Skip to content

Commit 3a7b616

Browse files
jpipkin1kimsaucetarunk2JV0812wjakelee
authored
DOCS-25 - Threat intelligence - GA (#3817)
* Threat intelligence GA * Add TAXII 1 * Add STIX to the product list article * Add threat intel to audit event index article * Edit Threat Intelligence section in About Cloud SIEM Rules * Update references to Create a Custom Threat Intelligence Source * Change release note date to March 28 * Create CID for threatlookup article * Update CID for threatlookup article * Update STIX 2.1 to STIX 2.x * Add CrowdStrike mapping section * Break out beta article into multiple articles for GA * Add CID for main Threat Intelligence article * Hide cat search operator * Remove note from 'Create a Custom Threat Intelligence Source' article * Change release note date * Fix redirect * Remove redirect for beta article * Add timestamp section * Tweak timestamp section * Minor updates * Change release note date to April 8 2024 * Update docs/platform-services/threat-intelligence-indicators.md Co-authored-by: Kim <[email protected]> * Update docs/search/search-query-language/search-operators/threatlookup.md Co-authored-by: Kim <[email protected]> * Update docs/platform-services/threat-intelligence/find-threats.md Co-authored-by: Kim <[email protected]> * Update docs/platform-services/threat-intelligence/find-threats.md Co-authored-by: Kim <[email protected]> * Update docs/platform-services/threat-intelligence/threat-indicators-in-cloud-siem.md Co-authored-by: Kim <[email protected]> * Update docs/platform-services/threat-intelligence/threat-intelligence-indicators.md Co-authored-by: Kim <[email protected]> * Update docs/platform-services/threat-intelligence/threat-intelligence-indicators.md Co-authored-by: Kim <[email protected]> * Update docs/platform-services/threat-intelligence/threat-intelligence-indicators.md Co-authored-by: Kim <[email protected]> * Update docs/platform-services/threat-intelligence/threat-intelligence-indicators.md Co-authored-by: Kim <[email protected]> * Update docs/platform-services/threat-intelligence/threat-indicators-in-cloud-siem.md Co-authored-by: Kim <[email protected]> * Update docs/platform-services/threat-intelligence/about-threat-intelligence.md Co-authored-by: Kim <[email protected]> * Update blog-service/2024-04-08-platform-services.md Co-authored-by: Kim <[email protected]> * Update docs/platform-services/threat-intelligence/about-threat-intelligence.md Co-authored-by: Kim <[email protected]> * Update docs/platform-services/threat-intelligence/upload-formats.md Co-authored-by: Kim <[email protected]> * Update docs/platform-services/threat-intelligence/crowdstrike-threat-intelligence.md Co-authored-by: Kim <[email protected]> * Update docs/platform-services/threat-intelligence/threat-indicators-in-cloud-siem.md Co-authored-by: Kim <[email protected]> * Update docs/platform-services/threat-intelligence/upload-formats.md Co-authored-by: Kim <[email protected]> * Update docs/platform-services/threat-intelligence/upload-formats.md Co-authored-by: Kim <[email protected]> * Update docs/search/search-query-language/search-operators/threatlookup.md Co-authored-by: Kim <[email protected]> * Update docs/search/search-query-language/search-operators/threatlookup.md Co-authored-by: Kim <[email protected]> * Update docs/search/search-query-language/search-operators/threatlookup.md Co-authored-by: Kim <[email protected]> * Update docs/search/search-query-language/search-operators/threatlookup.md Co-authored-by: Kim <[email protected]> * Update docs/search/search-query-language/search-operators/threatlookup.md * Update docs/cse/integrations/integrate-cse-with-taxii-feed.md Co-authored-by: Kim <[email protected]> * Update docs/cse/integrations/integrate-cse-with-taxii-feed.md Co-authored-by: Kim <[email protected]> * Update docs/platform-services/threat-intelligence/index.md * Add Threat Intel Ingest API doc (#3943) * resolve-alert-deletion-faq-arp (#3937) * Update scheduled-report.md (#3935) * Update STIX/TAXII articles (#3938) * Update search filter limitations (#3940) * Update search filter limitations * Update docs/manage/users-roles/roles/construct-search-filter-for-role.md Co-authored-by: Kim <[email protected]> * Update docs/manage/users-roles/roles/construct-search-filter-for-role.md Co-authored-by: Kim <[email protected]> --------- Co-authored-by: Kim <[email protected]> * Add Threat Intel Ingest API --------- Co-authored-by: Tarun Kumar <[email protected]> Co-authored-by: Jagadisha V <[email protected]> Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Remove extra space * Remove old beta article * Update cid-redirects so that legacy URL /Manage/Threat-Intel-Ingest points to Threat Intelligence * fix spaces * Update cid-redirects.json * Add micro lesson * Revise delete indicators section * Update release note * Update release note * Add hasThreatMatch examples for TRIDENT-18911 * Fix hasThreatMatch example * Add note about simple indicators * Minor correction * Add comments * Changed release note date * Move threat intel from platform services to security section * Add hidden Kanso instructions * Change release note date to June 18 2024 * Change release note date to Aug 1 2024 * Fix broken link * Update schedule-search.md (#4330) creation of Realtime scheduled search no longer supported. https://help.sumologic.com/docs/alerts/scheduled-searches/deprecation/ * Weekly 404 fixes (#4331) * Weekly 404 fixes * banner * Set isCloseable to true * Weekly 404 fixes * announcementBar re: outages (#4333) * OpenTelemetry Remote Management index page (beta) (#4023) * OTEL Remote Management GA (May 23) * align with PR 4015 * rm release note * Update docs/send-data/opentelemetry-collector/remote-management/index.md * Source templates index page --------- Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update collect-logs.md (#4341) * Update datadog.md (#4335) * Update markdown-syntax.md * Update docs/dashboards-classic/get-started/markdown-syntax.md Co-authored-by: Kim <[email protected]> * added supported elements note * removed code block content * Update salesforce-source.md * Update salesforce-source.md * updated note * updated the salesforce doc * minor fix * Update salesforce-source.md * Update datadog.md * minor formatting --------- Co-authored-by: Kim <[email protected]> * Update netskope-source.md (#4337) * Update netskope-source.md * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/netskope-source.md Co-authored-by: Kim (Sumo Logic) <[email protected]> * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/netskope-source.md --------- Co-authored-by: Kim (Sumo Logic) <[email protected]> * Update sumo-logic-flex-accounts.md (#4342) * Update close-cancel-sumo-account.md (#4338) * Update close-cancel-sumo-account.md * Update docs/manage/manage-subscription/close-cancel-sumo-account.md * Update keyboard shortcuts (#4323) * Update collect-logs-oracle-cloud-infrastructure.md (#4344) * Add sachin-sumologic to clabot file (#4345) * Real-time alerts/Sched Search edits (#4334) * Update schedule-search.md creation of Realtime scheduled search no longer supported. https://help.sumologic.com/docs/alerts/scheduled-searches/deprecation/ * Real-Time Sched Search edits * Real-time alerts/Sched Searches * Update docs/alerts/scheduled-searches/create-real-time-alert.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update docs/alerts/scheduled-searches/create-real-time-alert.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> --------- Co-authored-by: Jake Lee <[email protected]> Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Amazon Inspector doc update (#4346) * Amazon Inspector doc update * minor fixes * Update docs/integrations/amazon-aws/inspector.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update docs/integrations/amazon-aws/inspector.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> --------- Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * chore: update nodejs supported version (#4348) * chore: update tracing k8s deployment docs (#4339) * chore: update tracing k8s deployment endpoints * chore: update skc chart version * chore: update k8s version * Update docs/apm/traces/get-started-transaction-tracing/set-up-traces-collection-for-kubernetes-environments.md Co-authored-by: Kim (Sumo Logic) <[email protected]> * Update docs/apm/traces/get-started-transaction-tracing/set-up-traces-collection-for-kubernetes-environments.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> --------- Co-authored-by: Kim (Sumo Logic) <[email protected]> Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * New integration Sum-Logic-Notifaiction-By-Gmail (#4349) * new integration * Updates from review --------- Co-authored-by: John Pipkin <[email protected]> * chore: update java instr version (#4350) * Update github.md (#4353) * Update github.md Instructions were outdated and didn't align with screenshot * Update from review --------- Co-authored-by: John Pipkin <[email protected]> * Weekly 404 fixes (#4355) * Weekly 404 fixes * banner * Set isCloseable to true * Weekly 404 fixes * 404 fixes * Update docs/search/search-query-language/search-operators/cat.md * Update docs/search/search-query-language/search-operators/cat.md * Update cat.md * Changes for cassandra opentelemetry doc after with metric collection … (#4309) * Changes for cassandra opentelemetry doc after with metric collection and dashbaords * cassandraOtelMetrics * Apply suggestions from code review Co-authored-by: Jagadisha V <[email protected]> --------- Co-authored-by: John Pipkin <[email protected]> Co-authored-by: Jagadisha V <[email protected]> * Add metrics collection and metrics-based dashboards info to RabbitMQ (#4332) * Add metrics collection and metrics-based dashboards info to RabbitMQ Otel * fixed PR review comments * fixed PR review comments * Update rabbitmq-opentelemetry.md * Apply suggestions from code review Co-authored-by: Jagadisha V <[email protected]> * Apply suggestions from code review Co-authored-by: Jagadisha V <[email protected]> --------- Co-authored-by: Jagadisha V <[email protected]> * Log monitor trigger evaluation freq (#4305) * chore: update js instr deps (#4357) * DOCS-253 - Kanso cleanup (#4352) * Clean up 'Manage Data >' instances * Update docs/send-data/collect-from-other-data-sources/collect-ruby-on-rails-logs.md Co-authored-by: Kim (Sumo Logic) <[email protected]> --------- Co-authored-by: Kim (Sumo Logic) <[email protected]> * DOCS-350 - Ensure that the Product List article is indexed (#4354) * Break the Product List article into two articles * Cleanup * Update cloud-soar-bridge.md - Ammend SIEM_URL setting (#4359) * Update cloud-soar-bridge.md - Ammend SIEM_URL setting * Updates from review --------- Co-authored-by: John Pipkin <[email protected]> * Update automation-service-bridge.md - Amend SIEM_URL setting (#4358) * Update automation-service-bridge.md - Ammend SIEM_URL setting * Updates from reivew --------- Co-authored-by: John Pipkin <[email protected]> * Changing the dashboard screenshot file name from png to jpg (#4361) * VMWare Otel App Documentation (#4336) * Changes for cassandra opentelemetry doc after with metric collection and dashbaords * added initial doc changes for vmware otel app * Changes for collection part of vmware opentelemetry and other minor content correction * Fix build error * removing cassandra otel doc update which was mistakenly updated in this branch * Cassandra file was deleted but had to be replaced with the old change. * Apply suggestions from code review Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * updated s3 urls in src and resolved PR comments * resolved PR comment - added description for each dashboard * sidebar entry for the new file and type corrections * Updates from review * Apply suggestions from code review Co-authored-by: Kim (Sumo Logic) <[email protected]> * adding entry for cid to the vmware otel doc --------- Co-authored-by: Alekh Nema <[email protected]> Co-authored-by: John Pipkin <[email protected]> Co-authored-by: Alekh Nema <[email protected]> Co-authored-by: Kim (Sumo Logic) <[email protected]> * CONN-3431, CONN-3432: Added FAQ sections for Akamai SIEM API (#4362) * CONN-3431, CONN-3432: Added FAQ sections for Akamai SIEM API * Updates from review --------- Co-authored-by: John Pipkin <[email protected]> * chore: update python instr deps (#4364) * chore: update ruby deps (#4366) * chore: update .net instr logs location (#4365) * chore: update .net instr logs location * Update docs/apm/traces/get-started-transaction-tracing/opentelemetry-instrumentation/net/index.md --------- Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Add integrations (#4367) * DOCS-76 - Integrate UX style guidance (#4085) * Updates to Style Guide, Code of Conduct * more edits * more edits * Fixing md examples * edits * Update docs/contributing/remove-doc.md * Update docs/contributing/remove-doc.md * Update docs/contributing/remove-doc.md * Update upgrade-cloud-flex-legacy-account.md * Update docs/contributing/style-guide.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update docs/contributing/style-guide.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update docs/contributing/style-guide.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update docs/contributing/style-guide.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * sentence casing --------- Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update faq.md (#4343) * Update faq.md * Update docs/manage/partitions/flex/faq.md * Update docs/manage/partitions/flex/faq.md * Update docs/manage/partitions/flex/faq.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update docs/manage/partitions/flex/faq.md --------- Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Weekly 404 Fixes (#4373) * Weekly 404 fixes * banner * Set isCloseable to true * Weekly 404 fixes * 404 fixes * 404 Fixes * Update docs/search/search-cheat-sheets/log-operators.md * Update docs/search/search-query-language/search-operators/cat.md * Update cat.md * Formatting fixes - OTEL Traces Instrumentation (#4368) * Formatting fixes - OTEL Traces Instrumentation * minor edits * Update lookup.md (#4356) * Update lookup.md * Update docs/search/search-query-language/search-operators/lookup.md * Add STIX to product list article * Change release note date to Nov 29 2024 * Credit usage information screenshot updated (#4496) * Credit usage information screenshot updated * Minor fix * Documentation Azure Load Balancer (#4526) * Documentation Azure Load Balancer * Update docs/integrations/microsoft-azure/azure-load-balancer.md Co-authored-by: Himanshu Pal <[email protected]> * Update docs/integrations/microsoft-azure/azure-load-balancer.md Co-authored-by: Himanshu Pal <[email protected]> * Update docs/integrations/microsoft-azure/azure-load-balancer.md Co-authored-by: Himanshu Pal <[email protected]> * Resolved Feedbacks * Update azure-load-balancer.md * Update azure-load-balancer.md * Update azure-load-balancer.md * Update docs/integrations/microsoft-azure/azure-load-balancer.md --------- Co-authored-by: Himanshu Pal <[email protected]> Co-authored-by: Jagadisha V <[email protected]> * Update sdo-manual-configuration.md (#4523) * Update sdo-manual-configuration.md * Update sdo-manual-configuration.md * Update docs/observability/sdo/set-up-sdo/sdo-manual-configuration.md * Updates from review --------- Co-authored-by: Jagadisha V <[email protected]> Co-authored-by: John Pipkin <[email protected]> * Image updated (#4529) * Zendesk Source Docs (#4524) * Zendesk Source Docs * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/zendesk-source.md * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/zendesk-source.md * Update docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/zendesk-source.md --------- Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * CONN-3352 Release atlassian-source.md (#4519) * CONN-3352 Release atlassian-source.md * Add article to left nav --------- Co-authored-by: John Pipkin <[email protected]> * DOCS-443 - Clean up API articles (#4498) * Clean up APIs in left nav * API roles reuse file * First half * Second half * Add Korea to APIs * Remove extra Korea rows from tables * Wording change * Hide 'Required role capabilities' section * Remove 'hide_table_of_contents: false' * Micro Lesson added to the Flex app doc (#4525) * Micro Lesson added to the Flex app * Minor fix * Correct KinesisLog JSON contentType (#4530) * Estimate Infrequent tier data docs update (#4289) * Estimate Infrequent tier data docs update * Update docs/manage/partitions/data-tiers/searching-data-tiers.md Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update docs/manage/partitions/data-tiers/searching-data-tiers.md Co-authored-by: Kim (Sumo Logic) <[email protected]> --------- Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> Co-authored-by: Kim (Sumo Logic) <[email protected]> * Fix spelling (#4531) * added the content. (#4532) * added the content. * Updates from review --------- Co-authored-by: John Pipkin <[email protected]> * modified date (#4521) Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Added metrics collection and metrics-based dashboards info to MongoDB (#4517) * Added metrics collection and metrics-based dashboards info to MongoDB * fixed it. * Update mongodb-opentelemetry.md * fixed PR review comments * Added Linux env download description * Update haproxy-opentelemetry.md * Update redis-opentelemetry.md * Update rabbitmq-opentelemetry.md * Apply suggestions from code review Co-authored-by: Jagadisha V <[email protected]> * Apply suggestions from code review Co-authored-by: Jagadisha V <[email protected]> * Update mongodb-opentelemetry.md * fixed PR review comment * Update docs/integrations/databases/opentelemetry/redis-opentelemetry.md * Update docs/integrations/databases/opentelemetry/mongodb-opentelemetry.md * Update docs/integrations/databases/opentelemetry/mongodb-opentelemetry.md * Update mongodb-opentelemetry.md * Fix build break * Updates for review --------- Co-authored-by: Alekh Nema <[email protected]> Co-authored-by: Jagadisha V <[email protected]> Co-authored-by: John Pipkin <[email protected]> * Add new video (#4533) * Update python.md (#4534) updating according to our repo releases https://github.com/SumoLogic/sumologic-otel-lambda/blob/release-python-v1.20.0/python/README.md * updated docs for slack (#4536) * Moved 1Password to SaaS apps (#4535) * Moved 1Password to SaaS apps * Minor fixes * Fix broken link on product list --------- Co-authored-by: John Pipkin <[email protected]> * Edit config to throw warning for broken anchors (#4520) * Edit config to throw warning for broken anchors * fix first batch * /send-data anchor fixes * Fix some links * a few c2c fixes * Fix integration links * Fix manage links * Metrics, observability, and search links * integrations fixes * Fix 'send data' links * Release notes, alerts, misc. fixes * more fixes * more fixes * all fixes except last 2 CSOAR * Fix Cloud SOAR release notes links --------- Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Clean up upload-formats file * DOCS-443 - Clean up API articles (#4498) * Clean up APIs in left nav * API roles reuse file * First half * Second half * Add Korea to APIs * Remove extra Korea rows from tables * Wording change * Hide 'Required role capabilities' section * Remove 'hide_table_of_contents: false' * Edit config to throw warning for broken anchors (#4520) * Edit config to throw warning for broken anchors * fix first batch * /send-data anchor fixes * Fix some links * a few c2c fixes * Fix integration links * Fix manage links * Metrics, observability, and search links * integrations fixes * Fix 'send data' links * Release notes, alerts, misc. fixes * more fixes * more fixes * all fixes except last 2 CSOAR * Fix Cloud SOAR release notes links --------- Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * Update python version (#4537) Co-authored-by: Kim (Sumo Logic) <[email protected]> * Remove duplicate entry in sidebar * DOCS-443 - Clean up API articles (#4498) * Clean up APIs in left nav * API roles reuse file * First half * Second half * Add Korea to APIs * Remove extra Korea rows from tables * Wording change * Hide 'Required role capabilities' section * Remove 'hide_table_of_contents: false' * DOCS-443 - Clean up API articles (#4498) * Clean up APIs in left nav * API roles reuse file * First half * Second half * Add Korea to APIs * Remove extra Korea rows from tables * Wording change * Hide 'Required role capabilities' section * Remove 'hide_table_of_contents: false' * Edit config to throw warning for broken anchors (#4520) * Edit config to throw warning for broken anchors * fix first batch * /send-data anchor fixes * Fix some links * a few c2c fixes * Fix integration links * Fix manage links * Metrics, observability, and search links * integrations fixes * Fix 'send data' links * Release notes, alerts, misc. fixes * more fixes * more fixes * all fixes except last 2 CSOAR * Fix Cloud SOAR release notes links --------- Co-authored-by: John Pipkin (Sumo Logic) <[email protected]> * DOCS-443 - Clean up API articles (#4498) * Clean up APIs in left nav * API roles reuse file * First half * Second half * Add Korea to APIs * Remove extra Korea rows from tables * Wording change * Hide 'Required role capabilities' section * Remove 'hide_table_of_contents: false' * DOCS-443 - Clean up API articles (#4498) * Clean up APIs in left nav * API roles reuse file * First half * Second half * Add Korea to APIs * Remove extra Korea rows from tables * Wording change * Hide 'Required role capabilities' section * Remove 'hide_table_of_contents: false' * Fix conflict * Fixes for Kanso * Minor edit * Change release note date to Jan 16 2025 * Make terms lowercase * Remove beta tagging from Intel471 and Mandiant threat intel sources * Clean up threat intel source intros * Remove video * Remove beta from ZeroFox * Updates to Cloud SIEM threat intel article * Add Intel471 and Mandiant to product list * Make CrowdStrike Threat Intel Source GA * App migration away from CrowdStrike to Sumo Logic threat intelligence * Fix broken anchor link * Added PR #4190 changes * Fix broken link * Add notes about Cloud SIEM admins * Fix broken link * Add comments for DOCS-643 * Update pattern_type to stix * Comment out text * Updates from Mike Pomraning comments * Remove STIX from UI * Add file hashes and remove APIs * Add info to hasThreatMatch and threatlookup operators * Change release note date to Jan 24 2025 * Update release note * First set of updates for GA * Next set of updates * Final pass * Change release note date to Feb 28 2025 * Update screenshots * Updates from review * More updates from review * Yet more updates from review * Change to 10 million * Update release note from review * Update types values * Final updates from review * Fix file:hashes example --------- Co-authored-by: Kim <[email protected]> Co-authored-by: Tarun Kumar <[email protected]> Co-authored-by: Jagadisha V <[email protected]> Co-authored-by: Jake Lee <[email protected]> Co-authored-by: Cameron Eckles <[email protected]> Co-authored-by: Mateusz "mat" Rumian <[email protected]> Co-authored-by: Rishav Yaduvanshi <[email protected]> Co-authored-by: David Rooney <[email protected]> Co-authored-by: Alekh Nema <[email protected]> Co-authored-by: YasarArafat Nasir Rogangar <[email protected]> Co-authored-by: Matthew Virga <[email protected]> Co-authored-by: Ankur Chaudhary <[email protected]> Co-authored-by: Alekh Nema <[email protected]> Co-authored-by: Parth Langalia <[email protected]> Co-authored-by: Sachin Magar <[email protected]> Co-authored-by: Himanshu Pal <[email protected]> Co-authored-by: Yair Leiferman <[email protected]> Co-authored-by: Ruturaj Jain <[email protected]>
1 parent 78258bf commit 3a7b616

File tree

76 files changed

+1505
-533
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

76 files changed

+1505
-533
lines changed
Lines changed: 26 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,26 @@
1+
---
2+
title: Threat Intelligence (Security)
3+
image: https://www.sumologic.com/img/logo.svg
4+
keywords:
5+
- platform services
6+
- threat intel
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We’re excited to introduce Sumo Logic Threat Intelligence, a powerful feature set that enables Cloud SIEM administrators to seamlessly import indicators of Compromise (IoC) files and feeds directly into Sumo Logic to aid in security analysis. IoCs are individual data points about threats that are gathered from external sources about various entities such as host names, file hashes, IP addresses, and other known targets for compromise.
15+
16+
Once indicators are ingested and appear on the **Threat Intelligence** tab, Cloud SIEM analysts can use the `hasThreatMatch` function in Cloud SIEM rules to analyze incoming records for matches to the threat intelligence indicators.
17+
18+
Sumo Logic Threat Intelligence will help you stay ahead of emerging threats and enhance your security posture.
19+
20+
:::note
21+
Only Cloud SIEM administrators can add threat intelligence indicators to the datastore.
22+
:::
23+
24+
[Learn more](/docs/security/threat-intelligence/about-threat-intelligence).
25+
26+
<img src={useBaseUrl('img/security/threat-intelligence-tab-example.png')} alt="Threat Intelligence tab" style={{border: '1px solid gray'}} width="800" />

cid-redirects.json

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1557,7 +1557,9 @@
15571557
"/cid/1": "/docs/search/get-started-with-search/build-search/search-syntax-overview",
15581558
"/cid/0100": "/docs/manage/security/installation-tokens",
15591559
"/cid/0020": "/docs/manage/health-events",
1560-
"/cid/0020001": "/docs/platform-services/threat-intelligence-indicators",
1560+
"/cid/0020001": "/docs/security/threat-intelligence/upload-formats",
1561+
"/cid/20002": "/docs/search/search-query-language/search-operators/threatlookup",
1562+
"/cid/0020003": "/docs/security/threat-intelligence",
15611563
"/cid/0523": "/docs/manage/manage-subscription/upgrade-account/upgrade-sumo-logic-flex-account",
15621564
"/cid/0524": "/docs/manage/manage-subscription/cloud-flex-legacy-accounts",
15631565
"/cid/1000": "/docs/send-data/installed-collectors/sources/local-file-source",
@@ -2863,7 +2865,7 @@
28632865
"/Cloud_SIEM_Enterprise/Administration/Cloud_SIEM_Enterprise_Feature_Update_(2022)": "/docs/cse/administration",
28642866
"/Cloud_SIEM_Enterprise/Administration/Create_a_Custom_Tag_Schema": "/docs/cse/administration/create-a-custom-tag-schema",
28652867
"/Cloud_SIEM_Enterprise/Administration/Configure_a_Custom_Inventory_Source": "/docs/cse/administration/custom-inventory-sources",
2866-
"/Cloud_SIEM_Enterprise/Administration/Create_a_Custom_Threat_Intel_Source": "/docs/cse/administration/create-custom-threat-intel-source",
2868+
"/Cloud_SIEM_Enterprise/Administration/Create_a_Custom_Threat_Intel_Source": "/docs/security/threat-intelligence/threat-indicators-in-cloud-siem",
28672869
"/Cloud_SIEM_Enterprise/Administration/Create_and_Use_Network_Blocks": "/docs/cse/administration/create-use-network-blocks",
28682870
"/Cloud_SIEM_Enterprise/Administration/Create_CSE_Actions": "/docs/cse/administration/create-cse-actions",
28692871
"/Cloud_SIEM_Enterprise/Administration/Create_CSE_Context_Actions": "/docs/cse/administration/create-cse-context-actions",
@@ -3295,7 +3297,7 @@
32953297
"/Manage/Security/Set_a_Limit_for_User_Concurrent_Sessions": "/docs/manage/security/set-limit-user-concurrent-sessions",
32963298
"/Manage/Security/Set_a_Maximum_Web_Session_Timeout": "/docs/manage/security/set-max-web-session-timeout",
32973299
"/Manage/Security/Set-the-Password-Policy": "/docs/manage/security/set-password-policy",
3298-
"/Manage/Threat-Intel-Ingest": "/docs/integrations/amazon-aws/threat-intel",
3300+
"/Manage/Threat-Intel-Ingest": "/docs/security/threat-intelligence",
32993301
"/Manage/Users-and-Roles": "/docs/manage/users-roles",
33003302
"/Manage/Users-and-Roles/Manage-Roles": "/docs/manage/users-roles",
33013303
"/Manage/Users-and-Roles/Manage-Roles/About-Roles": "/docs/manage/users-roles/roles",

docs/api/threat-intel-ingest.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
---
2+
id: threat-intel-ingest
3+
title: Threat Intel Ingest Management APIs
4+
sidebar_label: Threat Intel Ingest Management
5+
description: The Threat Intel Ingest Management API allows you to upload STIX 2.x threat intel indicators, view storage status of threat intel ingest service, and view and set the retention period for threat intel indicators.
6+
hide_table_of_contents: true
7+
---
8+
9+
import useBaseUrl from '@docusaurus/useBaseUrl';
10+
import ApiIntro from '../reuse/api-intro.md';
11+
12+
<img src={useBaseUrl('img/icons/security/cloud-siem.png')} alt="icon" width="60"/>
13+
14+
The [Threat Intel Ingest Management](/docs/security/threat-intelligence) API allows you to:
15+
16+
* Upload STIX 2.x threat intel indicators
17+
* View storage status of threat intel ingest service
18+
* View and set the retention period for threat intel indicators
19+
20+
<ApiIntro/>
21+
22+
| Deployment | Documentation URL |
23+
|:-----------|:---------|
24+
| AU | https://api.au.sumologic.com/docs/#tag/threatIntelIngest |
25+
| CA | https://api.ca.sumologic.com/docs/#tag/threatIntelIngest |
26+
| DE | https://api.de.sumologic.com/docs/#tag/threatIntelIngest |
27+
| EU | https://api.eu.sumologic.com/docs/#tag/threatIntelIngest |
28+
| FED | https://api.fed.sumologic.com/docs/#tag/threatIntelIngest |
29+
| IN | https://api.in.sumologic.com/docs/#tag/threatIntelIngest |
30+
| JP | https://api.jp.sumologic.com/docs/#tag/threatIntelIngest |
31+
| US1 | https://api.sumologic.com/docs/#tag/threatIntelIngest |
32+
| US2 | https://api.us2.sumologic.com/docs/#tag/threatIntelIngest |

docs/cloud-soar/introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ As the newest member of your company's SOC team, it’s your task to set up some
4646

4747
Your company's apps and services generate logs, metrics, and tracing data.
4848

49-
When you ingest that data into Sumo Logic, you have one centralized location to query and visualize all that data. Sumo Logic’s Log Analytics Platform integrates with CrowdStrike’s threat intel database, so you can start getting security alerts and hunt threats. You can learn more in [Additional Security Features](/docs/security/additional-security-features/).
49+
When you ingest that data into Sumo Logic, you have one centralized location to query and visualize all that data. Sumo Logic’s Log Analytics Platform uses [threat intelligence](/docs/security/threat-intelligence/), so you can start getting security alerts and hunt threats. You can learn more in [Additional Security Features](/docs/security/additional-security-features/).
5050

5151
You can take your security one step further with [Cloud SIEM](/docs/cse/). When you forward your log messages to Cloud SIEM, they are parsed, mapped, and enriched into Cloud SIEM records. These records are compared to security rules. If a rule is triggered, an entity is extracted, a severity score is assigned, and a signal is created. If enough signals with the same entity cluster together, they become an Insight. Insights are likely risks that need your attention.
5252

docs/cse/administration/create-custom-threat-intel-source.md

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,23 @@ sidebar_label: Create a Custom Threat Intelligence Source
55
description: Learn how to create and manage custom threat sources.
66
---
77

8-
98
import useBaseUrl from '@docusaurus/useBaseUrl';
109

10+
<!-- For threat intel. Put this back once we support cat with the threatlookup search operator:
11+
12+
:::info
13+
This article describes functionality in Cloud SIEM that will be deprecated at a future time. **You can no longer add custom intelligence sources in Cloud SIEM**. To create new sources, use the Sumo Logic threat intelligence indicators framework. For more information, see [Threat Intelligence](/docs/security/threat-intelligence/).
14+
:::
15+
-->
16+
1117
This topic has information about setting up a *custom threat intelligence source* in Cloud SIEM, which is a threat intelligence list that you can populate manually, as opposed to using an automatic feed. 
1218

1319
You can set up and populate custom threat intelligence sources interactively from the Cloud SIEM UI, by uploading a .csv file, or using Cloud SIEM APIs. You can populate the sources with IP addresses, domains, URLs, email addresses, and file hashes.
1420

21+
:::note
22+
You can also use the Sumo Logic threat intelligence framework to add sources. See [Threat Intelligence](/docs/security/threat-intelligence/).
23+
:::
24+
1525
## How Cloud SIEM uses indicators
1626

1727
When Cloud SIEM encounters an indicator from your threat source in an incoming record it adds relevant information to the record. Because threat intelligence information is persisted within records, you can reference it downstream in both rules and search. The built-in rules that come with Cloud SIEM automatically create a signal for records that have been enriched in this way.
@@ -20,7 +30,7 @@ Rule authors can also write rules that look for threat intelligence information
2030

2131
## Create a threat intelligence source from Cloud SIEM UI
2232

23-
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Threat Intelligence**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**.
33+
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Threat Intelligence**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**.
2434
1. Click **Add Source** on the **Threat Intelligence** page.
2535
1. In the **Custom** box click **Create**.
2636
1. On the **Add New Source** popup, enter a name, and if desired, a description for the source.

docs/cse/get-started-with-cloud-siem/intro-for-analysts.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ sso : ip-192-0-2-0 : [email protected] :
6969
"Successful Login" : "2024-05-25T22:11:42"
7070
```
7171

72-
First, the message is parsed into a set of key-value pairs. This process also fixes basic formatting. This step creates semi-structured data. For example, instead of `ip-192-0-2-0`, the parsing step extracts the IP address into a key-value pair, where the key is something like `srcDeviceIP` and the value is `192.0.2.0`, with the hyphens normalized to dots. Then, this information is mapped onto the Cloud SIEM schema. Finally, the record is enriched with information from match lists or threat intelligence databases, such as its [CrowdStrike threat level](/docs/integrations/security-threat-detection/threat-intel-quick-analysis#threat-intel-faq). These normalized records are then sent down the Cloud SIEM pipeline and compared to rules.
72+
First, the message is parsed into a set of key-value pairs. This process also fixes basic formatting. This step creates semi-structured data. For example, instead of `ip-192-0-2-0`, the parsing step extracts the IP address into a key-value pair, where the key is something like `srcDeviceIP` and the value is `192.0.2.0`, with the hyphens normalized to dots. Then, this information is mapped onto the Cloud SIEM schema. Finally, the record is enriched with information from match lists or Sumo Logic [threat intelligence](/docs/security/threat-intelligence/). These normalized records are then sent down the Cloud SIEM pipeline and compared to rules.
7373

7474
### Extracting security insights from Cloud SIEM
7575

docs/cse/get-started-with-cloud-siem/onboarding-checklist-cse.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -130,16 +130,16 @@ Perform the following tasks to install security apps that provide data to Cloud
130130

131131
Install the Cloud SIEM App to monitor data that is parsed, along with all the signals and insights that records generate. The app contains multiple folders of searches and dashboards related to Cloud SIEM.
132132

133-
Also install any out-of-the-box apps or dashboards for security data sources we support, including CrowdStrike’s Threat Intel Quick Analysis app. These apps are useful for quick visualizations and configuring context actions to pivot directly to from Cloud SIEM.
133+
Also install any out-of-the-box apps or dashboards for security data sources we support, including the Threat Intel Quick Analysis app. These apps are useful for quick visualizations and configuring context actions to pivot directly to from Cloud SIEM.
134134

135135
See:
136136
* [Enterprise Audit - Cloud SIEM](/docs/integrations/sumo-apps/cse/)
137137
* [Security and Threat Detection](/docs/integrations/security-threat-detection/)
138138
* [Threat Intel Quick Analysis](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/)
139139

140-
#### Import Crowdstrike threat intel searches
140+
#### Import threat intel searches
141141

142-
You can configure Crowdstrike threat indicator matches from the Threat Intel Quick Analysis app to become signals within Cloud SIEM using scheduled searches. An example would be to fire a Cloud SIEM signal from a scheduled search when there is a highly malicious threat intel match on device IPs. Review other current scheduled search alerts that might be candidates for generating signals.
142+
You can configure Sumo Logic [threat intelligence](/docs/security/threat-intelligence/) matches from the Threat Intel Quick Analysis app to become signals within Cloud SIEM using scheduled searches. An example would be to fire a Cloud SIEM signal from a scheduled search when there is a highly malicious threat intel match on device IPs. Review other current scheduled search alerts that might be candidates for generating signals.
143143

144144
See:
145145
* [Threat Intel Quick Analysis](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/)
@@ -169,9 +169,9 @@ See: [Create and Use Network Blocks](/docs/cse/administration/create-use-network
169169

170170
### Configure threat intel feeds
171171

172-
Cloud SIEM heavily leverages threat intelligence to do real-time comparisons against known bad indicators. You can configure popular free threat feeds. But if your security team pays for premium threat intelligence (such as RecordedFuture, Anomali, Crowdstrike, ThreatConnect, etc), you can configure these too.
172+
Cloud SIEM heavily leverages threat intelligence to do real-time comparisons against known bad indicators. You can configure popular free threat feeds. But if your security team pays for premium threat intelligence (such as RecordedFuture, Anomali, Crowdstrike, ThreatConnect, and so on), you can configure these too.
173173

174-
See: [Create a Custom Threat Intel Source](/docs/cse/administration/create-custom-threat-intel-source/)
174+
See: [Manage Threat Intelligence Indicators](/docs/security/threat-intelligence/threat-intelligence-indicators/)
175175

176176
### Create lists
177177
Perform the following steps to create lists to allow or suppress information monitored for Cloud SIEM.

docs/cse/integrations/configuring-threatq-source-in-cse.md

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,11 +7,22 @@ description: Learn how to set up a ThreatQ source.
77

88
import useBaseUrl from '@docusaurus/useBaseUrl';
99

10+
<!-- For threat intel. Once we support cat with the threatlookup search operator, REPLACE THE CONTENTS OF THIS ARTICLE WITH THE FOLLOWING:
11+
12+
ThreatQ is a threat intelligence platform that centrally manages and correlates external sources of threat intel information. If you have a ThreatQ subscription, you can leverage ThreatQ threat intel feeds. 
13+
14+
To do so, [ingest threat intelligence indicators](/docs/security/threat-intelligence/about-threat-intelligence/#ingest-threat-intelligence-indicators) from your ThreatQ source.
15+
16+
## Looking for ThreatQ indicators using Cloud SIEM rules
17+
18+
Threat Intelligence sources are used at the time of record ingestion. When a record is ingested, Cloud SIEM determines whether any of the fields in the record exist in any of your Threat Intelligence sources. When a record contains a value that matches an entry in one or more Threat Intelligence sources, the `hasThreatMatch` Cloud SIEM rules function searches incoming records in Cloud SIEM for matches to threat intelligence indicators. For more information, see [Threat Intelligence Indicators in Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/).
19+
-->
20+
1021
This topic has information about configuring a ThreatQ source in Cloud SIEM.
1122

12-
ThreatQ is a threat intelligence platform that centrally manages and correlates external sources of threat intel information. 
23+
ThreatQ is a threat intelligence platform that centrally manages and correlates external sources of threat intel information.
1324

14-
If you have a ThreatQ subscription, Cloud SIEM’s ThreatQ integration allows you to leverage ThreatQ threat intel feeds. 
25+
If you have a ThreatQ subscription, Cloud SIEM’s ThreatQ integration allows you to leverage ThreatQ threat intel feeds.
1526

1627
To do so, you simply configure a ThreatQ source in Cloud SIEM. You supply the information Cloud SIEM needs to connect to ThreatQ and fetch feed updates on a periodic basis.
1728

@@ -51,7 +62,7 @@ Because the threat intel information is persisted within records, you can refere
5162

5263
`array_contains(listMatches, "threat_intel_list_name")`
5364

54-
where 
65+
where
5566

5667
`threat_intel_list_name` is the name of the threat intel list.
5768

@@ -60,4 +71,3 @@ If the name of the list you are referencing with `array_contains` contains any s
6071
:::
6172

6273
For more information, see [Rules and other content](/docs/cse/rules/about-cse-rules#rules-and-other-content) in the *About Cloud SIEM Rules* topic.
63-
 

docs/cse/integrations/enrichments-and-indicators.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,8 @@ No icon is displayed for entities with the **Not Flagged** label.
4040
**Not Flagged** is not the default value (which is no indicator at all). Cloud SIEM will not automatically determine the indicator value; enrichments must explicitly set it.
4141
:::
4242

43+
For more information, see [Threat Intelligence Indicators in Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/).
44+
4345
## Enrichment attributes
4446

4547
The enrichment schema includes support for the following optional attributes:

0 commit comments

Comments
 (0)