Skip to content

Commit cc88d91

Browse files
committed
Updates from review
1 parent 1d33c2d commit cc88d91

File tree

3 files changed

+63
-14
lines changed

3 files changed

+63
-14
lines changed

docs/cse/rules/cse-rules-syntax.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -670,13 +670,10 @@ As a best practice, always include filtering to narrow your match to just the ty
670670
For example:
671671
* `hasThreatMatch([dstDevice_ip], confidence > 1 AND (type="ipv4-addr" OR type="ipv6-addr"))`
672672
* `hasThreatMatch([file_hash_imphash, file_hash_md5, file_hash_pehash, file_hash_ssdeep, file_hash_sha1, file_hash_sha256], confidence > 1 AND type="file:hashes")`
673-
* `hasThreatMatch([device_hostname, srcDevice_hostname, dstDevice_hostname, http_hostname, http_referrerHostname, bro_ssl_serverName, bro_ntlm_domainame, bro_ssl_serverName_rootDomain, dns_queryDomain, dns_replyDomain, fromUser_authDomain, http_referrerDomain, http_url_rootDomain, http_url_fqdn], confidence > 1 AND (type="domain-name" OR type="url"))`
674673
* `hasThreatMatch([http_url], confidence > 1 AND type="url")`
675674
* `hasThreatMatch([srcDevice_ip], confidence > 1 AND (type="ipv4-addr" OR type="ipv6-addr"))`
676675

677676
Following are the standard indicator types you can filter on:
678-
* `domain-name`. Domain name.
679-
* `email-addr`. Email address.
680677
* `file:hashes`. File hash. (If you want to add the hash algorithm, enter `file:hashes.<HASH-TYPE>`. For example, `[file:hashes.MD5 = '5d41402abc4b2a76b9719d911017c592']` or `[file:hashes.'SHA-256' = '50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545c']`.)
681678
* `file`. File name.
682679
* `ipv4-addr`. IPv4 IP address.

docs/security/threat-intelligence/about-threat-intelligence.md

Lines changed: 14 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ _index=sumologic_audit_events _sourceCategory=threatIntelligence
104104

105105
Sumo Logic provides the following out-of-the-box default sources of threat indicators supplied by third party intel vendors and maintained by Sumo Logic. You cannot edit these sources:
106106
* **_sumo_global_feed_i471**. This source incorporates threat indicators supplied by [Intel 471](https://intel471.com/).
107-
* **_sumo_global_feed_cs**. This is a legacy source of threat indicators maintained by Sumo Logic. ***This source will be discontinued on April 30, 2025***. If you want to stop using this source before April 30, disable the source on the [Threat Intelligence tab](/docs/security/threat-intelligence/threat-intelligence-indicators/#threat-intelligence-tab).
107+
* **_sumo_global_feed_cs**. This is a legacy source of threat indicators maintained by Sumo Logic. ***This source will be discontinued on April 30, 2025***.
108108

109109
:::warning
110110
To maintain uninterrupted threat intelligence operation, if you have created rules, saved searches, monitors or dashboard panel queries that explicitly reference the legacy `_sumo_global_feed_cs` source, follow the directions below to update them to use the new `_sumo_global_feed_i471` source ***before April 30, 2025***.
@@ -116,21 +116,25 @@ Perform the steps in the following sections to migrate to the `_sumo_global_feed
116116

117117
#### hasThreatMatch rule syntax
118118

119-
If no source is explicitly provided in your rules with [hasThreatMatch](/docs/cse/rules/cse-rules-syntax/#hasthreatmatch) syntax, no change is needed:
120-
* By default, until April 30, 2025 the rules point to the legacy `_sumo_global_feed_cs` source (and the rest of your tenant-specific sources).
119+
In most cases, no change is needed if you use [hasThreatMatch](/docs/cse/rules/cse-rules-syntax/#hasthreatmatch) in your rules:
120+
* Until April 30, 2025 the rules point to the legacy `_sumo_global_feed_cs` source (and the rest of your tenant-specific sources).
121121
* After April 30, 2025, the rules point to the new `_sumo_global_feed_i471` source (and the rest of your tenant-specific sources).
122122

123-
If you have rules with hasThreatMatch syntax that explicitly point to the legacy `_sumo_global_feed_cs` source, change them to point to `_sumo_global_feed_i471` source. For example:
124-
* Change this: <br/>`hasThreatMatch([srcDevice_ip], confidence > 50 AND source="_sumo_global_feed_cs")`
125-
* To this: <br/>`hasThreatMatch([srcDevice_ip], confidence > 50 AND source="_sumo_global_feed_i471")`
123+
You may need to make changes in these scenarios:
124+
* If you have rules with `hasThreatMatch` syntax that explicitly point to the legacy `_sumo_global_feed_cs` source, change them to point to `_sumo_global_feed_i471` source. For example:
125+
* Change this: <br/>`hasThreatMatch([srcDevice_ip], confidence > 50 AND source="_sumo_global_feed_cs")`
126+
* To this: <br/>`hasThreatMatch([srcDevice_ip], confidence > 50 AND source="_sumo_global_feed_i471")`
127+
* The `domain-name` and `email-addr` types are not supported in Intel 471. If you filter for these types using `hasThreatMatch`, update your rule syntax to remove them.
126128

127129
#### lookup operator
128130

129-
No change is needed on your part to address changes to the [lookup](/docs/search/search-query-language/search-operators/lookup/) search operator.
131+
In most cases, no change is needed if you use the [lookup](/docs/search/search-query-language/search-operators/lookup/) search operator to point to `sumo://threat/cs`:
132+
* Until April 30, 2025, queries in dashboards that use the `lookup` search operator to point to `sumo://threat/cs` (the legacy `_sumo_global_feed_cs` source) are now updated to point to `sumo://threat/i471` (the new `_sumo_global_feed_i471` source). For examples, see the dashboards in the [Threat Intel Quick Analysis](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/#threat-intel-optimization) app.
133+
* After April 30, 2025, any `lookup` operator queries pointing to `sumo://threat/cs` will be directed to the new `_sumo_global_feed_i471` source.
130134

131-
Queries in dashboards that use the `lookup` search operator to point to `sumo://threat/cs` (the legacy `_sumo_global_feed_cs` source) will now point to `sumo://threat/i471` (the new `_sumo_global_feed_i471` source). For examples, see the dashboards in the [Threat Intel Quick Analysis](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/#threat-intel-optimization) app.
132-
133-
After April 30, 2025, all `lookup` operator queries pointing to `sumo://threat/cs` will be directed to the new `_sumo_global_feed_i471` source.
135+
You may need to make changes in these scenarios:
136+
* The `domain-name` and `email-addr` types are not supported in Intel 471. If you filter for these types using the `lookup` operator, update your queries to remove them.
137+
* If you parse the `raw` field returned from the `lookup` operation, you will see different fields when you use the new `_sumo_global_feed_i471` source. To avoid problems with fields not returning data, use a [nodrop](/docs/search/search-query-language/parse-operators/parse-nodrop-option/) clause.
134138

135139
#### threatip search operator
136140

docs/security/threat-intelligence/threat-intelligence-mapping.md

Lines changed: 49 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,55 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
99

1010
## Global feed mapping
1111

12-
Sumo Logic provides an out-of-the-box a `_sumo_global_feed_cs` source of threat intelligence indicators supplied by Sumo Logic. You can see it in the [**Threat Intelligence** tab](/docs/security/threat-intelligence/threat-intelligence-indicators/#threat-intelligence-tab). This source is a default source and cannot be changed or deleted.
12+
<!-- Add this section after we get the mapping information:
13+
### _sumo_global_feed_i471 source
14+
15+
The `_sumo_global_feed_i471` source is one of the out-of-the-box [global feed sources](/docs/security/threat-intelligence/about-threat-intelligence/#sumo-logic-global-feed-source) of threat intelligence indicators supplied by Sumo Logic. You can see it in the [**Threat Intelligence** tab](/docs/security/threat-intelligence/threat-intelligence-indicators/#threat-intelligence-tab). This source is a default source and cannot be changed or deleted.
16+
17+
In the threat intelligence datastore, the schema is mapped to normalized values to provide ease of interoperability with the schema from other threat intelligence sources:
18+
19+
| Original schema | Normalized schema in the datastore |
20+
|:--|:--|
21+
| `actor` | `actors` with the value of `NULL`. |
22+
| `confidence` | `confidence` (normalized to the 0-100 scale) |
23+
| `id` | `id` |
24+
| `imported` | `imported` |
25+
| `indicator` | `indicator` |
26+
| `kill_chain` | `killChain` |
27+
| `last_updated` | `updated` |
28+
| `threat_types` | `threatType` |
29+
| `type` | `type` |
30+
| `valid_from` | `validFrom` |
31+
| `valid_until` | `validUntil` |
32+
33+
(All other fields will be kept in the `fields{}` object.)
34+
35+
The `type` object is mapped to the following normalized type values:
36+
37+
| Type | Normalized type in the datastore |
38+
|:--|:--|
39+
| `binary_string` | `artifact:payload_bin` |
40+
| `bitcoin_address` | `url` |
41+
| `ip_address` | `ipv4-addr` / `ipv6-addr` |
42+
| `domain` | Not mapped. |
43+
| `email_address` | Not mapped. |
44+
| `file_path` | `file:name` |
45+
| `file_name` | `file:name` |
46+
| `hash_md5` | `file:hashes.'MD5'` |
47+
| `hash_sha1` | `file:hashes.'SHA-1'` |
48+
| `hash_sha256` | `file:hashes.'SHA-256'` |
49+
| `mutex_name` | `mutex:name` |
50+
| `service_name` | `process:name` |
51+
| `url` | `url` |
52+
| `username` | `user-account:user_id` |
53+
| `user_agent` | `http-request-ext:request_header.'User-Agent'` |
54+
| `x509_subject` | `x509-certificate:serial_number` |
55+
56+
-->
57+
58+
### _sumo_global_feed_cs source
59+
60+
The `_sumo_global_feed_cs` source is one of the out-of-the-box [global feed sources](/docs/security/threat-intelligence/about-threat-intelligence/#sumo-logic-global-feed-source) of threat intelligence indicators supplied by Sumo Logic. You can see it in the [**Threat Intelligence** tab](/docs/security/threat-intelligence/threat-intelligence-indicators/#threat-intelligence-tab). This source is a default source and cannot be changed or deleted.
1361

1462
In the threat intelligence datastore, the schema is mapped to normalized values to provide ease of interoperability with the schema from other threat intelligence sources:
1563

0 commit comments

Comments
 (0)