Skip to content

Commit 997626d

Browse files
authored
Merge branch 'main' into docs-514-transform-if-present-note
2 parents 1b56ca5 + b202fed commit 997626d

File tree

8 files changed

+42
-15
lines changed

8 files changed

+42
-15
lines changed

blog-service/2024-10-29-manage.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
title: Scan Budgets (Manage)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- scan-budgets
6+
- manage
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We are happy to introduce our new **Usage Management** tab under the **Accounts** section. This feature allows you to define query spending limits, helping prevent unexpected charges and manage Sumo Logic credits, particularly in pay-per-use scenarios by limiting search volume.
15+
16+
Key features include:
17+
18+
- **Org-wide query budget**. Set a budget for queries that applies to all users in the organization.
19+
- **User-level query budget**. Set a budget for queries at the user level. With this, *Admins* can specify roles and easily select groups based on roles.
20+
- **Flexible actions**. Choose what happens when the budget limit is reached. Options include **Display a warning to the user** or **Restrict queries to background scans only**.
21+
22+
Explore our technical documentation [here](/docs/manage/manage-subscription/usage-management/) to learn how to set up and use Scan Budgets.

docs/cse/get-started-with-cloud-siem/insight-generation-process.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ By default, when an entity’s Activity Score exceeds the threshold of 12, Clou
8989

9090
After Cloud SIEM fires a particular Signal on a particular Entity, it suppresses Signals for that Signal-Entity combination for 12 to 24 hours. For more information, see [Redundant Signal suppression](#redundant-signal-suppression), below. 
9191

92-
### Example of an Entity that has reached Activity Score threshold
92+
### Example of an Entity that has exceeded Activity Score threshold
9393

9494
In the screenshot below, the **Details** pane on the left shows that the Insight was created for the entity “217.xxx.x.x”, an IP address. The right side of the page shows the Signals that contributed to the Insight. You can see each of the Signals relate to the IP address for which the Insight was created; in the Record underlying each of the Signals, is mapped to the `srcDevice_ip` schema attribute. 
9595

docs/cse/introduction-to-cloud-siem.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -207,7 +207,7 @@ Cloud SIEM automatically normalizes, enriches, and correlates all your data acro
207207

208208
<img src={useBaseUrl('img/cse/intro-cloud-siem-insight-generation-process-1.png')} alt="Records creation" style={{border: '1px solid gray'}} width="800"/>
209209

210-
When records enter Cloud SIEM, rules analyze Entities on the records to produce Signals. The Signals are correlated, and if an Entity's activity score is 12 or more in a two-week period, [an Insight is generated](/docs/cse/get-started-with-cloud-siem/insight-generation-process/) for that Entity.
210+
When records enter Cloud SIEM, rules analyze Entities on the records to produce Signals. The Signals are correlated, and if an Entity's activity score exceeds 12 or more in a two-week period, [an Insight is generated](/docs/cse/get-started-with-cloud-siem/insight-generation-process/) for that Entity.
211211

212212
<img src={useBaseUrl('img/cse/intro-cloud-siem-insight-generation-process-2.png')} alt="Insights creation" style={{border: '1px solid gray'}} width="725"/>
213213

@@ -273,7 +273,7 @@ On the Cloud SIEM main page, you'll see a panel similar to this one. In this cas
273273

274274
Cloud SIEM takes everything one step further and correlates those Signals into a manageable number of Insights. Here, just one Insight was created out of all those Signals.
275275

276-
An Insight is a group of Signals clustered around a single entity. An Insight is created when the sum of the severity scores of Signals with the same entity goes above a certain activity score within a certain timeframe. By default, this is an activity score of 12 within the last 14 days. For example, if a rule was triggered with a severity of 5, and then ten days later another rule with the same entity and a severity of 5 was triggered, the total activity score would only be 10 in the last 14 days, so an Insight would not be created. However, if those same two rules had a severity score of 7, an Insight would be created.
276+
An Insight is a group of Signals clustered around a single entity. An Insight is created when the sum of the severity scores of Signals with the same entity goes above a certain activity score within a certain timeframe. By default, this is an activity score of 12 within the last 14 days. For example, if a rule was triggered with a severity of 5, and then ten days later another rule with the same entity and a severity of 5 was triggered, the total activity score would only be 10 in the last 14 days, so an Insight would not be created. However, if those same two rules had a severity score of 7, an Insight would be created because the total activity score exceeds 12.
277277

278278
## Get started with threat investigation
279279

@@ -330,7 +330,7 @@ When you click into a Signal, you’ll have the option to see the full details o
330330

331331
#### Entities
332332

333-
The Entities tab lists all the entities that your rules have detected in the last 14 days, by default. Each entity has an Activity Score associated with it. The activity score is the sum of all the severity scores of all the unique signals associated with that entity. When an entity’s activity score reaches at least 12, an Insight is created. If you have several entities with relatively high activity scores, they might be a good starting point for a threat hunt.
333+
The Entities tab lists all the entities that your rules have detected in the last 14 days, by default. Each entity has an Activity Score associated with it. The activity score is the sum of all the severity scores of all the unique signals associated with that entity. When an entity’s activity score exceeds 12, an Insight is created. If you have several entities with relatively high activity scores, they might be a good starting point for a threat hunt.
334334

335335
<img src={useBaseUrl('img/cse/intro-cloud-siem-entities.png')} alt="Entities tab" style={{border: '1px solid gray'}} width="800"/>
336336

docs/cse/records-signals-entities-insights/set-insight-generation-window-threshold.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,8 @@ To change the Insight generation settings:
1717
<br/>Your current detection settings are displayed on the Insight Detection page.<br/><img src={useBaseUrl('img/cse/detection-threshold-popup.png')} alt="Detection threshold settings" style={{border: '1px solid gray'}} width="600"/>
1818
1. Enter values for **Detection Threshold** and **Signal Suppression**:
1919
* **Standard Threshold**
20-
* **Detection Window (Days)**. Enter the duration, in days, during which an Entity's Activity Score must reach the threshold to result in an Insight being generated for the Entity.
21-
* **Threshold**. Enter the threshold Activity Score value that an Entity must reach during the detection window to result in an Insight being generated for the Entity.
20+
* **Detection Window (Days)**. Enter the duration, in days, during which an Entity's Activity Score must exceed the threshold to result in an Insight being generated for the Entity.
21+
* **Threshold**. Enter the threshold Activity Score value that an Entity must exceed during the detection window to result in an Insight being generated for the Entity.
2222
* **Global Signal Suppression**
2323
* **Maximum Period (Hours)**. By default, redundant Signals for a Signal-Entity combination are automatically suppressed for a maximum period of 72 hours to avoid repeated Signals contributing to Insight generation. This setting lets you modify this period based upon your organizational needs. To change this setting, select the number of hours to suppress Signals, anywhere from 24 hours to 72 hours. For additional ways to control signal suppression, see [About Signal Suppression](/docs/cse/records-signals-entities-insights/about-signal-suppression/).
2424
1. Click **Save**.

docs/platform-services/automation-service/app-central/integrations/connectwise-manage.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
77
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/logos/connectwise-manage.png')} alt="connectwise-manage" width="100"/>
88

99
***Version: 1.3
10-
Updated: Oct 28, 2024***
10+
Updated: Oct 29, 2024***
1111

1212
Create, update, search, and gather ticket information from ConnectWise.
1313

@@ -30,5 +30,5 @@ Create, update, search, and gather ticket information from ConnectWise.
3030
+ renamed Get Tickets action to List Tickets
3131
+ added new actions: Add Notes To Ticket, List Ticket Notes
3232
+ removed Get Tickets Daemon
33-
* October 28, 2024 (v1.3) Beta Release
33+
* October 29, 2024 (v1.3) Beta Release
3434
+ Added the "Priority" field to the Create Ticket and Update Ticket actions.

docs/platform-services/automation-service/app-central/integrations/google-chat.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
88
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/logos/google.png')} alt="google" width="80"/>
99

1010
***Version: 2.0
11-
Updated: August 27, 2024***
11+
Updated: Oct 29, 2024***
1212

1313
Google Chat is an intelligent and secure communication and collaboration tool, built for teams.
1414

@@ -30,13 +30,15 @@ Google Chat is an intelligent and secure communication and collaboration tool, b
3030
3. Go to the **API&Services** > **Credentials** page.
3131
4. In the same page click on **ENABLES API AND SERVICES** and search for Google Chat and enable it.
3232
5. Click **CREATE CREDENTIALS** and select **Service Account**.<br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-drive/google-drive-1.png')} style={{border:'1px solid gray'}} alt="google-drive" width="800"/>
33-
6. Enter a Service account name to display in the Google Cloud console. The Google Cloud console generates a service account ID based on this name.
33+
6. Enter a service account name to display in the Google Cloud console. The Google Cloud console generates a service account ID based on this name.
3434
7. (Optional) Enter a description of the service account.
3535
8. Skip two optional grant permissions steps and click **Done** to complete the service account creation.<br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-drive/google-drive-2.png')} style={{border:'1px solid gray'}} alt="google-drive" width="800"/>
3636
9. Click on the generated service account to open the details.<br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-drive/google-drive-3.png')} style={{border:'1px solid gray'}} alt="google-drive" width="800"/>
37-
10. Under the **KEYS** tab, Click **ADD KEY** and choose **Create new key**.<br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-drive/google-drive-4.png')} style={{border:'1px solid gray'}} alt="google-drive" width="800"/>
37+
10. Under the **KEYS** tab, click **ADD KEY** and choose **Create new key**.<br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-drive/google-drive-4.png')} style={{border:'1px solid gray'}} alt="google-drive" width="800"/>
3838
11. Click on **CREATE** (make sure **JSON** is selected).<br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-drive/google-drive-5.png')} style={{border:'1px solid gray'}} alt="google-drive" width="400"/>
3939
12. The JSON file is downloaded. Make sure you save it in a safe place.
40+
13. To configure the app in Google Chat API, go to **APIs & Services**, select **Google Chat API**, and in **CONFIGURATION** provide the details and click on **SAVE**. <br/><img src={useBaseUrl('/img/platform-services/automation-service/app-central/integrations/google-drive/google-drive-10.png')} style={{border:'1px solid gray'}} alt="google-drive" width="800"/>
41+
14. Go to the **Google Chat App** and add the above app in that. Also, to add above app in space, go to **space** and in **Apps & integration** add the app.
4042

4143
## Google Chat in Automation Service and Cloud SOAR
4244

@@ -46,4 +48,5 @@ Google Chat is an intelligent and secure communication and collaboration tool, b
4648

4749
## Change Log
4850

49-
* August 27, 2024 (v2.0) - First upload
51+
* August 27, 2024 (v2.0) - First upload
52+
* October 29, 2024 (v2.0) - Updated the docs

docs/platform-services/automation-service/app-central/integrations/microsoft-sentinel.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
66

77
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/logos/microsoft-sentinel.png')} alt="microsoft-sentinel" width="100"/>
88

9-
***Version: 1.5
10-
Updated: Oct 22, 2024***
9+
***Version: 1.6
10+
Updated: Oct 29, 2024***
1111

1212
Microsoft Sentinel is a cloud-native security information and event manager (SIEM) platform that uses built-in AI to help analyze large volumes of data across an enterprise.
1313

@@ -41,5 +41,7 @@ Microsoft Sentinel is a cloud-native security information and event manager (SIE
4141
+ Updated the integration by adding two new fields (**API Root** and **Login Endpoint**) to the configuration
4242
+ October 22, 2024 (v1.5)
4343
+ Added new action **List Incident Entities V2**
44-
+ Updated the integration by adding a new fields (**Cloud SOAR URL API URL**, **Access ID** , **Access Key**) to the configuration
44+
+ Updated the integration by adding new fields (**Cloud SOAR URL API URL**, **Access ID** , **Access Key**) to the configuration
45+
+ October 29, 2024 (v1.6)
46+
+ Updated **List Incident Entities V2** action in the output field.
4547

404 KB
Loading

0 commit comments

Comments
 (0)