Skip to content

Commit 365985e

Browse files
jc-sumojpipkin1
andauthored
Create 2025-06-12-content.md (#5468)
* Create 2025-06-12-content.md * Updates from review --------- Co-authored-by: John Pipkin <[email protected]>
1 parent e12c77b commit 365985e

File tree

1 file changed

+82
-0
lines changed

1 file changed

+82
-0
lines changed

blog-cse/2025-06-12-content.md

Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
---
2+
title: June 12, 2025 - Content Release
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- log mappers
6+
- parsers
7+
- rules
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
This content release includes:
14+
- New detection rules for browser extension persistence, Kerberos certificate authentication, GitHub vulnerability alerts, Okta application access monitoring, and threat intelligence email matching.
15+
- New product support for Atlassian audit and login events.
16+
- Enhanced Azure Event Hub Windows Defender integration with new threat event mapping for passthrough alerts.
17+
- Cisco ASA updates with new network event support and NAT IP handling improvements.
18+
- Citrix NetScaler mapping updates to support additional events.
19+
- Update to Auth0 successful/unsuccessful login mappings to properly classify each.
20+
- CrowdStrike NextGen SIEM Alert event support.
21+
- Mimecast security event mapping improvements across several event types.
22+
- AWS CloudTrail network event enhancements with event success/failure handling and protocol support.
23+
- Parser updates to support additional event formats for multiple platforms.
24+
25+
Changes are enumerated below.
26+
27+
### Rules
28+
- [New] MATCH-S00897 Chromium Extension Installed
29+
- Threat actors may install browser extensions as a form of persistence on victim systems. Look up the 32 character extension ID in order to ensure that the extension is valid and expected to be installed as part of normal business operations. This extension ID can be found in the following values: `file_path` and/or `changeTarget` depending on the source of the telemetry. This rule logic utilizes Sysmon file creation events, which need to be enabled and configured on relevant assets.
30+
- [New] FIRST-S00064 First Seen Certificate Thumbprint in Successful Kerberos Authentication
31+
- This alert looks for a first seen certificate thumbprint being used to authenticate to an Active Directory environment, resulting in a Kerberos ticket being successfully issued. This alert is designed to catch Active Directory Certificate Services related attacks, ensure the certificate thumprint is valid, correlate the thumbprint ID with other Certificate Services events, particularly looking for recently issued templates.
32+
- [New] MATCH-S00949 GitHub - Vulnerability Alerts
33+
- Detects vulnerability alerts created for a GitHub repository.
34+
- [New] FIRST-S00070 Okta - First Seen Application Accessed by User
35+
- This signal looks for a user that is accessing an application behind Okta SSO that is first seen since the baseline period. Ensure that access of this application is expected and authorized, look for other Okta events around the user account in question to determine whether access to this application is expected and authorized.
36+
- [New] AGGREGATION-S00007 Okta - Session Anomaly (Multiple Operating Systems)
37+
- This rule detects when a user has utilized multiple distinct operating systems when performing authentication through Okta. This activity could potentially indicate credential theft or a general session anomaly. Examine other Okta related events surrounding the time period for this signal, pivoting off the username value to examine if any other suspicious activity has taken place. If this rule is generating false positives, adjust the threshold value and consider excluding certain user accounts via tuning expression or a match list.
38+
- [New] MATCH-S01020 Threat Intel - Matched Target Email
39+
- Detects email addresses associated with known malicious actor(s) or campaign(s) as designated by a threat intelligence provider.
40+
- [New] MATCH-S01019 Threat Intel - Matched User Email
41+
- Detects email addresses associated with known malicious actor(s) or campaign(s) as designated by a threat intelligence provider.
42+
- [Updated] MATCH-S00170 Windows - Scheduled Task Creation
43+
- Fixed spelling error.
44+
45+
### Log Mappers
46+
- [New] Altassian audit events
47+
- [New] Altassian login events
48+
- [New] Azure Event Hub - Windows Defender Azure Alert
49+
- [New] Cisco ASA 4180(18|19|44)
50+
- [New] Cisco ASA 713nnn JSON
51+
- [New] Cisco ASA Network events
52+
- [New] Citrix NetScaler - SSL Handshake Failure
53+
- [New] CrowdStrike NextGen SIEM
54+
- [Updated] Auth0 Failed Authentication
55+
- [Updated] Auth0 Successful Authentication
56+
- [Updated] Azure Event Hub - Windows Defender Logs
57+
- [Updated] Cisco ASA 106010 JSON
58+
- [Updated] Cisco ASA 20900(4|5) JSON
59+
- [Updated] Cisco ASA 50000(4|3) JSON
60+
- [Updated] Citrix NetScaler - TCP Connection
61+
- [Updated] CloudTrail - ec2.amazonaws.com - All Network Events
62+
- [Updated] F5 HTTP Request
63+
- [Updated] Mimecast AV Event
64+
- [Updated] Mimecast Audit Authentication Logs
65+
- [Updated] Mimecast Audit Hold Messages
66+
- [Updated] Mimecast Audit Logs
67+
- [Updated] Mimecast DLP Logs
68+
- [Updated] Mimecast Email logs
69+
- [Updated] Mimecast Impersonation Event
70+
- [Updated] Mimecast Spam Event
71+
- [Updated] Mimecast Targeted Threat Protection Logs
72+
73+
### Parsers
74+
- [New] /Parsers/System/Atlassian/Atlassian Audit Events
75+
- [Updated] /Parsers/System/Cisco/Cisco ASA
76+
- [Updated] /Parsers/System/Cisco/Cisco Umbrella CSV
77+
- [Updated] /Parsers/System/Citrix/Citrix NetScaler Syslog
78+
- [Updated] /Parsers/System/AWS/CloudTrail
79+
- [Updated] /Parsers/System/CrowdStrike/CrowdStrike Falcon Endpoint - JSON
80+
- [Updated] /Parsers/System/F5/F5 Syslog
81+
- [Updated] /Parsers/System/Microsoft/Microsoft Azure JSON
82+
- [Updated] /Parsers/System/Microsoft/Windows-JSON-Open Telemetry

0 commit comments

Comments
 (0)