Skip to content

Commit 0b154e7

Browse files
authored
Merge branch 'main' into docs-613-service-intelligence-beta
2 parents 66c3edb + 34b0469 commit 0b154e7

File tree

13 files changed

+275
-126
lines changed

13 files changed

+275
-126
lines changed

blog-cse/2025-06-12-content.md

Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
---
2+
title: June 12, 2025 - Content Release
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- log mappers
6+
- parsers
7+
- rules
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
This content release includes:
14+
- New detection rules for browser extension persistence, Kerberos certificate authentication, GitHub vulnerability alerts, Okta application access monitoring, and threat intelligence email matching.
15+
- New product support for Atlassian audit and login events.
16+
- Enhanced Azure Event Hub Windows Defender integration with new threat event mapping for passthrough alerts.
17+
- Cisco ASA updates with new network event support and NAT IP handling improvements.
18+
- Citrix NetScaler mapping updates to support additional events.
19+
- Update to Auth0 successful/unsuccessful login mappings to properly classify each.
20+
- CrowdStrike NextGen SIEM Alert event support.
21+
- Mimecast security event mapping improvements across several event types.
22+
- AWS CloudTrail network event enhancements with event success/failure handling and protocol support.
23+
- Parser updates to support additional event formats for multiple platforms.
24+
25+
Changes are enumerated below.
26+
27+
### Rules
28+
- [New] MATCH-S00897 Chromium Extension Installed
29+
- Threat actors may install browser extensions as a form of persistence on victim systems. Look up the 32 character extension ID in order to ensure that the extension is valid and expected to be installed as part of normal business operations. This extension ID can be found in the following values: `file_path` and/or `changeTarget` depending on the source of the telemetry. This rule logic utilizes Sysmon file creation events, which need to be enabled and configured on relevant assets.
30+
- [New] FIRST-S00064 First Seen Certificate Thumbprint in Successful Kerberos Authentication
31+
- This alert looks for a first seen certificate thumbprint being used to authenticate to an Active Directory environment, resulting in a Kerberos ticket being successfully issued. This alert is designed to catch Active Directory Certificate Services related attacks, ensure the certificate thumprint is valid, correlate the thumbprint ID with other Certificate Services events, particularly looking for recently issued templates.
32+
- [New] MATCH-S00949 GitHub - Vulnerability Alerts
33+
- Detects vulnerability alerts created for a GitHub repository.
34+
- [New] FIRST-S00070 Okta - First Seen Application Accessed by User
35+
- This signal looks for a user that is accessing an application behind Okta SSO that is first seen since the baseline period. Ensure that access of this application is expected and authorized, look for other Okta events around the user account in question to determine whether access to this application is expected and authorized.
36+
- [New] AGGREGATION-S00007 Okta - Session Anomaly (Multiple Operating Systems)
37+
- This rule detects when a user has utilized multiple distinct operating systems when performing authentication through Okta. This activity could potentially indicate credential theft or a general session anomaly. Examine other Okta related events surrounding the time period for this signal, pivoting off the username value to examine if any other suspicious activity has taken place. If this rule is generating false positives, adjust the threshold value and consider excluding certain user accounts via tuning expression or a match list.
38+
- [New] MATCH-S01020 Threat Intel - Matched Target Email
39+
- Detects email addresses associated with known malicious actor(s) or campaign(s) as designated by a threat intelligence provider.
40+
- [New] MATCH-S01019 Threat Intel - Matched User Email
41+
- Detects email addresses associated with known malicious actor(s) or campaign(s) as designated by a threat intelligence provider.
42+
- [Updated] MATCH-S00170 Windows - Scheduled Task Creation
43+
- Fixed spelling error.
44+
45+
### Log Mappers
46+
- [New] Altassian audit events
47+
- [New] Altassian login events
48+
- [New] Azure Event Hub - Windows Defender Azure Alert
49+
- [New] Cisco ASA 4180(18|19|44)
50+
- [New] Cisco ASA 713nnn JSON
51+
- [New] Cisco ASA Network events
52+
- [New] Citrix NetScaler - SSL Handshake Failure
53+
- [New] CrowdStrike NextGen SIEM
54+
- [Updated] Auth0 Failed Authentication
55+
- [Updated] Auth0 Successful Authentication
56+
- [Updated] Azure Event Hub - Windows Defender Logs
57+
- [Updated] Cisco ASA 106010 JSON
58+
- [Updated] Cisco ASA 20900(4|5) JSON
59+
- [Updated] Cisco ASA 50000(4|3) JSON
60+
- [Updated] Citrix NetScaler - TCP Connection
61+
- [Updated] CloudTrail - ec2.amazonaws.com - All Network Events
62+
- [Updated] F5 HTTP Request
63+
- [Updated] Mimecast AV Event
64+
- [Updated] Mimecast Audit Authentication Logs
65+
- [Updated] Mimecast Audit Hold Messages
66+
- [Updated] Mimecast Audit Logs
67+
- [Updated] Mimecast DLP Logs
68+
- [Updated] Mimecast Email logs
69+
- [Updated] Mimecast Impersonation Event
70+
- [Updated] Mimecast Spam Event
71+
- [Updated] Mimecast Targeted Threat Protection Logs
72+
73+
### Parsers
74+
- [New] /Parsers/System/Atlassian/Atlassian Audit Events
75+
- [Updated] /Parsers/System/Cisco/Cisco ASA
76+
- [Updated] /Parsers/System/Cisco/Cisco Umbrella CSV
77+
- [Updated] /Parsers/System/Citrix/Citrix NetScaler Syslog
78+
- [Updated] /Parsers/System/AWS/CloudTrail
79+
- [Updated] /Parsers/System/CrowdStrike/CrowdStrike Falcon Endpoint - JSON
80+
- [Updated] /Parsers/System/F5/F5 Syslog
81+
- [Updated] /Parsers/System/Microsoft/Microsoft Azure JSON
82+
- [Updated] /Parsers/System/Microsoft/Windows-JSON-Open Telemetry

cid-redirects.json

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -470,6 +470,7 @@
470470
"/05Search/Lookup_Tables/02_Manage_and_Update_Lookup_Tables": "/docs/search/lookup-tables/manage-update-lookup-tables",
471471
"/05Search/Optimize-Search-Performance": "/docs/search/optimize-search-performance",
472472
"/05Search/Optimize-Search-Performance/Optimizing_Search_with_Partitions": "/docs/search/optimize-search-partitions",
473+
"/docs/manage/queries/optimize-queries": "/docs/search/optimize-search-performance",
473474
"/05Search/Search-Cheat-Sheets": "/docs/search/search-cheat-sheets",
474475
"/05Search/Search-Cheat-Sheets/General-Search-Examples-Cheat-Sheet": "/docs/search/search-cheat-sheets/general-search-examples",
475476
"/05Search/Search-Cheat-Sheets/grep-to-Searching-with-Sumo-Cheat-Sheet": "/docs/search/search-cheat-sheets/grep-searching-with-sumo",
@@ -1086,6 +1087,7 @@
10861087
"/07Sumo-Logic-Apps/16PCI_Compliance/PCI_Compliance_for_Palo_Alto_Networks/Collect_Logs_for_PCI_Compliance_for_Palo_Alto_Networks": "/docs/integrations/pci-compliance/palo-alto-networks-9",
10871088
"/07Sumo-Logic-Apps/16PCI_Compliance/PCI_Compliance_for_Palo_Alto_Networks/Install_the_PCI_for_Palo_Alto_Networks_App_and_View_the_Dashboards": "/docs/integrations/pci-compliance/palo-alto-networks-9",
10881089
"/07Sumo-Logic-Apps/16PCI_Compliance/PCI_Compliance_for_Palo_Alto_Networks": "/docs/integrations/pci-compliance/palo-alto-networks-9",
1090+
"/07Sumo-Logic-Apps/16PCI_Compliance/Choosing_Between_PCI_Compliance_Apps_and_PCI_Compliance_Professional_Services_App": "/docs/integrations/pci-compliance",
10891091
"/07Sumo-Logic-Apps/18SAAS_and_Cloud_Apps": "/docs/integrations/saas-cloud",
10901092
"/07Sumo-Logic-Apps/18SAAS_and_Cloud_Apps/Acquia": "/docs/integrations/saas-cloud/acquia",
10911093
"/07Sumo-Logic-Apps/18SAAS_and_Cloud_Apps/Acquia/Collect_logs_for_the_Acquia_App": "/docs/integrations/saas-cloud/acquia",
@@ -3601,6 +3603,7 @@
36013603
"/Send_Data/Hosted_Collectors": "/docs/send-data/hosted-collectors",
36023604
"/Send_Data/Hosted_Collectors/Configure_a_Hosted_Collector": "/docs/send-data/hosted-collectors/configure-hosted-collector",
36033605
"/Send_Data/Local_Configuration_File_Management": "/docs/send-data/use-json-configure-sources/local-configuration-file-management/new-collectors-and-sources",
3606+
"/Send_Data/Sources/01Sources_for_Installed_Collectors/Preconfigure_a_Machine_to_Collect_Remote_Windows_Events": "/docs/send-data/installed-collectors/sources/preconfigure-machine-collect-remote-windows-events",
36043607
"/Send_Data/Sources/01Sources_for_Installed_Collectors/Script_Action": "/docs/send-data/installed-collectors/sources/script-action",
36053608
"/Send_Data/Sources/01Sources_for_Installed_Collectors/Syslog_Source": "/docs/send-data/hosted-collectors/cloud-syslog-source",
36063609
"/Send_Data/Sources/01Sources_for_Installed_Collectors/Local_File_Source": "/docs/send-data/installed-collectors/sources/local-file-source",
@@ -3624,6 +3627,7 @@
36243627
"/Traces/02Working_with_Tracing_data/04Spans": "/docs/apm/spans",
36253628
"/Traces/02Working_with_Tracing_data/05Search_Query_Language_support_for_Traces": "/docs/apm/traces/search-query-language-support-for-traces",
36263629
"/Traces/Real_User_Monitoring": "/docs/apm/real-user-monitoring",
3630+
"/docs/apm/opentelemetry": "/docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation",
36273631
"/Traces/Service_Map_and_Dashboards": "/docs/apm/services-list-map",
36283632
"/Traces/View_and_investigate_traces": "/docs/apm/traces/view-and-investigate-traces",
36293633
"/Visualizations-and-Alerts": "/docs/alerts",
@@ -3765,6 +3769,7 @@
37653769
"/01Start-Here/01About-Sumo-Logic/System-Requirements/Installed-Collector-Requirements": "/docs/get-started/system-requirements",
37663770
"/01Start-Here/01About-Sumo-Logic/System-Requirements/Supported-Browsers": "/docs/get-started/system-requirements",
37673771
"/03-send-data/installed-collectors": "/docs/send-data/installed-collectors",
3772+
"/03-Send-Data/Sources/02-Hosted-Collectors/Google-Cloud-Platform-Source/Google-Cloud-Storage-Source": "/docs/send-data/hosted-collectors/google-source/google-cloud-platform-source",
37683773
"/03Send-Data/Collect-from-Other-Data-Sources/Collect_Logs_from_AWS_Lambda_using_Lambda_Extension": "/docs/send-data/collect-from-other-data-sources/collect-aws-lambda-logs-extension",
37693774
"/03Send-Data/Collect-from-Other-Data-Sources/Collecting-Logs-from-a-Local-File-System": "/docs/send-data/installed-collectors/sources/local-file-source",
37703775
"/03Send-Data/Hosted-Collectors/GCP_Metrics_Source": "/docs/send-data/hosted-collectors/google-source/gcp-metrics-source",
@@ -3906,6 +3911,7 @@
39063911
"/Dashboards-and-Alerts/Alerts/03-Create-a-Real-Time-Alert": "/docs/alerts/scheduled-searches/create-real-time-alert",
39073912
"/docs/alerts/scheduled-searches/deprecation": "/docs/alerts/scheduled-searches/create-real-time-alert",
39083913
"/Data_Enrichment": "/docs/send-data/data-enrichment",
3914+
"/docs/search/enrichment": "/docs/send-data/data-enrichment",
39093915
"/Manage/Connections_and_Integrations/Webhook_Connections": "/docs/alerts/webhook-connections",
39103916
"/Manage/Connections_and_Integrations/Webhook_Connections/About_Webhook_Connections": "/docs/alerts/webhook-connections/set-up-webhook-connections",
39113917
"/Manage/Connections_and_Integrations/Webhook_Connections/Webhook_Connection_for_AWS_Lambda": "/docs/alerts/webhook-connections/aws-lambda",
@@ -3945,6 +3951,7 @@
39453951
"/Search/Get_Started_with_Search/Search_Basics/Export_Search_Results": "/docs/search/get-started-with-search/search-basics/export-search-results",
39463952
"/Search/Get_Started_with_Search/How_to_Use_the_Search_Page/Field_Browser": "/docs/search/get-started-with-search/search-page/field-browser",
39473953
"/Search/Get_Started_with_Search/Search_Basics/Search_Metadata": "/docs/search/get-started-with-search/search-basics",
3954+
"/Search/Library/Apps-in-Sumo-Logic": "/docs/integrations/sumo-apps",
39483955
"/Search/Library/Apps-in-Sumo-Logic/01-Sumo-Logic-Apps/Audit-App": "/docs/integrations/sumo-apps/audit",
39493956
"/Search/Library/Apps-in-Sumo-Logic/01-Sumo-Logic-Apps/Data-Volume-App": "/docs/integrations/sumo-apps/data-volume",
39503957
"/Search/Library/Apps-in-Sumo-Logic/01-Sumo-Logic-Apps/Data-Volume-App/Data-Volume-App-Dashboards": "/docs/integrations/sumo-apps/data-volume",
@@ -4071,6 +4078,7 @@
40714078
"/Send-Data/Applications-and-Other-Data-Sources/Fastly": "/docs/integrations/saas-cloud/fastly",
40724079
"/Send-Data/Applications-and-Other-Data-Sources/Fastly/01Collect-Logs-for-Fastly": "/docs/integrations/saas-cloud/fastly",
40734080
"/Send-Data/Applications-and-Other-Data-Sources/Fastly/03Fastly-App-Dashboards": "/docs/integrations/saas-cloud/fastly",
4081+
"/docs/integrations/saas-cloud/google-workspace": "/docs/integrations/google/workspace",
40744082
"/Send-Data/Applications-and-Other-Data-Sources/GitHub": "/docs/integrations/app-development/github",
40754083
"/Send-Data/Applications-and-Other-Data-Sources/GitHub/GitHub-App-Dashboards": "/docs/integrations/app-development/github",
40764084
"/Send-Data/Applications-and-Other-Data-Sources/Google-Cloud-Audit": "/docs/integrations/google/cloud-audit",
@@ -4096,7 +4104,9 @@
40964104
"/Send-Data/Data-Types-and-Applications/Docker/01-Collect-Events-and-Statistics-for-the-Docker-App": "/docs/send-data/installed-collectors/sources/docker-sources",
40974105
"/Send-Data/Data-Types-and-Applications/Amazon-EC2-Container-Service-(ECS)/01-Collect-ECS-Logs-and-Metrics": "/docs/integrations/amazon-aws/elastic-container-service",
40984106
"/Send-Data/Data-Types/Microsoft-SQL-Server/01Collect-Logs-for-Microsoft-SQL-Server": "/docs/integrations/microsoft-azure/sql-server",
4107+
"/docs/integrations/microsoft-azure/storage": "/docs/integrations/microsoft-azure/azure-storage",
40994108
"/Send-Data/Data-Types/Azure-Web-Apps": "/docs/integrations/microsoft-azure/web-apps",
4109+
"/Send-Data/Data-Types/Box": "/docs/integrations/saas-cloud/box",
41004110
"/Send-Data/Data-Types/Docker": "/docs/send-data/installed-collectors/sources/docker-sources",
41014111
"/Send-Data/Data-Types/Docker/Docker-App-Dashboards": "/docs/integrations/containers-orchestration/docker-ulm",
41024112
"/Send-Data/Data-Types/Docker/02-Install-the-Docker-App": "/docs/integrations/containers-orchestration/docker-ulm",
@@ -4252,6 +4262,7 @@
42524262
"/docs/cse/get-started-with-cloud-siem/introduction-to-cloud-siem": "/docs/cse/get-started-with-cloud-siem",
42534263
"/docs/cse/cloud-siem-content-catalog": "/docs/cse/get-started-with-cloud-siem/cloud-siem-content-catalog",
42544264
"/docs/cse/cloud-siem/mapping-map-record-fields-to-schema": "/docs/cse/schema/create-structured-log-mapping",
4265+
"/docs/cse/cloud-siem/entities": "/docs/cse/records-signals-entities-insights",
42554266
"/docs/cse/introduction-to-cloud-siem": "/docs/cse/get-started-with-cloud-siem",
42564267
"/docs/integrations/sumo-apps/security-foundations": "/docs/integrations/sumo-apps/security-analytics",
42574268
"/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs/collect-with-amazon-kinesis": "/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs",
@@ -4394,5 +4405,6 @@
43944405
"/docs/manage/manage-subscription/create-manage-orgs-flex": "/docs/manage/manage-subscription/create-and-manage-orgs/create-manage-orgs-service-providers",
43954406
"/docs/manage/manage-subscription/manage-org-settings": "/docs/manage/manage-subscription/create-and-manage-orgs/manage-org-settings",
43964407
"/docs/integrations/amazon-aws/elastic-load-balancing": "/docs/integrations/amazon-aws/classic-load-balancer",
4397-
"/docs/integrations/microsoft-azure/microsoft-defender-for-cloud": "/docs/integrations/microsoft-azure/azure-security-defender-for-cloud"
4408+
"/docs/integrations/microsoft-azure/microsoft-defender-for-cloud": "/docs/integrations/microsoft-azure/azure-security-defender-for-cloud",
4409+
"/docs/integrations/azure": "/docs/integrations/microsoft-azure"
43984410
}

docs/apm/real-user-monitoring/dashboards.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ The **RUM Overview** dashboards (**Application**, **Service**, **Service with En
5858

5959
Use these dashboards to:
6060
* Analyze load and paint timings for page document loads by application, service, or action.
61-
* View information about core web vitals, XHR processing times/errors, and log errors.
61+
* View information about [core web vitals, XHR processing times/errors, and log errors](/docs/apm/real-user-monitoring/metrics/#xhr-monitoring-metrics).
6262
* Understand what top browsers, operating systems, and geolocations are active with your website.
6363

6464
You can select the timing metric type in the **statistic** dropdown on the dashboard header. This will change the browser time metrics types on charts.
@@ -78,7 +78,7 @@ The **RUM - TopN - Application** and **RUM - TopN - Application Service** dashbo
7878
Use these dashboards to:
7979
* Find out top N browsers, operating systems, and geolocations by load or requests.
8080
* Understand the slowest and fastest browsers from a rendering perspective or geographical locations from a network perspective.
81-
* Understand XHR and log errors your users are experiencing.
81+
* Understand [XHR and log errors](/docs/apm/real-user-monitoring/metrics/#xhr-monitoring-metrics) your users are experiencing.
8282
* Find out which browsers and operating systems are in use by your users and where are they are geographically located.
8383

8484
You can select the timing metric type in the **statistic** dropdown on the dashboard header. This will change the browser time metrics types on charts. You can also define the top N number for all charts.
@@ -91,7 +91,7 @@ The **RUM Performance Analytics** dashboards for **Application**, **Service**, a
9191

9292
Use these dashboards to:
9393
* Filter data for specific combinations of browser, operating system, and/or geolocation.
94-
* Understand XHR, load, timing metrics for the selected user cohort.
94+
* Understand [XHR, load, timing metrics](/docs/apm/real-user-monitoring/metrics/#xhr-monitoring-metrics) for the selected user cohort.
9595
* Compare your selected timings against data for a different time period by selecting the appropriate option in the compare_with dropdown.
9696

9797
You can click on any data point on the charts to open a details panel and view the **Infrastructure** tab to drill-down to traces representing user transactions from the selected time point. For cross-dimensional metrics, only the average statistic type is available.

docs/apm/real-user-monitoring/metrics.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -123,11 +123,15 @@ These CWV KPIs are captured and displayed on Overview dashboards for Document Lo
123123

124124
## XHR monitoring metrics
125125

126-
An XML HTTP Request (XHR) is a form of communication between the browser and the application backend without reloading the page. A typical example is when a page needs to update a price ticker automatically or after pressing the “update price” button next to it.
126+
:::note
127+
Currently, XHR metrics extraction in RUM is only supported for applications that use the [`fetch` API](https://developer.mozilla.org/en-US/docs/Web/API/Fetch_API) to perform XHR calls. If your application uses [`XMLHttpRequest`](https://developer.mozilla.org/en-US/docs/Web/API/XMLHttpRequest), metrics may not be collected at this time. A fix to support `XMLHttpRequest`-based calls is in progress and expected to roll out in mid 2025. We will update this page when that support becomes available.
128+
:::
129+
130+
An XMLHttpRequest (XHR) is a way for browsers to communicate with a backend server without reloading the page. For example, a page may use XHR to update a price ticker automatically or after clicking an "Update Price" button.
127131

128-
The XHR technique is frequently used in _single-page apps_ — apps that load the page once and then provide all interaction and navigation without loading additional documents. These pages can generate one or more XHR requests, typically in the form of HTTP POSTs/GETs, related to various user actions on a page. Sumo Logic provides the following monitoring coverage for XHR interactions:
132+
XHR is commonly used in *single-page applications* (SPAs), which load once and then handle all interactions without refreshing the page. These apps often generate multiple XHR requeststypically HTTP `POST` or `GET` calls—based on user actions.
129133

130-
Pages can generate one or more XHR requests, typically in the form of HTTP POSTs, related to various user actions on a page. The following performance timings are measured:
134+
Sumo Logic provides monitoring coverage for XHR interactions, including the following performance timings:
131135

132136
### `browser_time_to_first_xhr`
133137

0 commit comments

Comments
 (0)