Skip to content

Commit f12fbf0

Browse files
authored
Add section (#6015)
1 parent 13460b3 commit f12fbf0

File tree

2 files changed

+25
-1
lines changed

2 files changed

+25
-1
lines changed

docs/cse/match-lists-suppressed-lists/standard-match-lists.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -914,9 +914,14 @@ The following Cloud SIEM rules refer to this match list:
914914
The following Cloud SIEM rules refer to this match list:
915915
* Domain Resolution in Non-Standard TLD
916916
* HTTP Request to Domain in Non-Standard TLD
917+
* Threat Intel - Destination IP Address (Low Confidence)
918+
* Threat Intel - Destination IP Address (Medium Confidence)
917919
* Threat Intel - Device IP Matched Threat Intel Domain Name
918920
* Threat Intel - Device IP Matched Threat Intel URL
921+
* Threat Intel - Inbound Traffic from Threat Feed IP (High Confidence)
922+
* Threat Intel - Inbound Traffic from Threat Feed IP (Medium Confidence)
919923
* Threat Intel Match - IP Address
924+
* Threat Intel - Successful Authentication from Threat Feed IP
920925
* Web Request to IP Address
921926

922927
### verified_uri_ips

docs/security/threat-intelligence/threat-indicators-in-cloud-siem.md

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,4 +71,23 @@ Following is the mapping of threat type fields in indicators to reputation label
7171

7272
:::note
7373
If the mapping produces a threat indicator level of **Malicious**, but the confidence is less than 60, the entity's reputation will be set to **Suspicious** instead. If there are multiple reputation values for a given entity (potentially from threat intel and enrichment), Cloud SIEM will show the most severe indicator.
74-
:::
74+
:::
75+
76+
## Add verified indicators to match lists
77+
78+
To prevent entities that are verified as safe from resulting in signals being fired from threat intelligence indicators, add the verified entities to the appropriate [standard match lists](/docs/cse/match-lists-suppressed-lists/standard-match-lists):
79+
* [`verified_applications`](/docs/cse/match-lists-suppressed-lists/standard-match-lists/#verified_applications)
80+
* [`verified_domains`](/docs/cse/match-lists-suppressed-lists/standard-match-lists/#verified_domains)
81+
* [`verified_hostnames`](/docs/cse/match-lists-suppressed-lists/standard-match-lists/#verified_hostnames)
82+
* [`verified_ips`](/docs/cse/match-lists-suppressed-lists/standard-match-lists/#verified_ips)
83+
* [`verified_uri_ips`](/docs/cse/match-lists-suppressed-lists/standard-match-lists/#verified_uri_paths)
84+
85+
For example, if you have a list of allowed IP addresses, add them to the [`verified_ips`](/docs/cse/match-lists-suppressed-lists/standard-match-lists/#verified_ips) match list. Any rules whose expressions state to ignore IPs in that match list will not fire signals for those IPs when the rules run. Following are some of the standard Cloud SIEM threat intel rules whose expressions are configured to ignore IPs in the `verified_ips` match list:
86+
* `Threat Intel - Destination IP Address (Low Confidence)`
87+
* `Threat Intel - Destination IP Address (Medium Confidence)`
88+
* `Threat Intel - Device IP Matched Threat Intel Domain Name`
89+
* `Threat Intel - Device IP Matched Threat Intel URL`
90+
* `Threat Intel - Inbound Traffic from Threat Feed IP (High Confidence)`
91+
* `Threat Intel - Inbound Traffic from Threat Feed IP (Medium Confidence)`
92+
* `Threat Intel Match - IP Address`
93+
* `Threat Intel - Successful Authentication from Threat Feed IP`

0 commit comments

Comments
 (0)