Skip to content

Commit 4aa645e

Browse files
authored
Merge branch 'main' into threat-intel-ga
2 parents e4d7c84 + 499b3f8 commit 4aa645e

File tree

229 files changed

+715
-274
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

229 files changed

+715
-274
lines changed

blog-service/2024-10-29-apps.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: CrowdStrike Spotlight (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- crowdstrike-spotlight
6+
- apps
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We're excited to introduce the new CrowdStrike Spotlight app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud CrowdStrike Spotlight source to collect vulnerability logs through the CrowdStrike Spotlight API, helping you to obtain real-time visibility into vulnerabilities across your organization's assets to the security teams.
15+
16+
Explore our technical documentation [here](/docs/integrations/saas-cloud/crowdstrike-spotlight/) to learn how to set up and use the CrowdStrike Spotlight app for Sumo Logic.

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2068,6 +2068,7 @@
20682068
"/cid/4018": "/docs/send-data/installed-collectors",
20692069
"/cid/4019": "/docs/send-data/installed-collectors/sources/script-action",
20702070
"/cid/4412": "/docs/integrations/saas-cloud/crowdstrike-fdr-host-inventory",
2071+
"/cid/44122": "/docs/integrations/saas-cloud/crowdstrike-spotlight",
20712072
"/cid/4020": "/docs/search/logreduce",
20722073
"/cid/4021": "/docs/search/search-query-language/search-operators/accum",
20732074
"/cid/4022": "/docs/search/search-query-language/search-operators/fields",

docs/cse/administration/create-a-custom-tag-schema.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ This topic has instructions for creating a custom tag schema in Cloud SIEM. 
1313

1414
Tags are metadata you can attach to Insights, Signals, Entities, and Rules. Tags are useful for adding context to these Cloud SIEM items. You can also search for and filter items by tag. There are two types of tags: *keyword tags*, which are arbitrary, freeform strings; and *schema keys*, which are predefined key-value pairs. Cloud SIEM provides built-in schemas keys that display in the Cloud SIEM UI with a Sumo label, as shown in the example below. You can’t edit the built-in schemas.
1515

16-
<img src={useBaseUrl('img/cse/built-in-tags.png')} alt="Built-in schema keys" style={{border: '1px solid gray'}} width="400"/>
16+
<img src={useBaseUrl('img/cse/built-in-tags.png')} alt="Built-in schema keys" style={{border: '1px solid gray'}} width="800"/>
1717

1818
Schema tags can enforce specific tag values and prevent confusion from variations in tag values. For example, you might want to ensure the use of standard server identifiers, such as “FinanceServer”, rather than “Server-Finance” or “Finance_Server”. 
1919

@@ -22,8 +22,8 @@ For more information about tags in Cloud SIEM, see [Using Tags with Insights, Si
2222
## Define a custom tag schema
2323

2424
1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Workflow** select **Tag Schemas**.<br/>[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Workflow** select **Tag Schemas**. You can also click the **Go To...** menu at the top of the screen and select **Tag Schemas**.
25-
1. On the **Tag Schemas** page, click **Create**. <br/><img src={useBaseUrl('img/cse/tag-schemas-page.png')} alt="Tag schemas page" style={{border: '1px solid gray'}} width="800"/>
26-
1. The **Tag Schema** popup appears. The screenshot below shows a previously configured tag schema. <br/><img src={useBaseUrl('img/cse/tag-schema-filled-in.png')} alt="Example tag schema" style={{border: '1px solid gray'}} width="800"/>
25+
1. On the **Tag Schemas** page, click **Create**. <br/><img src={useBaseUrl('img/cse/tag-schema-empty.png')} alt="Create tag schema" style={{border: '1px solid gray'}} width="400"/>
26+
1. The **Tag Schema** popup appears.
2727
1. **Key**. Enter an identifier for the tag you’re defining. It won’t appear in the UI for assigning tags to a content item, unless you leave the **Label** field blank.
2828
1. **Label**. Enter a label for the tag. If you supply a label, that’s what will appear in the UI for assigning tags to a content item.
2929
1. **Content Types**. Select the types that you want the tag to be
@@ -33,6 +33,7 @@ For more information about tags in Cloud SIEM, see [Using Tags with Insights, Si
3333
* **Entity** The options do not include **Signal** or **Insight**. Signals and Insights inherit tag values from the rule(s) or Custom Insight definition that triggered the Signal or Insight and involved Entities.
3434
1. **Allow Custom Values**. Check this box to allow users to add additional allowable values to the tag schema. Otherwise, when applying the tag users may only select one of the values you define in the **Value Options** section below.
3535
1. **Value Options**. If **Allow Custom Values** is not checked, you must define at least one value for the tag:
36-
* **Value**. Enter an allowable value for the tag.
37-
* **Label**. Enter a label for the value.
38-
* **Link** (optional). Enter a URL for it to appear in the Actions menu of the tag in any content items to which it’s been applied. Cloud SIEM’s built-in schema tags are examples of schema tags that include a link. The screenshot below shows a link from the **Tactic:TA0002** to associated information on the MITRE site. <br/><img src={useBaseUrl('img/cse/mitre-link.png')} alt="Example MITRE link" style={{border: '1px solid gray'}} width="800"/>
36+
* **Enter Value**. Enter an allowable value for the tag.
37+
* **Enter Label**. Enter a label for the value.
38+
* **Enter Link** (optional). Enter a URL for it to appear in the Actions menu of the tag in any content items to which it’s been applied. Cloud SIEM’s built-in schema tags are examples of schema tags that include a link. The screenshot below shows a link from the **Tactic:TA0002** to associated information on the MITRE site. <br/><img src={useBaseUrl('img/cse/mitre-link.png')} alt="Example MITRE link" style={{border: '1px solid gray'}} width="400"/>
39+

docs/cse/administration/create-cse-actions.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -52,8 +52,8 @@ You can configure an Action to send information about an Insight to another syst
5252
What gets sent to the target system depends on the Action type. For some types—Slack, Microsoft Teams, and PagerDuty—the notification contains a summary of the Insight with the following information:
5353

5454
* The Entity the Insight fired on.
55-
* The [MITRE tactic](https://attack.mitre.org/) or tactics that form a portion of the Insight ID, which indicates which stage of the MITRE framework the Insight relates to. In the example below, the “Initial Access” tactic is shown.
56-
* A link to the Insight in Cloud SIEM. <br/><img src={useBaseUrl('img/cse/received-email.png')} alt="Example notification" width="600" />
55+
* The [MITRE tactic](https://attack.mitre.org/) or tactics that form a portion of the Insight ID, which indicates which stage of the MITRE framework the Insight relates to.
56+
* A link to the Insight in Cloud SIEM.
5757

5858
For the other Action types—AWS Simple Notification Service (SNS), Demisto (Cortex XSOAR), HTTP POST v2, and Slack Webhook—the notification includes the Insight itself in JSON format, and in some cases Signals or Records, depending on how you configure the Action.
5959

@@ -92,9 +92,11 @@ The notification sent by a Rule Action contains the name of the rule and the re
9292
* **Rule**. Click **When Automatically Disabled** to generate a notification when Cloud SIEM disables a rule.
9393
1. **Active**. Move the slider to the right if you’d like the Action to be enabled upon creation.
9494

95+
Continue filling out the dialog box depending on the type of action you are creating.
96+
9597
### AWS Simple Notification Service (SNS)
9698

97-
When you run this Action type for an Insight, Cloud SIEM sends the full Insight in JSON format to SNS.
99+
When you run this Action type for an Insight, Cloud SIEM sends the full Insight in JSON format to the AWS Simple Notification Service (SNS).
98100

99101
You can configure the action to authenticate with SNS using your AWS Access Key and Secret Access Key, or using the **AssumeRole** method.
100102

@@ -103,7 +105,7 @@ You can configure the action to authenticate with SNS using your AWS Access Key
103105
1. **Assume Role ARN**. Enter the AssumeRole ARN, if that's how you want to authenticate. Enter the Sumo Logic AWS account ID. For the Sumo Logic ID, see [Create a role manually using the AWS console](/docs/send-data/hosted-collectors/amazon-aws/grant-access-aws-product#create-a-role-manually-using-the-aws-console).
104106
1. **Topic ARN**. Enter the ARN of the SNS topic.
105107
1. **Region**. Enter the AWS region for the SNS topic. 
106-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/sns.png')} alt="AWS simple notification service action" style={{border: '1px solid gray'}} width="500" />
108+
1. Click **Create**.
107109

108110
### Demisto (Cortex XSOAR)
109111

@@ -115,14 +117,14 @@ When you run this Action type for an Insight, Cloud SIEM sends the full Insight
115117
1. **Create Incident API Endpoint**. Select `/incident/json`.
116118
1. **Extra Headers**. Enter any additional headers you want to send, as line-delimited key:value pairs.
117119
1. **Exclude Records**. Move the slider to the right if you don’t want to include Records in the notification.
118-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/demisto-action.png')} alt="Example Demisto action" style={{border: '1px solid gray'}} width="500" />
120+
1. Click **Create**.
119121

120122
### Email
121123

122124
This Action type sends an email notification.
123125

124126
1. **Recipients**. Enter a comma-separated list of the email addresses to send the notification to.
125-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/email-action.png')} alt="Example email action" style={{border: '1px solid gray'}} width="500" />
127+
1. Click **Create**.
126128

127129
When this Action runs on an Insight, the email notification contains:
128130

@@ -149,7 +151,7 @@ in Cloud SIEM.
149151
1. **Include Signals**. Move the slider to the right to send the Signals associated with the Insight in the POST. 
150152
1. **Include Records**. Move the slider to the right to send the Records associated with the Signal in the POST. 
151153
1. **Record Fields to Include**. If desired, provide a comma-delimited list of selected Record fields to include (instead of all Record fields).
152-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/http-post-v2.png')} alt="Example HTTP Post V2 action" style={{border: '1px solid gray'}} width="500" />
154+
1. Click **Create**.
153155

154156
### Microsoft Teams
155157

@@ -162,15 +164,15 @@ Create a Webhook connection for the Microsoft Teams channel to which emails shou
162164
#### Configure Action in Cloud SIEM
163165

164166
1. **URL**. Enter the URL for the Webhook connection you created above. 
165-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/microsoft-teams.png')} alt="Example Microsoft Teams action" style={{border: '1px solid gray'}} width="500" />
167+
1. Click **Create**.
166168

167169
### PagerDuty
168170

169171
This Action types sends a notification to PagerDuty.
170172

171173
1. **Service Key**. Enter your PagerDuty service key.
172174
1. **Subdomain**. Enter your PagerDuty account subdomain.
173-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/pagerduty.png')} alt="Example PagerDuty action" style={{border: '1px solid gray'}} width="500" />
175+
1. Click **Create**.
174176

175177
The notification contains:
176178

@@ -192,29 +194,27 @@ Lookups will consume RF API credits.
192194
1. On the **Generate New Token** page:
193195
1. **Name**. Enter a name for the token. 
194196
1. **Integration**. Select “Sumologic” from the list of integrations.
195-
1. Click **Generate**. <br/><img src={useBaseUrl('img/cse/rf-api-token.png')} alt="Generate New API token dialog" style={{border: '1px solid gray'}} width="400" />
197+
1. Click **Generate**.
196198
1. Copy and save the token.
197199

198200
#### Create Action in Cloud SIEM
199201

200202
1. **API Key**. Enter the Recorded Future API token you generated for the Sumo Logic integration. 
201203
1. **Enrich Insights**. Move the slider to the right to enrich Insights.
202204
1. **Enrich Signals of Insights**. Move the slider to the right to enrich Signals.
203-
1. Click **Create**.<br/><img src={useBaseUrl('img/cse/recorded-future.png')} alt="Example recorded Future action" style={{border: '1px solid gray'}} width="500" />
205+
1. Click **Create**.
204206

205207
####  View Recorded Future Enrichments
206208

207-
To view an Enrichment that’s been added to an Insight or Signal, navigate to the item and select the **Enrichments** tab.
208-
209-
<img src={useBaseUrl('img/cse/rf-enrichments.png')} alt="Example recorded Future enrichments" style={{border: '1px solid gray'}} width="600" />
209+
To view an Enrichment that’s been added to an Insight or Signal, navigate to the item and select the [**Enrichments**](/docs/cse/integrations/enrichments-and-indicators/#enrichments) tab.
210210

211211
### Slack
212212

213213
This Action type sends a message to a Slack channel.
214214

215215
1. **API Key**. Enter your Slack API key.
216216
1. **Channel**. Enter the Slack Channel that messages should go to.
217-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/slack.png')} alt="Example Slack action" style={{border: '1px solid gray'}} width="500" />
217+
1. Click **Create**.
218218

219219
If the Action was run on an Insight, the message contains:
220220

@@ -233,4 +233,4 @@ Create a Webhook connection for the Slack channel to which Insights should be se
233233
#### Configure Action in Cloud SIEM
234234

235235
1. **Webhook URL**. Enter the URL of the Webhook you created above.
236-
1. Click **Create**. <br/><img src={useBaseUrl('img/cse/slack-webhook.png')} alt="Example Slack webhook action" style={{border: '1px solid gray'}} width="500" />
236+
1. Click **Create**.

docs/cse/administration/create-cse-context-actions.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -107,10 +107,6 @@ The only required parameter in the URL is `{{value}}`. Depending on your use cas
107107

108108
`https://www.criminalip.io/asset/report/{{value}}`
109109

110-
For example:
111-
112-
<img src={useBaseUrl('img/cse/context-action-criminal-ip-example.png')} alt="Criminal IP context action example" style={{border: '1px solid gray'}} width="500"/>
113-
114110
## Template parameters for Context Actions
115111

116112
The table below defines the parameters you can use in the URL template for a Context Action.

docs/cse/administration/create-custom-threat-intel-source.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -48,17 +48,17 @@ Rule authors can also write rules that look for threat intelligence information
4848
### Create a threat intelligence source from Cloud SIEM UI
4949

5050
1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Content > Threat Intelligence**. <br/>[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**.
51-
1. Click **Add Source** on the **Threat Intelligence** page. <br/><img src={useBaseUrl('img/cse/threat-intel-page2.png')} alt="Threat Intelligence page" width="800"/>
52-
1. Click **Custom** on the **Add Source** popup. <br/><img src={useBaseUrl('img/cse/custom-button.png')} alt="Custom button" width="600"/>
53-
1. On the **Add New Source** popup, enter a name, and if desired, a description for the source. <br/><img src={useBaseUrl('img/cse/add-custom-source.png')} alt="Add new source" width="600"/>
51+
1. Click **Add Source** on the **Threat Intelligence** page.
52+
1. Click **Custom** on the **Add Source** popup.
53+
1. On the **Add New Source** popup, enter a name, and if desired, a description for the source.
5454
1. Click **Add Custom Source**.
5555

5656
Your new source should now appear on the **Threat Intelligence** page.
5757

5858
### Enter indicators manually
5959

60-
1. On the **Threat Intelligence** page, click the name of the source you want to update. <br/><img src={useBaseUrl('img/cse/click-name.png')} alt="List of sources" width="800"/>
61-
1. The **Details** page lists any indicators that have previously been added and have not expired. Click **Add Indicator**. <br/><img src={useBaseUrl('img/cse/threat-details.png')} alt="List of indicators" width="800"/>
60+
1. On the **Threat Intelligence** page, click the name of the source you want to update.
61+
1. The **Details** page lists any indicators that have previously been added and have not expired. Click **Add Indicator**.
6262
1. On the **New Threat Intelligence Indicator** popup.
6363
1. **Value**. Enter an IP address, hostname, URL, or file hash.
6464
Your entry must be one of:
@@ -78,7 +78,7 @@ Your new source should now appear on the **Threat Intelligence** page.
7878
### Upload a file of indicators 
7979

8080
If you have a large number of indicators to add to your source, you can
81-
save time by creating a .csv file and uploading it to Cloud SIEM. <br/><img src={useBaseUrl('img/cse/import-indicators.png')} alt="'Import Indicators from CSV' dialog" width="400"/>
81+
save time by creating a .csv file and uploading it to Cloud SIEM.
8282

8383
#### Create a CSV file
8484

docs/cse/administration/create-use-network-blocks.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,8 +61,6 @@ In the case that the two or more Network Blocks overlap, Cloud SIEM uses the sma
6161

6262
When Cloud SIEM looks for the Network Block address `10.128.0.1`, it will return the more-specific block, "WebServer IPs".
6363

64-
<img src={useBaseUrl('img/cse/overlapping-network-blocks.png')} alt="Overlapping network blocks" style={{border: '1px solid gray'}} width="400"/>
65-
6664
## Create a Network Block manually
6765

6866
Follow these instructions to create a Network Block using the Cloud SIEM UI. For information about creating multiple Network Blocks by file upload, see [Upload a CSV file of Network Blocks](#upload-a-csv-file-of-network-blocks).
@@ -118,13 +116,17 @@ In the table below, the left column contains schema fields that contain IP addre
118116
| `srcDevice_ip `| `srcDevice_ip_location` | `srcDevice_ip_isInternal` |
119117
| `srcDevice_natIp` | `srcDevice_natIp_location` | `srcDevice_natIp_isInternal` |
120118

119+
<!-- Can't reproduce the screenshot
120+
121121
The screenshot below shows a Record that contains several Network Block-related enrichment fields. Note that:
122122
123123
* `dstDevice_ip_isInternal` and `srcDevice_ip_isInternal` indicate that the `dstDevice_ip` and `srcDevice_ip` are both in Network Blocks that are marked Internal.
124124
* `srcDevice_ip_location` indicates that `srcDevice_ip` is in the “test_internal” Network Block.
125125
126126
<img src={useBaseUrl('img/cse/record.png')} alt="Example enrichment fields" style={{border: '1px solid gray'}} width="600"/>
127127
128+
-->
129+
128130
## Using enrichment fields
129131

130132
You can use the `*_location` and `*_isInternal` fields the same way you do other Record fields. You can use them to filter Records in rule expressions or in searches. 

docs/cse/administration/filter-search.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ keywords:
1111

1212
import useBaseUrl from '@docusaurus/useBaseUrl';
1313

14-
You can filter and search the list pages in Cloud SIEM—**Insights**, **Signals**, **Entities**, **Records**, **Rules**, and **Network Blocks**—using the **Filter** bar near the top of the page.
14+
You can filter and search the list pages in Cloud SIEM—**Insights**, **Signals**, **Entities**, **Records**, **Rules**, and **Network Blocks**—using the **Filters** bar near the top of the page.
1515

1616
<img src={useBaseUrl('img/cse/list-page-search.png')} alt="Filters box at the top of the page " width="500" />
1717

0 commit comments

Comments
 (0)