Skip to content

Commit d49c31a

Browse files
committed
Merge branch 'main' into 404s
2 parents 6c48f8c + 0aa5c4f commit d49c31a

File tree

85 files changed

+2589
-862
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

85 files changed

+2589
-862
lines changed

.clabot

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,8 @@
172172
"chetanchoudhary-sumo",
173173
"JamoCA",
174174
"darshan-sumo",
175-
"mahendrak-sumo"
175+
"mahendrak-sumo",
176+
"chvik"
176177
],
177178
"message": "Thank you for your contribution! As this is an open source project, we require contributors to sign our Contributor License Agreement and do not have yours on file. To proceed with your PR, please [sign your name here](https://forms.gle/YgLddrckeJaCdZYA6) and we will add you to our approved list of contributors.",
178179
"label": "cla-signed",

blog-cse/2024/12-31.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,8 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1616

1717
This is an archive of 2024 Cloud SIEM release notes. To view the full archive, [click here](/release-notes-cse/archive).
1818

19+
<!--truncate-->
20+
1921
---
2022
### December 20, 2024 - Content Release
2123

@@ -852,7 +854,7 @@ Other changes are enumerated below.
852854

853855
This release reverts a change to our AWS CloudTrail default (catch all) mapper for how `user_username` is mapped. This is being reverted due to reports of breaking rule tuning and missing user context for some `AssumedRole` events.
854856

855-
AWS `AssumedRole` events can contain service and user role assumptions. Oftentimes service role assumptions will contain a dynamic session identifier instead of a static user identifer which contains the originating identity. Prior to the change we are now reverting, this was causing certain services to generate user entities from these sessions, creating false positives. This behavior changed with the [August 5th, 2024 content release](/release-notes-cse/#august-5-2024---content-release) to handle role assumptions to instead map the role as user to prevent false positives from dynamic service sessions. While this decreased the number of false positives from dynamic service sessions, it also eliminated visibility into user role assumptions, creating potential for false negatives.
857+
AWS `AssumedRole` events can contain service and user role assumptions. Oftentimes service role assumptions will contain a dynamic session identifier instead of a static user identifer which contains the originating identity. Prior to the change we are now reverting, this was causing certain services to generate user entities from these sessions, creating false positives. This behavior changed with the [August 5th, 2024 content release](#august-5-2024---content-release) to handle role assumptions to instead map the role as user to prevent false positives from dynamic service sessions. While this decreased the number of false positives from dynamic service sessions, it also eliminated visibility into user role assumptions, creating potential for false negatives.
856858

857859
AWS best practices suggest defining `sourceIdentity` to allow for the originating user for a role assumption to be identifiable. This is the best path to avoid false positive generation, as our mapper will favor `sourceIdentity` if it is present in CloudTrail logs. If it is not present, then `userIdentity.arn` will be used and the `resource-id` will be mapped to `user_username`, creating potential for false positives from dynamic session identifiers. See [Viewing source identity in CloudTrail](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html#id_credentials_temp_control-access_monitor-ct) in the AWS documentation for more information.
858860

blog-cse/2025-01-14-content.md

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
---
2+
title: January 14, 2025 - Content Release
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- rules
6+
- log mappers
7+
- parsers
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
<a href="https://help.sumologic.com/release-notes-cse/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
14+
15+
This content release includes:
16+
- Parsing and mapping support for Azure DevOps Auditing via EventHubs, and Pfsense Firewall.
17+
- Parsing and mapping additions and updates for Cisco ISE, Cloudflare, Check Point Firewall, and Linux OS Syslog.
18+
19+
:::note
20+
In two weeks, MATCH-S00604 "OneLogin - API Credentials - Key Used from Untrusted Location" will be deleted from the out-of-the-box Cloud SIEM rules due to unmanageable deny list logic and low adoption. To retain this rule, a duplicate must be made prior to the deletion.
21+
:::
22+
23+
## Log Mappers
24+
- [New] Azure DevOps Auditing Catch All
25+
- [New] Check Point Application Control URL Filtering
26+
- [New] Cisco ISE Radius Diagnostics
27+
- [New] Linux OS Syslog - KRB5 Child - Authentication Failure
28+
- [New] Linux OS Syslog - Process systemd - Systemd Session
29+
- [New] Linux OS Syslog - Process systemd - Systemd Session Scope
30+
- [New] Linux OS Syslog - Process systemd - session logout
31+
- [New] Pfsense Firewall filterlog
32+
- [New] Pfsense Firewall nginx
33+
- [New] Pfsense Firewall openvpn Authentication
34+
- [New] Pfsense Firewall openvpn_peer_info|openvpn_error|php_log|sshguard|sshd_log
35+
- [New] Pfsense Firewall openvpn_server_connected|openvpn_server_disconnected|cron_log
36+
- [Updated] Cisco ISE Authentication Failure
37+
- Adds `normalizedSeverity` mapping
38+
- [Updated] Cisco ISE Authentication Success
39+
- Adds `normalizedSeverity` mapping
40+
- [Updated] Cloudflare - Logpush
41+
- Adds mapping for `dns_query`, `http_hostname`, `http_response_contentLength`, `http_response_contentType`, and an alternative value for `ipProtocol`.
42+
- [Updated] Linux OS Syslog - Process sshd - SSH Session Closed|disconnect
43+
- Adds mapping for `normalizedActio`n
44+
- [Updated] Linux OS Syslog - Process systemd - Systemd Session Start and Systemd File Configuration
45+
- Added support for additional events and mapping of `file_path`
46+
47+
## Parsers
48+
- [New] /Parsers/System/Pfsense/Pfsense Firewall
49+
- [Updated] /Parsers/System/Check Point/Check Point Firewall JSON
50+
- [Updated] /Parsers/System/Cisco/Cisco ISE
51+
- [Updated] /Parsers/System/Cloudflare/Cloudflare Logpush
52+
- [Updated] /Parsers/System/Linux/Linux OS Syslog
53+
- [Updated] /Parsers/System/Linux/Shared/Linux Shared Syslog Headers
54+
- [Updated] /Parsers/System/Linux/Shared/Linux Shared Syslog Headers

blog-csoar/2024/12-31.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,8 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1414

1515
This is an archive of 2024 Cloud SOAR release notes. To view the full archive, [click here](/release-notes-csoar/archive).
1616

17+
<!--truncate-->
18+
1719
---
1820
### December 31, 2024 - Application Update
1921

@@ -312,7 +314,7 @@ This release introduces three new integrations, as well as several updates.
312314
---
313315
### March 12, 2024 - Content Release
314316

315-
Our Cloud SOAR [application update](/release-notes-csoar/#march-12-2024---application-update) features an important upgrade to Python 3.12 for our Lambda functions. This enhancement is part of our ongoing commitment to security, performance, and the latest technological standards.
317+
Our Cloud SOAR [application update](#march-12-2024---application-update) features an important upgrade to Python 3.12 for our Lambda functions. This enhancement is part of our ongoing commitment to security, performance, and the latest technological standards.
316318

317319
The Python upgrade impacts a total of 38 integrations. These integrations will require updates to ensure compatibility with the new Python version.
318320

@@ -369,7 +371,7 @@ We strongly encourage all users to review the provided documentation and prepare
369371
### March 12, 2024 - Application Update
370372

371373
#### Changes and Enhancements
372-
* Python version updated. If you experience any issues, refer to our [content release note](/release-notes-csoar/#march-12-2024---content-release).
374+
* Python version updated. If you experience any issues, refer to our [content release note](#march-12-2024---content-release).
373375

374376
##### Cloud SOAR
375377
* Playbooks: Test feature now permits you to use internal Incident ID.
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
title: Remote Management for OpenTelemetry Collector (Collection)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- collection
6+
- opentelemetry
7+
- otel
8+
- remote-management
9+
hide_table_of_contents: true
10+
---
11+
12+
import useBaseUrl from '@docusaurus/useBaseUrl';
13+
14+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
15+
16+
The Sumo Logic Distribution for OpenTelemetry Collector now supports remote management, enabling you to configure and manage data collection directly from the Sumo Logic UI. With this feature, you can:
17+
18+
* **Simplify configuration**. Set up and manage data collection for multiple collectors without server access.
19+
* **Streamline workflows**. Use tags to group collectors and apply centralized data source templates, reducing redundancy and manual effort.
20+
* **Enhance automation**. Automatically monitor new servers by tagging them during setup.
21+
* **Accelerate time to value**. Start collecting data in minutes with an intuitive UI and no need to manage configuration files.
22+
23+
This release provides a faster, more efficient way to manage large-scale data collection, supporting scalable and automated operations. [Learn more](/docs/send-data/opentelemetry-collector/remote-management).

blog-service/2025-01-10-apps.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
---
2+
title: New SaaS and Cloud Apps Release (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- apps
6+
- symantec-endpoint-security-service
7+
- jamf
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
14+
15+
- **Symantec Endpoint Security Service**. We're excited to introduce the new Symantec Endpoint Security Service app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Symantec Endpoint Security source that collects incident and event logs data from the Symantec Endpoint Security platform. This app provides real-time insights into the log data that allows you to monitor and manage endpoint security in real time, enhancing quick responses to threats. [Learn more](/docs/integrations/saas-cloud/symantec-endpoint-security-service/).
16+
17+
- **Jamf**. We're excited to introduce the new Jamf app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Jamf source that collects inventory data from the Jamf platform. This app helps security analysts with critical insights into their organization's Jamf environment. [Learn more](/docs/integrations/saas-cloud/jamf/).
18+

cid-redirects.json

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1578,6 +1578,7 @@
15781578
"/cid/10111": "/docs/integrations/app-development/jfrog-xray",
15791579
"/cid/10188": "/docs/integrations/saas-cloud/miro",
15801580
"/cid/10187": "/docs/integrations/saas-cloud/digital-guardian-arc",
1581+
"/cid/10114": "/docs/integrations/saas-cloud/jamf",
15811582
"/cid/10208": "/docs/integrations/saas-cloud/cisco-meraki-c2c",
15821583
"/cid/10209": "/docs/integrations/security-threat-detection/cisco-meraki",
15831584
"/cid/10210": "/docs/integrations/saas-cloud/proofpoint-tap",
@@ -1595,6 +1596,7 @@
15951596
"/cid/10198": "/docs/integrations/saas-cloud/microsoft-graph-azure-ad-reporting",
15961597
"/cid/10193": "/docs/integrations/saas-cloud/asana",
15971598
"/cid/10181": "/docs/integrations/saas-cloud/atlassian",
1599+
"/cid/10207": "/docs/integrations/saas-cloud/symantec-endpoint-security-service",
15981600
"/cid/10197": "/docs/integrations/saas-cloud/symantec-web-security-service",
15991601
"/cid/6016": "/docs/integrations/saas-cloud/trend-micro-vision-one",
16001602
"/cid/10112": "/docs/integrations/app-development/jfrog-xray",
@@ -1885,6 +1887,7 @@
18851887
"/cid/2008": "/docs/send-data/installed-collectors/linux",
18861888
"/cid/2009": "/docs/search/behavior-insights/logcompare",
18871889
"/cid/2010": "/docs/search/search-query-language/search-operators/if",
1890+
"/cid/2110": "/docs/search/search-query-language/search-operators/macro",
18881891
"/cid/2011": "/docs/get-started/help",
18891892
"/cid/2012": "/docs/manage/security/enable-support-account",
18901893
"/cid/2013": "/docs/send-data/installed-collectors/sources/windows-active-directory-inventory-source",
@@ -2674,7 +2677,7 @@
26742677
"/cid/9008": "/docs/alerts/webhook-connections/new-relic",
26752678
"/cid/10333": "/docs/send-data/opentelemetry-collector/remote-management/processing-rules",
26762679
"/cid/10334": "/docs/send-data/opentelemetry-collector/remote-management/processing-rules/include-and-exclude-rules",
2677-
"/cid/10335": "/docs/send-data/opentelemetry-collector/remote-management/processing-rules/metrics-include-and-exclude-rules",
2680+
"/cid/10335": "/docs/send-data/opentelemetry-collector/remote-management/processing-rules/include-and-exclude-rules",
26782681
"/cid/10336": "/docs/send-data/opentelemetry-collector/remote-management/processing-rules/mask-rules",
26792682
"/cid/9010": "/docs/send-data/opentelemetry-collector",
26802683
"/cid/9011": "/docs/send-data/opentelemetry-collector/install-collector/linux",
@@ -3474,6 +3477,7 @@
34743477
"/release-notes-service/welcome": "/release-notes-service",
34753478
"/release-notes-service/2023/11/27/cis-for-aws": "/release-notes-service/2023/12/31/#november-27-2023-apps",
34763479
"/release-notes-service/2042/06/10/manage": "/release-notes-service/2024/12/31",
3480+
"/release-notes-service/2024/03/20/flex/": "/release-notes-service/2024/12/31/#march-20-2024-manage",
34773481
"/Send-Data/Applications-and-Other-Data-Sources/Azure-Audit/02Collect-Logs-for-Azure-Audit-from-Event-Hub": "/docs/integrations/microsoft-azure/audit",
34783482
"/Send-Data/Collect-from-Other-Data-Sources/Azure_Monitoring/Collect_Logs_from_Azure_Monitor": "/docs/send-data/collect-from-other-data-sources/azure-monitoring/ms-azure-event-hubs-source/",
34793483
"/Send-Data/Collect-from-Other-Data-Sources/Azure_Monitoring/Collect_Metrics_from_Azure_Monitor": "/docs/send-data/collect-from-other-data-sources/azure-monitoring/collect-metrics-azure-monitor",

docs/api/search-job.md

Lines changed: 20 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -343,6 +343,7 @@ This is the formatted result document:
343343

344344
```json
345345
{
346+
"warning":"",
346347
"state":"DONE GATHERING RESULTS",
347348
"messageCount":90,
348349
"histogramBuckets":[
@@ -356,7 +357,6 @@ This is the formatted result document:
356357
"count":1,
357358
"startTimestamp":1359405480000
358359
},
359-
...
360360
{
361361
"length":60000,
362362
"count":1,
@@ -367,7 +367,10 @@ This is the formatted result document:
367367
],
368368
"pendingWarnings":[
369369
],
370-
"recordCount":1
370+
"recordCount":1,
371+
"usageDetails":{
372+
"dataScannedInBytes":0
373+
}
371374
}
372375
```
373376

@@ -385,12 +388,16 @@ Notice that the state of the sample search job is DONE GATHERING RESULTS. The fo
385388

386389
#### More about results
387390

391+
The **warnings** value contains the detailed information about the warning while obtaining the current status of a search job.
392+
388393
The **messageCount** and **recordCount** values indicate the number of messages and records found or produced so far. Messages are raw log messages and records are aggregated data.
389394

390395
For queries that do not contain an aggregation operator, only messages are returned. If the query contains an aggregation, for example, **count by _sourceCategory**, then the messages are returned along with records resulting from the aggregation (similar to what a SQL database would return).
391396

392397
The **pendingErrors** and **pendingWarnings** values contain any pending error or warning strings that have accumulated since the last time the status was requested.
393398

399+
The **usageDetails** value contains the amount of data scanned in bytes details.
400+
394401
Errors and warnings are not cumulative. If you need to retain the errors and warnings, store them locally.
395402

396403
The **histogramBuckets** value returns a list of histogram buckets. A histogram bucket is defined by its timestamp, which is the start timestamp (in milliseconds) of the bucket, and a length, also in milliseconds, that expressed the width of the bucket. The **timestampplus** length is the end timestamp of the bucket, so the count is the number of messages in the bucket.
@@ -468,6 +475,7 @@ curl -b cookies.txt -c cookies.txt -H 'Accept: application/json'
468475

469476
```json
470477
{
478+
"warning": "",
471479
"fields":[
472480
{
473481
"name":"_messageid",
@@ -595,6 +603,7 @@ curl -b cookies.txt -c cookies.txt -H 'Accept: application/json'
595603

596604
The result contains two lists, **fields** and **messages**.
597605

606+
* ***warnings** contains the detailed information about the warning while paging through the messages found by a search job.
598607
* **fields** contains a list of all the fields defined for each of the messages returned. For each field, the field name and field type are returned.
599608
* **messages** contains a list of maps, one map per message. Each **map** maps from the fields described in the fields list to the actual value for the message.
600609

@@ -666,6 +675,7 @@ This is the formatted result document:
666675

667676
```json
668677
{
678+
"warning": "",
669679
"fields":[
670680
{
671681
"name":"_sourceCategory",
@@ -691,6 +701,8 @@ This is the formatted result document:
691701

692702
The returned document is similar to the one returned for the message paging API. The schema of the records returned is described by the list of fields as part of the fields element. The records themselves are a list of maps.
693703

704+
The ***warnings** contains the detailed information about the warning while paging through the records found by a Search Job.
705+
694706
</details>
695707

696708
## POST Methods
@@ -828,10 +840,12 @@ Example error response:
828840

829841
```json
830842
{
831-
"status" : 400,
832-
"id" : "IUUQI-DGH5I-TJ045",
833-
"code" : "searchjob.invalid.timestamp.from",
834-
"message" : "The 'from' field contains an invalid time."
843+
"warning": "A 404 status (Page Not Found) on a follow-up request may be due to a cookie not accompanying the request",
844+
"id": "IUUQI-DGH5I-TJ045",
845+
"link": {
846+
"rel": "self",
847+
"href": "https://api.sumologic.com/api/v1/search/jobs/IUUQI-DGH5I-TJ045"
848+
}
835849
}
836850
```
837851

docs/integrations/amazon-aws/cis-aws-foundations-benchmark.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,9 +34,9 @@ The CIS AWS Foundation Benchmark App ingests [AWS CloudTrail](/docs/integrations
3434

3535
Now that you have configured CIS AWS Foundation Benchmark, install the Sumo Logic App for CIS AWS Foundation Benchmark to take advantage of the preconfigured searches and dashboards to analyze your data.
3636

37-
import AppInstall from '../../reuse/apps/app-install.md';
37+
import AppInstall2 from '../../reuse/apps/app-install-v2.md';
3838

39-
<AppInstall/>
39+
<AppInstall2/>
4040

4141
For context regarding the CIS AWS Foundation Benchmark App, check out this [blog](https://www.sumologic.com/blog/cis-aws-foundations-benchmark-monitoring/) where we describe the monitoring controls.
4242

0 commit comments

Comments
 (0)