Skip to content

Commit 2221636

Browse files
authored
Merge branch 'main' into chvik/berry
2 parents b681288 + 0aa5c4f commit 2221636

File tree

25 files changed

+293
-85
lines changed

25 files changed

+293
-85
lines changed

blog-cse/2024/12-31.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,8 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1616

1717
This is an archive of 2024 Cloud SIEM release notes. To view the full archive, [click here](/release-notes-cse/archive).
1818

19+
<!--truncate-->
20+
1921
---
2022
### December 20, 2024 - Content Release
2123

@@ -852,7 +854,7 @@ Other changes are enumerated below.
852854

853855
This release reverts a change to our AWS CloudTrail default (catch all) mapper for how `user_username` is mapped. This is being reverted due to reports of breaking rule tuning and missing user context for some `AssumedRole` events.
854856

855-
AWS `AssumedRole` events can contain service and user role assumptions. Oftentimes service role assumptions will contain a dynamic session identifier instead of a static user identifer which contains the originating identity. Prior to the change we are now reverting, this was causing certain services to generate user entities from these sessions, creating false positives. This behavior changed with the [August 5th, 2024 content release](/release-notes-cse/#august-5-2024---content-release) to handle role assumptions to instead map the role as user to prevent false positives from dynamic service sessions. While this decreased the number of false positives from dynamic service sessions, it also eliminated visibility into user role assumptions, creating potential for false negatives.
857+
AWS `AssumedRole` events can contain service and user role assumptions. Oftentimes service role assumptions will contain a dynamic session identifier instead of a static user identifer which contains the originating identity. Prior to the change we are now reverting, this was causing certain services to generate user entities from these sessions, creating false positives. This behavior changed with the [August 5th, 2024 content release](#august-5-2024---content-release) to handle role assumptions to instead map the role as user to prevent false positives from dynamic service sessions. While this decreased the number of false positives from dynamic service sessions, it also eliminated visibility into user role assumptions, creating potential for false negatives.
856858

857859
AWS best practices suggest defining `sourceIdentity` to allow for the originating user for a role assumption to be identifiable. This is the best path to avoid false positive generation, as our mapper will favor `sourceIdentity` if it is present in CloudTrail logs. If it is not present, then `userIdentity.arn` will be used and the `resource-id` will be mapped to `user_username`, creating potential for false positives from dynamic session identifiers. See [Viewing source identity in CloudTrail](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html#id_credentials_temp_control-access_monitor-ct) in the AWS documentation for more information.
858860

blog-cse/2025-01-14-content.md

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
---
2+
title: January 14, 2025 - Content Release
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- rules
6+
- log mappers
7+
- parsers
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
<a href="https://help.sumologic.com/release-notes-cse/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
14+
15+
This content release includes:
16+
- Parsing and mapping support for Azure DevOps Auditing via EventHubs, and Pfsense Firewall.
17+
- Parsing and mapping additions and updates for Cisco ISE, Cloudflare, Check Point Firewall, and Linux OS Syslog.
18+
19+
:::note
20+
In two weeks, MATCH-S00604 "OneLogin - API Credentials - Key Used from Untrusted Location" will be deleted from the out-of-the-box Cloud SIEM rules due to unmanageable deny list logic and low adoption. To retain this rule, a duplicate must be made prior to the deletion.
21+
:::
22+
23+
## Log Mappers
24+
- [New] Azure DevOps Auditing Catch All
25+
- [New] Check Point Application Control URL Filtering
26+
- [New] Cisco ISE Radius Diagnostics
27+
- [New] Linux OS Syslog - KRB5 Child - Authentication Failure
28+
- [New] Linux OS Syslog - Process systemd - Systemd Session
29+
- [New] Linux OS Syslog - Process systemd - Systemd Session Scope
30+
- [New] Linux OS Syslog - Process systemd - session logout
31+
- [New] Pfsense Firewall filterlog
32+
- [New] Pfsense Firewall nginx
33+
- [New] Pfsense Firewall openvpn Authentication
34+
- [New] Pfsense Firewall openvpn_peer_info|openvpn_error|php_log|sshguard|sshd_log
35+
- [New] Pfsense Firewall openvpn_server_connected|openvpn_server_disconnected|cron_log
36+
- [Updated] Cisco ISE Authentication Failure
37+
- Adds `normalizedSeverity` mapping
38+
- [Updated] Cisco ISE Authentication Success
39+
- Adds `normalizedSeverity` mapping
40+
- [Updated] Cloudflare - Logpush
41+
- Adds mapping for `dns_query`, `http_hostname`, `http_response_contentLength`, `http_response_contentType`, and an alternative value for `ipProtocol`.
42+
- [Updated] Linux OS Syslog - Process sshd - SSH Session Closed|disconnect
43+
- Adds mapping for `normalizedActio`n
44+
- [Updated] Linux OS Syslog - Process systemd - Systemd Session Start and Systemd File Configuration
45+
- Added support for additional events and mapping of `file_path`
46+
47+
## Parsers
48+
- [New] /Parsers/System/Pfsense/Pfsense Firewall
49+
- [Updated] /Parsers/System/Check Point/Check Point Firewall JSON
50+
- [Updated] /Parsers/System/Cisco/Cisco ISE
51+
- [Updated] /Parsers/System/Cloudflare/Cloudflare Logpush
52+
- [Updated] /Parsers/System/Linux/Linux OS Syslog
53+
- [Updated] /Parsers/System/Linux/Shared/Linux Shared Syslog Headers
54+
- [Updated] /Parsers/System/Linux/Shared/Linux Shared Syslog Headers

blog-csoar/2024/12-31.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1414

1515
This is an archive of 2024 Cloud SOAR release notes. To view the full archive, [click here](/release-notes-csoar/archive).
1616

17+
<!--truncate-->
18+
1719
---
1820
### December 31, 2024 - Application Update
1921

@@ -312,7 +314,7 @@ This release introduces three new integrations, as well as several updates.
312314
---
313315
### March 12, 2024 - Content Release
314316

315-
Our Cloud SOAR [application update](/release-notes-csoar/#march-12-2024---application-update) features an important upgrade to Python 3.12 for our Lambda functions. This enhancement is part of our ongoing commitment to security, performance, and the latest technological standards.
317+
Our Cloud SOAR [application update](#march-12-2024---application-update) features an important upgrade to Python 3.12 for our Lambda functions. This enhancement is part of our ongoing commitment to security, performance, and the latest technological standards.
316318

317319
The Python upgrade impacts a total of 38 integrations. These integrations will require updates to ensure compatibility with the new Python version.
318320

@@ -369,7 +371,7 @@ We strongly encourage all users to review the provided documentation and prepare
369371
### March 12, 2024 - Application Update
370372

371373
#### Changes and Enhancements
372-
* Python version updated. If you experience any issues, refer to our [content release note](/release-notes-csoar/#march-12-2024---content-release).
374+
* Python version updated. If you experience any issues, refer to our [content release note](#march-12-2024---content-release).
373375

374376
##### Cloud SOAR
375377
* Playbooks: Test feature now permits you to use internal Incident ID.

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1887,6 +1887,7 @@
18871887
"/cid/2008": "/docs/send-data/installed-collectors/linux",
18881888
"/cid/2009": "/docs/search/behavior-insights/logcompare",
18891889
"/cid/2010": "/docs/search/search-query-language/search-operators/if",
1890+
"/cid/2110": "/docs/search/search-query-language/search-operators/macro",
18901891
"/cid/2011": "/docs/get-started/help",
18911892
"/cid/2012": "/docs/manage/security/enable-support-account",
18921893
"/cid/2013": "/docs/send-data/installed-collectors/sources/windows-active-directory-inventory-source",

docs/api/search-job.md

Lines changed: 20 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -343,6 +343,7 @@ This is the formatted result document:
343343

344344
```json
345345
{
346+
"warning":"",
346347
"state":"DONE GATHERING RESULTS",
347348
"messageCount":90,
348349
"histogramBuckets":[
@@ -356,7 +357,6 @@ This is the formatted result document:
356357
"count":1,
357358
"startTimestamp":1359405480000
358359
},
359-
...
360360
{
361361
"length":60000,
362362
"count":1,
@@ -367,7 +367,10 @@ This is the formatted result document:
367367
],
368368
"pendingWarnings":[
369369
],
370-
"recordCount":1
370+
"recordCount":1,
371+
"usageDetails":{
372+
"dataScannedInBytes":0
373+
}
371374
}
372375
```
373376

@@ -385,12 +388,16 @@ Notice that the state of the sample search job is DONE GATHERING RESULTS. The fo
385388

386389
#### More about results
387390

391+
The **warnings** value contains the detailed information about the warning while obtaining the current status of a search job.
392+
388393
The **messageCount** and **recordCount** values indicate the number of messages and records found or produced so far. Messages are raw log messages and records are aggregated data.
389394

390395
For queries that do not contain an aggregation operator, only messages are returned. If the query contains an aggregation, for example, **count by _sourceCategory**, then the messages are returned along with records resulting from the aggregation (similar to what a SQL database would return).
391396

392397
The **pendingErrors** and **pendingWarnings** values contain any pending error or warning strings that have accumulated since the last time the status was requested.
393398

399+
The **usageDetails** value contains the amount of data scanned in bytes details.
400+
394401
Errors and warnings are not cumulative. If you need to retain the errors and warnings, store them locally.
395402

396403
The **histogramBuckets** value returns a list of histogram buckets. A histogram bucket is defined by its timestamp, which is the start timestamp (in milliseconds) of the bucket, and a length, also in milliseconds, that expressed the width of the bucket. The **timestampplus** length is the end timestamp of the bucket, so the count is the number of messages in the bucket.
@@ -468,6 +475,7 @@ curl -b cookies.txt -c cookies.txt -H 'Accept: application/json'
468475

469476
```json
470477
{
478+
"warning": "",
471479
"fields":[
472480
{
473481
"name":"_messageid",
@@ -595,6 +603,7 @@ curl -b cookies.txt -c cookies.txt -H 'Accept: application/json'
595603

596604
The result contains two lists, **fields** and **messages**.
597605

606+
* ***warnings** contains the detailed information about the warning while paging through the messages found by a search job.
598607
* **fields** contains a list of all the fields defined for each of the messages returned. For each field, the field name and field type are returned.
599608
* **messages** contains a list of maps, one map per message. Each **map** maps from the fields described in the fields list to the actual value for the message.
600609

@@ -666,6 +675,7 @@ This is the formatted result document:
666675

667676
```json
668677
{
678+
"warning": "",
669679
"fields":[
670680
{
671681
"name":"_sourceCategory",
@@ -691,6 +701,8 @@ This is the formatted result document:
691701

692702
The returned document is similar to the one returned for the message paging API. The schema of the records returned is described by the list of fields as part of the fields element. The records themselves are a list of maps.
693703

704+
The ***warnings** contains the detailed information about the warning while paging through the records found by a Search Job.
705+
694706
</details>
695707

696708
## POST Methods
@@ -828,10 +840,12 @@ Example error response:
828840

829841
```json
830842
{
831-
"status" : 400,
832-
"id" : "IUUQI-DGH5I-TJ045",
833-
"code" : "searchjob.invalid.timestamp.from",
834-
"message" : "The 'from' field contains an invalid time."
843+
"warning": "A 404 status (Page Not Found) on a follow-up request may be due to a cookie not accompanying the request",
844+
"id": "IUUQI-DGH5I-TJ045",
845+
"link": {
846+
"rel": "self",
847+
"href": "https://api.sumologic.com/api/v1/search/jobs/IUUQI-DGH5I-TJ045"
848+
}
835849
}
836850
```
837851

docs/integrations/saas-cloud/cisco-umbrella.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -56,9 +56,16 @@ The Cisco Umbrella app offers logging to Amazon S3 as it has the ability to uplo
5656

5757
<img src={useBaseUrl('img/integrations/saas-cloud/options-aws-s3.png')} alt="options aws s3 cisco" width="750"/>
5858

59-
:::note
60-
If you're collecting from a Cisco Umbrella bucket, SNS Subscription Endpoint is not supported. For more information, see important note on using the [Sumo Logic Amazon S3 source for the Cisco-Managed S3 bucket](/docs/send-data/hosted-collectors/amazon-aws/aws-s3-source/#cisco-umbrella)
61-
:::
59+
Collection from a Cisco-managed S3 bucket has the following limitations:
60+
61+
* AWS versioned APIs are not supported. The **Use AWS versioned APIs** setting on the Source must be disabled.
62+
* S3 Event Notifications Integration is not supported, so you cannot use an SNS subscription endpoint.
63+
* Access must be provided with an Access ID and Key. Role-based access is not supported.
64+
* Use a prefix in the path expression so it doesn't point to the root directory.
65+
* Ensure that your path expression ends in `/*`. Otherwise, you will get a ListBucket error. For example:
66+
* Bucket Name: `cisco-managed-us-east-1`
67+
* Path Expression: `987654321_12e34c..../*`
68+
6269

6370
By having all your logs uploaded to an S3 bucket, you can then download logs automatically to keep in perpetuity in backup storage. Or, ingest the logs through your SIEM or another security tool to determine if any security events in these Umbrella logs coincide with events in other security tools.
6471

@@ -99,4 +106,4 @@ import AppUpdate from '../../reuse/apps/app-update.md';
99106

100107
import AppUninstall from '../../reuse/apps/app-uninstall.md';
101108

102-
<AppUninstall/>
109+
<AppUninstall/>

docs/integrations/saas-cloud/jamf.md

Lines changed: 23 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -862,15 +862,33 @@ _sourceCategory="Labs/Jamf" computer_management
862862
| count as num_profiles
863863
```
864864

865-
## Set up collection
865+
## Collection configuration and app installation
866866

867-
Follow the instructions provided to set up [Cloud-to-Cloud Integration for Jamf Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/jamf-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Jamf app is properly integrated and configured to collect and analyze your Jamf data.
867+
import CollectionConfiguration from '../../reuse/apps/collection-configuration.md';
868868

869-
## Installing the Jamf app
869+
<CollectionConfiguration/>
870870

871-
import AppInstall2 from '../../reuse/apps/app-install-v2.md';
871+
:::important
872+
Use the [Cloud-to-Cloud Integration for Jamf Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/jamf-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Jamf app is properly integrated and configured to collect and analyze your Jamf data.
873+
:::
874+
875+
### Create a new collector and install the app
876+
877+
import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md';
878+
879+
<AppCollectionOPtion1/>
880+
881+
### Use an existing collector and install the app
882+
883+
import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md';
884+
885+
<AppCollectionOPtion2/>
886+
887+
### Use an existing source and install the app
888+
889+
import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md';
872890

873-
<AppInstall2/>
891+
<AppCollectionOPtion3/>
874892

875893
## Viewing the Jamf dashboards
876894

docs/integrations/saas-cloud/symantec-endpoint-security-service.md

Lines changed: 23 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -209,15 +209,33 @@ _sourceCategory="Labs/SES" device_uid
209209
| limit 10
210210
```
211211

212-
## Set up collection
212+
## Collection configuration and app installation
213213

214-
To set up the [Cloud-to-Cloud Integration for Symantec Endpoint Security Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-endpoint-security-source/), follow the instructions provided. These instructions will guide you through the process of creating a source using the Symantec Endpoint Security Source category, which you will need to use when installing the app. By following these steps, you can ensure that your Symantec Endpoint Security app is properly integrated and configured to collect and analyze your Symantec Endpoint Security data.
214+
import CollectionConfiguration from '../../reuse/apps/collection-configuration.md';
215215

216-
## Installing the Symantec Endpoint Security app
216+
<CollectionConfiguration/>
217217

218-
import AppInstall2 from '../../reuse/apps/app-install-v2.md';
218+
:::important
219+
Use the [Cloud-to-Cloud Integration for Symantec Endpoint Security Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-endpoint-security-source/) to create the source and use the same source category while installing the app. By following these steps, you can ensure that your Symantec Endpoint Security app is properly integrated and configured to collect and analyze your Symantec Endpoint Security data.
220+
:::
221+
222+
### Create a new collector and install the app
223+
224+
import AppCollectionOPtion1 from '../../reuse/apps/app-collection-option-1.md';
225+
226+
<AppCollectionOPtion1/>
227+
228+
### Use an existing collector and install the app
229+
230+
import AppCollectionOPtion2 from '../../reuse/apps/app-collection-option-2.md';
231+
232+
<AppCollectionOPtion2/>
233+
234+
### Use an existing source and install the app
235+
236+
import AppCollectionOPtion3 from '../../reuse/apps/app-collection-option-3.md';
219237

220-
<AppInstall2/>
238+
<AppCollectionOPtion3/>
221239

222240
## Viewing the Symantec Endpoint Security dashboards
223241

docs/manage/content-sharing/index.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: Content Sharing allows you to selectively share and collaborate on
66

77
import useBaseUrl from '@docusaurus/useBaseUrl';
88

9-
Content Sharing allows you to selectively share and collaborate on apps, dashboards, and searches with specific users or roles. As an Admin, you can use content sharing to transfer ownership of searches and dashboards, or to highlight key content to specific users and groups. As a user, you can now choose how widely shared your content is within your Org.
9+
Content Sharing allows you to selectively share and collaborate on apps, dashboards, and searches with specific users or roles. As an Admin, you can use content sharing to share ownership of searches and dashboards, or to highlight key content to specific users and groups. As a user, you have the flexibility to control how broadly your content is shared within your organization.
1010

1111
You can share log searches, metric searches, dashboards, and folders with a user, a role, or combinations of the two. You can edit the sharing permissions at any time and share and revoke as needed from the **Share** dialog:
1212

@@ -56,15 +56,15 @@ To share content from the left navigation bar or the Library:
5656

5757
<img src={useBaseUrl('img/content-sharing/PermissionsShare.png')} alt="Permissions share" width="600"/>
5858

59-
## Navigate Content Sharing Tabs
59+
## Navigate content sharing tabs
6060

6161
Sumo provides a few ways to navigate your content based on what you want to view.
6262

6363
import UiElements from '../../reuse/ui-elements.md';
6464

6565
<UiElements/>
6666

67-
## Available Permission Levels
67+
## Available permission levels
6868

6969
You can share your content with specific users or roles. As a best practice we recommend sharing at the search or dashboard level, or if you want to share a folder, share a subfolder. All contents of the folder are shared, you can’t exclude a particular content item in a folder as private content.
7070

docs/platform-services/automation-service/app-central/integrations/darktrace.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
77

88
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/logos/darktrace.png')} alt="darktrace" width="100"/>
99

10-
***Version: 1.6
11-
Updated: Mar 4, 2024***
10+
***Version: 1.7
11+
Updated: Jan 10, 2025***
1212

1313
Perform threat intelligence evidence gathering with Darktrace.
1414

@@ -45,3 +45,4 @@ Perform threat intelligence evidence gathering with Darktrace.
4545
+ Updated resource: Resolved bug related to integration resource
4646
* February 28, 2024 (v1.5) - Updated code for compatibility with Python 3.12
4747
* March 4, 2024 (v1.5) - Updated code for compatibility with Python 3.12
48+
* January 10, 2025 (v1.7) - Fixed timedelta related error in all actions

0 commit comments

Comments
 (0)