You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We're excited to introduce the new CrowdStrike Spotlight app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud CrowdStrike Spotlight source to collect vulnerability logs through the CrowdStrike Spotlight API, helping you to obtain real-time visibility into vulnerabilities across your organization's assets to the security teams.
15
+
16
+
Explore our technical documentation [here](/docs/integrations/saas-cloud/crowdstrike-spotlight/) to learn how to set up and use the CrowdStrike Spotlight app for Sumo Logic.
Copy file name to clipboardExpand all lines: docs/cse/administration/create-a-custom-tag-schema.md
+7-6Lines changed: 7 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ This topic has instructions for creating a custom tag schema in Cloud SIEM.
13
13
14
14
Tags are metadata you can attach to Insights, Signals, Entities, and Rules. Tags are useful for adding context to these Cloud SIEM items. You can also search for and filter items by tag. There are two types of tags: *keyword tags*, which are arbitrary, freeform strings; and *schema keys*, which are predefined key-value pairs. Cloud SIEM provides built-in schemas keys that display in the Cloud SIEM UI with a Sumo label, as shown in the example below. You can’t edit the built-in schemas.
Schema tags can enforce specific tag values and prevent confusion from variations in tag values. For example, you might want to ensure the use of standard server identifiers, such as “FinanceServer”, rather than “Server-Finance” or “Finance_Server”.
19
19
@@ -22,8 +22,8 @@ For more information about tags in Cloud SIEM, see [Using Tags with Insights, Si
22
22
## Define a custom tag schema
23
23
24
24
1.[**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Workflow** select **Tag Schemas**.<br/>[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Workflow** select **Tag Schemas**. You can also click the **Go To...** menu at the top of the screen and select **Tag Schemas**.
25
-
1. On the **Tag Schemas** page, click **Create**. <br/><img src={useBaseUrl('img/cse/tag-schemas-page.png')} alt="Tag schemas page" style={{border: '1px solid gray'}} width="800"/>
26
-
1. The **Tag Schema** popup appears. The screenshot below shows a previously configured tag schema. <br/><img src={useBaseUrl('img/cse/tag-schema-filled-in.png')} alt="Example tag schema" style={{border: '1px solid gray'}} width="800"/>
25
+
1. On the **Tag Schemas** page, click **Create**. <br/><img src={useBaseUrl('img/cse/tag-schema-empty.png')} alt="Create tag schema" style={{border: '1px solid gray'}} width="400"/>
26
+
1. The **Tag Schema** popup appears.
27
27
1.**Key**. Enter an identifier for the tag you’re defining. It won’t appear in the UI for assigning tags to a content item, unless you leave the **Label** field blank.
28
28
1.**Label**. Enter a label for the tag. If you supply a label, that’s what will appear in the UI for assigning tags to a content item.
29
29
1.**Content Types**. Select the types that you want the tag to be
@@ -33,6 +33,7 @@ For more information about tags in Cloud SIEM, see [Using Tags with Insights, Si
33
33
***Entity** The options do not include **Signal** or **Insight**. Signals and Insights inherit tag values from the rule(s) or Custom Insight definition that triggered the Signal or Insight and involved Entities.
34
34
1.**Allow Custom Values**. Check this box to allow users to add additional allowable values to the tag schema. Otherwise, when applying the tag users may only select one of the values you define in the **Value Options** section below.
35
35
1.**Value Options**. If **Allow Custom Values** is not checked, you must define at least one value for the tag:
36
-
***Value**. Enter an allowable value for the tag.
37
-
***Label**. Enter a label for the value.
38
-
***Link** (optional). Enter a URL for it to appear in the Actions menu of the tag in any content items to which it’s been applied. Cloud SIEM’s built-in schema tags are examples of schema tags that include a link. The screenshot below shows a link from the **Tactic:TA0002** to associated information on the MITRE site. <br/><img src={useBaseUrl('img/cse/mitre-link.png')} alt="Example MITRE link" style={{border: '1px solid gray'}} width="800"/>
36
+
***Enter Value**. Enter an allowable value for the tag.
37
+
***Enter Label**. Enter a label for the value.
38
+
***Enter Link** (optional). Enter a URL for it to appear in the Actions menu of the tag in any content items to which it’s been applied. Cloud SIEM’s built-in schema tags are examples of schema tags that include a link. The screenshot below shows a link from the **Tactic:TA0002** to associated information on the MITRE site. <br/><img src={useBaseUrl('img/cse/mitre-link.png')} alt="Example MITRE link" style={{border: '1px solid gray'}} width="400"/>
Copy file name to clipboardExpand all lines: docs/cse/administration/create-cse-actions.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,8 +52,8 @@ You can configure an Action to send information about an Insight to another syst
52
52
What gets sent to the target system depends on the Action type. For some types—Slack, Microsoft Teams, and PagerDuty—the notification contains a summary of the Insight with the following information:
53
53
54
54
* The Entity the Insight fired on.
55
-
* The [MITRE tactic](https://attack.mitre.org/) or tactics that form a portion of the Insight ID, which indicates which stage of the MITRE framework the Insight relates to. In the example below, the “Initial Access” tactic is shown.
56
-
* A link to the Insight in Cloud SIEM. <br/><img src={useBaseUrl('img/cse/received-email.png')} alt="Example notification" width="600" />
55
+
* The [MITRE tactic](https://attack.mitre.org/) or tactics that form a portion of the Insight ID, which indicates which stage of the MITRE framework the Insight relates to.
56
+
* A link to the Insight in Cloud SIEM.
57
57
58
58
For the other Action types—AWS Simple Notification Service (SNS), Demisto (Cortex XSOAR), HTTP POST v2, and Slack Webhook—the notification includes the Insight itself in JSON format, and in some cases Signals or Records, depending on how you configure the Action.
59
59
@@ -92,9 +92,11 @@ The notification sent by a Rule Action contains the name of the rule and the re
92
92
***Rule**. Click **When Automatically Disabled** to generate a notification when Cloud SIEM disables a rule.
93
93
1.**Active**. Move the slider to the right if you’d like the Action to be enabled upon creation.
94
94
95
+
Continue filling out the dialog box depending on the type of action you are creating.
96
+
95
97
### AWS Simple Notification Service (SNS)
96
98
97
-
When you run this Action type for an Insight, Cloud SIEM sends the full Insight in JSON format to SNS.
99
+
When you run this Action type for an Insight, Cloud SIEM sends the full Insight in JSON format to the AWS Simple Notification Service (SNS).
98
100
99
101
You can configure the action to authenticate with SNS using your AWS Access Key and Secret Access Key, or using the **AssumeRole** method.
100
102
@@ -103,7 +105,7 @@ You can configure the action to authenticate with SNS using your AWS Access Key
103
105
1.**Assume Role ARN**. Enter the AssumeRole ARN, if that's how you want to authenticate. Enter the Sumo Logic AWS account ID. For the Sumo Logic ID, see [Create a role manually using the AWS console](/docs/send-data/hosted-collectors/amazon-aws/grant-access-aws-product#create-a-role-manually-using-the-aws-console).
104
106
1.**Topic ARN**. Enter the ARN of the SNS topic.
105
107
1.**Region**. Enter the AWS region for the SNS topic.
To view an Enrichment that’s been added to an Insight or Signal, navigate to the item and select the [**Enrichments**](/docs/cse/integrations/enrichments-and-indicators/#enrichments) tab.
210
210
211
211
### Slack
212
212
213
213
This Action type sends a message to a Slack channel.
214
214
215
215
1.**API Key**. Enter your Slack API key.
216
216
1.**Channel**. Enter the Slack Channel that messages should go to.
Copy file name to clipboardExpand all lines: docs/cse/administration/create-custom-threat-intel-source.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,17 +48,17 @@ Rule authors can also write rules that look for threat intelligence information
48
48
### Create a threat intelligence source from Cloud SIEM UI
49
49
50
50
1.[**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Content > Threat Intelligence**. <br/>[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**.
51
-
1. Click **Add Source** on the **Threat Intelligence** page. <br/><img src={useBaseUrl('img/cse/threat-intel-page2.png')} alt="Threat Intelligence page" width="800"/>
52
-
1. Click **Custom** on the **Add Source** popup. <br/><img src={useBaseUrl('img/cse/custom-button.png')} alt="Custom button" width="600"/>
53
-
1. On the **Add New Source** popup, enter a name, and if desired, a description for the source. <br/><img src={useBaseUrl('img/cse/add-custom-source.png')} alt="Add new source" width="600"/>
51
+
1. Click **Add Source** on the **Threat Intelligence** page.
52
+
1. Click **Custom** on the **Add Source** popup.
53
+
1. On the **Add New Source** popup, enter a name, and if desired, a description for the source.
54
54
1. Click **Add Custom Source**.
55
55
56
56
Your new source should now appear on the **Threat Intelligence** page.
57
57
58
58
### Enter indicators manually
59
59
60
-
1. On the **Threat Intelligence** page, click the name of the source you want to update. <br/><img src={useBaseUrl('img/cse/click-name.png')} alt="List of sources" width="800"/>
61
-
1. The **Details** page lists any indicators that have previously been added and have not expired. Click **Add Indicator**. <br/><img src={useBaseUrl('img/cse/threat-details.png')} alt="List of indicators" width="800"/>
60
+
1. On the **Threat Intelligence** page, click the name of the source you want to update.
61
+
1. The **Details** page lists any indicators that have previously been added and have not expired. Click **Add Indicator**.
62
62
1. On the **New Threat Intelligence Indicator** popup.
63
63
1.**Value**. Enter an IP address, hostname, URL, or file hash.
64
64
Your entry must be one of:
@@ -78,7 +78,7 @@ Your new source should now appear on the **Threat Intelligence** page.
78
78
### Upload a file of indicators
79
79
80
80
If you have a large number of indicators to add to your source, you can
81
-
save time by creating a .csv file and uploading it to Cloud SIEM. <br/><img src={useBaseUrl('img/cse/import-indicators.png')} alt="'Import Indicators from CSV' dialog" width="400"/>
81
+
save time by creating a .csv file and uploading it to Cloud SIEM.
Follow these instructions to create a Network Block using the Cloud SIEM UI. For information about creating multiple Network Blocks by file upload, see [Upload a CSV file of Network Blocks](#upload-a-csv-file-of-network-blocks).
@@ -118,13 +116,17 @@ In the table below, the left column contains schema fields that contain IP addre
The screenshot below shows a Record that contains several Network Block-related enrichment fields. Note that:
122
122
123
123
* `dstDevice_ip_isInternal` and `srcDevice_ip_isInternal` indicate that the `dstDevice_ip` and `srcDevice_ip` are both in Network Blocks that are marked Internal.
124
124
* `srcDevice_ip_location` indicates that `srcDevice_ip` is in the “test_internal” Network Block.
You can use the `*_location` and `*_isInternal` fields the same way you do other Record fields. You can use them to filter Records in rule expressions or in searches.
Copy file name to clipboardExpand all lines: docs/cse/administration/filter-search.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ keywords:
11
11
12
12
import useBaseUrl from '@docusaurus/useBaseUrl';
13
13
14
-
You can filter and search the list pages in Cloud SIEM—**Insights**, **Signals**, **Entities**, **Records**, **Rules**, and **Network Blocks**—using the **Filter** bar near the top of the page.
14
+
You can filter and search the list pages in Cloud SIEM—**Insights**, **Signals**, **Entities**, **Records**, **Rules**, and **Network Blocks**—using the **Filters** bar near the top of the page.
15
15
16
16
<img src={useBaseUrl('img/cse/list-page-search.png')} alt="Filters box at the top of the page " width="500" />
0 commit comments