Skip to content

Commit fe02275

Browse files
jpipkin1kimsauce
andauthored
DOCS-37 - New threat intel source (#5185)
* Rough draft * Remove RSS logo * Finish draft * Move release note to Cloud SIEM * Updates from meeting * Change name of default global feed to _sumo_global_feed_i471 * Updates per review by Nitin Pande * Minor updates * Updates from review * Update blog-cse/2025-04-01-application.md Co-authored-by: Kim (Sumo Logic) <[email protected]> * Updates from meeting * Fix broken link * Fix broken link * Add nodrop example * Adjustment to nodrop * New content for the mapping article * Update hasThreatMatch example * Update screenshots * Remove mapping article * Update from Kevin Burtt * Minor cleanup * Fix link in vendor switch article * Remove Beta from vendor switch article * Change release note date to April 3 2025 * Change date in release note * Add support link * Move release note to service section * Add Cloud SIEM release note for new source * Change release note date to April 8 2025 * Update screenshots * Fix typo --------- Co-authored-by: Kim (Sumo Logic) <[email protected]>
1 parent e5bc7c4 commit fe02275

23 files changed

+123
-144
lines changed

blog-cse/2025-04-08-application.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
---
2+
title: April 8, 2025 - Application Update
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- threat intel
6+
- security
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
### New Threat Intelligence Source
13+
14+
We’re excited to announce a new default source for Sumo Logic Threat Intelligence incorporating Indicators of Compromise (IoC) from Intel 471.
15+
16+
For more information, [see our release note](/release-notes-service/2025/04/08/security/) in the *Service* release notes section.
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
---
2+
title: New Threat Intelligence Source (Security)
3+
image: https://help.sumologic.com/img/sumo-square.png
4+
keywords:
5+
- security
6+
- threat intel
7+
hide_table_of_contents: true
8+
---
9+
10+
import useBaseUrl from '@docusaurus/useBaseUrl';
11+
12+
We’re excited to announce a new `SumoLogic_ThreatIntel` source incorporating Indicators of Compromise (IoC) from [Intel 471](https://intel471.com/). Analysts can use this out-of-the-box default source of threat indicators to aid in security analysis.
13+
14+
:::warning
15+
On April 30, 2025, we will discontinue our legacy `_sumo_global_feed_cs` source. If you have rules that explicitly point to this source, update them to use the new `SumoLogic_ThreatIntel` source.
16+
:::
17+
18+
[Learn more](/docs/security/threat-intelligence/about-threat-intelligence/#sumo-logic-threat-intelligence-sources).
19+
20+
<img src={useBaseUrl('img/security/threat-intelligence-tab-example.png')} alt="Threat Intelligence tab" style={{border: '1px solid gray'}} width="800" />

cid-redirects.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3312,6 +3312,7 @@
33123312
"/Manage/Security/Set-the-Password-Policy": "/docs/manage/security/set-password-policy",
33133313
"/Manage/Threat-Intel-Ingest": "/docs/security/threat-intelligence",
33143314
"/docs/platform-services/threat-intelligence-indicators": "/docs/security/threat-intelligence",
3315+
"/docs/security/threat-intelligence/threat-intelligence-mapping": "/docs/security/threat-intelligence",
33153316
"/Manage/Users-and-Roles": "/docs/manage/users-roles",
33163317
"/Manage/Users-and-Roles/Manage-Roles": "/docs/manage/users-roles",
33173318
"/Manage/Users-and-Roles/Manage-Roles/About-Roles": "/docs/manage/users-roles/roles",

docs/cse/rules/cse-rules-syntax.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -670,13 +670,10 @@ As a best practice, always include filtering to narrow your match to just the ty
670670
For example:
671671
* `hasThreatMatch([dstDevice_ip], confidence > 1 AND (type="ipv4-addr" OR type="ipv6-addr"))`
672672
* `hasThreatMatch([file_hash_imphash, file_hash_md5, file_hash_pehash, file_hash_ssdeep, file_hash_sha1, file_hash_sha256], confidence > 1 AND type="file:hashes")`
673-
* `hasThreatMatch([device_hostname, srcDevice_hostname, dstDevice_hostname, http_hostname, http_referrerHostname, bro_ssl_serverName, bro_ntlm_domainame, bro_ssl_serverName_rootDomain, dns_queryDomain, dns_replyDomain, fromUser_authDomain, http_referrerDomain, http_url_rootDomain, http_url_fqdn], confidence > 1 AND (type="domain-name" OR type="url"))`
674673
* `hasThreatMatch([http_url], confidence > 1 AND type="url")`
675-
* `hasThreatMatch([srcDevice_ip], confidence > 1 AND (type="ipv4-addr" OR type="ipv6-addr"))`
674+
* `hasThreatMatch([dstDevice_ip, srcDevice_ip], (confidence >1 AND confidence <50) AND (type='ipv4-addr' OR type='ipv6-addr'))`
676675

677676
Following are the standard indicator types you can filter on:
678-
* `domain-name`. Domain name.
679-
* `email-addr`. Email address.
680677
* `file:hashes`. File hash. (If you want to add the hash algorithm, enter `file:hashes.<HASH-TYPE>`. For example, `[file:hashes.MD5 = '5d41402abc4b2a76b9719d911017c592']` or `[file:hashes.'SHA-256' = '50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545c']`.)
681678
* `file`. File name.
682679
* `ipv4-addr`. IPv4 IP address.

docs/integrations/amazon-aws/waf.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ _sourceCategory=AWS/WAF {{client_ip}}
6060
| parse "\"httpMethod\":\"*\"," as httpMethod,"\"httpVersion\":\"*\"," as httpVersion,"\"uri\":\"*\"," as uri, "{\"clientIp\":\"*\",\"country\":\"*\"" as clientIp,country, "\"action\":\"*\"" as action, "\"matchingNonTerminatingRules\":[*]" as matchingNonTerminatingRules, "\"rateBasedRuleList\":[*]" as rateBasedRuleList, "\"ruleGroupList\":[*]" as ruleGroupList, "\"httpSourceId\":\"*\"" as httpSourceId, "\"httpSourceName\":\"*\"" as httpSourceName, "\"terminatingRuleType\":\"*\"" as terminatingRuleType, "\"terminatingRuleId\":\"*\"" as terminatingRuleId, "\"webaclId\":\"*\"" as webaclId nodrop
6161
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=clientip
6262
```
63-
<!-- Replace code example with this after `sumo://threat/cs` is replaced by `threatlookup`:
63+
<!-- Replace code example with this after `sumo://threat/i471` is replaced by `threatlookup`:
6464
```sql title="Client IP Threat Info"
6565
_sourceCategory=AWS/WAF {{client_ip}}
6666
| parse "\"httpMethod\":\"*\"," as httpMethod,"\"httpVersion\":\"*\"," as httpVersion,"\"uri\":\"*\"," as uri, "{\"clientIp\":\"*\",\"country\":\"*\"" as clientIp,country, "\"action\":\"*\"" as action, "\"matchingNonTerminatingRules\":[*]" as matchingNonTerminatingRules, "\"rateBasedRuleList\":[*]" as rateBasedRuleList, "\"ruleGroupList\":[*]" as ruleGroupList, "\"httpSourceId\":\"*\"" as httpSourceId, "\"httpSourceName\":\"*\"" as httpSourceName, "\"terminatingRuleType\":\"*\"" as terminatingRuleType, "\"terminatingRuleId\":\"*\"" as terminatingRuleId, "\"webaclId\":\"*\"" as webaclId nodrop

docs/integrations/security-threat-detection/threat-intel-quick-analysis.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,10 @@ import AppInstall from '../../reuse/apps/app-install.md';
2727

2828
## Threat Intel optimization
2929

30-
The Threat Intel Quick Analysis App provides baseline queries. You can further optimize and enhance these queries for the log and events types being scanned for threats. Use the following guidelines to customize your Threat Intel queries:
30+
The Threat Intel Quick Analysis App provides baseline queries. You can further optimize and enhance these queries for the log and events types being scanned for threats. To see the queries, open a [dashboard in the app](#viewing-threat-intel-quick-analysis-dashboards), click the three-dot kebab in the upper-right corner of the dashboard panel, and select **Open in Log Search**.
3131

32-
Filter out unwanted logs before you use lookup operator
32+
Use the following guidelines to customize your Threat Intel queries:
33+
* Filter out unwanted logs before you use lookup operator
3334
* Use keywords
3435
* Use the where operator
3536
* Use general search optimization rules
@@ -43,7 +44,7 @@ _sourceCategory=cylance "IP Address"
4344
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=ip_address
4445
```
4546

46-
<!-- Replace section content with this after `sumo://threat/cs` is replaced by `threatlookup`:
47+
<!-- Replace section content with this after `sumo://threat/i471` is replaced by `threatlookup`:
4748
4849
The app provides baseline queries that utilize the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/) to look for threat intelligence data. To see the queries, open a [dashboard in the app](#viewing-threat-intel-quick-analysis-dashboards), click the three-dot kebab in the upper-right corner of the dashboard panel, and select **Open in Log Search**.
4950
@@ -98,15 +99,15 @@ Use [Field Extraction Rules (FER)](/docs/manage/field-extractions/create-field-e
9899
1. Customize your query so you can use parsed fields from FER with the lookup operator, where src_ip is the parsed field from FER (see step # 1). For example:
99100
```
100101
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=src_ip
101-
| json field=raw "labels[*].name" as label_name
102+
| json field=raw "labels[*].name" as label_name nodrop
102103
| replace(label_name, "\\/","->") as label_name
103104
| replace(label_name, "\""," ") as label_name
104105
| where type="ip_address" and !isNull(malicious_confidence)
105106
| if (isEmpty(actor), "Unassigned", actor) as Actor
106107
| count as threat_count by src_ip, malicious_confidence, Actor, _source, label_name
107108
| sort by threat_count
108109
```
109-
<!-- Replace the preceding step with the following after `sumo://threat/cs` is replaced by `threatlookup`:
110+
<!-- Replace the preceding step with the following after `sumo://threat/i471` is replaced by `threatlookup`:
110111
1. Customize your query so you can use parsed fields from the Field Extraction Rule with the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/), where `src_ip` is the parsed field from the FER. For example:
111112
```
112113
| threatlookup singleIndicator src_ip
@@ -125,15 +126,15 @@ Use scheduled views with the threat lookup operator to find threats. Scheduled v
125126
1. Create a scheduled view. For example, for Cylance, create a scheduled view, **cylance_threat**:
126127
```
127128
_sourceCategory=cylance | lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=src_ip
128-
| json field=raw "labels[*].name" as label_name
129+
| json field=raw "labels[*].name" as label_name nodrop
129130
| replace(label_name, "\\/","->") as label_name
130131
| replace(label_name, "\""," ") as label_name
131132
| where type="ip_address" and !isNull(malicious_confidence)
132133
| if (isEmpty(actor), "Unassigned", actor) as Actor
133134
| lookup latitude, longitude, country_code, country_name, region, city, postal_code, area_code, metro_code from geo://default on ip = src_ip
134135
| count as threat_count by src_ip, malicious_confidence, Actor, _source, label_name, city, country_name, raw
135136
```
136-
<!-- Replace the preceding code with the following after `sumo://threat/cs` is replaced by `threatlookup`:
137+
<!-- Replace the preceding code with the following after `sumo://threat/i471` is replaced by `threatlookup`:
137138
```
138139
_sourceCategory=cylance
139140
| threatlookup singleIndicator src_ip
@@ -150,7 +151,7 @@ Use scheduled views with the threat lookup operator to find threats. Scheduled v
150151
| count by src_ip
151152
```
152153

153-
<!-- Hide this FAQ section until after `sumo://threat/cs` is replaced by `threatlookup`:
154+
<!-- Hide this FAQ section until after `sumo://threat/i471` is replaced by `threatlookup`:
154155

155156
## Threat Intel FAQ
156157

docs/observability/aws/integrations/aws-dynamodb.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,15 +61,15 @@ _sourceCategory=Labs/AWS/DynamoDB account=* namespace=* "\"eventSource\":\"dynam
6161
| where ip_address != "0.0.0.0" and ip_address != "127.0.0.1"
6262
| count as ip_count by ip_address
6363
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=ip_address
64-
| json field=raw "labels[*].name" as label_name
64+
| json field=raw "labels[*].name" as label_name nodrop
6565
| replace(label_name, "\\/","->") as label_name
6666
| replace(label_name, "\""," ") as label_name
6767
| where type="ip_address" and !isNull(malicious_confidence)
6868
| if (isEmpty(actor), "Unassigned", actor) as Actor
6969
| sum (ip_count) as threat_count
7070
```
7171
72-
<!-- Replace code example with this after `sumo://threat/cs` is replaced by `threatlookup`:
72+
<!-- Replace code example with this after `sumo://threat/i471` is replaced by `threatlookup`:
7373
```sql title="All IP Threat Count"
7474
_sourceCategory=Labs/AWS/DynamoDB account=* namespace=* "\"eventSource\":\"dynamodb.amazonaws.com\""
7575
| json "eventName", "awsRegion", "requestParameters.tableName", "sourceIPAddress", "userIdentity.userName" as event_name, Region, entity, ip_address, user

docs/search/search-query-language/search-operators/threatip.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: threatip Search Operator
44
sidebar_label: threatip
55
---
66

7-
The `threatip` operator correlates data in the `_sumo_global_feed_cs` [threat intelligence](/docs/security/threat-intelligence/about-threat-intelligence/) source based on IP addresses from your log data. This provides security analytics that helps you to detect threats in your environment, while also protecting against sophisticated and persistent cyber-attacks.
7+
The `threatip` operator correlates data in the [Sumo Logic threat intelligence sources](/docs/security/threat-intelligence/about-threat-intelligence/#sumo-logic-threat-intelligence-sources) based on IP addresses from your log data. This provides security analytics that helps you to detect threats in your environment, while also protecting against sophisticated and persistent cyber-attacks.
88

99
<!--
1010
You can also use the [`threatlookup`](/docs/search/search-query-language/search-operators/threatlookup/) search operator to search threat intelligence indicators.

docs/search/search-query-language/search-operators/threatlookup.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ _sourceCategory=weblogs
136136
| compose src_ip]
137137
```
138138

139-
<!-- Add this after sumo://threat/cs is replaced by threatlookup":
139+
<!-- Add this after sumo://threat/i471 is replaced by threatlookup":
140140
141141
### Threatlookup queries in dashboards
142142
@@ -217,6 +217,6 @@ cat sumo://threat-intel | formatDate(toLong(_threatlookup.valid_until), "yyyy-MM
217217
```
218218
219219
:::note
220-
You cannot use the cat search operator with the `_sumo_global_feed_cs` source.
220+
You cannot use the cat search operator with the `SumoLogic_ThreatIntel` source.
221221
:::
222222
-->

docs/search/search-query-language/search-operators/tolowercase-touppercase.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ which provides results like:
5555
| lookup raw from sumo://threat/cs on threat = hash{code}
5656
```
5757

58-
<!-- Replace code example with this after `sumo://threat/cs` is replaced by `threatlookup`:
58+
<!-- Replace code example with this after `sumo://threat/i471` is replaced by `threatlookup`:
5959
```sql
6060
*
6161
| limit 1

0 commit comments

Comments
 (0)