Skip to content

Commit c3206e4

Browse files
authored
Merge branch 'main' into DOCS-811
2 parents 0a586bb + 420cb8e commit c3206e4

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+210
-152
lines changed

.github/workflows/build_and_deploy.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ on:
2828

2929
jobs:
3030
build-and-deploy:
31-
runs-on: ubuntu-22.04
31+
runs-on: ubuntu-latest
3232
environment:
3333
name: ${{ inputs.environment }}
3434
url: ${{ inputs.hostname }}${{ inputs.base_url }}

.github/workflows/delete-review.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ on: delete
44

55
jobs:
66
delete-branch-environment:
7-
runs-on: ubuntu-20.04
7+
runs-on: ubuntu-latest
88
environment:
99
name: review/${{ github.ref_name }}
1010
env:

.github/workflows/pr.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ on:
1010

1111
jobs:
1212
build-and-deploy:
13-
runs-on: ubuntu-22.04
13+
runs-on: ubuntu-latest
1414
env:
1515
CI: true
1616
NODE_ENV: production

blog-cse/2025-04-25-content.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
---
2+
title: April 25, 2025 - Content Release
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- log mappers
6+
- parsers
7+
- rules
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
This content release includes:
14+
- Fixes for Threat Intelligence rules to correct match expression syntax for hash and HTTP referrer.
15+
- Parsing and mapping updates for Microsoft Office 365 to improve target user visibility.
16+
17+
## Rules
18+
- [Updated] MATCH-S01009 Threat Intel - HTTP Referrer
19+
- [Updated] MATCH-S01012 Threat Intel - HTTP Referrer Root Domain
20+
- [Updated] MATCH-S00999 Threat Intel - IMPHASH Match
21+
- [Updated] MATCH-S01000 Threat Intel - MD5 Match
22+
- [Updated] MATCH-S01001 Threat Intel - PEHASH Match
23+
- [Updated] MATCH-S01003 Threat Intel - SHA1 Match
24+
- [Updated] MATCH-S01004 Threat Intel - SHA256 Match
25+
- [Updated] MATCH-S01002 Threat Intel - SSDEEP Match
26+
27+
## Log Mappers
28+
- [Updated] Microsoft Office 365 Active Directory Authentication Events
29+
- [Updated] Microsoft Office 365 AzureActiveDirectory Events
30+
31+
## Parsers
32+
- [Updated] /Parsers/System/Microsoft/Office 365

blog-service/2025-04-28-manage.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
---
2+
title: Content Sharing for Apps (Manage)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- manage
6+
- apps
7+
- content sharing
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
We are happy to announce that authorized users can now control the visibility of installed app content. This update allows content administrators and the installing user to configure the roles and users who should be allowed to view the dashboards and log searches that are installed with an app.
14+
15+
For more information about sharing apps, see [Content Sharing in Sumo Logic](/docs/manage/content-sharing/).
16+
17+
<img src={useBaseUrl('img/content-sharing/grant-app-access-to-org.png')} alt="<your image description>" style={{border: '1px solid gray'}} width="<insert-pixel-number>" />

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4307,6 +4307,7 @@
43074307
"/docs/manage/partitions/flex/estimate-and-actual-scan-data": "/docs/manage/partitions/flex/estimate-scan-data",
43084308
"/docs/manage/partitions/flex/flex-pricing-faqs": "/docs/manage/partitions/flex/faq",
43094309
"/docs/manage/partitions/flex/flex-pricing-faq": "/docs/manage/partitions/flex/faq",
4310+
"/docs/platform-services/automation-service/app-central/integrations/exana-open-dns": "/docs/platform-services/automation-service/app-central/integrations",
43104311
"/docs/platform-services/automation-service/app-central/integrations/snowflake": "/docs/platform-services/automation-service/app-central/integrations",
43114312
"/docs/integrations/security-threat-detection/palo-alto-networks-6": "/docs/integrations/security-threat-detection/palo-alto-networks-9",
43124313
"/docs/integrations/security-threat-detection/palo-alto-networks-8":"/docs/integrations/security-threat-detection/palo-alto-networks-9",

docs/alerts/webhook-connections/set-up-webhook-connections.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ To set up a webhook connection:
4747
1. (Optional) Enter a **Description** for the connection.
4848
1. Enter the **URL** for the endpoint. This is generated from the remote system’s API.
4949
:::important
50-
Only HTTPS (`port 443`) and HTTP (`port 80`) URLs are supported. 
50+
HTTPS URLs can use any port without restriction, while HTTP URLs are limited to only port 80.
5151
:::
5252
1. (Optional) If the third-party system requires an **Authorization Header**, enter it here. For more information, see [Example Authorization Header](#example-authorization-header) below.
5353
1. (Optional) **Custom Headers**, enter up to five comma separated key-value pairs.

docs/cse/administration/create-custom-threat-intel-source.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ You can search using the same functionality available for other Cloud SIEM searc
3131

3232
When Cloud SIEM encounters an indicator from a threat source in an incoming record, it adds relevant information to the record. Because threat intelligence information is persisted within records, you can reference it downstream in both rules and search. The built-in rules that come with Cloud SIEM automatically create a signal for records that have been enriched in this way.
3333

34-
Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a rule tuning expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Threat Intelligence Indicators in Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/).
34+
Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a rule tuning expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Find Threats with Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/).
3535

3636
### Target fields for threat indicators
3737

docs/cse/integrations/configuring-threatq-source-in-cse.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ To do so, [ingest threat intelligence indicators](/docs/security/threat-intellig
1515
1616
## Looking for ThreatQ indicators using Cloud SIEM rules
1717
18-
Threat Intelligence sources are used at the time of record ingestion. When a record is ingested, Cloud SIEM determines whether any of the fields in the record exist in any of your Threat Intelligence sources. When a record contains a value that matches an entry in one or more Threat Intelligence sources, the `hasThreatMatch` Cloud SIEM rules function searches incoming records in Cloud SIEM for matches to threat intelligence indicators. For more information, see [Threat Intelligence Indicators in Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/).
18+
Threat Intelligence sources are used at the time of record ingestion. When a record is ingested, Cloud SIEM determines whether any of the fields in the record exist in any of your Threat Intelligence sources. When a record contains a value that matches an entry in one or more Threat Intelligence sources, the `hasThreatMatch` Cloud SIEM rules function searches incoming records in Cloud SIEM for matches to threat intelligence indicators. For more information, see [Find Threats with Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/).
1919
-->
2020

2121
This topic has information about configuring a ThreatQ source in Cloud SIEM.

docs/cse/integrations/integrate-cse-with-taxii-feed.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ Threat intelligence indicators allow you to enrich incoming records with threat
3737
3838
Because the threat intel information is persisted within records, you can reference it downstream in both rules and search. The built-in rules that come with Cloud SIEM will also automatically create a signal for any record with a match from your threat feed.
3939
40-
For more information, see [Threat Intelligence Indicators in Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/).
40+
For more information, see [Find Threats with Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/).
4141
4242
-->
4343

0 commit comments

Comments
 (0)