Skip to content

Commit 8f259d3

Browse files
committed
Updates from meeting
1 parent aa12d1d commit 8f259d3

File tree

18 files changed

+40
-189
lines changed

18 files changed

+40
-189
lines changed

blog-cse/2025-04-01-application.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,14 @@ hide_table_of_contents: true
88

99
import useBaseUrl from '@docusaurus/useBaseUrl';
1010

11-
### Threat Intelligence New Global Feed
11+
### New Threat Intelligence Source
1212

13-
We’re excited to announce a new `_sumo_global_feed_i471` source for Sumo Logic Threat Intelligence incorporating Indicators of Compromise (IoC) from [Intel 471](https://intel471.com/). Analysts can use this out-of-the-box default source of threat indicators to aid in security analysis.
13+
We’re excited to announce a new `SumoLogic_ThreatIntel` source incorporating Indicators of Compromise (IoC) from [Intel 471](https://intel471.com/). Analysts can use this out-of-the-box default source of threat indicators to aid in security analysis.
1414

1515
:::warning
16-
On April 30, 2025, we will discontinue our legacy `_sumo_global_feed_cs` source. If you have rules that explicitly point to this source, update them to use the new `_sumo_global_feed_i471` source.
16+
On April 30, 2025, we will discontinue our legacy `_sumo_global_feed_cs` source. If you have rules that explicitly point to this source, update them to use the new `SumoLogic_ThreatIntel` source.
1717
:::
1818

19-
[Learn more](/docs/security/threat-intelligence/about-threat-intelligence/#sumo-logic-global-feed-source).
19+
[Learn more](/docs/security/threat-intelligence/about-threat-intelligence/#sumo-logic-threat-intelligence-sources).
2020

2121
<img src={useBaseUrl('img/security/threat-intelligence-tab-example.png')} alt="Threat Intelligence tab" style={{border: '1px solid gray'}} width="800" />

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3307,6 +3307,7 @@
33073307
"/Manage/Security/Set-the-Password-Policy": "/docs/manage/security/set-password-policy",
33083308
"/Manage/Threat-Intel-Ingest": "/docs/security/threat-intelligence",
33093309
"/docs/platform-services/threat-intelligence-indicators": "/docs/security/threat-intelligence",
3310+
"/docs/security/threat-intelligence/threat-intelligence-mapping/": "/docs/security/threat-intelligence",
33103311
"/Manage/Users-and-Roles": "/docs/manage/users-roles",
33113312
"/Manage/Users-and-Roles/Manage-Roles": "/docs/manage/users-roles",
33123313
"/Manage/Users-and-Roles/Manage-Roles/About-Roles": "/docs/manage/users-roles/roles",

docs/integrations/amazon-aws/amazon-bedrock.md

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

docs/integrations/amazon-aws/waf.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ The Sumo Logic app for AWS WAF analyzes traffic flowing through AWS WAF and auto
5858
```sql title="Client IP Threat Info"
5959
_sourceCategory=AWS/WAF {{client_ip}}
6060
| parse "\"httpMethod\":\"*\"," as httpMethod,"\"httpVersion\":\"*\"," as httpVersion,"\"uri\":\"*\"," as uri, "{\"clientIp\":\"*\",\"country\":\"*\"" as clientIp,country, "\"action\":\"*\"" as action, "\"matchingNonTerminatingRules\":[*]" as matchingNonTerminatingRules, "\"rateBasedRuleList\":[*]" as rateBasedRuleList, "\"ruleGroupList\":[*]" as ruleGroupList, "\"httpSourceId\":\"*\"" as httpSourceId, "\"httpSourceName\":\"*\"" as httpSourceName, "\"terminatingRuleType\":\"*\"" as terminatingRuleType, "\"terminatingRuleId\":\"*\"" as terminatingRuleId, "\"webaclId\":\"*\"" as webaclId nodrop
61-
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/i471 on threat=clientip
61+
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=clientip
6262
```
6363
<!-- Replace code example with this after `sumo://threat/i471` is replaced by `threatlookup`:
6464
```sql title="Client IP Threat Info"

docs/integrations/security-threat-detection/threat-intel-quick-analysis.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ _sourceCategory=cylance "IP Address"
4141
| parse regex "(?<ip_address>\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
4242
| where !isNull(ip_address)
4343
| where ip_address != "0.0.0.0" and ip_address != "127.0.0.1"
44-
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/i471 on threat=ip_address
44+
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=ip_address
4545
```
4646

4747
<!-- Replace section content with this after `sumo://threat/i471` is replaced by `threatlookup`:
@@ -98,7 +98,7 @@ Use [Field Extraction Rules (FER)](/docs/manage/field-extractions/create-field-e
9898
```
9999
1. Customize your query so you can use parsed fields from FER with the lookup operator, where src_ip is the parsed field from FER (see step # 1). For example:
100100
```
101-
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/i471 on threat=src_ip
101+
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=src_ip
102102
| json field=raw "labels[*].name" as label_name
103103
| replace(label_name, "\\/","->") as label_name
104104
| replace(label_name, "\""," ") as label_name
@@ -125,7 +125,7 @@ Use scheduled views with the threat lookup operator to find threats. Scheduled v
125125

126126
1. Create a scheduled view. For example, for Cylance, create a scheduled view, **cylance_threat**:
127127
```
128-
_sourceCategory=cylance | lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/i471 on threat=src_ip
128+
_sourceCategory=cylance | lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=src_ip
129129
| json field=raw "labels[*].name" as label_name
130130
| replace(label_name, "\\/","->") as label_name
131131
| replace(label_name, "\""," ") as label_name

docs/observability/aws/integrations/aws-dynamodb.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ _sourceCategory=Labs/AWS/DynamoDB account=* namespace=* "\"eventSource\":\"dynam
6060
| where Region matches "*" and tolowercase(entity) matches "*"
6161
| where ip_address != "0.0.0.0" and ip_address != "127.0.0.1"
6262
| count as ip_count by ip_address
63-
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/i471 on threat=ip_address
63+
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=ip_address
6464
| json field=raw "labels[*].name" as label_name
6565
| replace(label_name, "\\/","->") as label_name
6666
| replace(label_name, "\""," ") as label_name

docs/search/search-query-language/search-operators/threatip.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: threatip Search Operator
44
sidebar_label: threatip
55
---
66

7-
The `threatip` operator correlates data in the `_sumo_global_feed_i471` [threat intelligence](/docs/security/threat-intelligence/about-threat-intelligence/) source based on IP addresses from your log data. This provides security analytics that helps you to detect threats in your environment, while also protecting against sophisticated and persistent cyber-attacks.
7+
The `threatip` operator correlates data in the [Sumo Logic threat intelligence sources](/docs/security/threat-intelligence/about-threat-intelligence/#sumo-logic-threat-intelligence-sources) based on IP addresses from your log data. This provides security analytics that helps you to detect threats in your environment, while also protecting against sophisticated and persistent cyber-attacks.
88

99
<!--
1010
You can also use the [`threatlookup`](/docs/search/search-query-language/search-operators/threatlookup/) search operator to search threat intelligence indicators.

docs/search/search-query-language/search-operators/threatlookup.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -217,6 +217,6 @@ cat sumo://threat-intel | formatDate(toLong(_threatlookup.valid_until), "yyyy-MM
217217
```
218218
219219
:::note
220-
You cannot use the cat search operator with the `_sumo_global_feed_i471` source.
220+
You cannot use the cat search operator with the `SumoLogic_ThreatIntel` source.
221221
:::
222222
-->

docs/search/search-query-language/search-operators/tolowercase-touppercase.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ which provides results like:
5252
| toLowerCase ("B101CD29E18A515753409AE86CE68A4CEDBE0D640D385EB24B9BBB69CF8186AE") as hash
5353
| count hash
5454
| fields -_count
55-
| lookup raw from sumo://threat/i471 on threat = hash{code}
55+
| lookup raw from sumo://threat/cs on threat = hash{code}
5656
```
5757

5858
<!-- Replace code example with this after `sumo://threat/i471` is replaced by `threatlookup`:

docs/search/subqueries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -385,7 +385,7 @@ _sourceCategory=weblogs
385385
| json field=_raw "service.action.networkConnectionAction.connectionDirection" as connectionDirection
386386
| where connectionDirection = "OUTBOUND"
387387
| json field=remoteipdetails "ipAddressV4" as src_ip
388-
| lookup type, actor, raw, threatlevel from sumo://threat/i471 on src_ip=threat
388+
| lookup type, actor, raw, threatlevel from sumo://threat/cs on src_ip=threat
389389
| where threatlevel = "high"
390390
| compose src_ip]
391391
```

0 commit comments

Comments
 (0)