Skip to content

Commit b77ef26

Browse files
authored
Merge branch 'main' into update-scheduled-views-doc
2 parents 20c0864 + 52591ed commit b77ef26

File tree

30 files changed

+946
-43
lines changed

30 files changed

+946
-43
lines changed

blog-service/2024-11-28-apps.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -33,10 +33,6 @@ We're excited to announce the release of the enhancements listed below for the S
3333
- **Added CloudTrail Audit dashboard**. The CloudTrail Audit dashboard is added to the [AWS Application Load Balancer](/docs/integrations/amazon-aws/application-load-balancer/#cloudtrail-audit), [AWS Classic Load Balancer](/docs/integrations/amazon-aws/classic-load-balancer/#cloudtrail-audit), and [AWS Network Load Balancer](/docs/integrations/amazon-aws/network-load-balancer/#cloudtrail-audit) apps. This dashboard helps you to visualize the successful and failed events globally, event trends, error details, and user activities, offering insights into load balancer performance, security, and usage patterns.
3434
- **Amazon RDS**. Added **Oracle Logs - Alert Logs Analysis**, **Oracle Logs - Audit Logs Analysis**, and **Oracle Logs - Listener Troubleshooting** dashboards. These CloudTrail and CloudWatch Logs dashboard provide monitoring for error logs and essential infrastructure details. [Learn more](/docs/integrations/amazon-aws/rds/#oracle-logs---alert-logs-analysis).
3535
- **MongoDB Atlas**. New version of the [MongoDB Atlas collection](/docs/integrations/databases/mongodb-atlas/#collecting-logs-and-metrics-for-the-mongodb-atlas-app) was released with `v.1.0.11` in [Pypi](https://pypi.org/project/sumologic-mongodb-atlas/) and `v1.0.18` in [AWS Serverless Repository](https://serverlessrepo.aws.amazon.com/applications/us-east-1/956882708938/sumologic-mongodb-atlas). [Learn more](https://github.com/SumoLogic/sumologic-mongodb-atlas/releases/tag/v2.0.1)
36-
- Source Template enhancements:
37-
- Updated log and metric section feature on 11 Source templates (OTRM).
38-
- Updated and maintained the UI uniformity across all Source templates.
39-
- Released masking feature for the Windows Source Template. [Learn more](/docs/send-data/opentelemetry-collector/data-transformations/#masking-examples).
4036

4137
### Bug fixes
4238

blog-service/2024-12-02-apps.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: Digital Guardian ARC (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- digital-guardian-arc
6+
- apps
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We're excited to introduce the new Digital Guardian ARC app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Digital Guardian source that provides data protection through analytics, reporting, and workflows. This integration helps to improve real-time activity monitoring, pre-configure alerts for different events, analyze policy enforcements, provide geolocation insights to support targeted threat investigation and response, and identify potential tampering by closely monitoring digital signatures for files and applications.
15+
16+
Explore our technical documentation [here](/docs/integrations/saas-cloud/digital-guardian-arc/) to learn how to set up and use the Digital Guardian ARC app for Sumo Logic.

blog-service/2024-12-02-apps2.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
---
2+
title: Microsoft Defender for Cloud (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- microsoft-defender-for-cloud
6+
- apps
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We're excited to introduce the new Microsoft Defender for Cloud app for Sumo Logic. This app helps you to collect the alerts, security recommendation, and regulatory compliance logs using the Sumo Logic Cloud-to-Cloud Azure Event Hub Source and by configuring the continuous export using the Event Hub instance details in the Azure portal. Key features of the Microsoft Defender for Cloud app include:
15+
16+
- Gain real-time visibility into security alerts across your Azure environment, categorized by severity (High, Medium, Low, and Informational).
17+
- Monitor trends in alert activity over time to identify spikes and recurring threats.
18+
- Leverage detailed alert summaries and remediation steps for effective threat mitigation.
19+
- Track compliance performance across critical standards, including FedRAMP, PCI DSS 4, CIS Azure Foundations, and Microsoft Cloud Security Benchmark.
20+
- Analyze threats by categories like data exfiltration, unauthorized access, and account breaches.
21+
22+
Explore our technical documentation [here](/docs/integrations/microsoft-azure/microsoft-defender-for-cloud/) to learn how to set up and use the Microsoft Defender for Cloud app for Sumo Logic.

blog-service/2024-12-02-copilot.md

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
title: Sumo Logic Copilot (Search)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- copilot
6+
- artificial intelligence
7+
- ai
8+
- machine learning
9+
- ml
10+
hide_table_of_contents: true
11+
---
12+
13+
import useBaseUrl from '@docusaurus/useBaseUrl';
14+
15+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
16+
17+
We're excited to introduce Copilot, an AI-powered assistant that accelerates log investigations and troubleshooting. With natural language query capabilities and contextual suggestions, Copilot helps security first responders and on-call engineers resolve incidents quickly and efficiently. [Learn more](/docs/search/copilot).
18+
19+
* Ask questions in plain English to generate actionable log insights.
20+
* Get tailored suggestions relevant to your troubleshooting and investigation context.
21+
* Leverage conversation history to save and resume sessions without losing context.
22+
* Auto-visualize charts from search results and add them directly to dashboards.
23+
* Use auto-complete for natural language queries to access insights faster.
24+
25+
<img src={useBaseUrl('img/search/copilot/ga-releasenote.png')} alt="Copilot UI with the query Analyze the geographic distribution of requests by source IP" style={{border: '1px solid gray'}} width="800" />

cid-redirects.json

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1573,6 +1573,7 @@
15731573
"/cid/10110": "/docs/integrations/app-development/jfrog-xray",
15741574
"/cid/10111": "/docs/integrations/app-development/jfrog-xray",
15751575
"/cid/10188": "/docs/integrations/saas-cloud/miro",
1576+
"/cid/10187": "/docs/integrations/saas-cloud/digital-guardian-arc",
15761577
"/cid/10208": "/docs/integrations/saas-cloud/cisco-meraki-c2c",
15771578
"/cid/10209": "/docs/integrations/security-threat-detection/cisco-meraki",
15781579
"/cid/10210": "/docs/integrations/saas-cloud/proofpoint-tap",
@@ -1824,6 +1825,7 @@
18241825
"/cid/1963": "/docs/integrations/sumo-apps/enterprise-audit",
18251826
"/cid/1964": "/docs/integrations/security-threat-detection/f5-big-ip-ltm",
18261827
"/cid/1965": "/docs/integrations/security-threat-detection/netskope",
1828+
"/cid/19665": "/docs/integrations/microsoft-azure/microsoft-defender-for-cloud",
18271829
"/cid/1966": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/carbon-black-cloud-source",
18281830
"/cid/1987": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/symantec-endpoint-security-source",
18291831
"/cid/1257": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/atlassian-source",
@@ -2021,6 +2023,7 @@
20212023
"/cid/10226": "/docs/integrations/containers-orchestration/opentelemetry/activemq-opentelemetry",
20222024
"/cid/25631": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/tenable-source",
20232025
"/cid/25632": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/workday-source",
2026+
"/cid/25633": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/universal-connector-source",
20242027
"/cid/25634": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-azure-ad-inventory-source",
20252028
"/cid/25635": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-azure-ad-reporting-source",
20262029
"/cid/25636": "/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/microsoft-graph-identity-protection-source",

docs/cse/introduction-to-cloud-siem.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ description: Learn basic concepts about Cloud SIEM.
77

88
import useBaseUrl from '@docusaurus/useBaseUrl';
99

10-
Cloud SIEM, also known as Cloud SIEM, is a cloud-based, enterprise-grade security information and event management (SIEM) system. Cloud SIEM leverages Sumo Logic's core functionality, including data collection, ingestion, storage, and threat intelligence. Cloud SIEM is a purchased add-on with an ever-expanding library of content designed for security operations.
10+
Cloud SIEM is a cloud-based enterprise-grade security information and event management (SIEM) system. Cloud SIEM leverages Sumo Logic's core functionality, including data collection, ingestion, storage, and threat intelligence. Cloud SIEM is a purchased add-on with an ever-expanding library of content designed for security operations.
1111

1212
Watch the following micro lesson to learn how to get started using Cloud SIEM for threat investigation.
1313

docs/cse/rules/cse-rules-syntax.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1394,7 +1394,12 @@ Filters results based on the value of a boolean expression.  
13941394

13951395
`... | where <boolean expression>`
13961396

1397-
**Example**
1397+
**Examples**
13981398

1399-
`| where jsonArrayContains(field, “vuln_scanner”)`
1399+
* `| where jsonArrayContains(field, “vuln_scanner”)`
14001400

1401+
* `| where` can be used at the beginning of an expression, as well as on subsequent lines after another syntax element has been used to start a preceding line. For example:
1402+
```
1403+
| json field=fields "foo" as alias
1404+
| where toInt(alias) > 5
1405+
```

docs/integrations/microsoft-azure/index.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -317,6 +317,12 @@ This guide has documentation for all of the apps that Sumo Logic provides for Mi
317317
<p>A guide to the Sumo Logic app for Azure Kubernetes Service Control Plane.</p>
318318
</div>
319319
</div>
320+
<div className="box smallbox card">
321+
<div className="container">
322+
<a href="/docs/integrations/microsoft-azure/microsoft-defender-for-cloud"><img src={useBaseUrl('img/integrations/microsoft-azure/microsoft-defender-for-cloud.png')} alt="thumbnail icon" width="75"/><h4>Microsoft Defender for Cloud</h4></a>
323+
<p>Learn about the Sumo Logic collection process for the Microsoft Defender for Cloud service.</p>
324+
</div>
325+
</div>
320326
<div className="box smallbox card">
321327
<div className="container">
322328
<img src={useBaseUrl('img/integrations/microsoft-azure/network-watcher.png')} alt="Thumbnail icon" width="50"/>

0 commit comments

Comments
 (0)