You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*[NEW][ThreatDown Oneview](/docs/platform-services/automation-service/app-central/integrations/threatdown-oneview/). The ThreatDown OneView integration has been built from scratch to facilitate seamless security operations management.
20
+
*[NEW][Atlassian Jira Cloud](/docs/platform-services/automation-service/app-central/integrations/atlassian-jira-cloud/). The Atlassian Jira Cloud integration has been developed from the ground up to streamline issue tracking and project management.
21
+
*[UPDATED][AWS WAF](/docs/platform-services/automation-service/app-central/integrations/aws-waf/). Added a new Update IP Set action in the AWS WAF integration that allows users to update an existing IP set.
22
+
23
+
#### Platform
24
+
25
+
##### Playbooks
26
+
27
+
* Improved the user experience in the node popup when loading dynamic fields.
28
+
* Added a confirmation dialog to alert users about pre-existing playbook drafts to avoid accidental overwriting while editing playbooks.
29
+
* Implemented an alert popup to prevent accidental loss of unsaved changes when closing a node popup.
30
+
* Added audit logs for failed nodes due to errors or exceptions during playbook execution.
31
+
32
+
### Bug fixes
33
+
34
+
#### General
35
+
36
+
* Fixed a session timeout issue when the user is active in Automation Service, but inactive in Sumo Logic Log Analytics.
37
+
* Fixed cursor positioning issue while typing in text areas.
38
+
39
+
#### Integrations
40
+
41
+
* Resolved a next page token and pageSize related issues in the List Permissions action of the [Google Drive](/docs/platform-services/automation-service/app-central/integrations/google-drive/) integration.
42
+
* Added a new `impersonate_user` field in List Permission and Delete Permission actions, allowing actions to be performed on a user's behalf.
Copy file name to clipboardExpand all lines: blog-service/2024/12-31.md
-4Lines changed: 0 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -425,10 +425,6 @@ We're excited to announce that when you create a role, you can select **Index Ac
425
425
426
426
This feature was [previously only available to participants in our beta program](/release-notes-service/2023/12/31/#october-27-2023-manage-account). It is now available for general use.
427
427
428
-
:::note
429
-
These changes are rolling out across deployments incrementally and will be available on all deployments by March 14, 2025.
We're excited to introduce the new Sumo Collection app for Sumo Logic. By leveraging this app, you can get insights into the health and status of Sumo Logic collectors and sources, allowing you to effectively manage and monitor collectors and sources within Sumo Logic. [Learn more](/docs/integrations/saas-cloud/sumo-collection).
Copy file name to clipboardExpand all lines: docs/alerts/scheduled-searches/generate-cse-signals.md
+23-3Lines changed: 23 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,8 @@ For a more detailed description of the options you can configure for a scheduled
15
15
16
16
## Requirements for the search query
17
17
18
+
When you [create a scheduled search](/docs/alerts/scheduled-searches/schedule-search/) to generate signals in Cloud SIEM, you start by creating a search query.
19
+
18
20
This section describes the requirements for your scheduled search, which include a minimum set of fields to be returned, and renaming message fields as necessary to match attribute names in the selected Cloud SIEM record type schema.
19
21
20
22
### Required fields
@@ -42,7 +44,6 @@ enable signal generation:
42
44
If the `stage` field contains a Tactic that isn't in the MITRE ATT&CK framework, a signal will not be generated, but a record will be.
43
45
:::
44
46
* At least one entity field:
45
-
46
47
*`device_ip`
47
48
*`device_mac`
48
49
*`device_natIp`
@@ -56,16 +57,35 @@ enable signal generation:
56
57
*`srcDevice_ip`
57
58
*`srcDevice_mac`
58
59
*`srcDevice_natIp`
59
-
*`user_username`
60
+
*`user_username`
60
61
61
62
### Renaming message fields
62
63
63
64
When you configure a Scheduled Search to create Cloud SIEM signals, you are prompted to select a [Cloud SIEM record type](/docs/cse/schema/cse-record-types/). The fields returned by your search must match an attribute in the record type you select. A field whose name does not match a Cloud SIEM attribute will not be populated in the record created from the Schedule Search results. For more about Cloud SIEM attribute names, see [Attributes You Can Map to Records](/docs/cse/schema/attributes-map-to-records/).
64
65
66
+
### Example
67
+
68
+
Let's suppose that `user_username` is the entity field we want to use, and its value needs to be mapped to `actor.email`. Then you need to add the following line to the query: `actor.email as user_username`.
69
+
70
+
And because the final output of this query is an aggregate, and Cloud SIEM signals expect `normalizedfield`, `stage`, and `entity`, we need need to add those in the `count` expression.
1. After creating and saving your search, click the save icon.<br/><img src={useBaseUrl('img/alerts/save-as.png')} alt="Save the search" style={{border: '1px solid gray'}} width="800"/>
68
-
1. The **Save Item** popup appears.<br/><img src={useBaseUrl('img/alerts/save-item.png')} alt="Save as scheduled search" width="500"/>
88
+
1. The **Save Item** popup appears.<br/><img src={useBaseUrl('img/alerts/save-item.png')} alt="Save as scheduled search" style={{border: '1px solid gray'}} width="500"/>
69
89
:::note
70
90
The name of your scheduled search will appear as the signal name in Cloud SIEM.
Copy file name to clipboardExpand all lines: docs/alerts/webhook-connections/set-up-webhook-connections.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,7 +47,7 @@ To set up a webhook connection:
47
47
1. (Optional) Enter a **Description** for the connection.
48
48
1. Enter the **URL** for the endpoint. This is generated from the remote system’s API.
49
49
:::important
50
-
Only HTTPS (`port 443`) and HTTP (`port 80`) URLs are supported.
50
+
HTTPS URLs can use any port without restriction, while HTTP URLs are limited to only port 80.
51
51
:::
52
52
1. (Optional) If the third-party system requires an **Authorization Header**, enter it here. For more information, see [Example Authorization Header](#example-authorization-header) below.
53
53
1. (Optional) **Custom Headers**, enter up to five comma separated key-value pairs.
Copy file name to clipboardExpand all lines: docs/contributing/remove-doc.md
+9-8Lines changed: 9 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,12 +1,12 @@
1
1
---
2
2
id: remove-doc
3
-
title: Remove a Doc
4
-
description: Learn how to properly remove a Sumo Logic doc.
3
+
title: Move or Remove a Doc
4
+
description: Learn how to properly move or remove a Sumo Logic doc.
5
5
---
6
6
7
7
import useBaseUrl from '@docusaurus/useBaseUrl';
8
8
9
-
When you delete a doc, its URL is also deleted. Visiting the old URL will return a `404 - Page Not Found` error, which negatively impacts customer experience and can damage our SEO.
9
+
When you move a doc or remove it altogether, that deletes its URL. Visiting the old URL will return a `404 - Page Not Found` error, which negatively impacts customer experience and can damage our SEO.
10
10
11
11
To prevent this, create a 301 redirect. Follow these steps to ensure a smooth transition and maintain the health of our docs site.
12
12
@@ -31,11 +31,12 @@ As an example, let's say there are two docs called **Nginx App** and **Nginx (Le
31
31
Ensure any internal links pointing to the deleted doc are updated to the new URL.
32
32
33
33
1. In your GitHub authoring tool, run a search for the URL you're removing. For example, if the legacy URL appears in other documents, replace all instances with the new URL.<br/><img src={useBaseUrl('img/contributing/old-url.png')} alt="Screenshot of a 'Find All' search for the URL to be removed" />
34
-
1. Check with a Sumo Logic subject matter expert to confirm that you can replace all with the new URL.
35
-
36
-
:::warning
37
-
Never do a "Find All > Replace All", as this can break unrelated items like image paths. Replace each URL on a one-by-one basis.
38
-
:::
34
+
:::warning
35
+
Never do a Find All > Replace All, as this can break unrelated items like image paths. Replace each URL on a one-by-one basis.
36
+
:::
37
+
1. If applicable:
38
+
* Remove from its parent index.md hub page.
39
+
* Remove from [Product List](/docs/integrations/product-list/).
Copy file name to clipboardExpand all lines: docs/cse/administration/create-custom-threat-intel-source.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ You can search using the same functionality available for other Cloud SIEM searc
31
31
32
32
When Cloud SIEM encounters an indicator from a threat source in an incoming record, it adds relevant information to the record. Because threat intelligence information is persisted within records, you can reference it downstream in both rules and search. The built-in rules that come with Cloud SIEM automatically create a signal for records that have been enriched in this way.
33
33
34
-
Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a rule tuning expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Threat Intelligence Indicators in Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/).
34
+
Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a rule tuning expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Find Threats with Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/).
Copy file name to clipboardExpand all lines: docs/cse/integrations/configuring-threatq-source-in-cse.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ To do so, [ingest threat intelligence indicators](/docs/security/threat-intellig
15
15
16
16
## Looking for ThreatQ indicators using Cloud SIEM rules
17
17
18
-
Threat Intelligence sources are used at the time of record ingestion. When a record is ingested, Cloud SIEM determines whether any of the fields in the record exist in any of your Threat Intelligence sources. When a record contains a value that matches an entry in one or more Threat Intelligence sources, the `hasThreatMatch` Cloud SIEM rules function searches incoming records in Cloud SIEM for matches to threat intelligence indicators. For more information, see [Threat Intelligence Indicators in Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/).
18
+
Threat Intelligence sources are used at the time of record ingestion. When a record is ingested, Cloud SIEM determines whether any of the fields in the record exist in any of your Threat Intelligence sources. When a record contains a value that matches an entry in one or more Threat Intelligence sources, the `hasThreatMatch` Cloud SIEM rules function searches incoming records in Cloud SIEM for matches to threat intelligence indicators. For more information, see [Find Threats with Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/).
19
19
-->
20
20
21
21
This topic has information about configuring a ThreatQ source in Cloud SIEM.
0 commit comments