Skip to content

Commit 757ff9f

Browse files
authored
Merge branch 'main' into postgresqlST
2 parents 42aa2ae + 2f49a2d commit 757ff9f

38 files changed

+587
-115
lines changed

blog-service/2025-01-23-manage.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
---
2+
title: Time-Phased Scan Budgets (Manage)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- time-phased-scan-budgets
6+
- manage
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We're excited to introduce the time-phased scan budgets for advanced usage management, which helps you to set **Daily**, **Weekly**, or **Monthly** budgets for individual user or a single shared budget for an entire group. [Learn more](/docs/manage/manage-subscription/usage-management/#set-scan-budgets).

docs/api/getting-started.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ See [Access Keys](/docs/manage/security/access-keys) to learn how to generate an
4242
Because access keys use the permissions of the user running the key, ensure that the user utilizing a key has the [role capabilities](/docs/manage/users-roles/roles/role-capabilities) needed to execute the tasks the key is needed for.
4343
:::
4444

45-
### Access ID and Access Key
45+
### Access ID and access key
4646

4747
When you have an `accessId` and `accessKey`, you can execute requests like the following:
4848

@@ -80,7 +80,7 @@ This would yield a Base64 encoded string `QWxhZGRpbjpPcGVuU2VzYW1l` that is used
8080
```
8181

8282

83-
## Sumo Logic Endpoints by Deployment and Firewall Security
83+
## Sumo Logic endpoints by deployment and firewall security
8484

8585
<img src={useBaseUrl('img/icons/operations/firewall.png')} alt="icon" width="50"/>
8686

@@ -218,17 +218,17 @@ For collection to work, your firewall must allow outbound traffic to Sumo Logic.
218218
* If your firewall doesn’t allow DNS entries, you must allowlist all of the IP addresses for your deployment region. The addresses to allowlist depend on your Sumo Logic deployment.
219219
* To determine the IP addresses that require allowlisting, download the JSON object provided by Amazon Web Services (AWS). Amazon advises that this file will change several times a week. For details on how the file is updated, its usage, its syntax, and how to download the JSON file, see [AWS IP Address Ranges](https://docs.aws.amazon.com/general/latest/gr/aws-ip-ranges.html).
220220

221-
### FedRAMP Deployment
221+
### FedRAMP deployment
222222

223223
Sumo Logic's FedRAMP deployment is similar to our other deployments, such as US2, except that FedRAMP is certified to comply with the United States Standards for Security Categorization of Federal Information and Information Systems ([FIPS-199](https://en.wikipedia.org/wiki/FIPS_199)). In this deployment, we adhere to specific security requirements that are required for handling, storing, and transmitting data classified in the "Moderate" impact level.
224224

225-
### AWS Region by Sumo Deployment
225+
### AWS region by Sumo Logic deployment
226226

227227
import AwsRegion from '../reuse/aws-region-by-sumo-deployment.md';
228228

229229
<AwsRegion/>
230230

231-
## Status Codes
231+
## Status codes
232232

233233
Generic status codes that apply to all our APIs. See the [HTTP status code registry](https://www.iana.org/assignments/http-status-codes/http-status-codes.xhtml) for reference.
234234

@@ -251,7 +251,7 @@ Generic status codes that apply to all our APIs. See the [HTTP status code regis
251251

252252
If a rate is exceeded, a `rate limit exceeded 429` status code is returned.
253253

254-
## Versioning and Conflict Detection
254+
## Versioning and conflict detection
255255

256256
The [Collector Management API](/docs/api/collector-management) uses optimistic locking to deal with versioning and conflict detection. Any response that returns a single entity will have an ETag header which identifies the version of that entity.
257257

docs/cse/administration/create-custom-threat-intel-source.md

Lines changed: 60 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -10,25 +10,19 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1010

1111
This topic has information about setting up a *custom threat intelligence source* in Cloud SIEM, which is a threat intelligence list that you can populate manually, as opposed to using an automatic feed. 
1212

13-
You can set up and populate custom threat intelligence sources interactively from the Cloud SIEM UI, by uploading a .csv file, or using Cloud SIEM APIs. You can populate the sources with IP addresses, hostnames, URLs, email addresses, and file hashes.
13+
You can set up and populate custom threat intelligence sources interactively from the Cloud SIEM UI, by uploading a .csv file, or using Cloud SIEM APIs. You can populate the sources with IP addresses, domains, URLs, email addresses, and file hashes.
1414

1515
## How Cloud SIEM uses indicators
1616

17-
When Cloud SIEM encounters an indicator from your threat source in an incoming
18-
record it adds relevant information to the record. Because threat intelligence
19-
information is persisted within records, you can reference it downstream
20-
in both rules and search. The built-in rules that come with Cloud SIEM
21-
automatically create a signal for records that have been enriched in
22-
this way.
17+
When Cloud SIEM encounters an indicator from your threat source in an incoming record it adds relevant information to the record. Because threat intelligence information is persisted within records, you can reference it downstream in both rules and search. The built-in rules that come with Cloud SIEM automatically create a signal for records that have been enriched in this way.
2318

24-
Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a Rule Tuning Expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Threat Intelligence](/docs/cse/rules/about-cse-rules/#threat-intelligence) in the
25-
*About Cloud SIEM Rules* topic.
19+
Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a Rule Tuning Expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Threat Intelligence](/docs/cse/rules/about-cse-rules/#threat-intelligence) in the *About Cloud SIEM Rules* topic.
2620

2721
## Create a threat intelligence source from Cloud SIEM UI
2822

2923
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Threat Intelligence**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**.
3024
1. Click **Add Source** on the **Threat Intelligence** page.
31-
1. Click **Custom** on the **Add Source** popup.
25+
1. In the **Custom** box click **Create**.
3226
1. On the **Add New Source** popup, enter a name, and if desired, a description for the source.
3327
1. Click **Add Custom Source**.
3428

@@ -41,13 +35,15 @@ Your new source should now appear on the **Threat Intelligence** page.
4135
1. On the **Threat Intelligence** page, click the name of the source you want to update.
4236
1. The **Details** page lists any indicators that have previously been added and have not expired. Click **Add Indicator**.
4337
1. On the **New Threat Intelligence Indicator** popup.
44-
1. **Value**. Enter an IP address, hostname, URL, or file hash.
45-
Your entry must be one of:
46-
* A valid IPV4 or IPv6 address  
47-
* A valid email address
48-
* A valid, complete URL
49-
* A hostname (without protocol or path)
50-
* A hexadecimal string of 32, 40, 64, or 128 characters 
38+
1. **Value**. Enter one of the following:
39+
* Domain (valid domain name without protocol or path)
40+
* Email (valid email address)
41+
* File hash (hexadecimal string of 32, 40, 64, or 128 characters)
42+
* IP (valid IPV4 or IPv6 address)  
43+
* URL (valid, complete URL)
44+
:::note
45+
For the fields the value will be compared to, see [Target fields for threat indicators](#target-fields-for-threat-indicators) below.
46+
:::
5147
1. **Description**. (Optional)
5248
1. **Expiration**. (Optional) If desired, you can specify an
5349
expiration date and time for the indicator. When that time is
@@ -58,16 +54,15 @@ Your new source should now appear on the **Threat Intelligence** page.
5854

5955
### Upload a file of indicators 
6056

61-
If you have a large number of indicators to add to your source, you can
62-
save time by creating a .csv file and uploading it to Cloud SIEM.
57+
If you have a large number of indicators to add to your source, you can save time by creating a .csv file and uploading it to Cloud SIEM.
6358

6459
#### Create a CSV file
6560

6661
The .csv file can contain up to four columns, which are described below. 
6762

6863
| Column | Description |
6964
| :-- | :-- |
70-
| value | Required. Must be one of the following: <br/>- A valid IPV4 or IPv6 address<br/>- A valid, complete URL <br/>- A valid email address<br/>- A hostname (without protocol or path)<br/>- A hexadecimal string of 32, 40, 64, or 128 characters |
65+
| value | Required. Must be one of the following: <br/>- Domain (valid domain name without protocol or path)<br/>- Email (valid email address)<br/>- File hash (hexadecimal string of 32, 40, 64, or 128 characters)<br/>- IP (valid IPV4 or IPv6 address)<br/>- URL (valid, complete URL) <br/>For the fields the value will be compared to, see [Target fields for threat indicators](#target-fields-for-threat-indicators) below. |
7166
| description | Optional. |
7267
| expires| Optional. The data and time when you want the indicator to be removed, in any ISO date format. |
7368
| active | Required. Specifies whether the indicator actively looks for threat intelligence in records. Valid values are `true` or `false`. |
@@ -79,7 +74,7 @@ value,description,expires,active
7974
22.333.22.252,Tante Intel,2022-06-01 01:00 PM,true
8075
```
8176

82-
### Upload the file
77+
#### Upload the file
8378

8479
1. On the **Threat Intelligence** page, click the name of the target custom source.
8580
1. Click **Import Indicators**.
@@ -91,6 +86,50 @@ value,description,expires,active
9186

9287
You can use Cloud SIEM threat intelligence APIs to create and manage indicators and custom threat sources. For information about Cloud SIEM APIs and how to access the API documentation, see [Cloud SIEM APIs](/docs/cse/administration/cse-apis/).
9388

89+
## Target fields for threat indicators
90+
91+
Following are the fields that threat indicators are compared to.
92+
93+
* Domain:
94+
* bro_ntlm_domainname
95+
* bro_ssl_serverName_rootDomain
96+
* dns_queryDomain
97+
* dns_replyDomain
98+
* fromUser_authDomain
99+
* http_referrerDomain
100+
* http_url_rootDomain
101+
* http_url_fqdn
102+
* Email:
103+
* email_sender
104+
* fromUser_email
105+
* fromUser_email_raw
106+
* targetUser_email
107+
* targetUser_email_raw
108+
* user_email
109+
* user_email_raw
110+
* File hash:
111+
* file_hash_imphash
112+
* file_hash_md5
113+
* file_hash_pehash
114+
* file_hash_sha1
115+
* file_hash_sha256
116+
* file_hash_ssdeep
117+
* IP:
118+
* bro_dhcp_assignedIp
119+
* bro_radius_remoteIp
120+
* bro_smtp_headers.xOriginatingIp
121+
* bro_socks_boundIp
122+
* bro_socks_requestIp
123+
* device_ip
124+
* device_natIp
125+
* dns_replyIp
126+
* dstDevice_ip
127+
* dstDevice_natIp
128+
* srcDevice_ip
129+
* srcDevice_natIp
130+
* URL:
131+
* http_url
132+
94133
## Search indicators
95134

96135
To search threat indicators, click the **Search All Indicators** button at the top of the **Threat Intelligence** page.

docs/cse/match-lists-suppressed-lists/create-match-list.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -18,11 +18,11 @@ Here’s a use case for using a match list to define an allow list:  Vulnerabil
1818
There’s no reason you can’t use a match list to define “deny lists” of items. However, Cloud SIEM’s threat intel feature is designed for exactly that purpose. Most of the time, but not always, you should use threat intel lists for negative indicators. For more information, see [Match lists or threat intel: which to use?](#match-listor-threat-intel-which-to-use).
1919
:::
2020

21-
Here’s an example of a match list in the Cloud SIEM UI. It is a list of trusted domains.
21+
Here are some match lists in Cloud SIEM.
2222

23-
<img src={useBaseUrl('img/cse/example-match-list.png')} alt="Example match list" style={{border: '1px solid gray'}} width="800"/>
23+
<img src={useBaseUrl('img/cse/example-match-lists.png')} alt="Example match list" style={{border: '1px solid gray'}} width="800"/>
2424

25-
Note that the match list has a **Target Column**, which you define when you create the list. The Target Column indicates what type of record fields should be compared to the match list, for example, hostnames, URLs, domains, IP addresses, usernames, and so on. For more information, see [How are match lists Used?](#how-are-match-lists-used)
25+
Note that each match list has a **Target Column**, which you define when you create the list. The Target Column indicates what type of record fields should be compared to the match list, for example, hostnames, URLs, domains, IP addresses, usernames, and so on. For more information, see [How are match lists Used?](#how-are-match-lists-used)
2626

2727
## Built-in rules refer to standard match list names
2828

@@ -82,24 +82,24 @@ You can also create and manage match lists with Cloud SIEM's REST [API](/docs/cs
8282
:::
8383

8484
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Match Lists**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Match List**. You can also click the **Go To...** menu at the top of the screen and select **Match List**.
85-
1. Click **Create**.
86-
1. On the **New Match List** popup, enter the following:
85+
1. Click **Add Match List**.
86+
1. On the **Add Match List** popup, enter the following:
8787
1. **Name**. Name of the Match list. If you are creating a standard match list, make sure the name matches the standard match list name. For more information, see [Standard match lists](/docs/cse/match-lists-suppressed-lists/standard-match-lists#standard-match-lists). We recommend no embedded spaces in list names. For example, instead of *my list*, use *my_list*.
8888
1. **Description**. Enter a description for the list. Descriptions for standard match lists can be found in [Standard match lists](/docs/cse/match-lists-suppressed-lists/standard-match-lists#standard-match-lists).
89-
1. **Time to Live (hours)**. (Optional) Enter the number of hours after which the entries on the list should expire.
9089
1. **Target Column**. The type of message field to which items on the list should be compared. The **Target Column** for standard match lists can be found in [Standard match lists](/docs/cse/match-lists-suppressed-lists/standard-match-lists#standard-match-lists). <br/>
9190
:::note
9291
Once you create a match list, it's not possible to change its **Target Column**.
9392
:::
94-
1. Click **Create**.<br/><img src={useBaseUrl('img/cse/new-match-list.png')} alt="New match list" style={{border: '1px solid gray'}} width="400"/>
93+
1. **Time to Live (hours)**. (Optional) Enter the number of hours after which the entries on the list should expire.
94+
1. Click **Save**.<br/><img src={useBaseUrl('img/cse/new-match-list.png')} alt="New match list" style={{border: '1px solid gray'}} width="400"/>
9595
1. The match list now appears on the **Match Lists** page.
9696
1. Click the name of the match list to open it.
97-
1. On the **Match List > Details** page, click **Add List Item**.
98-
1. On the **New Match List Item** popup, enter:
97+
1. On the **Match Lists > Details** page, click **Add Match List Item**.
98+
1. On the **Add Match List Item** popup, enter:
9999
* **Value**. The value of the entity. Make sure the value you enter is of the same type as the type you selected as the Target Column for the list. For example, if the Target Column is `Domain`, enter a domain.
100100
* **Description**. (Optional) Enter a description of the entity instance you entered.
101101
* **Expiration**. (Optional) The date and time at which the list item should be removed from the list.
102-
* Click **Add** to add the item to the list.
102+
* Click **Save** to add the item to the list.
103103
1. The item now appears in the match list.
104104

105105
## Import a match list

docs/cse/match-lists-suppressed-lists/custom-match-list-columns.md

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -26,25 +26,28 @@ To see the custom columns that have been defined in your environment:
2626

2727
## Create a Custom Column
2828

29-
1. On the **Custom Columns** page, click **Create**.
30-
1. The **Create Match List Column** popup appears. <br/><img src={useBaseUrl('img/cse/create-column.png')} alt="Create column" style={{border: '1px solid gray'}} width="400"/>
29+
1. On the **Custom Columns** page, click **Add Custom Column**.
30+
1. The **Add Custom Column** popup appears. <br/><img src={useBaseUrl('img/cse/create-column.png')} alt="Create column" style={{border: '1px solid gray'}} width="400"/>
3131
1. **Name**. Enter a name for the custom column.
32-
1. **Fields**. Click the chevron icon to display a selector list of Cloud SIEM attributes. You can select multiple attributes. If multiple attributes are selected, the match list will match if the list item value matches a record value for any of the custom column attributes. Click the icon next to Show field guide to view more information, such as data type, about attributes
33-
1. Click **Create** to add the new column.
32+
1. **Fields**. Click to display a selector list of Cloud SIEM attributes. You can select multiple attributes. If multiple attributes are selected, the match list will match if the list item value matches a record value for any of the custom column attributes. Click **Show Field Guide** to view more information about attributes, such as data type. 
33+
1. Click **Save** to add the new column.
3434

3535
## Edit a custom column
3636

3737
1. On the **Custom Columns** page, click the custom column name or the edit icon in the row for the column.
38-
1. Make your changes on the **Edit Match List Column** popup.
39-
1. Click **Update** to save the changes.
38+
1. Click **Edit**.
39+
1. Make your changes on the edit popup.
40+
1. Click **Save** to save the changes.
4041

4142
## Delete a custom column
4243

43-
1. On the **Custom Columns** page, click the trash can icon in the row for the column you want to delete.
44-
1. On the **Delete column** popup, click confirmation popup **Yes, Delete Column**.
44+
1. On the **Custom Columns** page, hover your mouse over a custom column in the list.
45+
1. Click the three-dot kebab button on the far right of the item.
46+
1. Select **Delete**.
47+
1. On the delete confirmation popup, click **Delete**
4548

4649
## Create a match list with a custom column
4750

48-
Follow the instructions in [Create a Match List](/docs/cse/match-lists-suppressed-lists/create-match-list), and select the desired column in the **Custom** section of the **Target Column** selector list.
49-
50-
<img src={useBaseUrl('img/cse//target-column-selector.png')} alt="Target column selector" style={{border: '1px solid gray'}} width="400"/>
51+
1. Follow the instructions in [Create a Match List](/docs/cse/match-lists-suppressed-lists/create-match-list/#create-a-match-list).
52+
1. In the **Add Match List** dialog, click **Target Column**. A list of available target column values appears.
53+
1. Select the desired column in the **Custom** section of the selector list.<br/><img src={useBaseUrl('img/cse/target-column-selector.png')} alt="Target column selector" style={{border: '1px solid gray'}} width="400"/>

0 commit comments

Comments
 (0)