Skip to content

Commit c63b1aa

Browse files
authored
Merge branch 'main' into view-otel-page
2 parents c3bbda3 + 0693458 commit c63b1aa

File tree

3,388 files changed

+10109
-4492
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,388 files changed

+10109
-4492
lines changed

.clabot

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,8 @@
184184
"dlindelof-sumologic",
185185
"snyk-bot",
186186
"stephenthedev",
187-
"Apoorvkudesia-sumologic"
187+
"Apoorvkudesia-sumologic",
188+
"ntanwar-sumo"
188189
],
189190
"message": "Thank you for your contribution! As this is an open source project, we require contributors to sign our Contributor License Agreement and do not have yours on file. To proceed with your PR, please [sign your name here](https://forms.gle/YgLddrckeJaCdZYA6) and we will add you to our approved list of contributors.",
190191
"label": "cla-signed",

.github/workflows/pr.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,5 +44,5 @@ jobs:
4444
name: Check spelling
4545
with:
4646
skip: "*.svg,*.js,*.map,*.css,*.scss"
47-
ignore_words_list: "aks,atleast,cros,ddress,fiel,ist,nd,ot,pullrequest,ser,shttp,wast,fo,seldomly,delt,cruzer,plack,secur,te,nginx,Nginx,notin"
47+
ignore_words_list: "aks,atleast,cros,ddress,delink,fiel,ist,nd,ot,pullrequest,ser,shttp,wast,fo,seldomly,delt,cruzer,plack,secur,te,nginx,Nginx,notin"
4848
path: docs

blog-cse/2025-06-02-application.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,5 +17,6 @@ We're happy to announce that now when you create or update a first seen or outli
1717
To learn more, see our information about baselines for [first seen rules](/docs/cse/rules/write-first-seen-rule/) and [outlier rules](/docs/cse/rules/write-outlier-rule/#baselines-for-outlier-rules).
1818

1919
:::note
20-
This change is rolling out across deployments incrementally and will be available on all deployments by June 12, 2025.
20+
* This feature update applies only to new and changed first seen and outlier rules. Unchanged existing rules will continue to use their existing baselines.
21+
* This feature update is rolling out across deployments incrementally and will be available on all deployments by June 12, 2025.
2122
:::

blog-cse/2025-06-12-content.md

Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
---
2+
title: June 12, 2025 - Content Release
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- log mappers
6+
- parsers
7+
- rules
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
This content release includes:
14+
- New detection rules for browser extension persistence, Kerberos certificate authentication, GitHub vulnerability alerts, Okta application access monitoring, and threat intelligence email matching.
15+
- New product support for Atlassian audit and login events.
16+
- Enhanced Azure Event Hub Windows Defender integration with new threat event mapping for passthrough alerts.
17+
- Cisco ASA updates with new network event support and NAT IP handling improvements.
18+
- Citrix NetScaler mapping updates to support additional events.
19+
- Update to Auth0 successful/unsuccessful login mappings to properly classify each.
20+
- CrowdStrike NextGen SIEM Alert event support.
21+
- Mimecast security event mapping improvements across several event types.
22+
- AWS CloudTrail network event enhancements with event success/failure handling and protocol support.
23+
- Parser updates to support additional event formats for multiple platforms.
24+
25+
Changes are enumerated below.
26+
27+
### Rules
28+
- [New] MATCH-S00897 Chromium Extension Installed
29+
- Threat actors may install browser extensions as a form of persistence on victim systems. Look up the 32 character extension ID in order to ensure that the extension is valid and expected to be installed as part of normal business operations. This extension ID can be found in the following values: `file_path` and/or `changeTarget` depending on the source of the telemetry. This rule logic utilizes Sysmon file creation events, which need to be enabled and configured on relevant assets.
30+
- [New] FIRST-S00064 First Seen Certificate Thumbprint in Successful Kerberos Authentication
31+
- This alert looks for a first seen certificate thumbprint being used to authenticate to an Active Directory environment, resulting in a Kerberos ticket being successfully issued. This alert is designed to catch Active Directory Certificate Services related attacks, ensure the certificate thumprint is valid, correlate the thumbprint ID with other Certificate Services events, particularly looking for recently issued templates.
32+
- [New] MATCH-S00949 GitHub - Vulnerability Alerts
33+
- Detects vulnerability alerts created for a GitHub repository.
34+
- [New] FIRST-S00070 Okta - First Seen Application Accessed by User
35+
- This signal looks for a user that is accessing an application behind Okta SSO that is first seen since the baseline period. Ensure that access of this application is expected and authorized, look for other Okta events around the user account in question to determine whether access to this application is expected and authorized.
36+
- [New] AGGREGATION-S00007 Okta - Session Anomaly (Multiple Operating Systems)
37+
- This rule detects when a user has utilized multiple distinct operating systems when performing authentication through Okta. This activity could potentially indicate credential theft or a general session anomaly. Examine other Okta related events surrounding the time period for this signal, pivoting off the username value to examine if any other suspicious activity has taken place. If this rule is generating false positives, adjust the threshold value and consider excluding certain user accounts via tuning expression or a match list.
38+
- [New] MATCH-S01020 Threat Intel - Matched Target Email
39+
- Detects email addresses associated with known malicious actor(s) or campaign(s) as designated by a threat intelligence provider.
40+
- [New] MATCH-S01019 Threat Intel - Matched User Email
41+
- Detects email addresses associated with known malicious actor(s) or campaign(s) as designated by a threat intelligence provider.
42+
- [Updated] MATCH-S00170 Windows - Scheduled Task Creation
43+
- Fixed spelling error.
44+
45+
### Log Mappers
46+
- [New] Altassian audit events
47+
- [New] Altassian login events
48+
- [New] Azure Event Hub - Windows Defender Azure Alert
49+
- [New] Cisco ASA 4180(18|19|44)
50+
- [New] Cisco ASA 713nnn JSON
51+
- [New] Cisco ASA Network events
52+
- [New] Citrix NetScaler - SSL Handshake Failure
53+
- [New] CrowdStrike NextGen SIEM
54+
- [Updated] Auth0 Failed Authentication
55+
- [Updated] Auth0 Successful Authentication
56+
- [Updated] Azure Event Hub - Windows Defender Logs
57+
- [Updated] Cisco ASA 106010 JSON
58+
- [Updated] Cisco ASA 20900(4|5) JSON
59+
- [Updated] Cisco ASA 50000(4|3) JSON
60+
- [Updated] Citrix NetScaler - TCP Connection
61+
- [Updated] CloudTrail - ec2.amazonaws.com - All Network Events
62+
- [Updated] F5 HTTP Request
63+
- [Updated] Mimecast AV Event
64+
- [Updated] Mimecast Audit Authentication Logs
65+
- [Updated] Mimecast Audit Hold Messages
66+
- [Updated] Mimecast Audit Logs
67+
- [Updated] Mimecast DLP Logs
68+
- [Updated] Mimecast Email logs
69+
- [Updated] Mimecast Impersonation Event
70+
- [Updated] Mimecast Spam Event
71+
- [Updated] Mimecast Targeted Threat Protection Logs
72+
73+
### Parsers
74+
- [New] /Parsers/System/Atlassian/Atlassian Audit Events
75+
- [Updated] /Parsers/System/Cisco/Cisco ASA
76+
- [Updated] /Parsers/System/Cisco/Cisco Umbrella CSV
77+
- [Updated] /Parsers/System/Citrix/Citrix NetScaler Syslog
78+
- [Updated] /Parsers/System/AWS/CloudTrail
79+
- [Updated] /Parsers/System/CrowdStrike/CrowdStrike Falcon Endpoint - JSON
80+
- [Updated] /Parsers/System/F5/F5 Syslog
81+
- [Updated] /Parsers/System/Microsoft/Microsoft Azure JSON
82+
- [Updated] /Parsers/System/Microsoft/Windows-JSON-Open Telemetry

blog-cse/2025-06-26-content.md

Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
title: June 26, 2025 - Content Release
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- log mappers
6+
- parsers
7+
hide_table_of_contents: true
8+
---
9+
10+
11+
This content release includes:
12+
- Device support for AWS VPN and VMware Avi Load Balancer.
13+
- Updates to Cisco ASA and Umbrella parsers to support additional log pattern variations.
14+
- Bug fix for year timestamp parsing with the potential of creating incorrect timestamps around the new year for records.
15+
16+
## Log Mappers
17+
- [New] AWS VPN
18+
- [New] VMware Avi Load Balancer Catch All
19+
20+
## Parsers
21+
- [New] /Parsers/System/AWS/AWS VPN
22+
- [New] /Parsers/System/VMware/VMware Avi Load Balancer
23+
- [Updated] /Parsers/System/Atlassian/Atlassian Audit Events
24+
- [Updated] /Parsers/System/Microsoft/Azure Storage Analytics
25+
- [Updated] /Parsers/System/Cisco/Cisco ASA
26+
- [Updated] /Parsers/System/Cisco/Cisco Umbrella CSV
27+
- [Updated] /Parsers/System/Cylance/Cylance Syslog
28+
- [Updated] /Parsers/System/Cylance/Cylance Threat JSON
29+
- [Updated] /Parsers/System/JumpCloud/JumpCloud Directory Insights
30+
- [Updated] /Parsers/System/Miro/Miro Audit C2C
31+
- [Updated] /Parsers/System/Palo Alto/PAN Firewall LEEF
32+
- [Updated] /Parsers/System/Pulse Secure/Pulse Secure Appliance
33+
- [Updated] /Parsers/System/RSA/RSA SecurID SinglePoint
34+
- [Updated] /Parsers/System/Symantec/Symantec Endpoint Protection/Symantec Endpoint Protection-Syslog
35+
- [Updated] /Parsers/System/Tanium/Tanium CEF
36+
- [Updated] /Parsers/System/Trellix/Trellix MVision EPO
37+
- [Updated] /Parsers/System/Twistlock/Twistlock
38+
- [Updated] /Parsers/System/Zeek/Zeek
39+
- [Updated] /Parsers/System/Zscaler/Zscaler Nanolog Streaming Service/Zscaler Nanolog Streaming Service-CEF
40+
- [Updated] /Parsers/System/Zscaler/Zscaler Nanolog Streaming Service/Zscaler Nanolog Streaming Service-JSON
41+
- [Updated] /Parsers/System/Zscaler/Zscaler Nanolog Streaming Service/Zscaler Nanolog Streaming Service-LEEF

blog-csoar/2025-02-06-application-update.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ hide_table_of_contents: true
99

1010
import useBaseUrl from '@docusaurus/useBaseUrl';
1111

12-
12+
## January release
1313

1414
### Changes and Enhancements
1515

blog-csoar/2025-02-24-application-update.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ hide_table_of_contents: true
99

1010
import useBaseUrl from '@docusaurus/useBaseUrl';
1111

12-
12+
## February release
1313

1414
### Changes and Enhancements
1515

blog-csoar/2025-04-21-content.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: April 21, 2025 - Content Release
2+
title: April 21, 2025 - Application Update
33
hide_table_of_contents: true
44
image: https://help.sumologic.com/img/sumo-square.png
55
keywords:
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
---
2+
title: June 3, 2025 - Application Update
3+
hide_table_of_contents: true
4+
image: https://help.sumologic.com/img/sumo-square.png
5+
keywords:
6+
- automation service
7+
- cloud soar
8+
- soar
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
## May release
14+
15+
### Changes and enhancements
16+
17+
#### New feature: Enable/disable playbooks
18+
19+
This feature allows users to easily enable or disable playbooks without deleting them, offering greater control over their execution.
20+
21+
What's new:
22+
* Switch playbooks' status to enabled or disabled directly from the playbook details page.
23+
* The playbooks listing page now shows a status column to display the status of the playbooks.
24+
* Disabled playbooks will not execute from any linked triggers like monitors, insights, or incident rules, enhancing operational safety.
25+
* By default, playbooks with any published version are set to enabled, while those that are draft-only or have been deleted remain disabled.
26+
* Audit logs are generated whenever playbooks are enabled or disabled manually.
27+
28+
For more information, see [Enable or disable playbooks](/docs/platform-services/automation-service/automation-service-playbooks/#enable-or-disable-playbooks).
29+
30+
#### Integrations
31+
32+
* [NEW] [Google Workspace IDP](/docs/platform-services/automation-service/app-central/integrations/google-workspace-idp/) – This integration automates user and group management in Google Workspace, simplifying identity and access control for improved security and efficiency.
33+
* [UPDATED] [Microsoft EWS Daemon](/docs/platform-services/automation-service/app-central/integrations/microsoft-ews-daemon/) - Enhanced the handling of email attachments that may lack file extension, ensuring consistent detection and processing.
34+
* [UPDATED] [TheHive](/docs/platform-services/automation-service/app-central/integrations/thehive/) - Modified TheHive integration with case and observable enhancements:
35+
* Fixed parsing issues for date related inputs with inconsistent formatting.
36+
* Fixed SSL-related warning issues.
37+
* Added organization name field in resource which will included in the headers.
38+
* Enhanced error handling and made the integration more resilient to malformed inputs.
39+
* [UPDATED] [Sumo Logic Automation Tools](/docs/platform-services/automation-service/app-central/integrations/sumo-logic-automation-tools/) - Introduced the new "Scaled Decimal to Percentage" action, which converts a scaled decimal value into a percentage.
40+
* [UPDATED] [Microsoft Sentinel](/docs/platform-services/automation-service/app-central/integrations/microsoft-sentinel/) - Enhanced the "Microsoft Sentinel Incidents Daemon" action, and added support to seamlessly fetch subsequent paginated data.
41+
42+
### Bug Fixes
43+
44+
#### Playbooks
45+
46+
* Fixed an issue where users were unable to use the "Answer by Email" option when selecting the authorizer as a playbook input variable.
47+
* Fixed long text getting cropped in filter and conditions nodes preview.
48+
49+
#### Rules
50+
51+
* Resolved an issue where empty keys within nested list objects were not properly filtered during rule execution. This fix ensures accurate evaluation of `isnot` and `notcontains` conditions by excluding empty keys, resulting in improved data processing accuracy and rule performance.
52+
53+
#### Incidents
54+
55+
* Resolved data loading issue on incidents and triage listing tables.
56+
* Fixed issue related to user redirection to the logic page on session timeout.

blog-service/2021/12-31.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -649,7 +649,7 @@ Update - We have updated our [Enterprise Audit - Security Management App](/docs
649649
---
650650
## March 4, 2021 (Observability)
651651

652-
Update - We're delighted to announce several enhancements to [Root Cause Explorer](/docs/observability/root-cause-explorer "Root Cause Explorer"). Root Cause Explorer now supports two additional AWS namespaces, as well as Events of Interest detection on Kubernetes and Trace metrics. Cause-impact analysis is now informed by Sumo Logic Tracing's Service Map, AWS X-ray, Kubernetes entities, and AWS inventory relationships. You'll also notice new filters and search builders at the top of the page to correlate Events of Interests at the service, orchestrator, AWS infrastructure, and host levels to speed up the identification of  root causes. You can use the Infrastructure tab for an Event of Interest to pivot to dashboards, logs, metrics and, trace searches to take the next steps in root cause analysis. 
652+
Update - We're delighted to announce several enhancements to Root Cause Explorer. Root Cause Explorer now supports two additional AWS namespaces, as well as Events of Interest detection on Kubernetes and Trace metrics. Cause-impact analysis is now informed by Sumo Logic Tracing's Service Map, AWS X-ray, Kubernetes entities, and AWS inventory relationships. You'll also notice new filters and search builders at the top of the page to correlate Events of Interests at the service, orchestrator, AWS infrastructure, and host levels to speed up the identification of  root causes. You can use the Infrastructure tab for an Event of Interest to pivot to dashboards, logs, metrics and, trace searches to take the next steps in root cause analysis. 
653653

654654
---
655655
## March 1, 2021 (Metrics)

0 commit comments

Comments
 (0)