Skip to content

Commit 4ba25fd

Browse files
authored
Merge branch 'main' into threat-intel-ga
2 parents 1e6880b + 17e1d0f commit 4ba25fd

File tree

211 files changed

+3059
-608
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

211 files changed

+3059
-608
lines changed

.clabot

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,8 @@
172172
"chetanchoudhary-sumo",
173173
"JamoCA",
174174
"darshan-sumo",
175-
"mahendrak-sumo"
175+
"mahendrak-sumo",
176+
"chvik"
176177
],
177178
"message": "Thank you for your contribution! As this is an open source project, we require contributors to sign our Contributor License Agreement and do not have yours on file. To proceed with your PR, please [sign your name here](https://forms.gle/YgLddrckeJaCdZYA6) and we will add you to our approved list of contributors.",
178179
"label": "cla-signed",

blog-cse/2024/12-31.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,8 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1616

1717
This is an archive of 2024 Cloud SIEM release notes. To view the full archive, [click here](/release-notes-cse/archive).
1818

19+
<!--truncate-->
20+
1921
---
2022
### December 20, 2024 - Content Release
2123

@@ -852,7 +854,7 @@ Other changes are enumerated below.
852854

853855
This release reverts a change to our AWS CloudTrail default (catch all) mapper for how `user_username` is mapped. This is being reverted due to reports of breaking rule tuning and missing user context for some `AssumedRole` events.
854856

855-
AWS `AssumedRole` events can contain service and user role assumptions. Oftentimes service role assumptions will contain a dynamic session identifier instead of a static user identifer which contains the originating identity. Prior to the change we are now reverting, this was causing certain services to generate user entities from these sessions, creating false positives. This behavior changed with the [August 5th, 2024 content release](/release-notes-cse/#august-5-2024---content-release) to handle role assumptions to instead map the role as user to prevent false positives from dynamic service sessions. While this decreased the number of false positives from dynamic service sessions, it also eliminated visibility into user role assumptions, creating potential for false negatives.
857+
AWS `AssumedRole` events can contain service and user role assumptions. Oftentimes service role assumptions will contain a dynamic session identifier instead of a static user identifer which contains the originating identity. Prior to the change we are now reverting, this was causing certain services to generate user entities from these sessions, creating false positives. This behavior changed with the [August 5th, 2024 content release](#august-5-2024---content-release) to handle role assumptions to instead map the role as user to prevent false positives from dynamic service sessions. While this decreased the number of false positives from dynamic service sessions, it also eliminated visibility into user role assumptions, creating potential for false negatives.
856858

857859
AWS best practices suggest defining `sourceIdentity` to allow for the originating user for a role assumption to be identifiable. This is the best path to avoid false positive generation, as our mapper will favor `sourceIdentity` if it is present in CloudTrail logs. If it is not present, then `userIdentity.arn` will be used and the `resource-id` will be mapped to `user_username`, creating potential for false positives from dynamic session identifiers. See [Viewing source identity in CloudTrail](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html#id_credentials_temp_control-access_monitor-ct) in the AWS documentation for more information.
858860

blog-cse/2025-01-14-content.md

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
---
2+
title: January 14, 2025 - Content Release
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- rules
6+
- log mappers
7+
- parsers
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
<a href="https://help.sumologic.com/release-notes-cse/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
14+
15+
This content release includes:
16+
- Parsing and mapping support for Azure DevOps Auditing via EventHubs, and Pfsense Firewall.
17+
- Parsing and mapping additions and updates for Cisco ISE, Cloudflare, Check Point Firewall, and Linux OS Syslog.
18+
19+
:::note
20+
In two weeks, MATCH-S00604 "OneLogin - API Credentials - Key Used from Untrusted Location" will be deleted from the out-of-the-box Cloud SIEM rules due to unmanageable deny list logic and low adoption. To retain this rule, a duplicate must be made prior to the deletion.
21+
:::
22+
23+
## Log Mappers
24+
- [New] Azure DevOps Auditing Catch All
25+
- [New] Check Point Application Control URL Filtering
26+
- [New] Cisco ISE Radius Diagnostics
27+
- [New] Linux OS Syslog - KRB5 Child - Authentication Failure
28+
- [New] Linux OS Syslog - Process systemd - Systemd Session
29+
- [New] Linux OS Syslog - Process systemd - Systemd Session Scope
30+
- [New] Linux OS Syslog - Process systemd - session logout
31+
- [New] Pfsense Firewall filterlog
32+
- [New] Pfsense Firewall nginx
33+
- [New] Pfsense Firewall openvpn Authentication
34+
- [New] Pfsense Firewall openvpn_peer_info|openvpn_error|php_log|sshguard|sshd_log
35+
- [New] Pfsense Firewall openvpn_server_connected|openvpn_server_disconnected|cron_log
36+
- [Updated] Cisco ISE Authentication Failure
37+
- Adds `normalizedSeverity` mapping
38+
- [Updated] Cisco ISE Authentication Success
39+
- Adds `normalizedSeverity` mapping
40+
- [Updated] Cloudflare - Logpush
41+
- Adds mapping for `dns_query`, `http_hostname`, `http_response_contentLength`, `http_response_contentType`, and an alternative value for `ipProtocol`.
42+
- [Updated] Linux OS Syslog - Process sshd - SSH Session Closed|disconnect
43+
- Adds mapping for `normalizedActio`n
44+
- [Updated] Linux OS Syslog - Process systemd - Systemd Session Start and Systemd File Configuration
45+
- Added support for additional events and mapping of `file_path`
46+
47+
## Parsers
48+
- [New] /Parsers/System/Pfsense/Pfsense Firewall
49+
- [Updated] /Parsers/System/Check Point/Check Point Firewall JSON
50+
- [Updated] /Parsers/System/Cisco/Cisco ISE
51+
- [Updated] /Parsers/System/Cloudflare/Cloudflare Logpush
52+
- [Updated] /Parsers/System/Linux/Linux OS Syslog
53+
- [Updated] /Parsers/System/Linux/Shared/Linux Shared Syslog Headers
54+
- [Updated] /Parsers/System/Linux/Shared/Linux Shared Syslog Headers

blog-csoar/2024/12-31.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1414

1515
This is an archive of 2024 Cloud SOAR release notes. To view the full archive, [click here](/release-notes-csoar/archive).
1616

17+
<!--truncate-->
18+
1719
---
1820
### December 31, 2024 - Application Update
1921

@@ -312,7 +314,7 @@ This release introduces three new integrations, as well as several updates.
312314
---
313315
### March 12, 2024 - Content Release
314316

315-
Our Cloud SOAR [application update](/release-notes-csoar/#march-12-2024---application-update) features an important upgrade to Python 3.12 for our Lambda functions. This enhancement is part of our ongoing commitment to security, performance, and the latest technological standards.
317+
Our Cloud SOAR [application update](#march-12-2024---application-update) features an important upgrade to Python 3.12 for our Lambda functions. This enhancement is part of our ongoing commitment to security, performance, and the latest technological standards.
316318

317319
The Python upgrade impacts a total of 38 integrations. These integrations will require updates to ensure compatibility with the new Python version.
318320

@@ -369,7 +371,7 @@ We strongly encourage all users to review the provided documentation and prepare
369371
### March 12, 2024 - Application Update
370372

371373
#### Changes and Enhancements
372-
* Python version updated. If you experience any issues, refer to our [content release note](/release-notes-csoar/#march-12-2024---content-release).
374+
* Python version updated. If you experience any issues, refer to our [content release note](#march-12-2024---content-release).
373375

374376
##### Cloud SOAR
375377
* Playbooks: Test feature now permits you to use internal Incident ID.

blog-service/2023/12-31.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -758,7 +758,7 @@ We're excited to announce the release of our new cloud-to-cloud source for Trell
758758

759759
We’re happy to announce a new security option allowing administrators to set a custom policy for the number of days an API Access Key can go unused before being automatically deactivated. This setting allows administrators to tailor the feature to suit their organization’s specific security requirements. This enhances the security of your account by reducing the risk of unauthorized access through abandoned access keys. This ensures that only active access keys can be used to access your account and its resources.
760760

761-
[Learn more](/docs/manage/security/access-keys#edit-deactivate-or-delete-an-access-key).
761+
[Learn more](/docs/manage/security/access-keys#access-keys-deactivation-policy).
762762

763763

764764
---

blog-service/2025-01-10-apps.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
title: New SaaS and Cloud Apps Release (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- apps
6+
- symantec-endpoint-security-service
7+
- jamf
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
14+
15+
- **Symantec Endpoint Security Service**. We're excited to introduce the new Symantec Endpoint Security Service app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Symantec Endpoint Security source that collects incident and event logs data from the Symantec Endpoint Security platform. This app provides real-time insights into the log data that allows you to monitor and manage endpoint security in real time, enhancing quick responses to threats. [Learn more](/docs/integrations/saas-cloud/symantec-endpoint-security-service/).
16+
17+
- **Jamf**. We're excited to introduce the new Jamf app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Jamf source that collects inventory data from the Jamf platform. This app helps security analysts with critical insights into their organization's Jamf environment. [Learn more](/docs/integrations/saas-cloud/jamf/).
18+

blog-service/2025-01-16-manage.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
---
2+
title: Access Keys Enhancements (Manage)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- access keys
6+
- manage
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We're excited to announce enhancements to how you create and manage access keys.
15+
16+
### Personal Access Keys
17+
18+
The **My Access Keys** section has been moved out of **Preferences** to its own tab and renamed **Personal Access Keys**.
19+
20+
<img src={useBaseUrl('/img/security/access-key-preferences-page.png')} alt="Personal access keys" style={{border: '1px solid gray'}} width="800"/>
21+
22+
To open the Personal Access Keys tab:
23+
* [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select your username and then **Preferences > Personal Access Keys**.
24+
* [**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select your username, and then under **Preferences** select **Personal Access Keys**. You can also click the **Go To...** menu at the top of the screen and select **Personal Access Keys**.
25+
26+
### Scopes
27+
28+
You can now create permission scopes for access keys. Scopes limit the API endpoints an access key can be used to call. This allows you to specify only the permissions the access key needs to accomplish a specific task, making the key more secure.
29+
30+
[Learn more](/docs/manage/security/access-keys).
31+
32+
<img src={useBaseUrl('/img/security/custom-scopes-example.png')} alt="Custom scopes example" style={{border: '1px solid gray'}} width="500"/>

blog-service/2025-01-23-manage.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: Time-Phased Scan Budgets (Manage)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- time-phased-scan-budgets
6+
- manage
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We're excited to introduce the time-phased scan budgets for advanced usage management, which helps you to set **Daily**, **Weekly**, or **Monthly** budgets for individual user or a single shared budget for an entire group. [Learn more](/docs/manage/manage-subscription/usage-management/#set-scan-budgets).

0 commit comments

Comments
 (0)