Skip to content

Commit 146e1de

Browse files
authored
Merge branch 'main' into app_central_netskope
2 parents 93801a3 + 6f693fd commit 146e1de

File tree

74 files changed

+1385
-304
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

74 files changed

+1385
-304
lines changed

.clabot

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,8 @@
172172
"bradtho",
173173
"Misterjohnson87",
174174
"lol3909",
175-
"Hellfire4959"
175+
"Hellfire4959",
176+
"antonymartinsumo"
176177
],
177178
"message": "Thank you for your contribution! As this is an open source project, we require contributors to sign our Contributor License Agreement and do not have yours on file. To proceed with your PR, please [sign your name here](https://forms.gle/YgLddrckeJaCdZYA6) and we'll add you to our approved list of contributors.",
178179
"label": "cla-signed",

blog-cse/2024-11-07-content.md

Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
---
2+
title: November 7, 2024 - Content Release
3+
hide_table_of_contents: true
4+
keywords:
5+
- log mappers
6+
- log parsers
7+
- detection rules
8+
- tag schemas
9+
image: https://help.sumologic.com/img/sumo-square.png
10+
---
11+
12+
import useBaseUrl from '@docusaurus/useBaseUrl';
13+
14+
<a href="https://help.sumologic.com/release-notes-cse/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
15+
16+
This content release includes:
17+
- New detection rules.
18+
- Updates to existing detection rules to correct rule logic and reduce false positives.
19+
- New parsing and mapping support for Automox, WatchGuard Firewall, and Digital Guardian ARC.
20+
- Update to existing AWS Application Load Balancer parsing and mapping to support Connection logs.
21+
- Update to MITRE ATT&CK tag schema to support ATT&CK v16.0.
22+
23+
Changes are enumerated below.
24+
25+
### Rules
26+
- [New] CHAIN-S00018 Autorun file created after USB disk mount on host
27+
- This signal looks for a USB drive being mounted on a Windows host followed by a file creation event with the file name of "autorun.inf" within a 5-minute time frame. This activity could be indicative of an attempt at lateral movement or initial access avenues through a USB device. Ensure that the machine in question is authorized to use USB devices and look for other file creation events from this host around the same time frame.
28+
- [New] FIRST-S00071 First Seen AWS ConsoleLogin by User
29+
- First observance of a user logging on to the Amazon AWS console. This could be indicative of new administrator onboarding, or an unauthorized access to the AWS console. Recommended to investigate the nature of the user account and the login.
30+
- [New] FIRST-S00080 First Seen Azure Portal access by User
31+
- First observance of a user logging on to the Microsoft Azure Portal. This could be indicative of new user onboarding, or an unauthorized access to the Azure portal. Recommended to investigate the nature of the user account and the login.
32+
- [New] FIRST-S00073 First Seen Get-ADDefaultDomainPasswordPolicy
33+
- The first observed execution of the PowerShell CMDLet Get-ADDefaultDomainPasswordPolicy on this host. This CMDLet can be used in the discovery of Windows Domain Password Policies by threat actors. Investigating the host and active users for additional activity around the time of execution is recommended.
34+
- [New] FIRST-S00072 First Seen Group Policy Discovery Operation
35+
- This detection is a first observed execution of Windows process or PowerShell commands that can be run by users or administrators in order to gather password policy and other types of system information in an enterprise environment. The detections in this signal are based off variations found in Atomic Red Team test cases. Reference: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1615/T1615.md. Look at the command line and parent process details of the signal in order to determine if this execution is legitimate or part of system provisioning or systems administration operations.
36+
- [New] FIRST-S00076 First Seen Net Command Use on Host
37+
- Microsoft’s Net.exe can be used for multiple Discovery tactics, including Password Policy, Permissions, Account and Domain Trust Discovery. This detection identifies the first observance of a Net related command on a system related to these discovery tactics. It is recommended to investigate the host and user to determine if this is authorized admin activity or needs further inspection.
38+
- [New] FIRST-S00065 First Seen Successful Authentication From Unexpected Country
39+
- First Seen rule which triggers when there are at least two successful logins from the same user with different country codes indicating possible credential theft. It is recommended to add filtering criteria to the expression to reduce false positives, such as known VPN addresses.(If degradation issues occur it is recommendation implementing tuning around your expected network.)
40+
- [New] FIRST-S00074 First Seen driverquery execution on host
41+
- First observed execution of the driverquery command on the following device host: `{{device_hostname}}`. Driverquery is a useful command for an attacker to enumerate local device drivers to determine next steps in the attack. Vulnerability scanners and automated processes may trigger this detection. It is recommended to identify and filter these processes out using a Tuning Expression for the corresponding baseImage. On detection, investigate the host and process executing the command to assist in understanding the context of the execution.
42+
- [New] FIRST-S00079 First Seen gpresult execution on host
43+
- This detection is first observed execution of gpresult on a host. This command may be used by attackers to access detailed password policy information in an enterprise environment. Vulnerability scanners and automated processes may trigger this detection. It is recommended to identify and filter these processes out using a Tuning Expression for the corresponding baseImage. On detection, investigate the host and process executing the command to assist in understanding the context of the execution.
44+
- [New] FIRST-S00067 Okta - First Seen Client ID/ASN combo in successful OIDC token grant
45+
- This signal looks for a new Client ID value ( mapped to the `user_username` field ) and ASN combination being issued an OIDC token, excluding the Okta Browser Plugin and Okta Dashboard. Use the Okta admin portal and look at the "Applications" section to cross-reference the Client ID value. Ensure that the IP address that is requesting the token is known and that this operation is expected and authorized.
46+
- [New] FIRST-S00068 Okta - First Seen User Accessing Admin Application
47+
- A user not seen since the baseline period has accessed the Okta admin application. Ensure that this user is expected to perform Okta administrative activities. If this user is expected and authroized, consider adding the user to the "Okta_Admins" match list to exclude the user from this signal.
48+
- [New] FIRST-S00066 Okta - First Seen User Requesting Report
49+
- This signal looks for a first seen user requesting an export of an Okta report. The various Okta report types can be found in the “Reports” section of the Okta administrative portal and can include various report types such as application password help, MFA usage, and reports around user access. During the October 2023 Okta incident, threat actors downloaded reports from Okta portals to extract information regarding user contact information. Ensure that the user that is requesting such reports is authorized and that this activity is expected. If a suspicious report generation event occurs, look at the “target” element within the event to gain more detailed information as to the type of report being generated and exported.
50+
- [New] OUTLIER-S00018 Okta - Outlier in ASNs Used to Access Applications
51+
- This signal looks for an outlier in the number of distinct autonomous system numbers (ASNs) that a particular user utilizes to access Okta resources within an hour time period. This is designed to alert on various forms of token or credential theft as well as general Okta session anomalies.
52+
- [New] OUTLIER-S00017 Okta - Outlier in MFA Attempts Denied by User
53+
- This signal builds an hourly baseline of MFA denied events per user and triggers when an outlier in the number of denied attempts is detected. This signal is designed to trigger on MFA-fatigue type attacks. If false positives are detected, consider excluding certain users from the alerting logic or raise the minimum count value within the rule configuration.
54+
- [New] OUTLIER-S00016 Okta - Outlier in OIDC token request failures
55+
- This signal looks for an outlier in the number of OpenID Connect (OIDC) token request failures for an Okta client application. Use the Okta admin portal to correlate the Client ID (mapped to `user_username`) to determine what application is being targeted. Pivot off the Client ID and IP address values to examine the raw Okta events in order to ensure that this activity is planned and expected. This activity can occur during setup and development of Okta applications and integrations.
56+
- [New] OUTLIER-S00013 Outlier in Data Outbound Per Day by Admin or Sensitive Device
57+
- A larger than typical amount of data has been observed being sent outbound from a Sensitive Device or an Admin user. It is recommended to investigate the device associated with this IP, the Internet destinations, and traffic associated with this anomalous behavior. A normalized record search for the source IP and external network traffic within the period of time of the detection will help identify suspicious activity. This rule is dependent on the Match Lists "domain_controllers" and "admin_usernames" being populated with the sensitive device IPs and admin usernames. Additionally, Entity Tagging offers a similar and extensible alternative to Match Lists. To add more sensitive Match Lists or Entity Tagging, use Rule Tuning Expressions. For further customization, consider adjusting the severity of this rule and/or using entity severity as needed to increase the severity of this rule.
58+
- [New] OUTLIER-S00015 Outlier in Data Outbound Per Hour by Admin or Sensitive Device
59+
- A larger than typical amount of data has been observed being sent outbound from a Sensitive Device or an Admin user. It is recommended to investigate the device associated with this IP, the Internet destinations, and traffic associated with this anomalous behavior. A normalized record search for the source IP and external network traffic within the period of time of the detection will help identify suspicious activity. This rule is dependent on the Match Lists "domain_controllers" and "admin_usernames" being populated with the sensitive device IPs and admin usernames. Additionally, Entity Tagging offers a similar and extensible alternative to Match Lists. To add more sensitive Match Lists or Entity Tagging, use Rule Tuning Expressions. For further customization, consider adjusting the severity of this rule and/or using entity severity as needed to increase the severity of this rule.
60+
- [Updated] THRESHOLD-S00095 Password Attack
61+
- Added NULL exclusion to rule expression to prevent false-positives stemming from NULL IP or hostnames.
62+
- [Updated] MATCH-S00556 Outbound Data Transfer Protocol Over Non-standard Port
63+
- Added missing parenthesis to match expression.
64+
65+
### Log Mappers
66+
- [New] AWS - Application Load Balancer - Connection
67+
- [New] Automox - Audit logs
68+
- [New] Automox - Audit logs - Logon
69+
- [New] Automox - Event logs
70+
- [New] Digital Guardian ARC - Audit Events
71+
- [New] Digital Guardian ARC - Mail
72+
- [New] Digital Guardian ARC - Network
73+
- [New] Digital Guardian ARC - User Login|Logoff
74+
- [New] Watchguard Fireware - Firewall
75+
- [New] Watchguard Fireware - http/https-proxy
76+
77+
### Parsers
78+
- [New] /Parsers/System/Automox/Automox
79+
- [New] /Parsers/System/Digital Guardian/Digital Guardian ARC
80+
- [New] /Parsers/System/WatchGuard/WatchGuard Fireware
81+
- [Updated] /Parsers/System/AWS/AWS ALB
82+
- Updated parser to support AWS Application Load Balancer Connection logs
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
title: November 8, 2024 - Application Update
3+
keywords:
4+
- cloud siem
5+
image: https://help.sumologic.com/img/sumo-square.png
6+
hide_table_of_contents: true
7+
---
8+
9+
### Cloud SIEM network sensor end-of-life
10+
11+
The Sumo Logic Product Team is discontinuing our on-premise network sensor feature for Sumo Logic Cloud SIEM. The feature will no longer receive updates as of November 8, 2024, and support ends as of April 30, 2025. We fully support a customer or partner managed [Zeek network sensor](/docs/cse/sensors/ingest-zeek-logs/) as a data source for our Cloud SIEM product that will provide equivalent monitoring of your network.
12+
13+
Learn more [here](/docs/cse/sensors/network-sensor-end-of-life/).

blog-service/2024-10-14-manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ We're excited to announce that when you create a role, you can select **Index Ac
1717
This feature was [previously only available to participants in our beta program](/release-notes-service/2023/12/31/#october-27-2023-manage-account). It is now available for general use.
1818

1919
:::note
20-
These changes are rolling out across deployments incrementally and will be available on all deployments by November 15, 2024.
20+
These changes are rolling out across deployments incrementally and will be available on all deployments by December 16, 2024.
2121
:::
2222

2323
[Learn more](/docs/manage/users-roles/roles/create-manage-roles/#create-a-role).

blog-service/2024-10-30-apps.md

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
title: App Guides - October Release (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- apps
6+
- releases-notes
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
### New release
15+
16+
We’re excited to announce the release of new Azure Database for MySQL, Azure App Service Plan, Amazon Bedrock, Amazon OpenSearch, and Cosmos DB for NoSQL apps for Sumo Logic.
17+
18+
- **Azure Database for MySQL**. Azure Database for MySQL is a relational database service in the Microsoft cloud based on the MySQL Community Edition database engine. This integration helps in identifying slow queries, tracking database-level activity, including connection, administration, data definition language (DDL), and data manipulation language (DML) events. [Learn more](/docs/integrations/microsoft-azure/azure-database-for-mysql).
19+
- **Azure App Service Plan**. Azure App Service Plan defines a set of compute resources for a app service to run. This integration helps in monitoring memory, CPU, incoming and outgoing bandwidth, number of sockets and their states across all the instances of the plan. [Learn more](/docs/integrations/microsoft-azure/azure-app-service-plan).
20+
- **Amazon Bedrock**. Amazon Bedrock is a fully managed service that offers a choice of high-performing foundation models (FMs) from leading AI companies like AI21 Labs, Anthropic, Cohere, Meta, Mistral AI, Stability AI, and Amazon through a single API, along with a broad set of capabilities you need to build generative AI applications with security, privacy, and responsible AI. [Learn more](/docs/integrations/amazon-aws/amazon-bedrock).
21+
- **Amazon OpenSearch**. Amazon OpenSearch Service is a managed service that makes it easy to deploy, operate, and scale OpenSearch clusters in the AWS Cloud. An OpenSearch Service domain is synonymous with an OpenSearch cluster. Domains are clusters with the settings, instance types, instance counts, and storage resources that you specify. [Learn more](/docs/integrations/amazon-aws/amazon-opensearch).
22+
- **Azure Cosmos DB for NoSQL**. Azure Cosmos DB is a fully managed NoSQL and relational database for modern app development offering single-digit millisecond response times, automatic and instant scalability, along with guaranteed speed at any scale. This integration helps in monitoring the overall performance, failures, capacity, and operational health of all your Azure Cosmos DB resources. [Learn more](/docs/integrations/microsoft-azure/azure-cosmos-db).
23+
24+
### Enhancements
25+
26+
We're excited to announce the release of below listed enhancements for the Sumo Logic apps:
27+
28+
- **Added Monitors in OpenTelemetry apps**. ActiveMQ - OpenTelemetry, Docker - OpenTelemetry, Elasticsearch - OpenTelemetry, JMX - OpenTelemetry, Kafka - OpenTelemetry, Linux - OpenTelemetry, macOS - OpenTelemetry, MySQL - OpenTelemetry, Nginx - OpenTelemetry, PostgreSQL - OpenTelemetry, SQL Server - OpenTelemetry, Windows 2012+ - OpenTelemetry apps are updated with new monitors.
29+
- **Classic Apps to Next-Gen Apps Migration**. [Tracing - Application Services Health](/docs/apm/traces/tracing-dashboards/) and [Real User Monitoring](/docs/apm/real-user-monitoring/dashboards/) apps are migrated from [Classic Apps (Legacy)](/docs/get-started/apps-integrations/#classic-apps-legacy) to [Next-Gen Apps](/docs/get-started/apps-integrations/#next-gen-apps).
30+
- **Oracle - OpenTelemetry**. Updated the collection process to fetch metrics and added new **Oracle - Performance Details** metrics based dashboards. These new dashboards will help monitor session, process, and transaction count of Oracle Database instance.
31+
32+
### Bug Fix
33+
34+
Minor *query* fixes in the below [Classic Apps (Legacy)](/docs/get-started/apps-integrations/#classic-apps-legacy):
35+
36+
- Amazon VPC Flow - Cloud Security Monitoring and Analytics
37+
- PCI Compliance for AWS CloudTrai
38+

blog-service/2024-11-05-alerts.md

Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
title: AI-Driven Alerts for Metrics Anomalies (Monitors)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- metrics
6+
- monitors
7+
- alerts
8+
- anomalies
9+
- ai
10+
hide_table_of_contents: true
11+
---
12+
13+
import useBaseUrl from '@docusaurus/useBaseUrl';
14+
15+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
16+
17+
We're excited to announce the general availability of AI-driven alerts for metrics anomalies, extending our AI-driven alerting capabilities to include metrics-based monitors. This new feature aims to reduce alert fatigue and accelerate incident resolution through the use of automated playbooks. [Learn more](/docs/alerts/monitors/create-monitor).
18+
19+
### Key features
20+
21+
* **Advanced anomaly detection**. Leverages 30 days of historical metrics data to establish baselines and identify critical anomalies.
22+
* **Customizable detection**. Allows configuration based on specific criteria, such as detecting multiple anomalies within a defined time window.
23+
* **Playbook integration**. Streamlines diagnosis and recovery by automating responses through integrated playbooks.

blog-service/2024-11-08-apps.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: Kandji (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- kandji
6+
- apps
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We're excited to introduce the new Kandji app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Kandji source to collect threat events and device events, thereby maintaining a secure Apple device environment and strengthening organizational security posture.
15+
16+
Explore our technical documentation [here](/docs/integrations/saas-cloud/kandji/) to learn how to set up and use the Kandji app for Sumo Logic.

blog-service/2024-11-08-search.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: Deprecation of Classic Visualization (Search)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- classic-visualization
6+
- search
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
In May 2024, we introduced [new visualization charts](/docs/search/get-started-with-search/search-basics/chart-search-results/#new-visualization) for all the Log Search queries, with which you can customize each chart by modifying the available settings and obtain a unified experience across the Sumo Logic platforms.
15+
16+
**Effective November 22, 2024**, the **Switch to Classic Visualization** button will be removed, and the Classic Visualization view will no longer be available. By default, all your charts will automatically display in the New Visualization style.

0 commit comments

Comments
 (0)