Skip to content

Commit e0e38ea

Browse files
authored
Merge branch 'main' into threat-intel-ga
2 parents 1ce3a08 + 812a6f8 commit e0e38ea

File tree

10 files changed

+944
-887
lines changed

10 files changed

+944
-887
lines changed

docs/cse/administration/create-custom-threat-intel-source.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ Rule authors can also write rules that look for threat intelligence information
4141

4242
Your new source should now appear on the **Threat Intelligence** page.
4343

44-
## Add indicators
44+
## Add threat indicators
4545

4646
### Enter indicators manually
4747

@@ -96,5 +96,10 @@ value,description,expires,active
9696

9797
### Manage sources and indicators using APIs
9898

99-
You can use Cloud SIEM threat intelligence APIs to create and manage indicators and custom threat sources. For information about Cloud SIEM APIs and how to access the API documentation, see [Cloud SIEM APIs](/docs/cse/administration/cse-apis/).
100-
 
99+
You can use Cloud SIEM threat intelligence APIs to create and manage indicators and custom threat sources. For information about Cloud SIEM APIs and how to access the API documentation, see [Cloud SIEM APIs](/docs/cse/administration/cse-apis/).
100+
101+
## Search indicators
102+
103+
To search threat indicators, click the **Search All Indicators** button at the top of the **Threat Intelligence** page.
104+
105+
You can search using the same functionality available for other Cloud SIEM searches, including regular expressions. For more information, see [Filter and Search Cloud SIEM List Pages](/docs/cse/administration/filter-search).

docs/cse/administration/filter-search.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -11,18 +11,20 @@ keywords:
1111

1212
import useBaseUrl from '@docusaurus/useBaseUrl';
1313

14-
You can filter and search the list pages in Cloud SIEM**Insights**, **Signals**, **Entities**, **Records**, **Rules**, and **Network Blocks**—using the **Filters** bar near the top of the page.
14+
## Search in Cloud SIEM
1515

16-
<img src={useBaseUrl('img/cse/list-page-search.png')} alt="Filters box at the top of the page " width="500" />
16+
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Cloud SIEM**.<br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Search Cloud SIEM**. You can also click the **Go To...** menu at the top of the screen and select **Search Cloud SIEM**.
17+
1. Click in the **Find Insights, Signals, Entities and more...** search bar at the top of the page.<br/><img src={useBaseUrl('img/cse/list-page-search.png')} alt="Search box at the top of the page" width="400" />
18+
1. Enter text to search.
19+
1. To filter, click the filter icon <img src={useBaseUrl('img/cse/filter-icon.png')} alt="Filter icon" width="20" /> on the right side of the search box.
20+
1. Select a source to filter on. <br/><img src={useBaseUrl('img/cse/search-sources.png')} alt="Search sources" width="250" />
21+
1. A dropdown list of filters appears for that source. Select a field to filter on, or pick a suggestion.<br/><img src={useBaseUrl('img/cse/filter-options.png')} alt="List of fields to filter on" width="400"/>
22+
1. Continue to select options to filter on from the options presented.
1723

18-
## Filter items
19-
When you click in the **Filters** bar, a dropdown list of filters appears. After you select a filter you’ll be presented with a dialog so you can specify your filtering criteria.
24+
## Search using regular expressions
2025

21-
<img src={useBaseUrl('img/cse/filter-options.png')} alt="List of fields to filter on" width="250"/>
26+
You also enter a search string or regex in the search bar, and press Return to run a search. Note that Cloud SIEM's regular expression engine will return items that contain text matching the complete string. The engine implicitly adds anchors (`^` and `$`) to the beginning and end of your regex.
2227

23-
## Search items
24-
You also enter a search string or regex in the **Filter** bar, and press Return to run a search. Note that Cloud SIEM's regular expression engine will return items that contain text matching the complete string. The engine implicitly adds anchors (`^` and `$`) to the beginning and end of your regex.
28+
Cloud SIEM search uses Elasticsearch. For regular expressions allowed for use in Cloud SIEM search, see [Regular expression syntax](https://www.elastic.co/guide/en/elasticsearch/reference/current/regexp-syntax.html) in the Elastic documentation.
2529

26-
You can use `not` to search for items that do not contain a particular keyword, for example:
27-
28-
`not:Initial Access`
30+
You can use `not` to search for items that do not contain a particular keyword, for example: `not:Initial Access`

docs/cse/match-lists-suppressed-lists/suppressed-lists.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,15 +52,17 @@ Match lists are for when you want to use the existence or absence of an indicato
5252

5353
Cloud SIEM uses suppressed lists similar to how it uses [match lists](#suppressed-list-or-match-list). When Cloud SIEM processes an incoming record, it compares the entries in each suppressed list to record fields of the same type as the target column of the suppressed list. For example, given a suppressed list whose target column is **Domain**, Cloud SIEM will compare items on that list only to record fields that contain domains.
5454

55-
When a record contains a value that matches one or more suppressed lists, two fields in the record get populated:
55+
Keep in mind:
56+
* Suppression lists will suppress any signal where the suppressed indicator is present, regardless of the primary entity in the signal.
57+
* Entity suppression will only suppress the signal if the suppressed entity is the primary signal.
58+
* If any entities within the record match items listed in a suppressed list, suppressed signals will be generated for those entities across all rules. Consequently, these signals will not affect the entity's Activity Score or contribute to insight generation.
5659

60+
When a record contains a value that matches one or more suppressed lists, two fields in the record get populated:
5761
* `listMatches`. Cloud SIEM adds the names of the suppressed lists that the record matched, and the column values of those lists. For example, if an IP address in a record matches the SourceIP address in the “vuln_scanners” suppressed list, the `listMatches` field would look like this: `listMatches: ['vuln_scanners', 'column:SourceIp']`  
5862
* `matchedItems`. Cloud SIEM adds the actual key-value pairs that were matched. For example, continuing the example above, if “vuln_scanners” match list contained an entry “5.6.7.8”, and the record’s SourceIp is also “5.6.7.8”, the assuming the SourceIP address in the “vuln_scanners” suppressed list, the `matchedItems` field would look like this: `matchedItems: [ { value: '5.6.7.8', …other metadata about list item } ]`
5963

6064
Because the information about list matches gets persisted within records, you can reference it downstream in both rules and search.
6165

62-
**If any entities within the record match items listed in a suppressed list, suppressed signals will be generated for those entities across all rules**. Consequently, these signals will not affect the entity's Activity Score or contribute to insight generation.
63-
6466
For more information about signal Suppression mechanisms, see [About Signal Suppression](/docs/cse/records-signals-entities-insights/about-signal-suppression/).
6567

6668

docs/platform-services/threat-intelligence-indicators.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,7 @@ To search logs that contain correlations to threat intelligence indicators, you
4444
* [Mandiant Threat Intel Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/mandiant-threat-intel-source)
4545
* [STIX/TAXII 1 Client Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/stix-taxii-1-client-source)
4646
* [STIX/TAXII 2 Client Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/stix-taxii-2-client-source)
47+
* [ZeroFox Threat Intel Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/zerofox-intel-source)
4748
* **The API**. See the following APIs in the [Threat Intel Ingest Management](https://api.sumologic.com/docs/#tag/threatIntelIngest) API resource:
4849
* [uploadNormalizedIndicators API](https://api.sumologic.com/docs/#operation/uploadNormalizedIndicators)
4950
* [uploadCsvIndicators API](https://api.sumologic.com/docs/#operation/uploadCsvIndicators)

package.json

Lines changed: 28 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -15,22 +15,33 @@
1515
"write-heading-ids": "docusaurus write-heading-ids"
1616
},
1717
"dependencies": {
18+
"@algolia/client-abtesting": "5.18.0",
19+
"@algolia/client-analytics": "5.18.0",
20+
"@algolia/client-insights": "5.18.0",
21+
"@algolia/client-personalization": "5.18.0",
22+
"@algolia/client-query-suggestions": "5.18.0",
23+
"@algolia/client-search": "5.18.0",
24+
"@algolia/ingestion": "1.18.0",
25+
"@algolia/monitoring": "1.18.0",
26+
"@algolia/recommend": "5.18.0",
1827
"@babel/plugin-proposal-decorators": "^7.23.7",
1928
"@babel/runtime-corejs3": "7.26.0",
2029
"@braintree/sanitize-url": "^6.0.1",
21-
"@docusaurus/bundler": "3.6.3",
22-
"@docusaurus/core": "^3.6.3",
23-
"@docusaurus/cssnano-preset": "3.6.3",
24-
"@docusaurus/plugin-client-redirects": "3.6.3",
25-
"@docusaurus/plugin-content-blog": "^3.6.3",
26-
"@docusaurus/plugin-debug": "3.6.3",
27-
"@docusaurus/plugin-google-analytics": "3.6.3",
28-
"@docusaurus/plugin-google-gtag": "3.6.3",
29-
"@docusaurus/plugin-google-tag-manager": "3.6.3",
30-
"@docusaurus/plugin-sitemap": "3.6.3",
31-
"@docusaurus/preset-classic": "3.6.3",
32-
"@docusaurus/theme-classic": "3.6.3",
33-
"@docusaurus/theme-search-algolia": "3.6.3",
30+
"@docsearch/css": "3.8.2",
31+
"@docusaurus/bundler": "3.7.0",
32+
"@docusaurus/core": "^3.7.0",
33+
"@docusaurus/cssnano-preset": "3.7.0",
34+
"@docusaurus/plugin-client-redirects": "3.7.0",
35+
"@docusaurus/plugin-content-blog": "^3.7.0",
36+
"@docusaurus/plugin-debug": "3.7.0",
37+
"@docusaurus/plugin-google-analytics": "3.7.0",
38+
"@docusaurus/plugin-google-gtag": "3.7.0",
39+
"@docusaurus/plugin-google-tag-manager": "3.7.0",
40+
"@docusaurus/plugin-sitemap": "3.7.0",
41+
"@docusaurus/plugin-svgr": "3.7.0",
42+
"@docusaurus/preset-classic": "3.7.0",
43+
"@docusaurus/theme-classic": "3.7.0",
44+
"@docusaurus/theme-search-algolia": "3.7.0",
3445
"@emotion/react": "^11.10.5",
3546
"@emotion/styled": "^11.10.5",
3647
"@eslint/eslintrc": "^1.3.3",
@@ -117,9 +128,10 @@
117128
"prismjs": "^1.27.0",
118129
"punycode": "^2.3.1",
119130
"raw-loader": "^4.0.2",
120-
"react": "^18.2.0",
121-
"react-dom": "^18.2.0",
131+
"react": "^19.0.0",
132+
"react-dom": "^19.0.0",
122133
"react-fast-compare": "^3.2.0",
134+
"react-helmet-async": "1.3.0",
123135
"react-iframe": "^1.8.0",
124136
"react-json-view-lite": "1.2.1",
125137
"react-live": "^4.1.5",
@@ -150,7 +162,7 @@
150162
"yaml": "^2.3.1"
151163
},
152164
"devDependencies": {
153-
"@docusaurus/module-type-aliases": "^3.6.3",
165+
"@docusaurus/module-type-aliases": "^3.7.0",
154166
"@tsconfig/docusaurus": "^1.0.4",
155167
"@types/react": "^17.0.0",
156168
"@types/webpack-env": "^1.16.3",

static/img/cse/filter-icon.png

4.25 KB
Loading

static/img/cse/filter-options.png

23.2 KB
Loading
-9.08 KB
Loading

static/img/cse/search-sources.png

33.1 KB
Loading

0 commit comments

Comments
 (0)