Skip to content

Commit 7f9a390

Browse files
committed
Prep for beta release
1 parent d42076a commit 7f9a390

File tree

6 files changed

+16
-20
lines changed

6 files changed

+16
-20
lines changed

blog-service/2024-10-18-collection.md

Lines changed: 0 additions & 14 deletions
This file was deleted.

docs/integrations/product-list/product-list-a-l.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -168,7 +168,7 @@ For descriptions of the different types of integrations Sumo Logic offers, see [
168168
| <img src={useBaseUrl('img/integrations/databases/couchbase-logo.png')} alt="Thumbnail icon" width="50"/> | [Couchbase](https://www.couchbase.com/) | Apps:<br/>- [Couchbase](/docs/integrations/databases/couchbase/) <br/>- [Couchbase - OpenTelemetry](/docs/integrations/databases/opentelemetry/couchbase-opentelemetry/) |
169169
| <img src={useBaseUrl('img/integrations/misc/cribl-logo.png')} alt="Thumbnail icon" width="75"/> | [Cribl](https://cribl.io/) | Automation integration: [Cribl](/docs/platform-services/automation-service/app-central/integrations/cribl/) <br/>Partner integration: [Cribl](https://docs.cribl.io/stream/destinations-sumo-logic/) |
170170
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/criminal-ip.png')} alt="Thumbnail icon" width="100"/> | [Criminal IP](https://www.criminalip.io/) | Automation integration: [Criminal IP](/docs/platform-services/automation-service/app-central/integrations/criminal-ip) |
171-
| <img src={useBaseUrl('img/integrations/security-threat-detection/crowdstrike.png')} alt="Thumbnail icon" width="75"/> | [CrowdStrike](https://www.crowdstrike.com/) | Apps: <br/>- [CrowdStrike Falcon Endpoint Protection](/docs/integrations/security-threat-detection/crowdstrike-falcon-endpoint-protection/) <br/>- [CrowdStrike Falcon FileVantage](/docs/integrations/saas-cloud/crowdstrike-falcon-filevantage/) <br/>- [Threat Intel Quick Analysis](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/) <br/>- [CrowdStrike FDR Host Inventory](/docs/integrations/saas-cloud/crowdstrike-fdr-host-inventory) <br/>- [CrowdStrike Spotlight](/docs/integrations/saas-cloud/crowdstrike-spotlight) <br/>Automation integrations: <br/>- [CrowdStrike Falcon](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon/) <br/>- [CrowdStrike Falcon Discover](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-discover/) <br/>- [CrowdStrike Falcon Intelligence](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-intelligence/) <br/>- [CrowdStrike Falcon Sandbox](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-sandbox/) <br/>Cloud SIEM integrations: <br/>- [CrowdStrike](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/79ade329-b6d4-43ae-8db1-2a9cc45c0fb0.md) <br/>- [PreemptSecurity](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/15c77a62-0fbb-4a60-9fae-ead49ec423f9.md) <br/>Collectors:<br/>- [CrowdStrike Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-source/) <br/>- [Crowdstrike FDR Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-fdr-source/)<br/>- [CrowdStrike FDR Host Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-fdr-host-inventory-source/) <br/>- [CrowdStrike FileVantage Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-filevantage-source/)<br/>- [CrowdStrike Spotlight Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-spotlight-source/) <br/>- [CrowdStrike Threat Intel Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-threat-intel-source/)|
171+
| <img src={useBaseUrl('img/integrations/security-threat-detection/crowdstrike.png')} alt="Thumbnail icon" width="75"/> | [CrowdStrike](https://www.crowdstrike.com/) | Apps: <br/>- [CrowdStrike Falcon Endpoint Protection](/docs/integrations/security-threat-detection/crowdstrike-falcon-endpoint-protection/) <br/>- [CrowdStrike Falcon FileVantage](/docs/integrations/saas-cloud/crowdstrike-falcon-filevantage/) <br/>- [Threat Intel Quick Analysis](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/) <br/>- [CrowdStrike FDR Host Inventory](/docs/integrations/saas-cloud/crowdstrike-fdr-host-inventory) <br/>- [CrowdStrike Spotlight](/docs/integrations/saas-cloud/crowdstrike-spotlight) <br/>Automation integrations: <br/>- [CrowdStrike Falcon](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon/) <br/>- [CrowdStrike Falcon Discover](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-discover/) <br/>- [CrowdStrike Falcon Intelligence](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-intelligence/) <br/>- [CrowdStrike Falcon Sandbox](/docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon-sandbox/) <br/>Cloud SIEM integrations: <br/>- [CrowdStrike](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/79ade329-b6d4-43ae-8db1-2a9cc45c0fb0.md) <br/>- [PreemptSecurity](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/15c77a62-0fbb-4a60-9fae-ead49ec423f9.md) <br/>Collectors:<br/>- [CrowdStrike Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-source/) <br/>- [Crowdstrike FDR Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-fdr-source/)<br/>- [CrowdStrike FDR Host Inventory Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-fdr-host-inventory-source/) <br/>- [CrowdStrike FileVantage Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-filevantage-source/)<br/>- [CrowdStrike Spotlight Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-spotlight-source/) <!-- <br/>- [CrowdStrike Threat Intel Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-threat-intel-source/) --> |
172172
| <img src={useBaseUrl('img/platform-services/automation-service/app-central/logos/cuckoo.png')} alt="Thumbnail icon" width="75"/> | [Cuckoo](https://cuckoo.readthedocs.io/en/latest/#) | Automation integration: [Cuckoo](/docs/platform-services/automation-service/app-central/integrations/cuckoo/) |
173173
| <img src={useBaseUrl('img/send-data/cyberark.png')} alt="Thumbnail icon" width="50"/> | [CyberArk](https://www.cyberark.com/) | Automation integrations: <br/>- [CyberArk AAM](/docs/platform-services/automation-service/app-central/integrations/cyberark-aam/) <br/>- [CyberArk PAM](/docs/platform-services/automation-service/app-central/integrations/cyberark-pam) <br/>Cloud SIEM integration: [CyberArk](https://github.com/SumoLogic/cloud-siem-content-catalog/blob/master/vendors/8a3d333e-ffad-49ed-9edd-0cf1c797b24f.md) <br/>Collector: [CyberArk EPM Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cyberark-source/) |
174174
| <img src={useBaseUrl('/img/platform-services/automation-service/app-central/logos/cyberint.png')} alt="cyberint" width="75"/> | [CyberInt](https://cyberint.com/) | Automation integration: [Cyberint](/docs/platform-services/automation-service/app-central/integrations/cyberint) |

docs/platform-services/threat-intelligence-indicators.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -40,6 +40,7 @@ You do not need to be assigned these role capabilities to [find threats with log
4040
To search logs that contain correlations to threat intelligence indicators, you must first ingest the indicators. You can ingest indicators using:
4141
* **The Threat Intelligence tab**. See [Add indicators in the Threat Intelligence tab](#add-indicators-in-the-threat-intelligence-tab).
4242
* **A collector**. See:
43+
* [CrowdStrike Threat Intel Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-threat-intel-source)
4344
* [Intel471 Threat Intel Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/intel471-threat-intel-source)
4445
* [Mandiant Threat Intel Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/mandiant-threat-intel-source)
4546
* [STIX/TAXII 1 Client Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/stix-taxii-1-client-source)

docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-threat-intel-source.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,15 @@ sidebar_label: CrowdStrike Threat Intel
55
tags:
66
- cloud-to-cloud
77
- crowdstrike-threat-intel
8-
description: Learn how to collect combined endpoint vulnerabilities data from the CrowdStrike Spotlight platform.
8+
description: Learn how to collect combined endpoint vulnerabilities data from the CrowdStrike platform.
99
---
10+
11+
<head>
12+
<meta name="robots" content="noindex" />
13+
</head>
14+
15+
<p><a href="/docs/beta"><span className="beta">Beta</span></a></p>
16+
1017
import CodeBlock from '@theme/CodeBlock';
1118
import ExampleJSON from '/files/c2c/crowdstrike-threat-intel/example.json';
1219
import MyComponentSource from '!!raw-loader!/files/c2c/crowdstrike-threat-intel/example.json';
@@ -64,12 +71,12 @@ Identify your **Region** based on your **Base URL**. The region can be selected
6471

6572
### Source configuration
6673

67-
When you create a CrowdStrike Spotlight Source, you add it to a Hosted Collector. Before creating the Source, identify the Hosted Collector you want to use or create a new Hosted Collector. For instructions, see [Configure a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector).
74+
When you create a CrowdStrike Threat Intel Source, you add it to a Hosted Collector. Before creating the Source, identify the Hosted Collector you want to use or create a new Hosted Collector. For instructions, see [Configure a Hosted Collector](/docs/send-data/hosted-collectors/configure-hosted-collector).
6875

69-
To configure the CrowdStrike Spotlight Source:
76+
To configure the CrowdStrike Threat Intel Source:
7077
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Collection > Collection**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the Sumo Logic top menu select **Configuration**, and then under **Data Collection** select **Collection**. You can also click the **Go To...** menu at the top of the screen and select **Collection**.
7178
1. On the Collectors page, click **Add Source** next to a Hosted Collector.
72-
1. Search for and select **CrowdStrike Spotlight** icon.
79+
1. Search for and select **CrowdStrike Threat Intel** icon.
7380
1. Enter a **Name** to display for the Source in the Sumo Logic web application. The description is optional.
7481
1. (Optional) For **Source Category**, enter any string to tag the output collected from the Source. Category metadata is stored in a searchable field called `_sourceCategory`.
7582
1. (Optional) **Fields**. Click the **+Add Field** link to define the fields you want to associate. Each field needs a name (key) and value.

docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/index.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -217,12 +217,14 @@ In this section, we'll introduce the following concepts:
217217
<p>Learn how to collect combined endpoint vulnerabilities data from the CrowdStrike Spotlight platform.</p>
218218
</div>
219219
</div>
220+
<!--
220221
<div className="box smallbox card">
221222
<div className="container">
222223
<a href="/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-threat-intel-source"><img src={useBaseUrl('img/integrations/security-threat-detection/crowdstrike.png')} alt="thumbnail icon" width="65"/><h4>CrowdStrike Threat Intel</h4></a>
223224
<p>Learn how to collect combined endpoint indicators data from the CrowdStrike Threat Intel platform.</p>
224225
</div>
225226
</div>
227+
-->
226228
<div className="box smallbox card">
227229
<div className="container">
228230
<a href="/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cyberark-source"><img src={useBaseUrl('img/send-data/cyberark.png')} alt="icon" width="50"/><h4>CyberArk EPM</h4></a>

sidebars.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -419,7 +419,7 @@ module.exports = {
419419
'send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-fdr-host-inventory-source',
420420
'send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-filevantage-source',
421421
'send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-spotlight-source',
422-
'send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-threat-intel-source',
422+
//'send-data/hosted-collectors/cloud-to-cloud-integration-framework/crowdstrike-threat-intel-source',
423423
'send-data/hosted-collectors/cloud-to-cloud-integration-framework/cyberark-source',
424424
'send-data/hosted-collectors/cloud-to-cloud-integration-framework/cybereason-source',
425425
'send-data/hosted-collectors/cloud-to-cloud-integration-framework/digital-guardian-source',

0 commit comments

Comments
 (0)