Skip to content

Commit f8680f0

Browse files
authored
Merge branch 'main' into Update-Timestamp-Autocorrection-and-Historical-Data-Ingestion-Documentation
2 parents 58cb57d + 420cb8e commit f8680f0

File tree

114 files changed

+1344
-392
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

114 files changed

+1344
-392
lines changed

.github/workflows/build_and_deploy.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ on:
2828

2929
jobs:
3030
build-and-deploy:
31-
runs-on: ubuntu-22.04
31+
runs-on: ubuntu-latest
3232
environment:
3333
name: ${{ inputs.environment }}
3434
url: ${{ inputs.hostname }}${{ inputs.base_url }}

.github/workflows/delete-review.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ on: delete
44

55
jobs:
66
delete-branch-environment:
7-
runs-on: ubuntu-20.04
7+
runs-on: ubuntu-latest
88
environment:
99
name: review/${{ github.ref_name }}
1010
env:

.github/workflows/pr.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ on:
1010

1111
jobs:
1212
build-and-deploy:
13-
runs-on: ubuntu-22.04
13+
runs-on: ubuntu-latest
1414
env:
1515
CI: true
1616
NODE_ENV: production

blog-cse/2025-04-25-content.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
---
2+
title: April 25, 2025 - Content Release
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- log mappers
6+
- parsers
7+
- rules
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
This content release includes:
14+
- Fixes for Threat Intelligence rules to correct match expression syntax for hash and HTTP referrer.
15+
- Parsing and mapping updates for Microsoft Office 365 to improve target user visibility.
16+
17+
## Rules
18+
- [Updated] MATCH-S01009 Threat Intel - HTTP Referrer
19+
- [Updated] MATCH-S01012 Threat Intel - HTTP Referrer Root Domain
20+
- [Updated] MATCH-S00999 Threat Intel - IMPHASH Match
21+
- [Updated] MATCH-S01000 Threat Intel - MD5 Match
22+
- [Updated] MATCH-S01001 Threat Intel - PEHASH Match
23+
- [Updated] MATCH-S01003 Threat Intel - SHA1 Match
24+
- [Updated] MATCH-S01004 Threat Intel - SHA256 Match
25+
- [Updated] MATCH-S01002 Threat Intel - SSDEEP Match
26+
27+
## Log Mappers
28+
- [Updated] Microsoft Office 365 Active Directory Authentication Events
29+
- [Updated] Microsoft Office 365 AzureActiveDirectory Events
30+
31+
## Parsers
32+
- [Updated] /Parsers/System/Microsoft/Office 365

blog-csoar/2025-04-21-content.md

Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
---
2+
title: April 21, 2025 - Content Release
3+
hide_table_of_contents: true
4+
image: https://help.sumologic.com/img/sumo-square.png
5+
keywords:
6+
- automation service
7+
- cloud soar
8+
- soar
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
## March and April releases
14+
15+
### Changes and enhancements
16+
17+
#### Integrations
18+
19+
* [NEW] [ThreatDown Oneview](/docs/platform-services/automation-service/app-central/integrations/threatdown-oneview/). The ThreatDown OneView integration has been built from scratch to facilitate seamless security operations management.
20+
* [NEW] [Atlassian Jira Cloud](/docs/platform-services/automation-service/app-central/integrations/atlassian-jira-cloud/). The Atlassian Jira Cloud integration has been developed from the ground up to streamline issue tracking and project management.
21+
* [UPDATED] [AWS WAF](/docs/platform-services/automation-service/app-central/integrations/aws-waf/). Added a new Update IP Set action in the AWS WAF integration that allows users to update an existing IP set.
22+
23+
#### Platform
24+
25+
##### Playbooks
26+
27+
* Improved the user experience in the node popup when loading dynamic fields.
28+
* Added a confirmation dialog to alert users about pre-existing playbook drafts to avoid accidental overwriting while editing playbooks.
29+
* Implemented an alert popup to prevent accidental loss of unsaved changes when closing a node popup.
30+
* Added audit logs for failed nodes due to errors or exceptions during playbook execution.
31+
32+
### Bug fixes
33+
34+
#### General
35+
36+
* Fixed a session timeout issue when the user is active in Automation Service, but inactive in Sumo Logic Log Analytics.
37+
* Fixed cursor positioning issue while typing in text areas.
38+
39+
#### Integrations
40+
41+
* Resolved a next page token and pageSize related issues in the List Permissions action of the [Google Drive](/docs/platform-services/automation-service/app-central/integrations/google-drive/) integration.
42+
* Added a new `impersonate_user` field in List Permission and Delete Permission actions, allowing actions to be performed on a user's behalf.

blog-service/2024/12-31.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -425,10 +425,6 @@ We're excited to announce that when you create a role, you can select **Index Ac
425425

426426
This feature was [previously only available to participants in our beta program](/release-notes-service/2023/12/31/#october-27-2023-manage-account). It is now available for general use.
427427

428-
:::note
429-
These changes are rolling out across deployments incrementally and will be available on all deployments by March 14, 2025.
430-
:::
431-
432428
[Learn more](/docs/manage/users-roles/roles/create-manage-roles/#create-a-role).
433429

434430
### October 14, 2024 (Collection)

blog-service/2025-04-21-apps.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
title: Sumo Collection (Apps)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- apps
6+
- sumo-collection
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
13+
We're excited to introduce the new Sumo Collection app for Sumo Logic. By leveraging this app, you can get insights into the health and status of Sumo Logic collectors and sources, allowing you to effectively manage and monitor collectors and sources within Sumo Logic. [Learn more](/docs/integrations/saas-cloud/sumo-collection).

blog-service/2025-04-28-manage.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
---
2+
title: Content Sharing for Apps (Manage)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- manage
6+
- apps
7+
- content sharing
8+
hide_table_of_contents: true
9+
---
10+
11+
import useBaseUrl from '@docusaurus/useBaseUrl';
12+
13+
We are happy to announce that authorized users can now control the visibility of installed app content. This update allows content administrators and the installing user to configure the roles and users who should be allowed to view the dashboards and log searches that are installed with an app.
14+
15+
For more information about sharing apps, see [Content Sharing in Sumo Logic](/docs/manage/content-sharing/).
16+
17+
<img src={useBaseUrl('img/content-sharing/grant-app-access-to-org.png')} alt="<your image description>" style={{border: '1px solid gray'}} width="<insert-pixel-number>" />

cid-redirects.json

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1627,6 +1627,7 @@
16271627
"/cid/6016": "/docs/integrations/saas-cloud/trend-micro-vision-one",
16281628
"/cid/6024": "/docs/integrations/saas-cloud/vmware-workspace-one",
16291629
"/cid/6025": "/docs/integrations/saas-cloud/cisco-vulnerability-management",
1630+
"/cid/6026": "/docs/integrations/saas-cloud/sumo-collection",
16301631
"/cid/10112": "/docs/integrations/app-development/jfrog-xray",
16311632
"/cid/10113": "/docs/observability/root-cause-explorer",
16321633
"/cid/10116": "/docs/manage/fields",
@@ -2673,6 +2674,7 @@
26732674
"/cid/20158": "/docs/integrations/amazon-aws/aws-ground-station",
26742675
"/cid/20159": "/docs/integrations/amazon-aws/aws-healthlake",
26752676
"/cid/20160": "/docs/integrations/amazon-aws/amazon-bedrock",
2677+
"/cid/20161": "/docs/integrations/microsoft-azure/azure-virtual-machine",
26762678
"/cid/8394": "/docs/search/search-query-language/search-operators/dedup",
26772679
"/cid/85858": "/docs/observability/kubernetes/quickstart",
26782680
"/cid/8595": "/docs/manage/security/set-password-policy",
@@ -4305,6 +4307,7 @@
43054307
"/docs/manage/partitions/flex/estimate-and-actual-scan-data": "/docs/manage/partitions/flex/estimate-scan-data",
43064308
"/docs/manage/partitions/flex/flex-pricing-faqs": "/docs/manage/partitions/flex/faq",
43074309
"/docs/manage/partitions/flex/flex-pricing-faq": "/docs/manage/partitions/flex/faq",
4310+
"/docs/platform-services/automation-service/app-central/integrations/exana-open-dns": "/docs/platform-services/automation-service/app-central/integrations",
43084311
"/docs/platform-services/automation-service/app-central/integrations/snowflake": "/docs/platform-services/automation-service/app-central/integrations",
43094312
"/docs/integrations/security-threat-detection/palo-alto-networks-6": "/docs/integrations/security-threat-detection/palo-alto-networks-9",
43104313
"/docs/integrations/security-threat-detection/palo-alto-networks-8":"/docs/integrations/security-threat-detection/palo-alto-networks-9",

docs/alerts/scheduled-searches/generate-cse-signals.md

Lines changed: 23 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,8 @@ For a more detailed description of the options you can configure for a scheduled
1515

1616
## Requirements for the search query
1717

18+
When you [create a scheduled search](/docs/alerts/scheduled-searches/schedule-search/) to generate signals in Cloud SIEM, you start by creating a search query.
19+
1820
This section describes the requirements for your scheduled search, which include a minimum set of fields to be returned, and renaming message fields as necessary to match attribute names in the selected Cloud SIEM record type schema.  
1921

2022
### Required fields
@@ -42,7 +44,6 @@ enable signal generation:
4244
If the `stage` field contains a Tactic that isn't in the MITRE ATT&CK framework, a signal will not be generated, but a record will be. 
4345
:::
4446
* At least one entity field:
45-
4647
* `device_ip`
4748
* `device_mac`
4849
* `device_natIp`
@@ -56,16 +57,35 @@ enable signal generation:
5657
* `srcDevice_ip`
5758
* `srcDevice_mac`
5859
* `srcDevice_natIp`
59-
* `user_username`  
60+
* `user_username`
6061

6162
### Renaming message fields
6263

6364
When you configure a Scheduled Search to create Cloud SIEM signals, you are prompted to select a [Cloud SIEM record type](/docs/cse/schema/cse-record-types/). The fields returned by your search must match an attribute in the record type you select. A field whose name does not match a Cloud SIEM attribute will not be populated in the record created from the Schedule Search results. For more about Cloud SIEM attribute names, see [Attributes You Can Map to Records](/docs/cse/schema/attributes-map-to-records/).
6465

66+
### Example
67+
68+
Let's suppose that `user_username` is the entity field we want to use, and its value needs to be mapped to `actor.email`. Then you need to add the following line to the query: `actor.email as user_username`.
69+
70+
And because the final output of this query is an aggregate, and Cloud SIEM signals expect `normalizedfield`, `stage`, and `entity`, we need need to add those in the `count` expression.
71+
72+
This is how the final query might look:
73+
74+
```txt
75+
((_index=sec_record_* objectType=*)
76+
AND _sourcename = "Google Apps Audit Event")
77+
AND _sourcecategory = "GoogleWorkspace/Groups"
78+
| 5 as normalizedseverity
79+
| "Initial Access" as stage
80+
| json auto
81+
| actor.email as user_username
82+
| count by events.name, events.type, actor.email, event.parameters.user_email, event.parameters.group_email, user_username, stage, normalizedseverity
83+
```
84+
6585
## Scheduling the search
6686

6787
1. After creating and saving your search, click the save icon.<br/><img src={useBaseUrl('img/alerts/save-as.png')} alt="Save the search" style={{border: '1px solid gray'}} width="800"/>
68-
1. The **Save Item** popup appears.<br/><img src={useBaseUrl('img/alerts/save-item.png')} alt="Save as scheduled search" width="500"/>
88+
1. The **Save Item** popup appears.<br/><img src={useBaseUrl('img/alerts/save-item.png')} alt="Save as scheduled search" style={{border: '1px solid gray'}} width="500"/>
6989
:::note
7090
The name of your scheduled search will appear as the signal name in Cloud SIEM.
7191
:::

0 commit comments

Comments
 (0)