Skip to content

Commit 288add8

Browse files
authored
Merge branch 'main' into docs-836-left-nav-reorg
2 parents a2fe780 + f9a80bb commit 288add8

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

43 files changed

+501
-2
lines changed

blog-cse/2025-08-20-content.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
title: August 20, 2025 - Content Release
3+
image: https://help.sumologic.com/img/reuse/rss-image.jpg
4+
keywords:
5+
- log mappers
6+
hide_table_of_contents: true
7+
---
8+
9+
This content release includes new log mappers to cover additional security finding sources collected via AWS Security Hub.
10+
11+
### Log Mappers
12+
- [New] AWS GuardDuty - OCSF Finding Events
13+
- [New] AWS Inspector - OCSF Finding Events
14+
- [New] AWS Security Hub Coverage - OCSF Finding Events
15+
- [New] AWS Security Hub Exposure Detection - OCSF Finding Events
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
title: ExtraHop RevealX 360 (Apps)
3+
image: https://help.sumologic.com/img/reuse/rss-image.jpg
4+
keywords:
5+
- apps
6+
- extrahop-revealx-360
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
We're excited to introduce the new ExtraHop RevealX 360 app for Sumo Logic, which enables you to gain real-time visibility into your security hub findings data. This app can help security teams to monitor detection trends, track changes in risk levels, and gain insights into the most frequently observed MITRE techniques, top destination devices, and key targets on the network. [Learn more](/docs/integrations/webhooks/extrahop-revealx-360).

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1636,6 +1636,7 @@
16361636
"/cid/10210": "/docs/integrations/saas-cloud/proofpoint-tap",
16371637
"/cid/10202": "/docs/integrations/saas-cloud/mimecast",
16381638
"/cid/12222": "/docs/integrations/webhooks/snyk",
1639+
"/cid/12223": "/docs/integrations/webhooks/extrahop-revealx-360",
16391640
"/cid/1119": "/docs/integrations/saas-cloud/druva",
16401641
"/cid/10191": "/docs/integrations/saas-cloud/akamai-datastream",
16411642
"/cid/10194": "/docs/integrations/saas-cloud/proofpoint-on-demand",

docs/integrations/product-list/product-list-a-l.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -219,7 +219,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
219219
| <img src={useBaseUrl('img/integrations/misc/eset-logo.png')} alt="Thumbnail icon" width="75"/> | [ESET](https://www.eset.com/us/) | Cloud SIEM integration: [ESET](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/ced86de0-64e4-4e7c-ae25-fb5b3dff3cb8.md) |
220220
| <img src={useBaseUrl('img/integrations/misc/exabeam-logo.svg')} alt="Thumbnail icon" width="75"/> | [Exabeam](https://www.exabeam.com/) | Cloud SIEM integration: [Exabeam](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/9d2d799d-2d6c-4894-a46f-0cce00641bcb.md) |
221221
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/exploit-database.png')} alt="Thumbnail icon" width="75"/> | [Exploit Database](https://www.exploit-db.com/) | Automation integration: [Exploit Database](/docs/platform-services/automation-service/app-central/integrations/exploit-database/) |
222-
| <img src={useBaseUrl('img/integrations/misc/extrahop-logo.png')} alt="Thumbnail icon" width="100"/> | [ExtraHop](https://www.extrahop.com/) | Cloud SIEM integration: [Extrahop](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/a8b03e2e-7497-4104-874d-cafd03aeb4c1.md) <br/>Community app: [Sumo Logic for ExtraHop Reveal(x) 360](https://github.com/SumoLogic/sumologic-content/tree/master/ExtraHop%20Reveal(x)%20360) |
222+
| <img src={useBaseUrl('img/integrations/misc/extrahop-logo.png')} alt="Thumbnail icon" width="100"/> | [ExtraHop](https://www.extrahop.com/) | App: [ExtraHop RevealX 360](/docs/integrations/webhooks/extrahop-revealx-360) <br/>- Cloud SIEM integration: [ExtraHop](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/a8b03e2e-7497-4104-874d-cafd03aeb4c1.md) <br/>Community app: [Sumo Logic for ExtraHop Reveal(x) 360](https://github.com/SumoLogic/sumologic-content/tree/master/ExtraHop%20Reveal(x)%20360) |
223223

224224

225225
## F
Lines changed: 169 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,169 @@
1+
---
2+
id: extrahop-revealx-360
3+
title: ExtraHop RevealX 360
4+
sidebar_label: ExtraHop RevealX 360
5+
description: The ExtraHop RevealX 360 app for Sumo Logic provides security analysts with critical visibility into your ExtraHop RevealX 360 environment.
6+
---
7+
8+
import useBaseUrl from '@docusaurus/useBaseUrl';
9+
10+
<img src={useBaseUrl('img/send-data/extrahop-revealx-360-icon.png')} alt="extrahop-revealx-360-icon" width="150"/>
11+
12+
The ExtraHop RevealX 360 app offers powerful network detection and response capabilities, providing organisations with in-depth visibility into security threats throughout their environment. By centralizing detection data such as total detections, average risk scores, MITRE attack techniques, and destination device activity, this app allows security teams to quickly identify, prioritize, and investigate suspicious activities.
13+
14+
By leveraging real-time metrics and contextual threat information, the app highlights patterns of malicious behavior, high-risk destinations, and devices originating from embargoed locations. This insight helps teams monitor evolving risks, identify vulnerable assets, and understand the tactics and techniques targeting their networks.
15+
16+
With its comprehensive detection summaries, geographical breakdowns, and detailed device-level insights, the ExtraHop RevealX 360 app empowers organizations to respond effectively to emerging threats. By maintaining a clear view of their security posture, teams can act swiftly, reduce dwell time, and strengthen defenses to protect critical systems and data.
17+
18+
:::info
19+
This app includes [built-in monitors](#extrahop-revealx-360-alerts). For details on creating custom monitors, refer to [Create monitors for ExtraHop RevealX 360 app](#create-monitors-for-extrahop-revealx-360-app).
20+
:::
21+
22+
## Log types
23+
24+
The Sumo Logic app for ExtraHop RevealX 360 ingests [detection events](https://docs.extrahop.com/current/detections-create-notification-rule/) via a webhook.
25+
26+
## Sample log messages
27+
28+
```json title="Detection log"
29+
{
30+
"mitre_techniques": [
31+
{
32+
"id": "T1021",
33+
"name": "Remote Services"
34+
},
35+
{
36+
"id": "T1078",
37+
"name": "Valid Accounts"
38+
},
39+
{
40+
"id": "T1570",
41+
"name": "Lateral Tool Transfer"
42+
}
43+
],
44+
"recommended": true,
45+
"time": 1755070340426,
46+
"dst": {
47+
"type": "device",
48+
"ipaddr": null,
49+
"hostname": null,
50+
"role": "victim",
51+
"endpoint": "server",
52+
"username": null,
53+
"device": {
54+
"oid": 17550703405,
55+
"macaddr": "0E:C9:8B:2C:62:F3",
56+
"name": "pc2.i.rx.tours",
57+
"ipaddrs": [
58+
"109.248.151.179"
59+
]
60+
}
61+
},
62+
"id": 17550703402,
63+
"url": "https://envio1206.duckdns.org/extrahop/#/detections/detail/17550703402/?from=1755070340&until=1755070340&interval_type=DT",
64+
"risk_score": 65,
65+
"recommended_factors": [
66+
"top_offender"
67+
],
68+
"additional_participants": [],
69+
"categories_ids": [
70+
"sec",
71+
"sec.lateral",
72+
"sec.attack"
73+
],
74+
"properties": {},
75+
"type": "New SMB Executable File Transfer Activity",
76+
"description": "pc2.i.rx.tours received an executable file. This is the first time in several weeks ExtraHop observed this activity. Check unexpected files for malware.\nExample of a suspicious transferred file path. View more in investigation steps\n\nADMIN$\\xxFDMxx.exe\n",
77+
"src": {
78+
"type": "device",
79+
"ipaddr": "109.248.151.179",
80+
"hostname": null,
81+
"role": "offender",
82+
"endpoint": "client",
83+
"username": null,
84+
"device": {
85+
"oid": 17550703400,
86+
"macaddr": "0E:86:1F:88:60:E9",
87+
"name": "pc3.i.rx.tours"
88+
}
89+
},
90+
"title": "New SMB Executable File Transfer Activity"
91+
}
92+
```
93+
94+
## Sample queries
95+
96+
```sql title="Total Detections"
97+
_sourceCategory=Labs/extraHop
98+
| json "id", "time", "url", "src.username", "risk_score", "mitre_techniques[*].name", "dst.device.name", "dst.device.macaddr", "dst.device.ipaddrs.[*]", "dst.ipaddr", "type", "title", "description", "recommended_factors", "categories_ids", "dst.hostname", "dst.role" as id, time, url, src_username, risk_score, mitre_techniques, dst_device_name, dst_device_mac_address, dst_device_ip_list, dst_device_ip_2, type, title, description, recommended_factors, categories_ids, dst_hostname, dst_role nodrop
99+
100+
| extract field=mitre_techniques "\"?(?<techniques>[\w\s\-&.,]*)\"?[,\n\]]" multi nodrop
101+
| extract field=dst_device_ip_list "\"?(?<dst_device_ip_1>[\w\s\-&.,]*)\"?[,\n\]]" nodrop
102+
| if (isBlank(dst_device_ip_1), dst_device_ip_2, dst_device_ip_1) as dst_device_ip
103+
104+
| where techniques matches "*"
105+
106+
| count by id, time, url, src_username
107+
| count
108+
```
109+
110+
## Setup
111+
112+
### Source configuration
113+
114+
Follow the below steps to configure the Hosted Collector to receive ExtraHop RevealX 360 events:
115+
116+
1. In the Sumo Logic portal, create a new [Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector/) or use an existing one. Then add an [HTTP Logs and Metrics Source](/docs/send-data/hosted-collectors/http-source/logs-metrics/#configure-an-httplogs-and-metrics-source).
117+
2. Configure **Source Category** in the HTTP source - for example, `webhook/extrahop-revealx` - for the ExtraHop RevealX 360 integration.
118+
3. Copy and save the endpoint URL of the source.
119+
120+
### Vendor configuration
121+
122+
Configure the webhook integration in ExtraHop RevealX 360 to send events to the Sumo Logic HTTP source. Once configured, it will be triggered each time the events occur within your Extrahop RevealX 360 account.
123+
124+
To configure the ExtraHop RevealX 360 webhook, refer to the [ExtraHop RevealX 360 Documentation](https://docs.extrahop.com/current/detections-create-notification-rule/).
125+
126+
### Installing the ExtraHop RevealX 360 app
127+
128+
import AppInstall2 from '../../reuse/apps/app-install-v2.md';
129+
130+
<AppInstall2/>
131+
132+
## Viewing ExtraHop RevealX 360 dashboards​
133+
134+
import ViewDashboards from '../../reuse/apps/view-dashboards.md';
135+
136+
<ViewDashboards/>
137+
138+
### Security
139+
140+
The **ExtraHop RevealX 360 - Security** dashboard provides a comprehensive overview of network detection activities and the overall security posture of your environment. It offers insights into total detections, average risk scores, and the distribution of techniques over time, allowing teams to quickly identify unusual patterns and potential areas of concern.
141+
142+
This dashboard helps security teams monitor detection trends, track changes in risk levels, and gain insights into the most frequently observed MITRE techniques, top destination devices, and key targets on the network. It also highlights detections linked to high-risk or embargoed geolocations, offering valuable context for prioritizing investigations.
143+
144+
By consolidating these insights into a unified view, the dashboard enhances threat detection, supports more informed response actions, and strengthens defenses against evolving network-based attacks.<br/><img src='https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Extrahop+RevealX+360/Extrahop-RevealX-360-Security.png' alt="Extrahop-RevealX-360-Security" style={{border:'1px solid gray'}} />
145+
146+
## Create monitors for ExtraHop RevealX 360 app
147+
148+
import CreateMonitors from '../../reuse/apps/create-monitors.md';
149+
150+
<CreateMonitors/>
151+
152+
### ExtraHop RevealX 360 alerts
153+
154+
| Name | Description | Trigger Type (Critical / Warning / MissingData) | Alert Condition |
155+
|:--|:--|:--|:--|
156+
| `ExtraHop RevealX 360 - Destination Devices from Embargoed Geo Locations` | This alert is fired when events originating from embargoed locations are detected, ensuring adherence to security restrictions and protocols. | Critical | Count > 0 |
157+
| `ExtraHop RevealX 360 - Critical Detections` | This alert is fired when detections are identified with a risk score greater than 70, signaling high-severity threats that require immediate investigation and remediation. | Critical | Count > 0 |
158+
159+
## Upgrade/Downgrade the ExtraHop RevealX 360 app (Optional)
160+
161+
import AppUpdate from '../../reuse/apps/app-update.md';
162+
163+
<AppUpdate/>
164+
165+
## Uninstalling the ExtraHop RevealX 360 app (Optional)
166+
167+
import AppUninstall from '../../reuse/apps/app-uninstall.md';
168+
169+
<AppUninstall/>

docs/platform-services/automation-service/automation-service-playbooks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ The following procedure provides a brief introduction to how to create a playboo
3838
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Automation**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Automation > Playbooks**. You can also click the **Go To...** menu at the top of the screen and select **Playbooks**. <br/>Previously-created playbooks display.
3939
1. Click the **+** button to the left of **Playbook**.<br/><img src={useBaseUrl('img/cse/automations-new-playbook-button.png')} style={{border:'1px solid gray'}} alt="New playbook button" width="400"/>
4040
1. A new configuration box will be displayed. Name your new playbook.<br/><img src={useBaseUrl('img/cse/automations-new-playbook-dialog.png')} style={{border:'1px solid gray'}} alt="New playbook dialog" width="400"/>
41-
1. Select the incident **Type**. (For example, for Cloud SIEM automations, select **CSE**. For playbooks run from inside another playbook, you can select another incident type to associate with it, for example, **Denial of Service**, **Malware**, **Phishing**, and so on.)
41+
1. Select the incident **Type**. (For example, for Cloud SIEM automations, select **Cloud SIEM**. For playbooks run from inside another playbook, you can select another incident type to associate with it, for example, **Denial of Service**, **Malware**, **Phishing**, and so on.)
4242
1. Enter a **Description** of the playbook to help others understand how to use it.
4343
1. Click **Create**. The new playbook appears in the list of available playbooks.
4444
1. To configure the new playbook, select it from the list and click the **Edit** button at the bottom of the screen.<br/><img src={useBaseUrl('img/cse/automations-new-empty-playbook.png')} alt="New playbook" style={{border:'1px solid gray'}} width="600"/>

docs/platform-services/automation-service/index.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,12 @@ In this section, we'll introduce the following concepts:
1818
<p>Get an overview of how the Automation Service allows you to automate actions.</p>
1919
</div>
2020
</div>
21+
<div className="box smallbox card">
22+
<div className="container">
23+
<a href="/docs/platform-services/automation-service/intro-to-automation-service/"><img src={useBaseUrl('img/icons/security/siem-challenges.png')} alt="icon" width="40"/><h4>Introduction to the Automation Service</h4></a>
24+
<p>Get an introduction to the Automation Service.</p>
25+
</div>
26+
</div>
2127
<div className="box smallbox card">
2228
<div className="container">
2329
<a href="/docs/platform-services/automation-service/app-central/"><img src={useBaseUrl('img/icons/security/siem-challenges.png')} alt="icon" width="40"/><h4>App Central</h4></a>

0 commit comments

Comments
 (0)