for the last 15 minutes.
By Event Type. Shows the percentage of events by type in a pie chart for the last 15 minutes.
By Status. Provides details on threats by status level in a pie chart, including states such as Unsafe, Cleared, Abnormal, and Quarantined for the last 15 minutes.
By Detection Method. Displays the detection methods used to expose the threat in a pie chart for the last 15 minutes.
Devices with the Most Events. Shows a list of devices with the most threat events in a table chart, including the device name and the count for the last 15 minutes.
Devices with High Risk Scores. Provides information on devices with the highest threat total score ranked in a table chart, including device name and total score, for the last 15 minutes.
FileNames with the Most Events. Displays file names with the most number of reported threat events in a table chart, including file name and count for the last 15 minutes.
Score by Occurrence. Shows the number of occurrences of a score, ranging from 1 to 99, in a table chart, including the score and the number of devices, for the last 15 minutes.