|
| 1 | +--- |
| 2 | +title: October 10, 2025 - Content Release |
| 3 | +image: https://assets-www.sumologic.com/company-logos/_800x418_crop_center-center_82_none/SumoLogic_Preview_600x600.jpg?mtime=1617040082 |
| 4 | +keywords: |
| 5 | + - log mappers |
| 6 | +hide_table_of_contents: true |
| 7 | +--- |
| 8 | + |
| 9 | +This content release includes: |
| 10 | + - New and updated rules. |
| 11 | + - Updated Threat Intelligence rules with match lists which can be populated with exclusions to prevent the generation of undesired signals. |
| 12 | + - Mapping update. |
| 13 | + |
| 14 | +Changes are enumerated below. |
| 15 | + |
| 16 | +## Rules |
| 17 | +- [New] CHAIN-S00023 Administrative Remote Interactive Brute Force Login |
| 18 | + <br/>This rule correlates a high number of failed authentication attempts with a successful remote interactive login (such as via RDP) coming from the same source IP address and user account. |
| 19 | +- [New] CHAIN-S00024 RDP Brute Force Login Attempt |
| 20 | + <br/>This rule correlates a high number of failed authentication attempts with repeated inbound connections over port 3389 (the default RDP port). |
| 21 | +- [New] MATCH-S01056 Administrative Remote Interactive Login |
| 22 | + <br/>This rule triggers on a successful remote interactive login (such as via RDP) of a privileged user. |
| 23 | +- [Updated] MATCH-S00139 Abnormal Parent-Child Process Combination |
| 24 | + <br/>Updated to reduce false positive matches for certain parent-child process combinations. |
| 25 | +- [Updated] MATCH-S01024 Threat Intel - Destination IP Address (High Confidence) |
| 26 | +- [Updated] MATCH-S01026 Threat Intel - Destination IP Address (Low Confidence) |
| 27 | +- [Updated] MATCH-S01028 Threat Intel - Destination IP Address (Medium Confidence) |
| 28 | +- [Updated] MATCH-S01023 Threat Intel - Inbound Traffic from Threat Feed IP (High Confidence) |
| 29 | +- [Updated] MATCH-S01025 Threat Intel - Inbound Traffic from Threat Feed IP (Low Confidence) |
| 30 | +- [Updated] MATCH-S01027 Threat Intel - Inbound Traffic from Threat Feed IP (Medium Confidence) |
| 31 | +- [Updated] MATCH-S01018 Threat Intel - Successful Authentication from Threat Feed IP |
| 32 | + |
| 33 | +## Log Mappers |
| 34 | +- [Updated] Slack Anomaly Event |
| 35 | + <br/>Updated to include `threat_name` mapping for improved context in alerts. |
0 commit comments