Skip to content

Commit 4f7bc2d

Browse files
authored
Merge branch 'main' into threat-intel-ga
2 parents c475014 + 60e36f5 commit 4f7bc2d

File tree

508 files changed

+1700
-1435
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

508 files changed

+1700
-1435
lines changed

blog-cse/2024-09-19-content.md

Lines changed: 214 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,214 @@
1+
---
2+
title: September 19, 2024 - Content Release
3+
hide_table_of_contents: true
4+
keywords:
5+
- log mappers
6+
- log parsers
7+
- detection rules
8+
image: https://help.sumologic.com/img/sumo-square.png
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
<a href="https://help.sumologic.com/release-notes-cse/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
14+
15+
This content release includes:
16+
* Updates to 111 rules to improve the user experience by removing often lengthy command lines from rule summary expressions (retained in record and signal).
17+
* Deletion of a low efficacy rule.
18+
* Mapping updates to better employ [normalized classification](/docs/cse/schema/cse-normalized-classification/) fields across data sources.
19+
* Adds alternate case handling for Windows Security Event Log error codes.
20+
* Updates to LastPass parsing and mapping to support Reporting and Failed Logon events.
21+
* Adds support for Thinkst Canary JSON logging.
22+
* Adjusts time handling for Thinkst Canary Syslog.
23+
24+
Other changes are enumerated below.
25+
26+
27+
### Rules
28+
- [Deleted] LEGACY-S00180 DNS query for dynamic DNS provider
29+
- [Updated] MATCH-S00814 Abnormal Child Process - sdiagnhost.exe - CVE-2022-30190
30+
- [Updated] MATCH-S00660 Anomalous AWS User Executed a Command on ECS Container
31+
- [Updated] MATCH-S00388 COMPlus_ETWEnabled Command Line Arguments
32+
- [Updated] MATCH-S00727 CPL File Executed from Temp Directory
33+
- [Updated] MATCH-S00412 Command Line Execution with Suspicious URL and AppData Strings
34+
- [Updated] MATCH-S00658 Container Management Utility in Container
35+
- [Updated] MATCH-S00410 Copy from Admin Share
36+
- [Updated] MATCH-S00443 Create Windows Share
37+
- [Updated] MATCH-S00525 Credential Dumping Via Copy Command From Shadow Copy
38+
- [Updated] MATCH-S00526 Credential Dumping Via Symlink To Shadow Copy
39+
- [Updated] MATCH-S00348 Curl Start Combination
40+
- [Updated] MATCH-S00385 DTRACK Process Creation
41+
- [Updated] MATCH-S00441 Delete Windows Share
42+
- [Updated] MATCH-S00543 Detect Psexec With Accepteula Flag
43+
- [Updated] MATCH-S00319 Dridex Process Pattern
44+
- [Updated] MATCH-S00590 Elise Backdoor
45+
- [Updated] MATCH-S00392 File or Folder Permissions Modifications
46+
- [Updated] FIRST-S00028 First Seen Common Windows Recon Commands From User
47+
- [Updated] FIRST-S00059 First Seen esentutl command From User
48+
- [Updated] FIRST-S00041 First Seen networksetup Usage from User
49+
- [Updated] FIRST-S00058 First Seen vssadmin command From User
50+
- [Updated] FIRST-S00060 First Seen wbadmin command From User
51+
- [Updated] FIRST-S00008 First Seen whoami command From User
52+
- [Updated] MATCH-S00414 Grabbing Sensitive Hives via Reg Utility
53+
- [Updated] MATCH-S00325 Greenbug Campaign Indicators
54+
- [Updated] MATCH-S00367 Impacket Lateralization Detection
55+
- [Updated] MATCH-S00482 Impacket-Obfuscation SMBEXEC Utility
56+
- [Updated] MATCH-S00483 Impacket-Obfuscation WMIEXEC Utility
57+
- [Updated] MATCH-S00322 Judgement Panda Credential Access Activity
58+
- [Updated] MATCH-S00334 Judgement Panda Exfil Activity
59+
- [Updated] MATCH-S00651 Kubernetes CreateCronjob
60+
- [Updated] MATCH-S00652 Kubernetes DeleteCronjob
61+
- [Updated] MATCH-S00650 Kubernetes ListCronjobs
62+
- [Updated] MATCH-S00648 Kubernetes ListSecrets
63+
- [Updated] MATCH-S00647 Kubernetes Pod Deletion
64+
- [Updated] MATCH-S00649 Kubernetes Service Account Token File Accessed
65+
- [Updated] MATCH-S00461 LNKSmasher Utility Commands
66+
- [Updated] MATCH-S00746 Loadable Kernel Module Dependency Install
67+
- [Updated] MATCH-S00745 Loadable Kernel Module Enumeration
68+
- [Updated] MATCH-S00723 Loadable Kernel Module Modifications
69+
- [Updated] MATCH-S00352 MSHTA Suspicious Execution
70+
- [Updated] MATCH-S00534 MacOS - Re-Opened Applications
71+
- [Updated] MATCH-S00729 MacOS Gatekeeper Bypass
72+
- [Updated] MATCH-S00731 MacOS System Integrity Protection Disabled
73+
- [Updated] MATCH-S00161 Malicious PowerShell Get Commands
74+
- [Updated] MATCH-S00190 Malicious PowerShell Invoke Commands
75+
- [Updated] MATCH-S00198 Malicious PowerShell Keywords
76+
- [Updated] MATCH-S00331 MavInject Process Injection
77+
- [Updated] MATCH-S00466 MsiExec Web Install
78+
- [Updated] MATCH-S00288 NotPetya Ransomware Activity
79+
- [Updated] MATCH-S00698 PATH Set to Current Directory
80+
- [Updated] MATCH-S00659 Package Management Utility in Container
81+
- [Updated] MATCH-S00697 Pkexec Privilege Escalation - CVE-2021-4034
82+
- [Updated] MATCH-S00149 PowerShell File Download
83+
- [Updated] MATCH-S00449 Powershell Execution Policy Bypass
84+
- [Updated] MATCH-S00427 Process Dump via Rundll32 and Comsvcs.dll
85+
- [Updated] MATCH-S00439 Psr.exe Capture Screenshots
86+
- [Updated] MATCH-S00167 Recon Using Common Windows Commands
87+
- [Updated] MATCH-S00346 Ryuk Ransomware Endpoint Indicator
88+
- [Updated] MATCH-S00506 SC Exe Manipulating Windows Services
89+
- [Updated] MATCH-S00153 Scheduled Task Created via PowerShell
90+
- [Updated] MATCH-S00529 Schtasks Scheduling Job On Remote System
91+
- [Updated] MATCH-S00530 Schtasks Used For Forcing A Reboot
92+
- [Updated] MATCH-S00359 Suspicious Certutil Command
93+
- [Updated] MATCH-S00356 Suspicious Compression Tool Parameters
94+
- [Updated] MATCH-S00362 Suspicious Curl File Upload
95+
- [Updated] MATCH-S00476 Suspicious Execution of Search Indexer
96+
- [Updated] MATCH-S00464 Suspicious Non-Standard InstallUtil Execution
97+
- [Updated] MATCH-S00191 Suspicious PowerShell Keywords
98+
- [Updated] MATCH-S00431 Suspicious Use of Procdump
99+
- [Updated] MATCH-S00477 Suspicious Use of Workflow Compiler for Payload Execution
100+
- [Updated] MATCH-S00342 Suspicious use of Dev-Tools-Launcher
101+
- [Updated] MATCH-S00279 TAIDOOR RAT DLL Load
102+
- [Updated] MATCH-S00531 Unload Sysmon Filter Driver
103+
- [Updated] MATCH-S00762 Unusual Staging Directory - PolicyDefinitions
104+
- [Updated] MATCH-S00761 Volume Shadow Copy Service Stopped
105+
- [Updated] MATCH-S00147 WMI Managed Object Format (MOF) Process Execution
106+
- [Updated] MATCH-S00760 WMI Ping Sweep
107+
- [Updated] MATCH-S00146 WMI Process Call Create
108+
- [Updated] MATCH-S00151 WMI Process Get Brief
109+
- [Updated] MATCH-S00379 WMIExec VBS Script
110+
- [Updated] MATCH-S00400 Web Download via Office Binaries
111+
- [Updated] MATCH-S00539 Web Servers Executing Suspicious Processes
112+
- [Updated] MATCH-S00174 Web Services Executing Common Web Shell Commands
113+
- [Updated] MATCH-S00284 Windows - Delete Windows Backup Catalog
114+
- [Updated] MATCH-S00181 Windows - Domain Trust Discovery
115+
- [Updated] MATCH-S00168 Windows - Local System executing whoami.exe
116+
- [Updated] MATCH-S00162 Windows - Network trace capture using netsh.exe
117+
- [Updated] MATCH-S00159 Windows - Permissions Group Discovery
118+
- [Updated] MATCH-S00268 Windows - Possible Impersonation Token Creation Using Runas
119+
- [Updated] MATCH-S00276 Windows - Possible Squiblydoo Technique Observed
120+
- [Updated] MATCH-S00281 Windows - PowerShell Process Discovery
121+
- [Updated] MATCH-S00171 Windows - Powershell Scheduled Task Creation from PowerSploit or Empire
122+
- [Updated] MATCH-S00185 Windows - Remote System Discovery
123+
- [Updated] MATCH-S00272 Windows - Rogue Domain Controller - dcshadow
124+
- [Updated] MATCH-S00170 Windows - Scheduled Task Creation
125+
- [Updated] MATCH-S00192 Windows - System Network Configuration Discovery
126+
- [Updated] MATCH-S00194 Windows - System Time Discovery
127+
- [Updated] MATCH-S00172 Windows - WiFi Credential Harvesting with netsh
128+
- [Updated] MATCH-S00532 Windows Adfind Exe
129+
- [Updated] MATCH-S00552 Windows Connhost Started Forcefully
130+
- [Updated] MATCH-S00398 Windows Defender Download Activity
131+
- [Updated] MATCH-S00179 Windows Network Sniffing
132+
- [Updated] MATCH-S00157 Windows Process Name Impersonation
133+
- [Updated] MATCH-S00178 Windows Query Registry
134+
- [Updated] MATCH-S00533 Windows Security Account Manager Stopped
135+
- [Updated] LEGACY-S00171 Windows Service Executed from Nonstandard Execution Path
136+
- [Updated] MATCH-S00724 Windows Update Agent DLL Changed
137+
- [Updated] MATCH-S00382 Winnti Pipemon Characteristics
138+
- [Updated] MATCH-S00435 XSL Script Processing
139+
- [Updated] MATCH-S00726 macOS Kernel Extension Load
140+
141+
### Log Mappers
142+
- [New] LastPass Failed Login Attempt
143+
- [New] LastPass Reporting
144+
- [Updated] Thinkst Canary Parser - Catch All
145+
- Removed time handling from mapper to favor parser time handling
146+
- [Updated] 1Password Item Audit Actions
147+
- [Updated] 1Password Item Usage Actions
148+
- [Updated] AWS Config - Custom Parser
149+
- [Updated] AWS EKS - Custom Parser
150+
- [Updated] AWS Inspector - Custom Parser
151+
- [Updated] AWS Route 53 Logs
152+
- [Updated] AWS S3 Server Access Log - Custom Parser
153+
- [Updated] AWS Security Hub
154+
- [Updated] AWSGuardDuty - Audit Events
155+
- [Updated] AWSGuardDuty - AwsServiceEvent-AWS API Call via CloudTrail
156+
- [Updated] AWSGuardDuty - Reconnaissance and malicious activity detection
157+
- [Updated] AWSGuardDuty - Tor Client and Relay
158+
- [Updated] AWSGuardDuty - UnauthorizedAccess_EC2_TorIPCaller
159+
- [Updated] AWSGuardDuty_Catch_All
160+
- [Updated] Adaxes - Custom Parser
161+
- [Updated] ApplicationGatewayAccessLog
162+
- [Updated] ApplicationGatewayFirewallLog
163+
- [Updated] Aqua Runtime Policy Match
164+
- [Updated] Azure Appplication Service Console Logs
165+
- [Updated] Azure AuditEvent logs
166+
- [Updated] Azure Event Hub - Windows Defender Logs
167+
- [Updated] Azure Firewall Application Rule
168+
- [Updated] Azure Firewall DNS Proxy
169+
- [Updated] Azure Firewall Network Rule
170+
- [Updated] Azure NSG Flows
171+
- [Updated] Azure Policy Logs
172+
- [Updated] AzureActivityLog
173+
- [Updated] AzureActivityLog 01
174+
- [Updated] AzureActivityLog AuditLogs
175+
- [Updated] AzureDevOpsAuditing
176+
- [Updated] Cato Networks Audits
177+
- [Updated] CloudTrail - cloudtrail.amazonaws.com - CreateTrail
178+
- [Updated] Cyber Ark EPM AggregateEvent
179+
- [Updated] Druva Cyber Resilience - Catch All
180+
- [Updated] GCP App Engine Logs
181+
- [Updated] GCP Audit Logs
182+
- [Updated] GCP IDS
183+
- [Updated] GCP Parser - Load Balancer
184+
- [Updated] Google Security Command Center
185+
- [Updated] JumpCloud IdP - Catch All
186+
- [Updated] Kaltura Audits
187+
- [Updated] Microsoft Defender for Cloud - Security Alerts
188+
- [Updated] Microsoft Office 365 AzureActiveDirectory Events
189+
- [Updated] Microsoft Office 365 MicrosoftStream Events
190+
- [Updated] Microsoft Office 365 PowerApps Events
191+
- [Updated] Microsoft Office 365 Sway Events
192+
- [Updated] Microsoft Office 365 Teams Events
193+
- [Updated] Microsoft Office 365 Yammer Events
194+
- [Updated] MicrosoftGraphActivityLogs
195+
- [Updated] Office 365 - MicrosoftFlow
196+
- [Updated] Office 365 - Security Compliance Alerts
197+
- [Updated] Osquery Catchall
198+
- [Updated] Osquery FIM
199+
- [Updated] Osquery Process Auditing
200+
- [Updated] Osquery Socket Events
201+
- [Updated] Osquery Startup Items
202+
- [Updated] Palo Alto Config - Custom Parser
203+
- [Updated] Palo Alto Threat Spyware - Custom Parser
204+
- [Updated] RSA SecurID Runtime Authn Logout
205+
- [Updated] RSA SecurID Runtime Catchall
206+
- [Updated] UnauthorizedAccess_EC2_SSHBruteForce
207+
- [Updated] Windows - Security - 4625
208+
- [Updated] Windows - Security - 4634
209+
210+
### Parsers
211+
- [New] /Parsers/System/Thinkst Canary/Thinkst Canary JSON
212+
- [Updated] /Parsers/System/LastPass/LastPass
213+
- [Updated] /Parsers/System/Thinkst Canary/Thinkst Canary
214+
- Updated time handling to use `_messagetime` metadata

blog-service/2016/12-31.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ This is an archive of the 2016 Sumo Logic Service Release Notes. To view the ful
5555

5656
**Sumo Logic App for Amazon RDS Metrics (Preview).** The Sumo Logic App for Amazon RDS Metrics provides visibility into your Amazon Relational Database Service (RDS) Metrics collected via a CloudWatch Metrics Source. The App’s Dashboards provide preconfigured searches and filters that allow you to monitor your RDS system's overview, CPU, memory, storage, network transmit and receive throughput, read and write operations, database connection count, disk queue depth, and more. For details, see [Amazon RDS Metrics](/docs/integrations/amazon-aws/rds). This is a Preview App.
5757

58-
**Pause and Resume an S3 Source.** You can pause an S3 Source at any time to stop the Source from sending data from the Source to Sumo Logic. Locate the Source on the **Manage > Collection** page, and click **Pause**.** **Click the **Resume** link when you are ready for the Source to start sending data again. For details, see [Pause and Resume an S3 Source](/docs/send-data/collection/pause-resume-source).
58+
**Pause and Resume an S3 Source.** You can pause an S3 Source at any time to stop the Source from sending data from the Source to Sumo Logic. Locate the Source on the **Manage > Collection** page, and click **Pause**.Click the **Resume** link when you are ready for the Source to start sending data again. For details, see [Pause and Resume an S3 Source](/docs/send-data/collection/pause-resume-source).
5959

6060

6161
### November 10, 2016
@@ -238,7 +238,7 @@ Downloading the configuration allows you to create scripts to configure multiple
238238

239239
### July 19, 2016
240240

241-
**New UI for Users and Roles.** As the first step in introducing advanced Role Based Access Control (RBAC) to Sumo Logic, the UI for the **Manage > User **and **Manage > Roles** pages has been updated. The new UI provides Sumo Logic administrators with an easy and intuitive way to create new roles based on business needs, define the capabilities the roles can access, assign users to roles, and manage the settings for users, roles, and capabilities. For complete details, see [Users and Roles](/docs/manage/users-roles).
241+
**New UI for Users and Roles.** As the first step in introducing advanced Role Based Access Control (RBAC) to Sumo Logic, the UI for the **Manage > User** and **Manage > Roles** pages has been updated. The new UI provides Sumo Logic administrators with an easy and intuitive way to create new roles based on business needs, define the capabilities the roles can access, assign users to roles, and manage the settings for users, roles, and capabilities. For complete details, see [Users and Roles](/docs/manage/users-roles).
242242

243243

244244
### July 15, 2016

blog-service/2017/12-31.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -373,7 +373,7 @@ The ability to save LogReduce results to a baseline has been deprecated.
373373
---
374374
## June 23, 2017
375375

376-
**PCI Compliance for Amazon VPC Flow Log App. **The Sumo Logic App for [Payment Card Industry (PCI) Compliance for Amazon VPC Flow App](/docs/integrations/amazon-aws/vpc-flow-logs-pci-compliance) is now available. This app offers dashboards to help you monitor that network traffic, network activities, and network security are within your expected ranges. The PCI Compliance for Amazon VPC Flow App covers PCI requirements 01, 02 and 04.
376+
**PCI Compliance for Amazon VPC Flow Log App**. The Sumo Logic App for [Payment Card Industry (PCI) Compliance for Amazon VPC Flow App](/docs/integrations/amazon-aws/vpc-flow-logs-pci-compliance) is now available. This app offers dashboards to help you monitor that network traffic, network activities, and network security are within your expected ranges. The PCI Compliance for Amazon VPC Flow App covers PCI requirements 01, 02 and 04.
377377

378378
<img src={useBaseUrl('img/release-notes/service/archive/6-23-17.png')} alt="releasenotes" />
379379

@@ -391,8 +391,8 @@ Be aware of the following changes that come with these enhancements:
391391
* **Field counts may still be loading.** Field counts load asynchronously, and may still be loading after the histogram renders.
392392
* **Receipt time still has 100k pause.** If your search uses receipt time, you will still see the 100k message limit.
393393
* **Oldest message sorts first when you reach 100k messages.** Although you can have more than 100k messages in the histogram, the oldest message that will be shown is the 100k message. To get around this issue and see the range you want on the histogram, you can:
394-
** Reduce the timerange and return the search.
395-
** Shift+click on the histogram bar to drilldown into a specific timerange.
394+
* Reduce the timerange and return the search.
395+
* Shift+click on the histogram bar to drilldown into a specific timerange.
396396

397397
---
398398
## June 19, 2017
@@ -431,10 +431,10 @@ The Threat Intel for AWS App scans your AWS CloudTrail, AWS Elastic Load Balanci
431431
---
432432
## June 16, 2017
433433

434-
**Custom timestamp formats. **You can now specify multiple custom timestamp formats per source, where to locate them in your log lines with regex, and test them to see if we can parse that format. We will still auto detect timestamps for you if your custom formats do not parse. See [Timestamps, Time Zones, Time Ranges, and Date Formats](/docs/send-data/reference-information/time-reference) and [Use JSON to Configure Sources](/docs/send-data/use-json-configure-sources)
434+
**Custom timestamp formats**. You can now specify multiple custom timestamp formats per source, where to locate them in your log lines with regex, and test them to see if we can parse that format. We will still auto detect timestamps for you if your custom formats do not parse. See [Timestamps, Time Zones, Time Ranges, and Date Formats](/docs/send-data/reference-information/time-reference) and [Use JSON to Configure Sources](/docs/send-data/use-json-configure-sources)
435435

436436

437-
**More epoch timestamp support. **You can now specify the epoch timestamp token, which will match against 10, 13, 16, or 19-digit epoch timestamps, with or without decimal points. See [Timestamps, Time Zones, Time Ranges, and Date Formats](/docs/send-data/reference-information/time-reference).
437+
**More epoch timestamp support**. You can now specify the epoch timestamp token, which will match against 10, 13, 16, or 19-digit epoch timestamps, with or without decimal points. See [Timestamps, Time Zones, Time Ranges, and Date Formats](/docs/send-data/reference-information/time-reference).
438438

439439
---
440440
## June 12, 2017
@@ -459,7 +459,7 @@ If you're a current Sumo Logic user, you'll find that the navigation and some me
459459

460460
**Apps**. The App Catalog has a new preview option. If you’re not sure what dashboards you’ll get with an app, you can click the
461461

462-
**Preview Dashboards **link in the App Catalog to see a preview of the dashboards included with the app.
462+
**Preview Dashboards**. Link in the App Catalog to see a preview of the dashboards included with the app.
463463

464464
**New tutorials**. We’ve updated our Quick Start tutorials to better reflect the different getting started experiences for setting up Sumo Logic and using Sumo Logic.
465465

@@ -607,4 +607,4 @@ This capability is called quantization. The quantization interval aligns your ti
607607

608608
**Webhook Connection for Microsoft Azure Functions**. You can trigger an Azure function directly from a Scheduled Search or metrics monitor by configuring a Webhook connection in Sumo Logic. For details, see [Webhook Connection for Microsoft Azure Functions](/docs/alerts/webhook-connections/microsoft-azure-functions).
609609

610-
**Webhook Connection for AWS Lambda. **You can trigger an AWS Lambda function directly from a Scheduled Search or metrics monitor by configuring a Webhook connection in Sumo Logic. For details, see [Webhook Connection for AWS Lambda](/docs/alerts/webhook-connections/aws-lambda).
610+
**Webhook Connection for AWS Lambda**. You can trigger an AWS Lambda function directly from a Scheduled Search or metrics monitor by configuring a Webhook connection in Sumo Logic. For details, see [Webhook Connection for AWS Lambda](/docs/alerts/webhook-connections/aws-lambda).

0 commit comments

Comments
 (0)