You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: blog-service/2024/12-31.md
-4Lines changed: 0 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -425,10 +425,6 @@ We're excited to announce that when you create a role, you can select **Index Ac
425
425
426
426
This feature was [previously only available to participants in our beta program](/release-notes-service/2023/12/31/#october-27-2023-manage-account). It is now available for general use.
427
427
428
-
:::note
429
-
These changes are rolling out across deployments incrementally and will be available on all deployments by March 14, 2025.
Copy file name to clipboardExpand all lines: docs/alerts/scheduled-searches/generate-cse-signals.md
+23-3Lines changed: 23 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,8 @@ For a more detailed description of the options you can configure for a scheduled
15
15
16
16
## Requirements for the search query
17
17
18
+
When you [create a scheduled search](/docs/alerts/scheduled-searches/schedule-search/) to generate signals in Cloud SIEM, you start by creating a search query.
19
+
18
20
This section describes the requirements for your scheduled search, which include a minimum set of fields to be returned, and renaming message fields as necessary to match attribute names in the selected Cloud SIEM record type schema.
19
21
20
22
### Required fields
@@ -42,7 +44,6 @@ enable signal generation:
42
44
If the `stage` field contains a Tactic that isn't in the MITRE ATT&CK framework, a signal will not be generated, but a record will be.
43
45
:::
44
46
* At least one entity field:
45
-
46
47
*`device_ip`
47
48
*`device_mac`
48
49
*`device_natIp`
@@ -56,16 +57,35 @@ enable signal generation:
56
57
*`srcDevice_ip`
57
58
*`srcDevice_mac`
58
59
*`srcDevice_natIp`
59
-
*`user_username`
60
+
*`user_username`
60
61
61
62
### Renaming message fields
62
63
63
64
When you configure a Scheduled Search to create Cloud SIEM signals, you are prompted to select a [Cloud SIEM record type](/docs/cse/schema/cse-record-types/). The fields returned by your search must match an attribute in the record type you select. A field whose name does not match a Cloud SIEM attribute will not be populated in the record created from the Schedule Search results. For more about Cloud SIEM attribute names, see [Attributes You Can Map to Records](/docs/cse/schema/attributes-map-to-records/).
64
65
66
+
### Example
67
+
68
+
Let's suppose that `user_username` is the entity field we want to use, and its value needs to be mapped to `actor.email`. Then you need to add the following line to the query: `actor.email as user_username`.
69
+
70
+
And because the final output of this query is an aggregate, and Cloud SIEM signals expect `normalizedfield`, `stage`, and `entity`, we need need to add those in the `count` expression.
1. After creating and saving your search, click the save icon.<br/><img src={useBaseUrl('img/alerts/save-as.png')} alt="Save the search" style={{border: '1px solid gray'}} width="800"/>
68
-
1. The **Save Item** popup appears.<br/><img src={useBaseUrl('img/alerts/save-item.png')} alt="Save as scheduled search" width="500"/>
88
+
1. The **Save Item** popup appears.<br/><img src={useBaseUrl('img/alerts/save-item.png')} alt="Save as scheduled search" style={{border: '1px solid gray'}} width="500"/>
69
89
:::note
70
90
The name of your scheduled search will appear as the signal name in Cloud SIEM.
Copy file name to clipboardExpand all lines: docs/integrations/amazon-aws/amazon-ec2-auto-scaling.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -121,7 +121,7 @@ When you create an AWS Source, you'll need to identify the Hosted Collector you
121
121
* A green circle with a check mark is shown when the field exists and is enabled in the Fields table schema.
122
122
* An orange triangle with an exclamation point is shown when the field doesn't exist, or is disabled, in the Fields table schema. In this case, an option to automatically add or enable the nonexistent fields to the Fields table schema is provided. If a field is sent to Sumo Logic that does not exist in the Fields schema or is disabled it is ignored, known as dropped.
123
123
:::note
124
-
Namespace for Amazon EC2 Auto-scaling Service is AWS/AutoScaling.
124
+
Namespace for Amazon EC2 Auto Scaling Service is AWS/AutoScaling.
125
125
:::
126
126
127
127
## Field in field schema
@@ -132,7 +132,7 @@ Namespace for Amazon EC2 Auto-scaling Service is AWS/AutoScaling.
132
132
133
133
## Field Extraction Rule(s)
134
134
135
-
Create a Field Extraction Rule (FER) for Amazon EC2 Auto-scaling access logs and Cloudtrail logs. Learn how to create a Field Extraction Rule [here](/docs/manage/field-extractions/create-field-extraction-rule).
135
+
Create a Field Extraction Rule (FER) for Amazon EC2 Auto Scaling access logs and Cloudtrail logs. Learn how to create a Field Extraction Rule [here](/docs/manage/field-extractions/create-field-extraction-rule).
136
136
137
137
**Amazon EC2 Auto Scaling CloudTrail logs**
138
138
@@ -177,8 +177,8 @@ The **Amazon EC2 Auto Scaling - CloudTrail Audit** dashboard provides a comprehe
177
177
178
178
Use this dashboard for:
179
179
* Monitoring the overall health and performance of your Amazon EC2 Auto Scaling groups
180
-
* Identifying and troubleshooting common errors and failures in auto-scaling operations
181
-
* Tracking user activities and potential security concerns related to auto-scaling events
180
+
* Identifying and troubleshooting common errors and failures in autoscaling operations
181
+
* Tracking user activities and potential security concerns related to autoscaling events
182
182
* Analyzing trends in event types, success rates, and failure patterns over time
Copy file name to clipboardExpand all lines: docs/integrations/microsoft-azure/azure-key-vault.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,6 @@ For more information on supported metrics and their units, refer to the [Azure d
25
25
Azure service sends monitoring data to Azure Monitor, which can then [stream data to Eventhub](https://learn.microsoft.com/en-us/azure/azure-monitor/essentials/stream-monitoring-data-event-hubs). Sumo Logic supports:
26
26
27
27
* Logs collection from [Azure Monitor](https://docs.microsoft.com/en-us/azure/monitoring-and-diagnostics/monitoring-get-started) using our [Azure Event Hubs source](/docs/send-data/collect-from-other-data-sources/azure-monitoring/ms-azure-event-hubs-source/).
28
-
* Metrics collection using our [HTTP Logs and Metrics source](/docs/send-data/collect-from-other-data-sources/azure-monitoring/collect-metrics-azure-monitor/) via Azure Functions deployed using the ARM template.
29
28
30
29
You must explicitly enable diagnostic settings for each Key Vault you want to monitor. You can forward logs to the same event hub provided they satisfy the limitations and permissions as described [here](https://learn.microsoft.com/en-us/azure/azure-monitor/essentials/diagnostic-settings?tabs=portal#destination-limitations).
0 commit comments