You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We’re excited to introduce Sumo Logic Threat Intelligence, a new feature set that enables you to seamlessly import threat intelligence indicator files directly into Sumo Logic to aid in security analysis. Sumo Logic Threat Intelligence will help you stay ahead of emerging threats and enhance your security posture.
14
+
We’re excited to introduce Sumo Logic Threat Intelligence, a powerful feature set that enables you to seamlessly import threat intelligence indicator files directly into Sumo Logic to aid in security analysis. Threat intelligence indicators are individual data points about threats that are gathered from external sources about various entities such as host names, file hashes, IP addresses, and other known targets for compromise.
15
15
16
-
Threat intelligence indicators are individual data points about threats that are gathered from external sources about various entities such as host names, file hashes, IP addresses, and other known targets for compromise.
16
+
To see threat intelligence indicators, go to **Manage Data > Logs > Threat Intelligence**. Once indicators are ingested and appear on the **Threat Intelligence** tab, you can use them to search logs for threats.
17
17
18
-
To see threat intelligence indicators, go to **Manage Data > Logs > Threat Intelligence**. Once you ingest indicators and they appear on the **Threat Intelligence** tab, you can use them to search logs for threats.
18
+
Sumo Logic Threat Intelligence will help you stay ahead of emerging threats and enhance your security posture.
Only Cloud SIEM administrators can add threat intelligence indicators to the system. However, all Sumo Logic users can run queries against the indicators to uncover threats.
Copy file name to clipboardExpand all lines: docs/integrations/security-threat-detection/threat-intel-quick-analysis.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,9 +27,11 @@ import AppInstall from '../../reuse/apps/app-install.md';
27
27
28
28
## Threat Intel optimization
29
29
30
-
The Threat Intel Quick Analysis app provides baseline queries. You can further optimize and enhance these queries for the log and events types being scanned for threats. Use the following guidelines to customize your threat intel queries:
30
+
The app provides baseline queries that utilize the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/) to look for threat intelligence data. To see the queries, open a [dashboard in the app](#viewing-threat-intel-quick-analysis-dashboards), click the three-dot kebab in the upper-right corner of the dashboard panel, and select **Open in Log Search**.
31
31
32
-
* Filter out unwanted logs before you use the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/)
32
+
You can further optimize and enhance these queries for the log and events types being scanned for threats. Use the following guidelines to customize your threat intel queries:
33
+
34
+
* Filter out unwanted logs before you use the `threatlookup` search operator
33
35
* Use keywords
34
36
* Use the `where` operator
35
37
* Use general search optimization [rules](/docs/search/get-started-with-search/build-search/best-practices-search.md)
Only Cloud SIEM administrators can add threat intelligence indicators to the system. However, all Sumo Logic users can [run queries against threat intelligence indicators](/docs/security/threat-intelligence/find-threats/) to uncover threats.
import CloudSIEMThreatIntelNote from '../../reuse/cloud-siem-threat-intelligence-note.md';
10
11
11
12
Threat intelligence, often abbreviated as *threat intel*, is information that helps you prevent or mitigate cyber attacks. *Threat intelligence indicators* are individual data points about threats that are gathered from external sources about various entities such as host names, file hashes, IP addresses, and other known targets for compromise. You can import files containing threat intelligence indicators directly into Sumo Logic to aid in security analysis.
12
13
13
14
Threat intelligence indicators can help security analysts leverage a large body of information to surface potential threats. For example, say that a threat intelligence database has an indicator that correlates a certain IP address with known malicious activity. Because of this correlation, analysts can assume log messages with that IP address are more likely to be part of a real cyber attack.
14
15
15
16
Once you [ingest indicators](#ingest-threat-intelligence-indicators) and they appear on the [Threat Intelligence tab](/docs/security/threat-intelligence/threat-intelligence-indicators/#threat-intelligence-tab), you can use them to search logs for threats. See [Find threats with log queries](/docs/security/threat-intelligence/find-threats/) to learn how.
16
17
18
+
<CloudSIEMThreatIntelNote/>
19
+
17
20
Watch this micro lesson to learn about Sumo Logic's threat intelligence features.
@@ -46,7 +49,6 @@ You do not need to be assigned these role capabilities to [find threats with log
46
49
### Ingest threat intelligence indicators
47
50
48
51
To search logs that contain correlations to threat intelligence indicators, you must first ingest the indicators. You can ingest indicators using:
49
-
***The Threat Intelligence tab**. See [Add indicators in the Threat Intelligence tab](/docs/security/threat-intelligence/threat-intelligence-indicators/#add-indicators-in-the-threat-intelligence-tab).
***The Threat Intelligence tab**. See [Add indicators in the Threat Intelligence tab](/docs/security/threat-intelligence/threat-intelligence-indicators/#add-indicators-in-the-threat-intelligence-tab).
61
64
62
65
See [Upload formats](/docs/security/threat-intelligence/upload-formats/) for the format to use when uploading indicators using the **Threat Intelligence** tab or APIs.
63
66
67
+
<CloudSIEMThreatIntelNote/>
68
+
64
69
:::note
65
70
* Sumo Logic's threat intelligence data store only ingests simple threat indicators, not complex indicators that outline a series of steps or entities that make up an attack. Nor does it ingest actors, malware, or other object types.
66
71
* The limit of the number of indicators that can be uploaded in one API call is 100.
67
72
* When you add indicators, the event is recorded in the Audit Event Index. See [Audit logging for threat intelligence](#audit-logging-for-threat-intelligence).
Copy file name to clipboardExpand all lines: docs/security/threat-intelligence/find-threats.md
+46-3Lines changed: 46 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,9 +7,9 @@ description: Perform searches to find matches to data in threat intelligence ind
7
7
8
8
import useBaseUrl from '@docusaurus/useBaseUrl';
9
9
10
-
Once you [ingest threat intelligence indicators](/docs/security/threat-intelligence/about-threat-intelligence/#ingest-threat-intelligence-indicators), you can perform searches to find matches to data in the indicators using the `threatlookup` search operator.
10
+
You can use the `threatlookup` search operator to find matches to indicators in the Sumo Logic [threat intelligence](/docs/security/threat-intelligence/) data store.
11
11
12
-
The `threatlookup` operator allows you to search logs for matches in threat intelligence indicators. For example, use the following query to find logs in all `sec_record*` indexes with a `srcDevice_ip` attribute correlated to a threat indicator with a high confidence level (greater than `50`):
12
+
For example, use the following query to find logs in all `sec_record*` indexes with a `srcDevice_ip` attribute correlated to a threat indicator with a high confidence level (greater than `50`):
13
13
14
14
```
15
15
_index=sec_record*
@@ -19,8 +19,51 @@ _index=sec_record*
19
19
| count by _timeslice
20
20
```
21
21
22
-
For more information, see [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/).
22
+
For syntax and examples, see [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/).
23
23
24
24
<!-- Add this back once we have support for the cat search operator.
25
25
You can also [run threatlookup with the cat search operator](/docs/search/search-query-language/search-operators/threatlookup/#run-threatlookup-with-the-cat-search-operator) to search the entire store of threat intelligence indicators.
26
26
-->
27
+
28
+
## Threatlookup queries in dashboards
29
+
30
+
The `threatlookup` search operator is used for queries in some dashboards, including [dashboards in the Threat Intel Quick Analysis app](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/#viewing-threat-intel-quick-analysis-dashboards). These queries provide great examples of how to use the operator.
31
+
32
+
To see `threatlookup` used in a query:
33
+
1. Open the Threat Intel Quick Analysis app.
34
+
1. Navigate to a dashboard, such as **Overview**.
35
+
1. Click the three-dot kebab in the upper-right corner of the dashboard panel.
36
+
1. Select **Open in Log Search**.
37
+
1. Look for `threatlookup` used in a query.
38
+
39
+
For example, here is the query used for the **Threat Count** panel in the [Threat Intel Quick Analysis - IP](#ip) dashboard:
| where ip_address != "0.0.0.0" and ip_address != "127.0.0.1"
45
+
| count as ip_count by ip_address
46
+
47
+
| threatlookup singleIndicator ip_address
48
+
49
+
// normalize confidence level to a string
50
+
| if (_threatlookup.confidence >= 85, "high", if (_threatlookup.confidence >= 50, "medium", if (_threatlookup.confidence >= 15, "low", if (_threatlookup.confidence >= 0, "unverified", "unknown")))) as threat_confidence
51
+
52
+
// filter for threat confidence
53
+
| where threat_confidence matches "*"
54
+
55
+
//rename to match threat_<foo> convention
56
+
| %"_threatlookup.actors" as threat_actors
57
+
| %"_threatlookup.type" as type
58
+
| %"_threatlookup.threat_type" as threat_type
59
+
60
+
//convert threat valid from to human readable time
61
+
| toLong(%"_threatlookup.valid_from" * 1000) as %"_threatlookup.valid_from"
62
+
| formatDate(%"_threatlookup.valid_from", "MM-dd-yyyy") as threat_valid_from
63
+
64
+
| where type matches "ipv4-addr*" and !isNull(threat_confidence)
65
+
66
+
| if (isEmpty(threat_actors), "Unassigned", threat_actors) as threat_actors
Copy file name to clipboardExpand all lines: docs/security/threat-intelligence/threat-intelligence-indicators.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,7 @@ description: Learn how to add and manage indicators from threat intelligence sou
6
6
---
7
7
8
8
import useBaseUrl from '@docusaurus/useBaseUrl';
9
+
import CloudSIEMThreatIntelNote from '../../reuse/cloud-siem-threat-intelligence-note.md';
9
10
10
11
The **Threat Intelligence** tab shows the indicators that have been added to your threat intelligence data store. Use this tab to add and manage your threat intelligence indicators. You can add indicators from a number of sources, including TAXII, ThreatQ, iDefense, and many others. Threat intelligence indicators imported to Sumo Logic not only integrate with your existing core Sumo Logic deployment, but also Cloud SIEM and Cloud SOAR.
11
12
@@ -19,7 +20,6 @@ You can also add threat intelligence indicators using a collector or the API. Se
19
20
20
21
[**New UI**](/docs/get-started/sumo-logic-ui/). To access the **Threat Intelligence** tab, in the top menu select **Configuration**, and then under **Logs** select **Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**.
1.**+ Add Indicators**. Click to upload files that [add threat intelligence indicators](#add-indicators-in-the-threat-intelligence-tab).
@@ -36,16 +36,16 @@ You can also add threat intelligence indicators using a collector or the API. Se
36
36
37
37
## Add indicators in the Threat Intelligence tab
38
38
39
-
To add threat intelligence indicators in the **Threat Intelligence** tab, you must upload files containing the indicators in a format that can be consumed by Sumo Logic.
39
+
You can add threat intelligence indicators using a collector, API, or the **Threat Intelligence** tab. This section describes how to add indicators in the **Threat Intelligence** tab. For information on the other methods, see [Ingest threat intelligence indicators](/docs/security/threat-intelligence/about-threat-intelligence/#ingest-threat-intelligence-indicators).
40
+
41
+
<CloudSIEMThreatIntelNote/>
40
42
41
43
1.[**Classic UI**](/docs/get-started/sumo-logic-ui-classic/).In the main Sumo Logic menu, select **Manage Data > Logs > Threat Intelligence**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui/). In the top menu select **Configuration**, and then under **Logs** select **Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**.
1. Select the format of the file to be uploaded (see [Upload formats](/docs/security/threat-intelligence/upload-formats/) for the format to use in the file):
44
46
***Normalized JSON**. A normalized JSON file.
45
47
***CSV**. A comma-separated value (CSV) file.
46
48
***STIX 2.x JSON**. A JSON file in STIX 2.x format. When choosing this format, you must enter the name of the source in the **Source** field provided.
47
-
48
-
See [Upload formats](/docs/security/threat-intelligence/upload-formats/) for the format to use in the file.
0 commit comments