Skip to content

Commit 76867ca

Browse files
authored
DOCS-610 - Fix match lists docs (#4988)
1 parent 132bd3c commit 76867ca

File tree

4 files changed

+5
-5
lines changed

4 files changed

+5
-5
lines changed

docs/cse/match-lists-suppressed-lists/create-match-list.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@ Here’s a use case for using a match list to define an allow list:  Vulnerabil
1818
There’s no reason you can’t use a match list to define “deny lists” of items. However, Cloud SIEM’s threat intel feature is designed for exactly that purpose. Most of the time, but not always, you should use threat intel lists for negative indicators. For more information, see [Match lists or threat intel: which to use?](#match-listor-threat-intel-which-to-use).
1919
:::
2020

21-
Here are some match lists in the Cloud SIEM UI.
21+
Here are some match lists in Cloud SIEM.
2222

23-
<img src={useBaseUrl('img/cse/example-match-list.png')} alt="Example match list" style={{border: '1px solid gray'}} width="800"/>
23+
<img src={useBaseUrl('img/cse/example-match-lists.png')} alt="Example match list" style={{border: '1px solid gray'}} width="800"/>
2424

2525
Note that each match list has a **Target Column**, which you define when you create the list. The Target Column indicates what type of record fields should be compared to the match list, for example, hostnames, URLs, domains, IP addresses, usernames, and so on. For more information, see [How are match lists Used?](#how-are-match-lists-used)
2626

docs/cse/match-lists-suppressed-lists/custom-match-list-columns.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,4 +50,4 @@ To see the custom columns that have been defined in your environment:
5050

5151
1. Follow the instructions in [Create a Match List](/docs/cse/match-lists-suppressed-lists/create-match-list/#create-a-match-list).
5252
1. In the **Add Match List** dialog, click **Target Column**. A list of available target column values appears.
53-
1. Select the desired column in the **Custom** section of the selector list.<br/><img src={useBaseUrl('img/cse//target-column-selector.png')} alt="Target column selector" style={{border: '1px solid gray'}} width="400"/>
53+
1. Select the desired column in the **Custom** section of the selector list.<br/><img src={useBaseUrl('img/cse/target-column-selector.png')} alt="Target column selector" style={{border: '1px solid gray'}} width="400"/>

docs/cse/rules/about-cse-rules.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -134,9 +134,9 @@ This section describes what [match lists](/docs/cse/match-lists-suppressed-lists
134134

135135
Match lists are lists of important indicators and identifiers, typically configured by a Cloud SIEM analyst. Match lists are often used to define allowlists of entities, like IP addresses, URLs, and hostnames, and so on, that you want to exempt from ordinary rule processing. For example, you might want to prevent a rule from firing for records that contain one of a certain set of IP addresses. 
136136

137-
Here’s an example of a match list in the Cloud SIEM UI. 
137+
Here are some match lists in Cloud SIEM.  
138138

139-
<img src={useBaseUrl('img/cse/example-match-list.png')} alt="Example match list" width="800"/>
139+
<img src={useBaseUrl('img/cse/example-match-lists.png')} alt="Example match list" width="800"/>
140140

141141
You can take advantage of match lists in rules, but match lists actually come into play when records are ingested. Here’s how it works:  When a record is ingested, Cloud SIEM compares the entries in all match lists to fields in the record. Of course, Cloud SIEM doesn’t compare the entries in a given match list to all fields in a record; it wouldn’t make sense to compare a domain name to an IP address. You could say that Cloud SIEM understands the difference between apples and oranges: Cloud SIEM distinguishes which record fields contain IP addresses, which contain domain name and so on. So, Cloud SIEM compares a match list of IP addresses to record fields that contain IP addresses. Similarly, Cloud SIEMs compares a match list of usernames to record fields that contain usernames. For more information about how that works, see [Match Fields Reference](/docs/cse/match-lists-suppressed-lists/match-fields-reference)
142142

File renamed without changes.

0 commit comments

Comments
 (0)