Skip to content

Commit e09f8db

Browse files
authored
Merge branch 'main' into update-scan-budget-docs
2 parents da5d854 + 6f693fd commit e09f8db

24 files changed

+581
-62
lines changed

blog-cse/2024-11-07-content.md

Lines changed: 82 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,82 @@
1+
---
2+
title: November 7, 2024 - Content Release
3+
hide_table_of_contents: true
4+
keywords:
5+
- log mappers
6+
- log parsers
7+
- detection rules
8+
- tag schemas
9+
image: https://help.sumologic.com/img/sumo-square.png
10+
---
11+
12+
import useBaseUrl from '@docusaurus/useBaseUrl';
13+
14+
<a href="https://help.sumologic.com/release-notes-cse/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
15+
16+
This content release includes:
17+
- New detection rules.
18+
- Updates to existing detection rules to correct rule logic and reduce false positives.
19+
- New parsing and mapping support for Automox, WatchGuard Firewall, and Digital Guardian ARC.
20+
- Update to existing AWS Application Load Balancer parsing and mapping to support Connection logs.
21+
- Update to MITRE ATT&CK tag schema to support ATT&CK v16.0.
22+
23+
Changes are enumerated below.
24+
25+
### Rules
26+
- [New] CHAIN-S00018 Autorun file created after USB disk mount on host
27+
- This signal looks for a USB drive being mounted on a Windows host followed by a file creation event with the file name of "autorun.inf" within a 5-minute time frame. This activity could be indicative of an attempt at lateral movement or initial access avenues through a USB device. Ensure that the machine in question is authorized to use USB devices and look for other file creation events from this host around the same time frame.
28+
- [New] FIRST-S00071 First Seen AWS ConsoleLogin by User
29+
- First observance of a user logging on to the Amazon AWS console. This could be indicative of new administrator onboarding, or an unauthorized access to the AWS console. Recommended to investigate the nature of the user account and the login.
30+
- [New] FIRST-S00080 First Seen Azure Portal access by User
31+
- First observance of a user logging on to the Microsoft Azure Portal. This could be indicative of new user onboarding, or an unauthorized access to the Azure portal. Recommended to investigate the nature of the user account and the login.
32+
- [New] FIRST-S00073 First Seen Get-ADDefaultDomainPasswordPolicy
33+
- The first observed execution of the PowerShell CMDLet Get-ADDefaultDomainPasswordPolicy on this host. This CMDLet can be used in the discovery of Windows Domain Password Policies by threat actors. Investigating the host and active users for additional activity around the time of execution is recommended.
34+
- [New] FIRST-S00072 First Seen Group Policy Discovery Operation
35+
- This detection is a first observed execution of Windows process or PowerShell commands that can be run by users or administrators in order to gather password policy and other types of system information in an enterprise environment. The detections in this signal are based off variations found in Atomic Red Team test cases. Reference: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1615/T1615.md. Look at the command line and parent process details of the signal in order to determine if this execution is legitimate or part of system provisioning or systems administration operations.
36+
- [New] FIRST-S00076 First Seen Net Command Use on Host
37+
- Microsoft’s Net.exe can be used for multiple Discovery tactics, including Password Policy, Permissions, Account and Domain Trust Discovery. This detection identifies the first observance of a Net related command on a system related to these discovery tactics. It is recommended to investigate the host and user to determine if this is authorized admin activity or needs further inspection.
38+
- [New] FIRST-S00065 First Seen Successful Authentication From Unexpected Country
39+
- First Seen rule which triggers when there are at least two successful logins from the same user with different country codes indicating possible credential theft. It is recommended to add filtering criteria to the expression to reduce false positives, such as known VPN addresses.(If degradation issues occur it is recommendation implementing tuning around your expected network.)
40+
- [New] FIRST-S00074 First Seen driverquery execution on host
41+
- First observed execution of the driverquery command on the following device host: `{{device_hostname}}`. Driverquery is a useful command for an attacker to enumerate local device drivers to determine next steps in the attack. Vulnerability scanners and automated processes may trigger this detection. It is recommended to identify and filter these processes out using a Tuning Expression for the corresponding baseImage. On detection, investigate the host and process executing the command to assist in understanding the context of the execution.
42+
- [New] FIRST-S00079 First Seen gpresult execution on host
43+
- This detection is first observed execution of gpresult on a host. This command may be used by attackers to access detailed password policy information in an enterprise environment. Vulnerability scanners and automated processes may trigger this detection. It is recommended to identify and filter these processes out using a Tuning Expression for the corresponding baseImage. On detection, investigate the host and process executing the command to assist in understanding the context of the execution.
44+
- [New] FIRST-S00067 Okta - First Seen Client ID/ASN combo in successful OIDC token grant
45+
- This signal looks for a new Client ID value ( mapped to the `user_username` field ) and ASN combination being issued an OIDC token, excluding the Okta Browser Plugin and Okta Dashboard. Use the Okta admin portal and look at the "Applications" section to cross-reference the Client ID value. Ensure that the IP address that is requesting the token is known and that this operation is expected and authorized.
46+
- [New] FIRST-S00068 Okta - First Seen User Accessing Admin Application
47+
- A user not seen since the baseline period has accessed the Okta admin application. Ensure that this user is expected to perform Okta administrative activities. If this user is expected and authroized, consider adding the user to the "Okta_Admins" match list to exclude the user from this signal.
48+
- [New] FIRST-S00066 Okta - First Seen User Requesting Report
49+
- This signal looks for a first seen user requesting an export of an Okta report. The various Okta report types can be found in the “Reports” section of the Okta administrative portal and can include various report types such as application password help, MFA usage, and reports around user access. During the October 2023 Okta incident, threat actors downloaded reports from Okta portals to extract information regarding user contact information. Ensure that the user that is requesting such reports is authorized and that this activity is expected. If a suspicious report generation event occurs, look at the “target” element within the event to gain more detailed information as to the type of report being generated and exported.
50+
- [New] OUTLIER-S00018 Okta - Outlier in ASNs Used to Access Applications
51+
- This signal looks for an outlier in the number of distinct autonomous system numbers (ASNs) that a particular user utilizes to access Okta resources within an hour time period. This is designed to alert on various forms of token or credential theft as well as general Okta session anomalies.
52+
- [New] OUTLIER-S00017 Okta - Outlier in MFA Attempts Denied by User
53+
- This signal builds an hourly baseline of MFA denied events per user and triggers when an outlier in the number of denied attempts is detected. This signal is designed to trigger on MFA-fatigue type attacks. If false positives are detected, consider excluding certain users from the alerting logic or raise the minimum count value within the rule configuration.
54+
- [New] OUTLIER-S00016 Okta - Outlier in OIDC token request failures
55+
- This signal looks for an outlier in the number of OpenID Connect (OIDC) token request failures for an Okta client application. Use the Okta admin portal to correlate the Client ID (mapped to `user_username`) to determine what application is being targeted. Pivot off the Client ID and IP address values to examine the raw Okta events in order to ensure that this activity is planned and expected. This activity can occur during setup and development of Okta applications and integrations.
56+
- [New] OUTLIER-S00013 Outlier in Data Outbound Per Day by Admin or Sensitive Device
57+
- A larger than typical amount of data has been observed being sent outbound from a Sensitive Device or an Admin user. It is recommended to investigate the device associated with this IP, the Internet destinations, and traffic associated with this anomalous behavior. A normalized record search for the source IP and external network traffic within the period of time of the detection will help identify suspicious activity. This rule is dependent on the Match Lists "domain_controllers" and "admin_usernames" being populated with the sensitive device IPs and admin usernames. Additionally, Entity Tagging offers a similar and extensible alternative to Match Lists. To add more sensitive Match Lists or Entity Tagging, use Rule Tuning Expressions. For further customization, consider adjusting the severity of this rule and/or using entity severity as needed to increase the severity of this rule.
58+
- [New] OUTLIER-S00015 Outlier in Data Outbound Per Hour by Admin or Sensitive Device
59+
- A larger than typical amount of data has been observed being sent outbound from a Sensitive Device or an Admin user. It is recommended to investigate the device associated with this IP, the Internet destinations, and traffic associated with this anomalous behavior. A normalized record search for the source IP and external network traffic within the period of time of the detection will help identify suspicious activity. This rule is dependent on the Match Lists "domain_controllers" and "admin_usernames" being populated with the sensitive device IPs and admin usernames. Additionally, Entity Tagging offers a similar and extensible alternative to Match Lists. To add more sensitive Match Lists or Entity Tagging, use Rule Tuning Expressions. For further customization, consider adjusting the severity of this rule and/or using entity severity as needed to increase the severity of this rule.
60+
- [Updated] THRESHOLD-S00095 Password Attack
61+
- Added NULL exclusion to rule expression to prevent false-positives stemming from NULL IP or hostnames.
62+
- [Updated] MATCH-S00556 Outbound Data Transfer Protocol Over Non-standard Port
63+
- Added missing parenthesis to match expression.
64+
65+
### Log Mappers
66+
- [New] AWS - Application Load Balancer - Connection
67+
- [New] Automox - Audit logs
68+
- [New] Automox - Audit logs - Logon
69+
- [New] Automox - Event logs
70+
- [New] Digital Guardian ARC - Audit Events
71+
- [New] Digital Guardian ARC - Mail
72+
- [New] Digital Guardian ARC - Network
73+
- [New] Digital Guardian ARC - User Login|Logoff
74+
- [New] Watchguard Fireware - Firewall
75+
- [New] Watchguard Fireware - http/https-proxy
76+
77+
### Parsers
78+
- [New] /Parsers/System/Automox/Automox
79+
- [New] /Parsers/System/Digital Guardian/Digital Guardian ARC
80+
- [New] /Parsers/System/WatchGuard/WatchGuard Fireware
81+
- [Updated] /Parsers/System/AWS/AWS ALB
82+
- Updated parser to support AWS Application Load Balancer Connection logs
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
title: November 8, 2024 - Application Update
3+
keywords:
4+
- cloud siem
5+
image: https://help.sumologic.com/img/sumo-square.png
6+
hide_table_of_contents: true
7+
---
8+
9+
### Cloud SIEM network sensor end-of-life
10+
11+
The Sumo Logic Product Team is discontinuing our on-premise network sensor feature for Sumo Logic Cloud SIEM. The feature will no longer receive updates as of November 8, 2024, and support ends as of April 30, 2025. We fully support a customer or partner managed [Zeek network sensor](/docs/cse/sensors/ingest-zeek-logs/) as a data source for our Cloud SIEM product that will provide equivalent monitoring of your network.
12+
13+
Learn more [here](/docs/cse/sensors/network-sensor-end-of-life/).

blog-service/2024-10-14-manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ We're excited to announce that when you create a role, you can select **Index Ac
1717
This feature was [previously only available to participants in our beta program](/release-notes-service/2023/12/31/#october-27-2023-manage-account). It is now available for general use.
1818

1919
:::note
20-
These changes are rolling out across deployments incrementally and will be available on all deployments by November 15, 2024.
20+
These changes are rolling out across deployments incrementally and will be available on all deployments by December 16, 2024.
2121
:::
2222

2323
[Learn more](/docs/manage/users-roles/roles/create-manage-roles/#create-a-role).

blog-service/2024-11-08-apps.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: Kandji (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- kandji
6+
- apps
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
We're excited to introduce the new Kandji app for Sumo Logic. This app leverages the Sumo Logic Cloud-to-Cloud Kandji source to collect threat events and device events, thereby maintaining a secure Apple device environment and strengthening organizational security posture.
15+
16+
Explore our technical documentation [here](/docs/integrations/saas-cloud/kandji/) to learn how to set up and use the Kandji app for Sumo Logic.

blog-service/2024-11-08-search.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: Deprecation of Classic Visualization (Search)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- classic-visualization
6+
- search
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>
13+
14+
In May 2024, we introduced [new visualization charts](/docs/search/get-started-with-search/search-basics/chart-search-results/#new-visualization) for all the Log Search queries, with which you can customize each chart by modifying the available settings and obtain a unified experience across the Sumo Logic platforms.
15+
16+
**Effective November 22, 2024**, the **Switch to Classic Visualization** button will be removed, and the Classic Visualization view will no longer be available. By default, all your charts will automatically display in the New Visualization style.

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1810,6 +1810,7 @@
18101810
"/cid/19600": "/docs/integrations/saas-cloud/citrix-cloud",
18111811
"/cid/60046": "/docs/integrations/saas-cloud/sentinelone",
18121812
"/cid/60048": "/docs/integrations/saas-cloud/knowbe4",
1813+
"/cid/60049": "/docs/integrations/saas-cloud/kandji",
18131814
"/cid/19601": "/docs/integrations/saas-cloud/docusign",
18141815
"/cid/2122": "/docs/integrations/saas-cloud/gmail-tracelogs",
18151816
"/cid/21202": "/docs/integrations/saas-cloud/airtable",

docs/cse/ingestion/ingestion-sources-for-cloud-siem/corelight-zeek.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -11,11 +11,6 @@ This section has instructions for collecting Corelight Zeek log messages and sen
1111

1212
These instructions are for Corelight Zeek logs sent as JSON over syslog.
1313

14-
:::note
15-
The [Cloud SIEM Network Sensor](/docs/cse/sensors/network-sensor-deployment-guide/) also utilizes Zeek, so If you're using the sensor, using Corelight Zeek would be redundant.
16-
:::
17-
18-
1914
## Step 1: Configure collection
2015

2116
In this step, you configure a Syslog Source to collect Corelight Zeek log messages. You can configure the source on an existing Installed Collector or create a new collector. If you’re going to use an existing collector, jump to [Configure a Syslog Source](#configure-a-syslog-source) below. Otherwise, create a new collector as described in [Configure an Installed Collector](#configure-an-installed-collector) below, and then create the Syslog Source on the collector.

docs/cse/records-signals-entities-insights/search-cse-records-in-sumo.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ When you query Cloud SIEM Records or Signalsin a Sumo Logic log search tab, the
6767
<img src={useBaseUrl('img/cse/security-record-details.png')} alt="Security records details" style={{border: '1px solid gray'}} width="600"/>
6868

6969

70-
## Search Records or from the Partitions page
70+
## Search Records from the Partitions page
7171

7272
If you have the **View Partitions** role capability, you can search Cloud SIEM partitions from the **Partitions** page in the Sumo Logic UI.
7373

docs/cse/sensors/index.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,12 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1212
In this section, we'll introduce the following concepts:
1313

1414
<div className="box-wrapper" >
15+
<div className="box smallbox card">
16+
<div className="container">
17+
<a href="/docs/cse/sensors/ingest-zeek-logs"><img src={useBaseUrl('img/icons/logs.png')} alt="Document icon" width="40"/><h4>Ingest Zeek Logs</h4></a>
18+
<p>Learn how to collect Zeek (Bro) logs and ingest them to Cloud SIEM.</p>
19+
</div>
20+
</div>
1521
<div className="box smallbox card">
1622
<div className="container">
1723
<a href="/docs/cse/sensors/sensor-download-locations"><img src={useBaseUrl('img/icons/operations/sensor.png')} alt="Database icon" width="40"/><h4>Sensor Download Locations</h4></a>
@@ -36,10 +42,4 @@ In this section, we'll introduce the following concepts:
3642
<p>Learn how to collect Log Sensor status and data to support troubleshooting efforts.</p>
3743
</div>
3844
</div>
39-
<div className="box smallbox card">
40-
<div className="container">
41-
<a href="/docs/cse/sensors/ingest-zeek-logs"><img src={useBaseUrl('img/icons/logs.png')} alt="Document icon" width="40"/><h4>Ingest Zeek Logs</h4></a>
42-
<p>Learn how to collect Zeek (Bro) logs and ingest them to Cloud SIEM.</p>
43-
</div>
44-
</div>
4545
</div>

0 commit comments

Comments
 (0)