You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*[NEW][ThreatDown Oneview](/docs/platform-services/automation-service/app-central/integrations/threatdown-oneview/). The ThreatDown OneView integration has been built from scratch to facilitate seamless security operations management.
20
+
*[NEW][Atlassian Jira Cloud](/docs/platform-services/automation-service/app-central/integrations/atlassian-jira-cloud/). The Atlassian Jira Cloud integration has been developed from the ground up to streamline issue tracking and project management.
21
+
*[UPDATED][AWS WAF](/docs/platform-services/automation-service/app-central/integrations/aws-waf/). Added a new Update IP Set action in the AWS WAF integration that allows users to update an existing IP set.
22
+
23
+
#### Platform
24
+
25
+
##### Playbooks
26
+
27
+
* Improved the user experience in the node popup when loading dynamic fields.
28
+
* Added a confirmation dialog to alert users about pre-existing playbook drafts to avoid accidental overwriting while editing playbooks.
29
+
* Implemented an alert popup to prevent accidental loss of unsaved changes when closing a node popup.
30
+
* Added audit logs for failed nodes due to errors or exceptions during playbook execution.
31
+
32
+
### Bug fixes
33
+
34
+
#### General
35
+
36
+
* Fixed a session timeout issue when the user is active in Automation Service, but inactive in Sumo Logic Log Analytics.
37
+
* Fixed cursor positioning issue while typing in text areas.
38
+
39
+
#### Integrations
40
+
41
+
* Resolved a next page token and pageSize related issues in the List Permissions action of the [Google Drive](/docs/platform-services/automation-service/app-central/integrations/google-drive/) integration.
42
+
* Added a new `impersonate_user` field in List Permission and Delete Permission actions, allowing actions to be performed on a user's behalf.
Copy file name to clipboardExpand all lines: blog-service/2024/12-31.md
-4Lines changed: 0 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -425,10 +425,6 @@ We're excited to announce that when you create a role, you can select **Index Ac
425
425
426
426
This feature was [previously only available to participants in our beta program](/release-notes-service/2023/12/31/#october-27-2023-manage-account). It is now available for general use.
427
427
428
-
:::note
429
-
These changes are rolling out across deployments incrementally and will be available on all deployments by March 14, 2025.
We're excited to introduce the new Sumo Collection app for Sumo Logic. By leveraging this app, you can get insights into the health and status of Sumo Logic collectors and sources, allowing you to effectively manage and monitor collectors and sources within Sumo Logic. [Learn more](/docs/integrations/saas-cloud/sumo-collection).
We are happy to announce that authorized users can now control the visibility of installed app content. This update allows content administrators and the installing user to configure the roles and users who should be allowed to view the dashboards and log searches that are installed with an app.
14
+
15
+
For more information about sharing apps, see [Content Sharing in Sumo Logic](/docs/manage/content-sharing/).
Copy file name to clipboardExpand all lines: docs/alerts/scheduled-searches/generate-cse-signals.md
+23-3Lines changed: 23 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,8 @@ For a more detailed description of the options you can configure for a scheduled
15
15
16
16
## Requirements for the search query
17
17
18
+
When you [create a scheduled search](/docs/alerts/scheduled-searches/schedule-search/) to generate signals in Cloud SIEM, you start by creating a search query.
19
+
18
20
This section describes the requirements for your scheduled search, which include a minimum set of fields to be returned, and renaming message fields as necessary to match attribute names in the selected Cloud SIEM record type schema.
19
21
20
22
### Required fields
@@ -42,7 +44,6 @@ enable signal generation:
42
44
If the `stage` field contains a Tactic that isn't in the MITRE ATT&CK framework, a signal will not be generated, but a record will be.
43
45
:::
44
46
* At least one entity field:
45
-
46
47
*`device_ip`
47
48
*`device_mac`
48
49
*`device_natIp`
@@ -56,16 +57,35 @@ enable signal generation:
56
57
*`srcDevice_ip`
57
58
*`srcDevice_mac`
58
59
*`srcDevice_natIp`
59
-
*`user_username`
60
+
*`user_username`
60
61
61
62
### Renaming message fields
62
63
63
64
When you configure a Scheduled Search to create Cloud SIEM signals, you are prompted to select a [Cloud SIEM record type](/docs/cse/schema/cse-record-types/). The fields returned by your search must match an attribute in the record type you select. A field whose name does not match a Cloud SIEM attribute will not be populated in the record created from the Schedule Search results. For more about Cloud SIEM attribute names, see [Attributes You Can Map to Records](/docs/cse/schema/attributes-map-to-records/).
64
65
66
+
### Example
67
+
68
+
Let's suppose that `user_username` is the entity field we want to use, and its value needs to be mapped to `actor.email`. Then you need to add the following line to the query: `actor.email as user_username`.
69
+
70
+
And because the final output of this query is an aggregate, and Cloud SIEM signals expect `normalizedfield`, `stage`, and `entity`, we need need to add those in the `count` expression.
1. After creating and saving your search, click the save icon.<br/><img src={useBaseUrl('img/alerts/save-as.png')} alt="Save the search" style={{border: '1px solid gray'}} width="800"/>
68
-
1. The **Save Item** popup appears.<br/><img src={useBaseUrl('img/alerts/save-item.png')} alt="Save as scheduled search" width="500"/>
88
+
1. The **Save Item** popup appears.<br/><img src={useBaseUrl('img/alerts/save-item.png')} alt="Save as scheduled search" style={{border: '1px solid gray'}} width="500"/>
69
89
:::note
70
90
The name of your scheduled search will appear as the signal name in Cloud SIEM.
0 commit comments