Skip to content

Commit 5d11a6c

Browse files
committed
Cleanup
1 parent d737ece commit 5d11a6c

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

docs/cse/get-started-with-cloud-siem/ai-investation-for-insights.md renamed to docs/cse/get-started-with-cloud-siem/ai-investigation-of-insights.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
id: ai-investigation-for-insights
2+
id: ai-investigation-of-insights
33
title: AI Investigation of Cloud SIEM Insights
44
sidebar_label: AI Investigation of Insights
55
description: Learn how to perform investigations of a Cloud SIEM insights assisted by Sumo Logic artificial intelligence tools.
@@ -46,31 +46,31 @@ the scope, context, and likely impact of an event.
4646

4747
## Investigate the Insight in Sumo Logic Mobot
4848

49-
1. From the insight's details page, click **Ask Mobot** to open the AI investigation in [Sumo Logic Mobot](https://www.sumologic.com/help/docs/search/mobot/).<br/><img src={useBaseUrl('img/cse/ask-mobot-buttons.png')} alt="Ask Mobot buttons" style={{border: '1px solid gray'}} width="800" />
49+
1. From the insight's details page, click **Ask Mobot** to open the AI investigation in [Sumo Logic Mobot](/docs/search/mobot/).<br/><img src={useBaseUrl('img/cse/ask-mobot-buttons.png')} alt="Ask Mobot buttons" style={{border: '1px solid gray'}} width="800" />
5050
1. Details about the AI investigation appear in the Sumo Logic Investigation Agent, an AI agentic tool. The entire context of the AI investigation is brought into Mobot so you can quickly drill down for more information about the insight.<br/><img src={useBaseUrl('img/cse/insight-agent-in-mobot.png')} alt="Mobot Investigation Agent" style={{border: '1px solid gray'}} width="600" />
5151
1. In **Ask Something...**, type a question about the insight using details provided in the **What Happened** section above. For example, you could ask to see logs about the entities mentioned in the text (that is, hosts, users, IP addresses, file hashes, and so on).<br/><img src={useBaseUrl('img/cse/investigation-agent-query.png')} alt="Investigation Agent query" style={{border: '1px solid gray'}} width="600" />
5252
1. Click **Search** <img src={useBaseUrl('img/cse/search-button-in-mobot.png')} alt="Search button in Mobot" width="30" />. The Investigation Agrent analyzes your request and fashions a query based on it.
5353
1. Click **View Results** to see the results of your request in the logs query UI. You can also click the suggestions provided to drill down farther. As you ask questions, Mobot retains the context of your conversation about the insight, allowing you to more easily obtain detail. <br/><img src={useBaseUrl('img/cse/investigation-agent-results.png')} alt="Investigation Agent query results" style={{border: '1px solid gray'}} width="600" />
5454

55-
## Start a new investigation
55+
### Start a new investigation
5656

5757
To clear the context and start a new investigation, click **New Conversation** in the upper-right corner of the screen. To start investigation on another insight, navigate back to Cloud SIEM, select another insight, and click **Ask Mobot**.
5858

5959
## FAQs
6060

6161
### What is the Sumo Logic SOC Analyst Agent?
6262

63-
The SOC Analyst Agent is part of the Sumo Logic [Dojo AI](/docs/get-started/ai-machine-learning/#whats-new-dojo-ai-for-the-soc). The SOC Analyst Agent is an assistant that applies agentic AI reasoning to triage and investigation tasks. It correlates alerts, weighs patterns against frameworks like MITRE ATT&CK, and renders evidence-backed verdicts, providing analysts an immediate sense of threat impact. When deeper analysis is required, the same agent supports hypothesis-based investigation to map relationships, connect entities, and summarize findings.
63+
The SOC Analyst Agent is part of the [Sumo Logic Dojo AI](/docs/get-started/ai-machine-learning/#whats-new-dojo-ai-for-the-soc). The SOC Analyst Agent is an assistant that applies agentic AI reasoning to triage and investigation tasks. It correlates alerts, weighs patterns against frameworks like MITRE ATT&CK, and renders evidence-backed verdicts, providing analysts an immediate sense of threat impact. When deeper analysis is required, the same agent supports hypothesis-based investigation to map relationships, connect entities, and summarize findings.
6464

65-
### What are the benefits of the SOC Analyst Agent?
65+
### What are the benefits of the agent?
6666

6767
Security teams spend too much time validating false positives and performing repetitive investigative steps. By embedding reasoning and context-awareness directly into Cloud SIEM, the SOC Analyst Agent eliminates noise, standardizes outcomes, and accelerates time to resolution.
6868

69-
### Will the SOC Analyst Agent increase scanning or data-processing costs?
69+
### Will the agent increase scanning or data-processing costs?
7070

7171
No. The agent analyzes existing data already ingested into Cloud SIEM. It performs reasoning on metadata and contextual signals rather than initiating new scans.
7272

73-
### How does the SOC Analyst Agent differ from Cloud SIEM correlation or automation rules?
73+
### How does the aAgent differ from Cloud SIEM correlation or automation rules?
7474

7575
Unlike traditional correlation logic, which is static, the SOC Analyst Agent applies agentic reasoning. It adapts based on insight context, recent analyst actions, and environmental signals, producing contextual, explainable decisions rather than fixed pattern matches.
7676

0 commit comments

Comments
 (0)