Skip to content

Commit c7fb611

Browse files
Merge branch 'main' into sumo_261549
2 parents a99a391 + faf54b9 commit c7fb611

File tree

929 files changed

+9308
-6243
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

929 files changed

+9308
-6243
lines changed

.clabot

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,9 @@
182182
"Deklin",
183183
"justrelax19",
184184
"dlindelof-sumologic",
185-
"snyk-bot"
185+
"snyk-bot",
186+
"stephenthedev",
187+
"Apoorvkudesia-sumologic"
186188
],
187189
"message": "Thank you for your contribution! As this is an open source project, we require contributors to sign our Contributor License Agreement and do not have yours on file. To proceed with your PR, please [sign your name here](https://forms.gle/YgLddrckeJaCdZYA6) and we will add you to our approved list of contributors.",
188190
"label": "cla-signed",

.github/workflows/build_and_deploy.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ on:
2828

2929
jobs:
3030
build-and-deploy:
31-
runs-on: ubuntu-22.04
31+
runs-on: ubuntu-latest
3232
environment:
3333
name: ${{ inputs.environment }}
3434
url: ${{ inputs.hostname }}${{ inputs.base_url }}

.github/workflows/delete-review.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ on: delete
44

55
jobs:
66
delete-branch-environment:
7-
runs-on: ubuntu-20.04
7+
runs-on: ubuntu-latest
88
environment:
99
name: review/${{ github.ref_name }}
1010
env:

.github/workflows/pr.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ on:
1010

1111
jobs:
1212
build-and-deploy:
13-
runs-on: ubuntu-22.04
13+
runs-on: ubuntu-latest
1414
env:
1515
CI: true
1616
NODE_ENV: production

blog-cse/2025-04-14-content.md

Lines changed: 81 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,81 @@
1+
---
2+
title: April 14, 2025 - Content Release
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- log mappers
6+
- parsers
7+
- rules
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
This content release includes:
14+
- Additional data requirements for GitHub rules added to rule descriptions.
15+
- Spelling corrections for AWS Lambda rules.
16+
- New Slack Anomaly Event log mapper and supporting parsing changes:
17+
- Enables passthrough detection of Slack Anomaly Events using Normalized Security Signal (MATCH-S00402).
18+
- Requires parser be defined for passthrough detection.
19+
- Updates to Sysdig parsing and mapping to support additional events.
20+
- Support for Microsoft Windows Sysmon-29 event.
21+
- Additional normalized field mappings for Microsoft Windows Sysmon events.
22+
- New `user_phoneNumber` and `targetUser_phoneNumber` schema fields.
23+
24+
25+
### Rules
26+
- [Updated] MATCH-S00874 AWS Lambda Function Recon
27+
- [Updated] MATCH-S00952 GitHub - Administrator Added or Invited
28+
- [Updated] MATCH-S00953 GitHub - Audit Logging Modification
29+
- [Updated] MATCH-S00954 GitHub - Copilot Seat Cancelled by GitHub
30+
- [Updated] FIRST-S00091 GitHub - First Seen Activity From Country for User
31+
- [Updated] FIRST-S00090 GitHub - First Seen Application Interacting with API
32+
- [Updated] MATCH-S00950 GitHub - Member Invitation or Addition
33+
- [Updated] MATCH-S00955 GitHub - Member Permissions Modification
34+
- [Updated] MATCH-S00956 GitHub - OAuth Application Activity
35+
- [Updated] MATCH-S00957 GitHub - Organization Transfer
36+
- [Updated] OUTLIER-S00026 GitHub - Outlier in Distinct User Agent Strings by User
37+
- [Updated] OUTLIER-S00027 GitHub - Outlier in Repository Cloning or Downloads
38+
- [Updated] MATCH-S00958 GitHub - PR Review Requirement Removed
39+
- [Updated] MATCH-S00959 GitHub - Repository Public Key Deletion
40+
- [Updated] MATCH-S00960 GitHub - Repository Transfer
41+
- [Updated] MATCH-S00961 GitHub - Repository Visibility Changed to Public
42+
- [Updated] MATCH-S00962 GitHub - Repository Visibility Permissions Changed
43+
- [Updated] MATCH-S00963 GitHub - SSH Key Created for Private Repo
44+
- [Updated] MATCH-S00964 GitHub - SSO Recovery Codes Access Activity
45+
- [Updated] MATCH-S00951 GitHub - Secret Scanning Alert
46+
- [Updated] MATCH-S00965 GitHub - Secret Scanning Potentially Disabled
47+
- [Updated] MATCH-S00966 GitHub - Two-Factor Authentication Disabled for Organization
48+
49+
### Log Mappers
50+
- [New] Slack Anomaly Event
51+
- [New] Windows - Microsoft-Windows-Sysmon/Operational - 16
52+
- [New] Windows - Microsoft-Windows-Sysmon/Operational - 19|20
53+
- [New] Windows - Microsoft-Windows-Sysmon/Operational-29
54+
- [Updated] Sysdig Secure Packages
55+
- [Updated] Sysdig Secure Vulnerability
56+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 1
57+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 2
58+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 3
59+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 4
60+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 5
61+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 6
62+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 7
63+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 8
64+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 9
65+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 10
66+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 11
67+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 15
68+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 17
69+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 18
70+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 23
71+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 24
72+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 26
73+
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 27
74+
75+
### Parsers
76+
- [New] /Parsers/System/Slack/Slack Enterprise Audit
77+
- [Updated] /Parsers/System/Sysdig/Sysdig Secure
78+
79+
### Schema
80+
- [New] `targetUser_phoneNumber`
81+
- [New] `user_phoneNumber`

blog-cse/2025-04-25-content.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
---
2+
title: April 25, 2025 - Content Release
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- log mappers
6+
- parsers
7+
- rules
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
This content release includes:
14+
- Fixes for Threat Intelligence rules to correct match expression syntax for hash and HTTP referrer.
15+
- Parsing and mapping updates for Microsoft Office 365 to improve target user visibility.
16+
17+
## Rules
18+
- [Updated] MATCH-S01009 Threat Intel - HTTP Referrer
19+
- [Updated] MATCH-S01012 Threat Intel - HTTP Referrer Root Domain
20+
- [Updated] MATCH-S00999 Threat Intel - IMPHASH Match
21+
- [Updated] MATCH-S01000 Threat Intel - MD5 Match
22+
- [Updated] MATCH-S01001 Threat Intel - PEHASH Match
23+
- [Updated] MATCH-S01003 Threat Intel - SHA1 Match
24+
- [Updated] MATCH-S01004 Threat Intel - SHA256 Match
25+
- [Updated] MATCH-S01002 Threat Intel - SSDEEP Match
26+
27+
## Log Mappers
28+
- [Updated] Microsoft Office 365 Active Directory Authentication Events
29+
- [Updated] Microsoft Office 365 AzureActiveDirectory Events
30+
31+
## Parsers
32+
- [Updated] /Parsers/System/Microsoft/Office 365

blog-cse/2025-05-09-content.md

Lines changed: 148 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,148 @@
1+
---
2+
title: May 9, 2025 - Content Release
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- log mappers
6+
- parsers
7+
- rules
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
This release includes:
14+
- New rules for monitoring AWS services (see below for tuning guidance).
15+
- Updated rules for Microsoft O365 and Powershell.
16+
- Updates to Cisco ASA mappers to add normalizedAction and normalizedSeverity.
17+
- Updates to Cisco Umbrella mappers to add user_username.
18+
- Updates to SentinelOne mappers to drop null values.
19+
- New parsers for Azure Virtual Network and SentinelOne MGMT API.
20+
- Updates to existing parsers for Abnormal Security, Cisco ASA, Cisco ISE, Cisco Umbrella CSV, Cylance Syslog, and KnowBe4 KMSAT C2C.
21+
22+
Changes are enumerated below.
23+
24+
25+
### Rules
26+
- [New] OUTLIER-S00033 AWS DynamoDB Outlier in PutItem Events from User
27+
- [Disabled by Default] This rule detects an unusual amount of PutItem events to a DynamoDB resource within an hour time period (DynamoDB data events are required). Verify the user is authorized to modify the DynamoDB tables and instances. This rule is disabled by default due to potential volume of signals, before enabling consider excluding authorized users via match lists, and adjust floor value and model sensitivity as needed.
28+
- [New] FIRST-S00100 First Seen User Enumerating Custom AWS Bedrock Models
29+
- [Disabled by Default] Detection of a user account's first enumeration of custom AWS Bedrock models via ListCustomModels API. Verify the user is authorized for AWS Bedrock access. The http_userAgent field indicates whether a browser or CLI tool was used. This rule is disabled by default due to potential high volume of alerts, particularly from service accounts. Before enabling, consider excluding authorized users and service accounts (such as CNAPP monitoring accounts with timestamp-based usernames) through rule tuning expressions.
30+
- [New] OUTLIER-S00032 Outlier in Data Transferred from an S3 Bucket by User
31+
- [Disabled by Default] This rule detects an unusual amount of data transferred outbound from an S3 bucket (requires AWS Data events are required). Verify if the user, role and IP address associated with this activity are authorized. This rule is disabled by default due to potential signal volume. Before enabling, consider excluding authorized users with regular large transfers via match lists, and adjust floor value and model sensitivity as needed.
32+
- [New] OUTLIER-S00031 Outlier in Data Transferred into an S3 Bucket by User
33+
- [Disabled by Default] Detects unusual amounts of inbound data transfers to S3 buckets (requires AWS Data events). Verify if the user, role, and IP address associated with this activity are authorized. This rule is disabled by default due to potential alert volume. Before enabling, consider excluding authorized users with regular large transfers via match lists, and adjust floor value and model sensitivity as needed.
34+
- [Updated] MATCH-S00069 O365 - Users Password Reset
35+
- Changed Entity and Summary, replacing user_username with targetUser_username.
36+
- [Updated] MATCH-S00449 Powershell Execution Policy Bypass
37+
- Fixed camel case in commandLine field.
38+
39+
### Log Mappers
40+
- [New] Azure Virtual Network Flow logs
41+
- [Updated] Abnormal Security Threats
42+
- [Updated] Cisco ASA 103001 JSON
43+
- [Updated] Cisco ASA 103004 JSON
44+
- [Updated] Cisco ASA 106001 JSON
45+
- [Updated] Cisco ASA 106002 JSON
46+
- [Updated] Cisco ASA 106006 JSON
47+
- [Updated] Cisco ASA 106007 JSON
48+
- [Updated] Cisco ASA 106010 JSON
49+
- [Updated] Cisco ASA 106012 JSON
50+
- [Updated] Cisco ASA 106014 JSON
51+
- [Updated] Cisco ASA 106015 JSON
52+
- [Updated] Cisco ASA 106021 JSON
53+
- [Updated] Cisco ASA 106023 JSON
54+
- [Updated] Cisco ASA 106027 JSON
55+
- [Updated] Cisco ASA 106100 JSON
56+
- [Updated] Cisco ASA 106102-3 JSON
57+
- [Updated] Cisco ASA 109005-8 JSON
58+
- [Updated] Cisco ASA 110002 JSON
59+
- [Updated] Cisco ASA 111008-9 JSON
60+
- [Updated] Cisco ASA 111010 JSON
61+
- [Updated] Cisco ASA 113003 JSON
62+
- [Updated] Cisco ASA 113004 JSON
63+
- [Updated] Cisco ASA 113005 JSON
64+
- [Updated] Cisco ASA 113006 JSON
65+
- [Updated] Cisco ASA 113007 JSON
66+
- [Updated] Cisco ASA 113008 JSON
67+
- [Updated] Cisco ASA 113009 JSON
68+
- [Updated] Cisco ASA 113012-17 JSON
69+
- [Updated] Cisco ASA 113019 JSON
70+
- [Updated] Cisco ASA 113021 JSON
71+
- [Updated] Cisco ASA 113039 JSON
72+
- [Updated] Cisco ASA 209004 JSON
73+
- [Updated] Cisco ASA 302010 JSON
74+
- [Updated] Cisco ASA 302020-1 JSON
75+
- [Updated] Cisco ASA 303002 JSON
76+
- [Updated] Cisco ASA 304001 JSON
77+
- [Updated] Cisco ASA 304002 JSON
78+
- [Updated] Cisco ASA 305011-12 JSON
79+
- [Updated] Cisco ASA 313001 JSON
80+
- [Updated] Cisco ASA 313004 JSON
81+
- [Updated] Cisco ASA 313005 JSON
82+
- [Updated] Cisco ASA 314003 JSON
83+
- [Updated] Cisco ASA 315011 JSON
84+
- [Updated] Cisco ASA 322001 JSON
85+
- [Updated] Cisco ASA 322003 JSON
86+
- [Updated] Cisco ASA 338001-8+338201-4 JSON
87+
- [Updated] Cisco ASA 4000nn JSON
88+
- [Updated] Cisco ASA 402117 JSON
89+
- [Updated] Cisco ASA 402119 JSON
90+
- [Updated] Cisco ASA 405001 JSON
91+
- [Updated] Cisco ASA 405002 JSON
92+
- [Updated] Cisco ASA 406001 JSON
93+
- [Updated] Cisco ASA 406002 JSON
94+
- [Updated] Cisco ASA 419001 JSON
95+
- [Updated] Cisco ASA 419002 JSON
96+
- [Updated] Cisco ASA 500004 JSON
97+
- [Updated] Cisco ASA 502101-2 JSON
98+
- [Updated] Cisco ASA 502103 JSON
99+
- [Updated] Cisco ASA 602303-4 JSON
100+
- [Updated] Cisco ASA 605004-5 JSON
101+
- [Updated] Cisco ASA 609002 JSON
102+
- [Updated] Cisco ASA 611101-2 JSON
103+
- [Updated] Cisco ASA 611103 JSON
104+
- [Updated] Cisco ASA 710002-3 JSON
105+
- [Updated] Cisco ASA 710005 JSON
106+
- [Updated] Cisco ASA 713052 JSON
107+
- [Updated] Cisco ASA 713172 JSON
108+
- [Updated] Cisco ASA 713228 JSON
109+
- [Updated] Cisco ASA 716014-7-8 JSON
110+
- [Updated] Cisco ASA 716038 JSON
111+
- [Updated] Cisco ASA 716039 JSON
112+
- [Updated] Cisco ASA 716059 JSON
113+
- [Updated] Cisco ASA 719022-3 JSON
114+
- [Updated] Cisco ASA 721016-8 JSON
115+
- [Updated] Cisco ASA 722034 JSON
116+
- [Updated] Cisco ASA 722051 JSON
117+
- [Updated] Cisco ASA 722055 JSON
118+
- [Updated] Cisco ASA 733100 JSON
119+
- [Updated] Cisco ASA 751011 JSON
120+
- [Updated] Cisco ASA 751023 JSON
121+
- [Updated] Cisco ASA 751025 JSON
122+
- [Updated] Cisco ASA tcp_udp_sctp_builds JSON
123+
- [Updated] Cisco ASA tcp_udp_sctp_teardowns JSON
124+
- [Updated] Cisco Umbrella DNS Logs
125+
- [Updated] Cisco Umbrella IP Logs
126+
- [Updated] Cisco Umbrella Proxy Logs
127+
- [Updated] SentinelOne Logs - C2C activities
128+
- [Updated] SentinelOne Logs - C2C agents
129+
- [Updated] SentinelOne Logs - C2C alerts
130+
- [Updated] SentinelOne Logs - C2C threats
131+
- [Updated] SentinelOne Logs - C2C users
132+
- [Updated] SentinelOne Logs - Syslog Custom Parser
133+
134+
### Parsers
135+
- [New] /Parsers/System/Microsoft/Azure Virtual Network
136+
- [New] /Parsers/System/SentinelOne/SentinelOne MGMT API
137+
- [Updated] /Parsers/System/Abnormal Security/Abnormal Security
138+
- Updated the parser to support new events.
139+
- [Updated] /Parsers/System/Cisco/Cisco ASA
140+
- Updated regex to fix ASA-6-721016 events.
141+
- [Updated] /Parsers/System/Cisco/Cisco ISE
142+
- Updated parser to drop certain non-actionable logs.
143+
- [Updated] /Parsers/System/Cisco/Cisco Umbrella CSV
144+
- Updated parser to support additional event format variations.
145+
- [Updated] /Parsers/System/Cylance/Cylance Syslog
146+
- Updated parser to support new events.
147+
- [Updated] /Parsers/System/KnowBe4/KnowBe4 KMSAT C2C
148+
- Updated parser to drop phishing test events.

blog-csoar/2025-04-21-content.md

Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
---
2+
title: April 21, 2025 - Content Release
3+
hide_table_of_contents: true
4+
image: https://help.sumologic.com/img/sumo-square.png
5+
keywords:
6+
- automation service
7+
- cloud soar
8+
- soar
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
## March and April releases
14+
15+
### Changes and enhancements
16+
17+
#### Integrations
18+
19+
* [NEW] [ThreatDown Oneview](/docs/platform-services/automation-service/app-central/integrations/threatdown-oneview/). The ThreatDown OneView integration has been built from scratch to facilitate seamless security operations management.
20+
* [NEW] [Atlassian Jira Cloud](/docs/platform-services/automation-service/app-central/integrations/atlassian-jira-cloud/). The Atlassian Jira Cloud integration has been developed from the ground up to streamline issue tracking and project management.
21+
* [UPDATED] [AWS WAF](/docs/platform-services/automation-service/app-central/integrations/aws-waf/). Added a new Update IP Set action in the AWS WAF integration that allows users to update an existing IP set.
22+
23+
#### Platform
24+
25+
##### Playbooks
26+
27+
* Improved the user experience in the node popup when loading dynamic fields.
28+
* Added a confirmation dialog to alert users about pre-existing playbook drafts to avoid accidental overwriting while editing playbooks.
29+
* Implemented an alert popup to prevent accidental loss of unsaved changes when closing a node popup.
30+
* Added audit logs for failed nodes due to errors or exceptions during playbook execution.
31+
32+
### Bug fixes
33+
34+
#### General
35+
36+
* Fixed a session timeout issue when the user is active in Automation Service, but inactive in Sumo Logic Log Analytics.
37+
* Fixed cursor positioning issue while typing in text areas.
38+
39+
#### Integrations
40+
41+
* Resolved a next page token and pageSize related issues in the List Permissions action of the [Google Drive](/docs/platform-services/automation-service/app-central/integrations/google-drive/) integration.
42+
* Added a new `impersonate_user` field in List Permission and Delete Permission actions, allowing actions to be performed on a user's behalf.

blog-service/2021/12-31.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -618,13 +618,13 @@ Update - [Scheduled View](/docs/manage/scheduled-views "Scheduled Views") quer
618618
---
619619
## March 16, 2021 (Alerts)
620620

621-
Update - We have resolved a discrepancy in the notification payload of [Real Time Scheduled Searches](/docs/alerts/scheduled-searches/create-real-time-alert).
621+
Update - We have resolved a discrepancy in the notification payload of Real-Time Scheduled Searches.
622622

623623
Previously, the payload for subsequent real time alerts in a given time range would incrementally report the results and omit the records that were already present in the previous alert.
624624

625625
For example, if the Scheduled Search initially returned 10 records, the first alert notification would contain 10 records in the payload. If the next run contained the same 10 records plus 1 additional, the notification payload would only contain the single new record.
626626

627-
Going forward, we will ensure that the records sent in the notification payload will always contain all the records returned in the Scheduled Search. Following the above example, the next run of the Real Time Scheduled Search would return 11 records. This change ensures that the payload will always match the results of the search in Sumo Logic.
627+
Going forward, we will ensure that the records sent in the notification payload will always contain all the records returned in the Scheduled Search. Following the above example, the next run of the Real-Time Scheduled Search would return 11 records. This change ensures that the payload will always match the results of the search in Sumo Logic.
628628

629629
---
630630
## March 12, 2021-12 (Collection)

0 commit comments

Comments
 (0)