Skip to content

Commit d9657e4

Browse files
authored
DOCS-25 - Fix minor threat intel doc issues (#5138)
* DOCS-25 - Fix minor threat intel issues * Add Cloud SIEM release note
1 parent 7062782 commit d9657e4

File tree

23 files changed

+63
-41
lines changed

23 files changed

+63
-41
lines changed

blog-cse/2025-03-03-application.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: March 3, 2025 - Application Update
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- threat intel
6+
- security
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-cse/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We’re excited to introduce Sumo Logic Threat Intelligence, a powerful feature set that enables Cloud SIEM administrators to seamlessly import indicators of Compromise (IoC) files and feeds directly into Sumo Logic to aid in security analysis.
15+
16+
For more information, [see our release note](http://localhost:3000/release-notes-service/2025/03/03/security/) in the *Service* release notes section.

blog-service/2025-03-03-security.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
title: Threat Intelligence (Security)
3-
image: https://www.sumologic.com/img/logo.svg
3+
image: https://help.sumologic.com/img/sumo-square.png
44
keywords:
5-
- platform services
5+
- security
66
- threat intel
77
hide_table_of_contents: true
88
---

docs/api/index.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -230,6 +230,11 @@ To connect with other Sumo Logic users, post feedback, or ask a question, visit
230230
<a href="/docs/api/span-analytics"><img src={useBaseUrl('img/icons/operations/distributed-operations.png')} alt="Thumbnail icon" width="50"/><h4>Span Analytics</h4></a>
231231
</div>
232232
</div>
233+
<div className="box smallbox card">
234+
<div className="container">
235+
<a href="/docs/api/threat-intel-ingest"><img src={useBaseUrl('img/icons/security/cloud-siem.png')} alt="Thumbnail icon" width="50"/><h4>Threat Intel Ingest</h4></a>
236+
</div>
237+
</div>
233238
<div className="box smallbox card">
234239
<div className="container">
235240
<a href="/docs/api/token-management"><img src={useBaseUrl('img/icons/security/security.png')} alt="Thumbnail icon" width="50"/><h4>Tokens</h4></a>

docs/api/threat-intel-ingest.md

Lines changed: 18 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,21 +1,25 @@
11
---
22
id: threat-intel-ingest
33
title: Threat Intel Ingest Management APIs
4-
sidebar_label: Threat Intel Ingest Management
4+
sidebar_label: Threat Intel
55
description: The Threat Intel Ingest Management API allows you to upload STIX 2.x threat intel indicators, view storage status of threat intel ingest service, and view and set the retention period for threat intel indicators.
6-
hide_table_of_contents: true
76
---
87

98
import useBaseUrl from '@docusaurus/useBaseUrl';
109
import ApiIntro from '../reuse/api-intro.md';
10+
import ApiRoles from '../reuse/api-roles.md';
1111

1212
<img src={useBaseUrl('img/icons/security/cloud-siem.png')} alt="icon" width="60"/>
1313

14-
The [Threat Intel Ingest Management](/docs/security/threat-intelligence) API allows you to:
14+
The Threat Intel Ingest Management API allows you to:
1515

16-
* Upload STIX 2.x threat intel indicators
17-
* View storage status of threat intel ingest service
18-
* View and set the retention period for threat intel indicators
16+
* Upload threat intelligence indicators
17+
* View storage status of threat intelligence ingest service
18+
* View and set the retention period for threat intelligence indicators
19+
20+
For more information about threat intelligence, see [About Sumo Logic Threat Intelligence](/docs/security/threat-intelligence/about-threat-intelligence/).
21+
22+
## Documentation
1923

2024
<ApiIntro/>
2125

@@ -30,3 +34,11 @@ The [Threat Intel Ingest Management](/docs/security/threat-intelligence) API all
3034
| JP | https://api.jp.sumologic.com/docs/#tag/threatIntelIngest |
3135
| US1 | https://api.sumologic.com/docs/#tag/threatIntelIngest |
3236
| US2 | https://api.us2.sumologic.com/docs/#tag/threatIntelIngest |
37+
38+
## Required role capabilities
39+
40+
<ApiRoles/>
41+
42+
* Threat Intel
43+
* View Threat Intel Data Store
44+
* Manage Threat Intel Data Store

docs/cse/administration/create-custom-threat-intel-source.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1010
<!-- For threat intel. Put this back once we support cat with the threatlookup search operator:
1111
1212
:::info
13-
This article describes functionality in Cloud SIEM that will be deprecated at a future time. **You can no longer add custom intelligence sources in Cloud SIEM**. To create new sources, use the Sumo Logic threat intelligence indicators framework. For more information, see [Threat Intelligence](/docs/security/threat-intelligence/).
13+
This article describes functionality in Cloud SIEM that will be deprecated at a future time. **You can no longer add custom intelligence sources in Cloud SIEM**. To create new sources, use the Sumo Logic threat intelligence indicators framework. For more information, see [Sumo Logic Threat Intelligence](/docs/security/threat-intelligence/).
1414
:::
1515
-->
1616

@@ -19,7 +19,7 @@ This topic has information about setting up a *custom threat intelligence source
1919
You can set up and populate custom threat intelligence sources interactively from the Cloud SIEM UI, by uploading a .csv file, or using Cloud SIEM APIs. You can populate the sources with IP addresses, domains, URLs, email addresses, and file hashes.
2020

2121
:::note
22-
You can also use the Sumo Logic threat intelligence framework to add sources. See [Threat Intelligence](/docs/security/threat-intelligence/).
22+
You can also use the Sumo Logic threat intelligence framework to add sources. See [Sumo Logic Threat Intelligence](/docs/security/threat-intelligence/).
2323
:::
2424

2525
## How Cloud SIEM uses indicators

docs/cse/get-started-with-cloud-siem/onboarding-checklist-cse.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ See: [Create and Use Network Blocks](/docs/cse/administration/create-use-network
171171

172172
Cloud SIEM heavily leverages threat intelligence to do real-time comparisons against known bad indicators. You can configure popular free threat feeds. But if your security team pays for premium threat intelligence (such as RecordedFuture, Anomali, Crowdstrike, ThreatConnect, and so on), you can configure these too.
173173

174-
See: [Manage Threat Intelligence Indicators](/docs/security/threat-intelligence/threat-intelligence-indicators/)
174+
See: [Ingest threat intelligence indicators](/docs/security/threat-intelligence/about-threat-intelligence/#ingest-threat-intelligence-indicators)
175175

176176
### Create lists
177177
Perform the following steps to create lists to allow or suppress information monitored for Cloud SIEM.

docs/cse/rules/about-cse-rules.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ This example below checks a record for a field named `listMatches` that contains
181181

182182
### Threat Intelligence
183183

184-
Threat Intelligence sources contain values that, when encountered in a record, are clear indicators of compromise. To create a new source of Threat Intelligence, see [Manage Threat Intelligence Indicators](/docs/security/threat-intelligence/threat-intelligence-indicators/).
184+
Threat Intelligence sources contain values that, when encountered in a record, are clear indicators of compromise. To create a new source of Threat Intelligence, see [Ingest threat intelligence indicators](/docs/security/threat-intelligence/about-threat-intelligence/#ingest-threat-intelligence-indicators).
185185

186186
Threat Intelligence sources are used at the time of record ingestion. When a record is ingested, Cloud SIEM determines whether any of the fields in the record exist in any of your Threat Intelligence sources. When a record contains a value that matches an entry in one or more Threat Intelligence sources, the `hasThreatMatch` Cloud SIEM rules function searches incoming records in Cloud SIEM for matches to threat intelligence indicators. For more information, see [Threat Intelligence Indicators in Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/).
187187

docs/manage/users-roles/roles/role-capabilities.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -129,8 +129,8 @@ Folder-level permissions are available if your org has fine-grained Monitor perm
129129
## Threat Intel
130130
| Capability | Description |
131131
| :-- | :-- |
132-
| View Threat Intel Data Store | Search log data using [threat intelligence indicators](/docs/security/threat-intelligence/threat-intelligence-indicators/). |
133-
| Manage Threat Intel Data Store | Create, edit, and delete [threat intelligence indicators](/docs/security/threat-intelligence/threat-intelligence-indicators/). |
132+
| View Threat Intel Data Store | View the [Threat Intelligence](/docs/security/threat-intelligence/about-threat-intelligence/) tab. |
133+
| Manage Threat Intel Data Store | Create, edit, and delete threat intelligence sources on the [Threat Intelligence](/docs/security/threat-intelligence/about-threat-intelligence/) tab. |
134134

135135
## Cloud SOAR
136136

docs/platform-services/index.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,10 +15,4 @@ Platform services are services that are available to use across the entire Sumo
1515
<p>Learn how to use the Automation Service to automate actions.</p>
1616
</div>
1717
</div>
18-
<div className="box smallbox card">
19-
<div className="container">
20-
<a href="/docs/security/threat-intelligence"><img src={useBaseUrl('img/icons/security/cloud-siem.png')} alt="icon" width="40"/><h4>Threat Intelligence</h4></a>
21-
<p>Learn about Sumo Logic's threat intelligence capabilities.</p>
22-
</div>
23-
</div>
2418
</div>

docs/search/search-query-language/search-operators/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -381,7 +381,7 @@ In this section, we'll introduce the following concepts:
381381
<div className="box smallbox card">
382382
<div className="container">
383383
<a href="/docs/search/search-query-language/search-operators/threatip"><img src={useBaseUrl('img/icons/operations/queries.png')} alt="icon" width="40"/><h4>threatip</h4></a>
384-
<p>Correlates CrowdStrike's threat intelligence data based on IP addresses from your log data, helping you detect threats in your environment.</p>
384+
<p>Correlates threat intelligence data based on IP addresses from your log data, helping you detect threats in your environment.</p>
385385
</div>
386386
</div>
387387
<!-- <div className="box smallbox card">

0 commit comments

Comments
 (0)