You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We're excited to introduce the time-phased scan budgets for advanced usage management, which helps you to set **Daily**, **Weekly**, or **Monthly** budgets for individual user or a single shared budget for an entire group. [Learn more](/docs/manage/manage-subscription/usage-management/#set-scan-budgets).
Copy file name to clipboardExpand all lines: docs/api/getting-started.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,7 +42,7 @@ See [Access Keys](/docs/manage/security/access-keys) to learn how to generate an
42
42
Because access keys use the permissions of the user running the key, ensure that the user utilizing a key has the [role capabilities](/docs/manage/users-roles/roles/role-capabilities) needed to execute the tasks the key is needed for.
43
43
:::
44
44
45
-
### Access ID and Access Key
45
+
### Access ID and access key
46
46
47
47
When you have an `accessId` and `accessKey`, you can execute requests like the following:
48
48
@@ -80,7 +80,7 @@ This would yield a Base64 encoded string `QWxhZGRpbjpPcGVuU2VzYW1l` that is used
80
80
```
81
81
82
82
83
-
## Sumo Logic Endpoints by Deployment and Firewall Security
83
+
## Sumo Logic endpoints by deployment and firewall security
@@ -218,17 +218,17 @@ For collection to work, your firewall must allow outbound traffic to Sumo Logic.
218
218
* If your firewall doesn’t allow DNS entries, you must allowlist all of the IP addresses for your deployment region. The addresses to allowlist depend on your Sumo Logic deployment.
219
219
* To determine the IP addresses that require allowlisting, download the JSON object provided by Amazon Web Services (AWS). Amazon advises that this file will change several times a week. For details on how the file is updated, its usage, its syntax, and how to download the JSON file, see [AWS IP Address Ranges](https://docs.aws.amazon.com/general/latest/gr/aws-ip-ranges.html).
220
220
221
-
### FedRAMP Deployment
221
+
### FedRAMP deployment
222
222
223
223
Sumo Logic's FedRAMP deployment is similar to our other deployments, such as US2, except that FedRAMP is certified to comply with the United States Standards for Security Categorization of Federal Information and Information Systems ([FIPS-199](https://en.wikipedia.org/wiki/FIPS_199)). In this deployment, we adhere to specific security requirements that are required for handling, storing, and transmitting data classified in the "Moderate" impact level.
224
224
225
-
### AWS Region by Sumo Deployment
225
+
### AWS region by Sumo Logic deployment
226
226
227
227
import AwsRegion from '../reuse/aws-region-by-sumo-deployment.md';
228
228
229
229
<AwsRegion/>
230
230
231
-
## Status Codes
231
+
## Status codes
232
232
233
233
Generic status codes that apply to all our APIs. See the [HTTP status code registry](https://www.iana.org/assignments/http-status-codes/http-status-codes.xhtml) for reference.
234
234
@@ -251,7 +251,7 @@ Generic status codes that apply to all our APIs. See the [HTTP status code regis
251
251
252
252
If a rate is exceeded, a `rate limit exceeded 429` status code is returned.
253
253
254
-
## Versioning and Conflict Detection
254
+
## Versioning and conflict detection
255
255
256
256
The [Collector Management API](/docs/api/collector-management) uses optimistic locking to deal with versioning and conflict detection. Any response that returns a single entity will have an ETag header which identifies the version of that entity.
Copy file name to clipboardExpand all lines: docs/cse/administration/create-custom-threat-intel-source.md
+60-21Lines changed: 60 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,25 +10,19 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
10
10
11
11
This topic has information about setting up a *custom threat intelligence source* in Cloud SIEM, which is a threat intelligence list that you can populate manually, as opposed to using an automatic feed.
12
12
13
-
You can set up and populate custom threat intelligence sources interactively from the Cloud SIEM UI, by uploading a .csv file, or using Cloud SIEM APIs. You can populate the sources with IP addresses, hostnames, URLs, email addresses, and file hashes.
13
+
You can set up and populate custom threat intelligence sources interactively from the Cloud SIEM UI, by uploading a .csv file, or using Cloud SIEM APIs. You can populate the sources with IP addresses, domains, URLs, email addresses, and file hashes.
14
14
15
15
## How Cloud SIEM uses indicators
16
16
17
-
When Cloud SIEM encounters an indicator from your threat source in an incoming
18
-
record it adds relevant information to the record. Because threat intelligence
19
-
information is persisted within records, you can reference it downstream
20
-
in both rules and search. The built-in rules that come with Cloud SIEM
21
-
automatically create a signal for records that have been enriched in
22
-
this way.
17
+
When Cloud SIEM encounters an indicator from your threat source in an incoming record it adds relevant information to the record. Because threat intelligence information is persisted within records, you can reference it downstream in both rules and search. The built-in rules that come with Cloud SIEM automatically create a signal for records that have been enriched in this way.
23
18
24
-
Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a Rule Tuning Expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Threat Intelligence](/docs/cse/rules/about-cse-rules/#threat-intelligence) in the
25
-
*About Cloud SIEM Rules* topic.
19
+
Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a Rule Tuning Expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Threat Intelligence](/docs/cse/rules/about-cse-rules/#threat-intelligence) in the *About Cloud SIEM Rules* topic.
26
20
27
21
## Create a threat intelligence source from Cloud SIEM UI
28
22
29
23
1.[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Threat Intelligence**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**.
30
24
1. Click **Add Source** on the **Threat Intelligence** page.
31
-
1.Click **Custom**on the**Add Source** popup.
25
+
1.In the **Custom**box click**Create**.
32
26
1. On the **Add New Source** popup, enter a name, and if desired, a description for the source.
33
27
1. Click **Add Custom Source**.
34
28
@@ -41,13 +35,15 @@ Your new source should now appear on the **Threat Intelligence** page.
41
35
1. On the **Threat Intelligence** page, click the name of the source you want to update.
42
36
1. The **Details** page lists any indicators that have previously been added and have not expired. Click **Add Indicator**.
43
37
1. On the **New Threat Intelligence Indicator** popup.
44
-
1.**Value**. Enter an IP address, hostname, URL, or file hash.
45
-
Your entry must be one of:
46
-
* A valid IPV4 or IPv6 address
47
-
* A valid email address
48
-
* A valid, complete URL
49
-
* A hostname (without protocol or path)
50
-
* A hexadecimal string of 32, 40, 64, or 128 characters
38
+
1.**Value**. Enter one of the following:
39
+
* Domain (valid domain name without protocol or path)
40
+
* Email (valid email address)
41
+
* File hash (hexadecimal string of 32, 40, 64, or 128 characters)
42
+
* IP (valid IPV4 or IPv6 address)
43
+
* URL (valid, complete URL)
44
+
:::note
45
+
For the fields the value will be compared to, see [Target fields for threat indicators](#target-fields-for-threat-indicators) below.
46
+
:::
51
47
1. **Description**. (Optional)
52
48
1. **Expiration**. (Optional) If desired, you can specify an
53
49
expiration date and time for the indicator. When that time is
@@ -58,16 +54,15 @@ Your new source should now appear on the **Threat Intelligence** page.
58
54
59
55
### Upload a file of indicators
60
56
61
-
If you have a large number of indicators to add to your source, you can
62
-
save time by creating a .csv file and uploading it to Cloud SIEM.
57
+
If you have a large number of indicators to add to your source, you can save time by creating a .csv file and uploading it to Cloud SIEM.
63
58
64
59
#### Create a CSV file
65
60
66
61
The .csv file can contain up to four columns, which are described below.
67
62
68
63
| Column | Description |
69
64
| :-- | :-- |
70
-
| value | Required. Must be one of the following: <br/>- A valid IPV4 or IPv6 address<br/>- A valid, complete URL <br/>- A valid email address<br/>- A hostname (without protocol or path)<br/>- A hexadecimal string of 32, 40, 64, or 128 characters|
65
+
| value | Required. Must be one of the following: <br/>- Domain (valid domain name without protocol or path)<br/>- Email (valid email address)<br/>- File hash (hexadecimal string of 32, 40, 64, or 128 characters)<br/>- IP (valid IPV4 or IPv6 address)<br/>- URL (valid, complete URL) <br/>For the fields the value will be compared to, see [Target fields for threat indicators](#target-fields-for-threat-indicators) below.|
71
66
| description | Optional. |
72
67
| expires| Optional. The data and time when you want the indicator to be removed, in any ISO date format. |
73
68
| active | Required. Specifies whether the indicator actively looks for threat intelligence in records. Valid values are `true` or `false`. |
You can use Cloud SIEM threat intelligence APIs to create and manage indicators and custom threat sources. For information about Cloud SIEM APIs and how to access the API documentation, see [Cloud SIEM APIs](/docs/cse/administration/cse-apis/).
93
88
89
+
## Target fields for threat indicators
90
+
91
+
Following are the fields that threat indicators are compared to.
92
+
93
+
* Domain:
94
+
* bro_ntlm_domainname
95
+
* bro_ssl_serverName_rootDomain
96
+
* dns_queryDomain
97
+
* dns_replyDomain
98
+
* fromUser_authDomain
99
+
* http_referrerDomain
100
+
* http_url_rootDomain
101
+
* http_url_fqdn
102
+
* Email:
103
+
* email_sender
104
+
* fromUser_email
105
+
* fromUser_email_raw
106
+
* targetUser_email
107
+
* targetUser_email_raw
108
+
* user_email
109
+
* user_email_raw
110
+
* File hash:
111
+
* file_hash_imphash
112
+
* file_hash_md5
113
+
* file_hash_pehash
114
+
* file_hash_sha1
115
+
* file_hash_sha256
116
+
* file_hash_ssdeep
117
+
* IP:
118
+
* bro_dhcp_assignedIp
119
+
* bro_radius_remoteIp
120
+
* bro_smtp_headers.xOriginatingIp
121
+
* bro_socks_boundIp
122
+
* bro_socks_requestIp
123
+
* device_ip
124
+
* device_natIp
125
+
* dns_replyIp
126
+
* dstDevice_ip
127
+
* dstDevice_natIp
128
+
* srcDevice_ip
129
+
* srcDevice_natIp
130
+
* URL:
131
+
* http_url
132
+
94
133
## Search indicators
95
134
96
135
To search threat indicators, click the **Search All Indicators** button at the top of the **Threat Intelligence** page.
Copy file name to clipboardExpand all lines: docs/cse/match-lists-suppressed-lists/create-match-list.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,11 +18,11 @@ Here’s a use case for using a match list to define an allow list: Vulnerabil
18
18
There’s no reason you can’t use a match list to define “deny lists” of items. However, Cloud SIEM’s threat intel feature is designed for exactly that purpose. Most of the time, but not always, you should use threat intel lists for negative indicators. For more information, see [Match lists or threat intel: which to use?](#match-listor-threat-intel-which-to-use).
19
19
:::
20
20
21
-
Here’s an example of a match list in the Cloud SIEM UI. It is a list of trusted domains.
21
+
Here are some match lists in Cloud SIEM.
22
22
23
-
<img src={useBaseUrl('img/cse/example-match-list.png')} alt="Example match list" style={{border: '1px solid gray'}} width="800"/>
23
+
<img src={useBaseUrl('img/cse/example-match-lists.png')} alt="Example match list" style={{border: '1px solid gray'}} width="800"/>
24
24
25
-
Note that the match list has a **Target Column**, which you define when you create the list. The Target Column indicates what type of record fields should be compared to the match list, for example, hostnames, URLs, domains, IP addresses, usernames, and so on. For more information, see [How are match lists Used?](#how-are-match-lists-used)
25
+
Note that each match list has a **Target Column**, which you define when you create the list. The Target Column indicates what type of record fields should be compared to the match list, for example, hostnames, URLs, domains, IP addresses, usernames, and so on. For more information, see [How are match lists Used?](#how-are-match-lists-used)
26
26
27
27
## Built-in rules refer to standard match list names
28
28
@@ -82,24 +82,24 @@ You can also create and manage match lists with Cloud SIEM's REST [API](/docs/cs
82
82
:::
83
83
84
84
1.[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Match Lists**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Match List**. You can also click the **Go To...** menu at the top of the screen and select **Match List**.
85
-
1. Click **Create**.
86
-
1. On the **New Match List** popup, enter the following:
85
+
1. Click **Add Match List**.
86
+
1. On the **Add Match List** popup, enter the following:
87
87
1.**Name**. Name of the Match list. If you are creating a standard match list, make sure the name matches the standard match list name. For more information, see [Standard match lists](/docs/cse/match-lists-suppressed-lists/standard-match-lists#standard-match-lists). We recommend no embedded spaces in list names. For example, instead of *my list*, use *my_list*.
88
88
1.**Description**. Enter a description for the list. Descriptions for standard match lists can be found in [Standard match lists](/docs/cse/match-lists-suppressed-lists/standard-match-lists#standard-match-lists).
89
-
1.**Time to Live (hours)**. (Optional) Enter the number of hours after which the entries on the list should expire.
90
89
1.**Target Column**. The type of message field to which items on the list should be compared. The **Target Column** for standard match lists can be found in [Standard match lists](/docs/cse/match-lists-suppressed-lists/standard-match-lists#standard-match-lists). <br/>
91
90
:::note
92
91
Once you create a match list, it's not possible to change its **Target Column**.
1. The match list now appears on the **Match Lists** page.
96
96
1. Click the name of the match list to open it.
97
-
1. On the **Match List > Details** page, click **Add List Item**.
98
-
1. On the **New Match List Item** popup, enter:
97
+
1. On the **Match Lists > Details** page, click **Add Match List Item**.
98
+
1. On the **Add Match List Item** popup, enter:
99
99
***Value**. The value of the entity. Make sure the value you enter is of the same type as the type you selected as the Target Column for the list. For example, if the Target Column is `Domain`, enter a domain.
100
100
***Description**. (Optional) Enter a description of the entity instance you entered.
101
101
***Expiration**. (Optional) The date and time at which the list item should be removed from the list.
1.**Fields**. Click the chevron icon to display a selector list of Cloud SIEM attributes. You can select multiple attributes. If multiple attributes are selected, the match list will match if the list item value matches a record value for any of the custom column attributes. Click the icon next to Show field guide to view more information, such as data type, about attributes.
33
-
1. Click **Create** to add the new column.
32
+
1.**Fields**. Click to display a selector list of Cloud SIEM attributes. You can select multiple attributes. If multiple attributes are selected, the match list will match if the list item value matches a record value for any of the custom column attributes. Click **Show Field Guide** to view more information about attributes, such as data type.
33
+
1. Click **Save** to add the new column.
34
34
35
35
## Edit a custom column
36
36
37
37
1. On the **Custom Columns** page, click the custom column name or the edit icon in the row for the column.
38
-
1. Make your changes on the **Edit Match List Column** popup.
39
-
1. Click **Update** to save the changes.
38
+
1. Click **Edit**.
39
+
1. Make your changes on the edit popup.
40
+
1. Click **Save** to save the changes.
40
41
41
42
## Delete a custom column
42
43
43
-
1. On the **Custom Columns** page, click the trash can icon in the row for the column you want to delete.
44
-
1. On the **Delete column** popup, click confirmation popup **Yes, Delete Column**.
44
+
1. On the **Custom Columns** page, hover your mouse over a custom column in the list.
45
+
1. Click the three-dot kebab button on the far right of the item.
46
+
1. Select **Delete**.
47
+
1. On the delete confirmation popup, click **Delete**
45
48
46
49
## Create a match list with a custom column
47
50
48
-
Follow the instructions in [Create a Match List](/docs/cse/match-lists-suppressed-lists/create-match-list), and select the desired column in the **Custom** section of the **Target Column** selector list.
1.Follow the instructions in [Create a Match List](/docs/cse/match-lists-suppressed-lists/create-match-list/#create-a-match-list).
52
+
1. In the **Add Match List** dialog, click **Target Column**. A list of available target column values appears.
53
+
1. Select the desired column in the **Custom** section of the selector list.<br/><img src={useBaseUrl('img/cse/target-column-selector.png')} alt="Target column selector" style={{border: '1px solid gray'}} width="400"/>
0 commit comments