Skip to content

Commit 92cb05f

Browse files
committed
Merge branch 'main' into manage
2 parents fbb4fd6 + d57404d commit 92cb05f

File tree

415 files changed

+6943
-4346
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

415 files changed

+6943
-4346
lines changed

.clabot

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -169,7 +169,8 @@
169169
"Hellfire4959",
170170
"antonymartinsumo",
171171
"amee-sumo",
172-
"chetanchoudhary-sumo"
172+
"chetanchoudhary-sumo",
173+
"JamoCA"
173174
],
174175
"message": "Thank you for your contribution! As this is an open source project, we require contributors to sign our Contributor License Agreement and do not have yours on file. To proceed with your PR, please [sign your name here](https://forms.gle/YgLddrckeJaCdZYA6) and we will add you to our approved list of contributors.",
175176
"label": "cla-signed",

README.md

Lines changed: 64 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -8,36 +8,80 @@
88
<a href="https://help.sumologic.com/release-notes-service"><img src="https://img.shields.io/badge/RSS-FFA500?style=for-the-badge&logo=rss&logoColor=white" alt="RSS Follow" width="50"/></a>
99
</p>
1010

11-
Share your knowledge with the Sumo Logic community by contributing to our docs! You can contribute by creating an issue or pull request (PR) on our GitHub repository. We welcome all types of contributions; from minor typo fixes to new topics.
11+
Sumo Docs is the open-source documentation site for Sumo Logic, an all-in-one cloud data analytics platform built to support security, operations, and business intelligence use cases. Sumo Logic empowers users to monitor, analyze, troubleshoot, and visualize data from their applications and network environments in real time. Its elastic processing capabilities enable seamless log data collection and management from various sources, regardless of type, volume, or location. Learn more at [sumologic.com](https://www.sumologic.com).
1212

13-
Documentation staff members review issues and pull requests on a regular basis. We do our best to address all issues as soon as possible, but working through the backlog takes time. We appreciate your patience.
13+
## Get involved
1414

15-
## Contributing Content
15+
We welcome contributions from the community! Whether it's fixing a typo, adding new content, or proposing improvements, your input helps users make the most of Sumo Logic. You can contribute by creating an issue or submitting a pull request in our GitHub repository.
1616

17-
For detailed instructions, including our style guide, see [Contributor Guidelines](https://help.sumologic.com/docs/contributing).
17+
Here’s how to get started:
18+
- Fork our repo and create a new branch for your content changes.
19+
- Preview your edits by building the site locally.
20+
- Submit a pull request for review.
1821

19-
We recommend forking our repo, creating a new branch for your content changes, and submitting a pull request. We will help review, test, and merge the content for publishing.
22+
Our team will help review, test, and merge your contributions for publishing.
2023

21-
## Building Locally
24+
Sumo Docs is built with [Docusaurus 3](https://docusaurus.io/) and supports React, Rehype, and Remark plugins. We also use [cla-bot](https://colineberhardt.github.io/cla-bot/) to manage our Contributor License Agreement (CLA) process.
2225

23-
Docusaurus requires the following to build on locals:
26+
Before submitting an issue or pull request, we recommend reviewing the sections below.
2427

25-
* [NodeJS](https://nodejs.org/en/download/) version >= 16.14
26-
* [Yarn](https://yarnpkg.com/en/) version >= 1.5, you can install with [Homebrew](https://brew.sh/) if you have that installed: `brew install yarn`
28+
## Table of contents
2729

28-
The site includes translations into other languages. To build on your local:
30+
- [Get involved](#get-involved)
31+
- [Prerequisites](#prerequisites)
32+
- [Installation](#installation)
33+
- [Contributing content](#contributing-content)
34+
- [Building locally](#building-locally)
35+
- [Publishing content](#publishing-content)
2936

30-
1. Clone the repo using Git or tools like GitHub Desktop.
31-
1. In a terminal, change to the cloned repo folder. Run the install command: `yarn install`.
32-
1. To serve and review your content, use one of the following:
33-
* Use start, hot reloads as you make changes: `yarn start`. Any issues with broken links and images are listed according to file. Locate and update those issues, then run build and start again to verify.
34-
* Use npm serve to test and review multi-languages: `npm run serve`. This build does not hot reload and requires a rebuild to test and review.
35-
1. To build locally and test your links, run `yarn build`.
37+
## Prerequisites
3638

37-
The static files are generated in the `build` folder and run on your local machine at: `http://localhost:3000/`. To stop the build or served site, hit Ctrl + C to interrupt. You can enter new commands in terminal, rebuild, and restart.
39+
To contribute to Sumo Docs, ensure you have the following tools installed:
3840

39-
Sumo Docs was created using [Docusaurus 2](https://docusaurus.io/) with React, Rehype, and Remark plugin support. Our CLA bot was built using [cla-bot](https://colineberhardt.github.io/cla-bot/).
41+
- [Node.js](https://nodejs.org/en/download/) version 18 or higher
42+
- [Yarn](https://yarnpkg.com/en/), installable via [Homebrew](https://brew.sh/) (`brew install yarn`)
4043

41-
## Publishing Content
44+
## Installation
4245

43-
As pull requests are merged to the `main` branch by the Sumo Logic Doc team, the content builds and deploys to a staging site. This allows you to review and test your content thoroughly on a server, rather than a local build, prior to merging your code to production.
46+
1. Fork and clone the repository using Git or a tool like GitHub Desktop.
47+
2. Navigate to the cloned repository folder:
48+
```bash
49+
cd sumologic-documentation
50+
```
51+
3. Install dependencies:
52+
```bash
53+
yarn install
54+
```
55+
56+
## Apply your changes
57+
58+
Make edits using [Markdown syntax](https://help.sumologic.com/docs/contributing/style-guide/#markdown). Keep contributions concise, informative, and aligned with our guidelines.
59+
60+
Refer to our [Contributor Guidelines](https://help.sumologic.com/docs/contributing/create-edit-doc/#edit-a-doc) for more information on:
61+
- Markdown editing
62+
- Proposing bug fixes
63+
- Testing your changes
64+
65+
All contributions must follow our [Style Guide](https://help.sumologic.com/docs/contributing/style-guide/).
66+
67+
## Building locally
68+
69+
Building the site locally ensures your changes are accurate and functional before submission.
70+
71+
1. Serve and preview your content with hot reloads:
72+
```bash
73+
yarn start
74+
```
75+
Any issues, such as broken links or images, will be listed. Fix them, rebuild, and verify your changes.
76+
77+
2. Build the site and test locally:
78+
```bash
79+
yarn build
80+
```
81+
The static files will be generated in the `build` folder and served at `http://localhost:3000/`.
82+
83+
To stop the local server or build process, press `Ctrl + C`. You can rebuild and restart as needed.
84+
85+
## Publishing content
86+
87+
Our documentation team regularly reviews issues and pull requests. While we strive to address contributions promptly, there may be delays as we work through the backlog. Your patience is appreciated.

blog-cse/2022/12-31.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -453,7 +453,7 @@ Cloud SIEM now supports custom sources of inventory data. Now, if you want to in
453453

454454
#### Standard Match Lists
455455

456-
As a reminder, the migration for our out-of-the-box rules content from standard match lists to tags for Entities has begun. The system is now automatically setting the appropriate tags for any Entities appearing in any of the standard match lists called out in the [previous announcement](https://help.sumologic.com/release-notes-cse/2022/10/13/application-update/). This will continue until January 20, 2023, when the migration will be complete.
456+
As a reminder, the migration for our out-of-the-box rules content from standard match lists to tags for Entities has begun. The system is now automatically setting the appropriate tags for any Entities appearing in any of the standard match lists called out in the [previous announcement](/release-notes-cse/2022/12/31/#october-13-2022---application-update). This will continue until January 20, 2023, when the migration will be complete.
457457

458458
#### Minor Changes and Enhancements
459459

@@ -776,7 +776,7 @@ Labels were not being created properly based on Network Blocks for a small numbe
776776
#### Read-Only User Capabilities for Cloud SIEM
777777
New user capabilities (permissions) have been created enabling read-only access to content and configuration features in Cloud SIEM.
778778

779-
These can be used when defining roles in the Sumo Logic platform (at **Administration > Users and Roles > Roles**).
779+
These can be used when [defining roles](/docs/manage/users-roles/roles/create-manage-roles/) in the Sumo Logic platform.
780780

781781
<img src={useBaseUrl('img/release-notes/cse/Read-Only-Roles.png')} alt="read-only roles" />
782782

blog-cse/2023/12-31.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ For full details, see the [Cloud SOAR documentation](/docs/platform-services/aut
166166
---
167167
### October 26, 2023 - Content Release
168168

169-
This content release includes templates for creating Cloud SIEM parsers. There are two versions of each, one with comments that explain the purpose of each parser component, and “clean” versions that you can use to start quickly creating custom parsers. Further documentation on using these parsers will be available on [Sumo Logic Docs](https://help.sumologic.com/) in the coming weeks. Other changes in this release are enumerated below.
169+
This content release includes templates for creating Cloud SIEM parsers. There are two versions of each, one with comments that explain the purpose of each parser component, and “clean” versions that you can use to start quickly creating custom parsers. Further documentation on using these parsers will be available on [Sumo Logic Docs](/docs/cse/get-started-with-cloud-siem/cloud-siem-content-catalog/) in the coming weeks. Other changes in this release are enumerated below.
170170

171171
#### Rules
172172

@@ -1325,7 +1325,7 @@ Each node in the graph represents a single Entity. The graph also displays the r
13251325

13261326
The graph also includes a number of controls for zoom, full screen mode, filtering by Entity type, and adjusting the time frame for relationship detection.
13271327

1328-
For more information about how to use the Entity Relationship Graph, see the [online documentation](https://help.sumologic.com/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/#about-the-entities-tab-graph-view). You will also see an introduction to the feature the first time you visit an Insight details page.
1328+
For more information about how to use the Entity Relationship Graph, see the [online documentation](/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/#about-the-entities-tab-graph-view). You will also see an introduction to the feature the first time you visit an Insight details page.
13291329

13301330
#### Minor Changes and Enhancements
13311331

blog-cse/2024-12-06-content.md

Lines changed: 99 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,99 @@
1+
---
2+
title: December 6, 2024 - Content Release
3+
hide_table_of_contents: true
4+
keywords:
5+
- log mappers
6+
- log parsers
7+
- detection rules
8+
- tag schemas
9+
image: https://help.sumologic.com/img/sumo-square.png
10+
---
11+
12+
import useBaseUrl from '@docusaurus/useBaseUrl';
13+
14+
<a href="https://help.sumologic.com/release-notes-cse/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
15+
16+
This content release:
17+
- Introduces new Cloud SIEM detection rules for monitoring activity and alerts from GitHub Enterprise.
18+
- New and updated log parsing and mapping support for:
19+
- AWS VPC Transit Gateways Flow Logs
20+
- Alert Logic
21+
- Google G Suite Alert Center
22+
- Microsoft Defender Advanced Hunting
23+
- Azure Provisioning, Alert, ResourceHealth, and ServiceHealth events
24+
25+
Changes are enumerated below.
26+
27+
:::note
28+
First Seen Successful Authentication From Unexpected Country (FIRST-S00029), which is disabled by default, has been replaced by a rule of the same name (FIRST-S00065) which is enabled by default. FIRST-S00029 will be removed in a subsequent release in 2 weeks (week of December 16). Any tuning expressions applied to FIRST-S00029 will need to be migrated to FIRST-S00065 to continue functioning.
29+
:::
30+
31+
### Rules
32+
- [New] MATCH-S00952 GitHub - Administrator Added or Invited
33+
- Detects additions or invitations of GitHub Administrators. Illegitimate addition of administrative users could be an indication of privilege escalation or persistence by adversaries.
34+
- [New] MATCH-S00953 GitHub - Audit Logging Modification
35+
- Detects modifications to the GitHub Enterprise Audit Log. Modifications and deletions have the potential to reduce visibility of malicious activity.
36+
- [New] MATCH-S00954 GitHub - Copilot Seat Cancelled by GitHub
37+
- Observes for GitHub staff manually revoking copilot access for a user. This action is likely to be rare and may be indicative of a user violating the [acceptable use policy for GitHub](https://docs.github.com/en/site-policy/acceptable-use-policies).
38+
- [New] FIRST-S00091 GitHub - First Seen Activity From Country for User
39+
- Detects GitHub user activity from a new country. User account compromises can be detected through unusual geolocation in some cases. To lower possible false positives, a tuning expression for expected country names or codes can be added,.
40+
- [New] FIRST-S00090 GitHub - First Seen Application Interacting with API
41+
- Detects new application usage of the GitHub API. New applications utilizing the API may be routine, however this may also reveal malicious applications utilizing the API.
42+
- [New] MATCH-S00950 GitHub - Member Invitation or Addition
43+
- Detects new user additions or invitations to the business or organization GitHub. New user additions/invitations should be monitored as they could be a vector for malicious actors to establish access or persistence.
44+
- [New] MATCH-S00955 GitHub - Member Permissions Modification
45+
- Detects modifications of GitHub user permissions. Added permissions for a user should be monitored for potential privilege escalation by an adversary.
46+
- [New] MATCH-S00956 GitHub - OAuth Application Activity
47+
- Detects OAuth application activities within GitHub. OAuth application management and access activity should be monitored for potential abuse by potential malicious actors, either by creating malicious access paths within GitHub, or destruction of GitHub infrastructure.
48+
- [New] MATCH-S00957 GitHub - Organization Transfer
49+
- Detects transfers of an organization to another enterprise This is a sensitive activity that should be monitored to ensure organizations and their repositories are not being transferred without proper authorization.
50+
- [New] OUTLIER-S00026 GitHub - Outlier in Distinct User Agent Strings by User
51+
- Detects an outlier in the number of distinct user agent strings for a GitHub user. Unusual user agent strings for a user account could indicate account takeover.
52+
- [New] OUTLIER-S00028 GitHub - Outlier in Removal Actions by User
53+
- Detects a higher than usual number of removal actions undertaken by a user. This detection has a broad scope to detect any unusual number of destroy, delete, or remove actions undertaken by a user to help detect a range of different potential destructive activities in GitHub.
54+
- [New] OUTLIER-S00027 GitHub - Outlier in Repository Cloning or Downloads
55+
- Detects an unusual number of repository clones for a user. Unusual repository cloning could indicate data exfiltration or discovery.
56+
- [New] MATCH-S00958 GitHub - PR Review Requirement Removed
57+
- Detects GitHub pull request review requirements being removed from a repository either via branch protection rule or ruleset.
58+
- [New] MATCH-S00959 GitHub - Repository Public Key Deletion
59+
- Detects deletions of SSH keys in GitHub. Unusual deletions could represent an adversary attempting to disrupt normal operations by denying access.
60+
- [New] MATCH-S00960 GitHub - Repository Transfer
61+
- Detects transfers of a repository to another organization or user. This is a sensitive activity that GitHub places in the "Danger Zone" of repository setting and should be monitored to ensure no unauthorized transfers are taking place.
62+
- [New] MATCH-S00961 GitHub - Repository Visibility Changed to Public
63+
- Detects a user making a repository public. This action should be closely monitored and mitigative actions taken even if the published repository is deleted, or reverted to private. Reference: https://trufflesecurity.com/blog/anyone-can-access-deleted-and-private-repo-data-github
64+
- [New] MATCH-S00962 GitHub - Repository Visibility Permissions Changed
65+
- Detects repository visibility permissions being changed to allow members of an organization to change the visibility of repositories. This activity introduces the potential for data leakage if a private or internal repository is changed to public and should be monitored to ensure no inadvertent or malicious publication of a repository.
66+
- [New] MATCH-S00963 GitHub - SSH Key Created for Private Repo
67+
- Detects the creation of an SSH key for a private GitHub repository. Performed maliciously, creating an SSH key could create a parallel access path for an attacker.
68+
- [New] MATCH-S00964 GitHub - SSO Recovery Codes Access Activity
69+
- Detects activities accessing SSO recovery codes. SSO recovery codes can enable a user to bypass normal more stringent authentication routes.
70+
- [New] MATCH-S00951 GitHub - Secret Scanning Alert
71+
- Observes for secret scanning alerts from GitHub. Secrets detected by GitHub Enterprise Cloud undergo validation by GitHub automatically, to determine whether they are actively in use, this is not surfaced in the audit log, and will require separate inspection. For more information see [Evaluating alerts from secret scanning](https://docs.github.com/en/code-security/secret-scanning/managing-alerts-from-secret-scanning/evaluating-alerts).
72+
- [New] MATCH-S00965 GitHub - Secret Scanning Potentially Disabled
73+
- Detects actions which disable or modify secret scanning policies for an organization or repository. Modifying or disabling secret scanning may lead to inadvertent leaking of credentials.
74+
- [New] MATCH-S00966 GitHub - Two-Factor Authentication Disabled for Organization
75+
- Observes for two-factor authentication being disabled for a GitHub organization. Removing two-factor authentication requirements significantly degrades the security of the GitHub organization by permitting password only authentication.
76+
- [Updated] THRESHOLD-S00095 Password Attack from Host
77+
- Modified the rule expression to remove the `srcDevice_ip` entity selector and the `isNull` from the rule expression for entities from the existing rule, and creates a new rule for those entities so that there are 2 versions of the rule's intent.
78+
79+
### Log Mappers
80+
- [New] AWS VPC Transit Gateways Flow Logs
81+
- [New] Alert Logic Catch All
82+
- [New] Azure ResourceHealth and ServiceHealth
83+
- [New] Google G Suite Alert Center - User Changes
84+
- [New] Microsoft Defender Advanced Hunting - Alert
85+
- [New] Microsoft Defender Advanced Hunting - Audit
86+
- [New] Microsoft Defender Advanced Hunting - Email events
87+
- [New] Microsoft Defender Advanced Hunting - Logon
88+
- [New] Microsoft Defender Advanced Hunting - Network
89+
- [Updated] Azure Event Hub - Windows Defender Logs and Azure Alert
90+
- Adds support for additional event types and field mappings.
91+
- [Updated] Trend Micro Vision One Custom Parser
92+
- Supports additional field names.
93+
94+
### Parsers
95+
- [New] /Parsers/System/AWS/AWS VPC Transit Gateways Flow Logs
96+
- [New] /Parsers/System/Alert Logic/Alert Logic
97+
- [New] /Parsers/System/Microsoft/Microsoft Defender Advanced Hunting
98+
- [Updated] /Parsers/System/Trend Micro/Trend Micro Vision One
99+
- Parser updated to support additional event format.

0 commit comments

Comments
 (0)