You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We’re excited to introduce Sumo Logic Threat Intelligence, a powerful feature set that enables Cloud SIEM administrators to seamlessly import indicators of Compromise (IoC) files and feeds directly into Sumo Logic to aid in security analysis.
15
+
16
+
For more information, [see our release note](http://localhost:3000/release-notes-service/2025/03/03/security/) in the *Service* release notes section.
Copy file name to clipboardExpand all lines: docs/api/threat-intel-ingest.md
+18-6Lines changed: 18 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,21 +1,25 @@
1
1
---
2
2
id: threat-intel-ingest
3
3
title: Threat Intel Ingest Management APIs
4
-
sidebar_label: Threat Intel Ingest Management
4
+
sidebar_label: Threat Intel
5
5
description: The Threat Intel Ingest Management API allows you to upload STIX 2.x threat intel indicators, view storage status of threat intel ingest service, and view and set the retention period for threat intel indicators.
The [Threat Intel Ingest Management](/docs/security/threat-intelligence) API allows you to:
14
+
The Threat Intel Ingest Management API allows you to:
15
15
16
-
* Upload STIX 2.x threat intel indicators
17
-
* View storage status of threat intel ingest service
18
-
* View and set the retention period for threat intel indicators
16
+
* Upload threat intelligence indicators
17
+
* View storage status of threat intelligence ingest service
18
+
* View and set the retention period for threat intelligence indicators
19
+
20
+
For more information about threat intelligence, see [About Sumo Logic Threat Intelligence](/docs/security/threat-intelligence/about-threat-intelligence/).
21
+
22
+
## Documentation
19
23
20
24
<ApiIntro/>
21
25
@@ -30,3 +34,11 @@ The [Threat Intel Ingest Management](/docs/security/threat-intelligence) API all
Copy file name to clipboardExpand all lines: docs/cse/administration/create-custom-threat-intel-source.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,7 +10,7 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
10
10
<!-- For threat intel. Put this back once we support cat with the threatlookup search operator:
11
11
12
12
:::info
13
-
This article describes functionality in Cloud SIEM that will be deprecated at a future time. **You can no longer add custom intelligence sources in Cloud SIEM**. To create new sources, use the Sumo Logic threat intelligence indicators framework. For more information, see [Threat Intelligence](/docs/security/threat-intelligence/).
13
+
This article describes functionality in Cloud SIEM that will be deprecated at a future time. **You can no longer add custom intelligence sources in Cloud SIEM**. To create new sources, use the Sumo Logic threat intelligence indicators framework. For more information, see [Sumo Logic Threat Intelligence](/docs/security/threat-intelligence/).
14
14
:::
15
15
-->
16
16
@@ -19,7 +19,7 @@ This topic has information about setting up a *custom threat intelligence source
19
19
You can set up and populate custom threat intelligence sources interactively from the Cloud SIEM UI, by uploading a .csv file, or using Cloud SIEM APIs. You can populate the sources with IP addresses, domains, URLs, email addresses, and file hashes.
20
20
21
21
:::note
22
-
You can also use the Sumo Logic threat intelligence framework to add sources. See [Threat Intelligence](/docs/security/threat-intelligence/).
22
+
You can also use the Sumo Logic threat intelligence framework to add sources. See [Sumo Logic Threat Intelligence](/docs/security/threat-intelligence/).
Copy file name to clipboardExpand all lines: docs/cse/get-started-with-cloud-siem/onboarding-checklist-cse.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -171,7 +171,7 @@ See: [Create and Use Network Blocks](/docs/cse/administration/create-use-network
171
171
172
172
Cloud SIEM heavily leverages threat intelligence to do real-time comparisons against known bad indicators. You can configure popular free threat feeds. But if your security team pays for premium threat intelligence (such as RecordedFuture, Anomali, Crowdstrike, ThreatConnect, and so on), you can configure these too.
Copy file name to clipboardExpand all lines: docs/cse/rules/about-cse-rules.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -181,7 +181,7 @@ This example below checks a record for a field named `listMatches` that contains
181
181
182
182
### Threat Intelligence
183
183
184
-
Threat Intelligence sources contain values that, when encountered in a record, are clear indicators of compromise. To create a new source of Threat Intelligence, see [Manage Threat Intelligence Indicators](/docs/security/threat-intelligence/threat-intelligence-indicators/).
184
+
Threat Intelligence sources contain values that, when encountered in a record, are clear indicators of compromise. To create a new source of Threat Intelligence, see [Ingest threat intelligence indicators](/docs/security/threat-intelligence/about-threat-intelligence/#ingest-threat-intelligence-indicators).
185
185
186
186
Threat Intelligence sources are used at the time of record ingestion. When a record is ingested, Cloud SIEM determines whether any of the fields in the record exist in any of your Threat Intelligence sources. When a record contains a value that matches an entry in one or more Threat Intelligence sources, the `hasThreatMatch` Cloud SIEM rules function searches incoming records in Cloud SIEM for matches to threat intelligence indicators. For more information, see [Threat Intelligence Indicators in Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/).
Copy file name to clipboardExpand all lines: docs/manage/users-roles/roles/role-capabilities.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -129,8 +129,8 @@ Folder-level permissions are available if your org has fine-grained Monitor perm
129
129
## Threat Intel
130
130
| Capability | Description |
131
131
| :-- | :-- |
132
-
| View Threat Intel Data Store |Search log data using [threat intelligence indicators](/docs/security/threat-intelligence/threat-intelligence-indicators/). |
133
-
| Manage Threat Intel Data Store | Create, edit, and delete [threat intelligence indicators](/docs/security/threat-intelligence/threat-intelligence-indicators/). |
132
+
| View Threat Intel Data Store |View the [Threat Intelligence](/docs/security/threat-intelligence/about-threat-intelligence/) tab. |
133
+
| Manage Threat Intel Data Store | Create, edit, and delete threat intelligence sources on the [Threat Intelligence](/docs/security/threat-intelligence/about-threat-intelligence/) tab. |
0 commit comments