Skip to content

Commit 1ce3a08

Browse files
committed
Updates to Cloud SIEM threat intel article
1 parent 48ea9b8 commit 1ce3a08

File tree

1 file changed

+9
-3
lines changed

1 file changed

+9
-3
lines changed

docs/cse/administration/create-custom-threat-intel-source.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -10,15 +10,19 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1010
<!-- For threat intel. Put this back once we support cat with the threatlookup search operator:
1111
1212
:::info
13-
This article describes functionality in Cloud SIEM that will be deprecated at a future time. **You can no longer add custom intelligence sources in Cloud SIEM**. To create new sources, use our new threat intelligence indicators framework. For more information, see [Custom threat intelligence sources in Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/#custom-threat-intelligence-sources-in-cloud-siem).
13+
This article describes functionality in Cloud SIEM that will be deprecated at a future time. **You can no longer add custom intelligence sources in Cloud SIEM**. To create new sources, use the Sumo Logic threat intelligence indicators framework. For more information, see [Threat Intelligence](/docs/security/threat-intelligence/).
1414
:::
1515
-->
1616

1717
This topic has information about setting up a *custom threat intelligence source* in Cloud SIEM, which is a threat intelligence list that you can populate manually, as opposed to using an automatic feed. 
1818

1919
You can set up and populate custom threat intelligence sources interactively from the Cloud SIEM UI, by uploading a .csv file, or using Cloud SIEM APIs. You can populate the sources with IP addresses, hostnames, URLs, email addresses, and file hashes.
2020

21-
### How Cloud SIEM uses indicators
21+
:::note
22+
You can also use the Sumo Logic threat intelligence framework to add sources. See [Threat Intelligence](/docs/security/threat-intelligence/).
23+
:::
24+
25+
## How Cloud SIEM uses indicators
2226

2327
When Cloud SIEM encounters an indicator from your threat source in an incoming record it adds relevant information to the record. Because threat intelligence
2428
information is persisted within records, you can reference it downstream in both rules and search. The built-in rules that come with Cloud SIEM automatically create a signal for records that have been enriched in
@@ -27,7 +31,7 @@ this way.
2731
Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a Rule Tuning Expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Threat Intelligence](/docs/cse/rules/about-cse-rules/#threat-intelligence) in the
2832
*About Cloud SIEM Rules* topic.
2933

30-
### Create a threat intelligence source from Cloud SIEM UI
34+
## Create a threat intelligence source from Cloud SIEM UI
3135

3236
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Threat Intelligence**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**.
3337
1. Click **Add Source** on the **Threat Intelligence** page.
@@ -37,6 +41,8 @@ Rule authors can also write rules that look for threat intelligence information
3741

3842
Your new source should now appear on the **Threat Intelligence** page.
3943

44+
## Add indicators
45+
4046
### Enter indicators manually
4147

4248
1. On the **Threat Intelligence** page, click the name of the source you want to update.

0 commit comments

Comments
 (0)