You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Rough draft
* Remove RSS logo
* Finish draft
* Move release note to Cloud SIEM
* Updates from meeting
* Change name of default global feed to _sumo_global_feed_i471
* Updates per review by Nitin Pande
* Minor updates
* Updates from review
* Update blog-cse/2025-04-01-application.md
Co-authored-by: Kim (Sumo Logic) <[email protected]>
* Updates from meeting
* Fix broken link
* Fix broken link
* Add nodrop example
* Adjustment to nodrop
* New content for the mapping article
* Update hasThreatMatch example
* Update screenshots
* Remove mapping article
* Update from Kevin Burtt
* Minor cleanup
* Fix link in vendor switch article
* Remove Beta from vendor switch article
* Change release note date to April 3 2025
* Change date in release note
* Add support link
* Move release note to service section
* Add Cloud SIEM release note for new source
* Change release note date to April 8 2025
* Update screenshots
* Fix typo
---------
Co-authored-by: Kim (Sumo Logic) <[email protected]>
We’re excited to announce a new `SumoLogic_ThreatIntel` source incorporating Indicators of Compromise (IoC) from [Intel 471](https://intel471.com/). Analysts can use this out-of-the-box default source of threat indicators to aid in security analysis.
13
+
14
+
:::warning
15
+
On April 30, 2025, we will discontinue our legacy `_sumo_global_feed_cs` source. If you have rules that explicitly point to this source, update them to use the new `SumoLogic_ThreatIntel` source.
*`hasThreatMatch([http_url], confidence > 1 AND type="url")`
675
-
*`hasThreatMatch([srcDevice_ip], confidence >1 AND (type="ipv4-addr" OR type="ipv6-addr"))`
674
+
*`hasThreatMatch([dstDevice_ip, srcDevice_ip], (confidence >1 AND confidence <50) AND (type='ipv4-addr' OR type='ipv6-addr'))`
676
675
677
676
Following are the standard indicator types you can filter on:
678
-
*`domain-name`. Domain name.
679
-
*`email-addr`. Email address.
680
677
*`file:hashes`. File hash. (If you want to add the hash algorithm, enter `file:hashes.<HASH-TYPE>`. For example, `[file:hashes.MD5 = '5d41402abc4b2a76b9719d911017c592']` or `[file:hashes.'SHA-256' = '50d858e0985ecc7f60418aaf0cc5ab587f42c2570a884095a9e8ccacd0f6545c']`.)
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=clientip
62
62
```
63
-
<!-- Replace code example with this after `sumo://threat/cs` is replaced by `threatlookup`:
63
+
<!-- Replace code example with this after `sumo://threat/i471` is replaced by `threatlookup`:
64
64
```sql title="Client IP Threat Info"
65
65
_sourceCategory=AWS/WAF {{client_ip}}
66
66
| parse "\"httpMethod\":\"*\"," as httpMethod,"\"httpVersion\":\"*\"," as httpVersion,"\"uri\":\"*\"," as uri, "{\"clientIp\":\"*\",\"country\":\"*\"" as clientIp,country, "\"action\":\"*\"" as action, "\"matchingNonTerminatingRules\":[*]" as matchingNonTerminatingRules, "\"rateBasedRuleList\":[*]" as rateBasedRuleList, "\"ruleGroupList\":[*]" as ruleGroupList, "\"httpSourceId\":\"*\"" as httpSourceId, "\"httpSourceName\":\"*\"" as httpSourceName, "\"terminatingRuleType\":\"*\"" as terminatingRuleType, "\"terminatingRuleId\":\"*\"" as terminatingRuleId, "\"webaclId\":\"*\"" as webaclId nodrop
Copy file name to clipboardExpand all lines: docs/integrations/security-threat-detection/threat-intel-quick-analysis.md
+9-8Lines changed: 9 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,9 +27,10 @@ import AppInstall from '../../reuse/apps/app-install.md';
27
27
28
28
## Threat Intel optimization
29
29
30
-
The Threat Intel Quick Analysis App provides baseline queries. You can further optimize and enhance these queries for the log and events types being scanned for threats. Use the following guidelines to customize your Threat Intel queries:
30
+
The Threat Intel Quick Analysis App provides baseline queries. You can further optimize and enhance these queries for the log and events types being scanned for threats. To see the queries, open a [dashboard in the app](#viewing-threat-intel-quick-analysis-dashboards), click the three-dot kebab in the upper-right corner of the dashboard panel, and select **Open in Log Search**.
31
31
32
-
Filter out unwanted logs before you use lookup operator
32
+
Use the following guidelines to customize your Threat Intel queries:
33
+
* Filter out unwanted logs before you use lookup operator
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=ip_address
44
45
```
45
46
46
-
<!-- Replace section content with this after `sumo://threat/cs` is replaced by `threatlookup`:
47
+
<!-- Replace section content with this after `sumo://threat/i471` is replaced by `threatlookup`:
47
48
48
49
The app provides baseline queries that utilize the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/) to look for threat intelligence data. To see the queries, open a [dashboard in the app](#viewing-threat-intel-quick-analysis-dashboards), click the three-dot kebab in the upper-right corner of the dashboard panel, and select **Open in Log Search**.
49
50
@@ -98,15 +99,15 @@ Use [Field Extraction Rules (FER)](/docs/manage/field-extractions/create-field-e
98
99
1. Customize your query so you can use parsed fields from FER with the lookup operator, where src_ip is the parsed field from FER (see step # 1). For example:
99
100
```
100
101
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=src_ip
101
-
| json field=raw "labels[*].name" as label_name
102
+
| json field=raw "labels[*].name" as label_name nodrop
102
103
| replace(label_name, "\\/","->") as label_name
103
104
| replace(label_name, "\""," ") as label_name
104
105
| where type="ip_address" and !isNull(malicious_confidence)
105
106
| if (isEmpty(actor), "Unassigned", actor) as Actor
106
107
| count as threat_count by src_ip, malicious_confidence, Actor, _source, label_name
107
108
| sort by threat_count
108
109
```
109
-
<!-- Replace the preceding step with the following after `sumo://threat/cs` is replaced by `threatlookup`:
110
+
<!-- Replace the preceding step with the following after `sumo://threat/i471` is replaced by `threatlookup`:
110
111
1. Customize your query so you can use parsed fields from the Field Extraction Rule with the [`threatlookup` search operator](/docs/search/search-query-language/search-operators/threatlookup/), where `src_ip` is the parsed field from the FER. For example:
111
112
```
112
113
| threatlookup singleIndicator src_ip
@@ -125,15 +126,15 @@ Use scheduled views with the threat lookup operator to find threats. Scheduled v
125
126
1. Create a scheduled view. For example, for Cylance, create a scheduled view, **cylance_threat**:
126
127
```
127
128
_sourceCategory=cylance | lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=src_ip
128
-
| json field=raw "labels[*].name" as label_name
129
+
| json field=raw "labels[*].name" as label_name nodrop
129
130
| replace(label_name, "\\/","->") as label_name
130
131
| replace(label_name, "\""," ") as label_name
131
132
| where type="ip_address" and !isNull(malicious_confidence)
132
133
| if (isEmpty(actor), "Unassigned", actor) as Actor
133
134
| lookup latitude, longitude, country_code, country_name, region, city, postal_code, area_code, metro_code from geo://default on ip = src_ip
134
135
| count as threat_count by src_ip, malicious_confidence, Actor, _source, label_name, city, country_name, raw
135
136
```
136
-
<!-- Replace the preceding code with the following after `sumo://threat/cs` is replaced by `threatlookup`:
137
+
<!-- Replace the preceding code with the following after `sumo://threat/i471` is replaced by `threatlookup`:
137
138
```
138
139
_sourceCategory=cylance
139
140
| threatlookup singleIndicator src_ip
@@ -150,7 +151,7 @@ Use scheduled views with the threat lookup operator to find threats. Scheduled v
150
151
| count by src_ip
151
152
```
152
153
153
-
<!-- Hide this FAQ section until after `sumo://threat/cs` is replaced by `threatlookup`:
154
+
<!-- Hide this FAQ section until after `sumo://threat/i471` is replaced by `threatlookup`:
Copy file name to clipboardExpand all lines: docs/search/search-query-language/search-operators/threatip.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ title: threatip Search Operator
4
4
sidebar_label: threatip
5
5
---
6
6
7
-
The `threatip` operator correlates data in the `_sumo_global_feed_cs`[threat intelligence](/docs/security/threat-intelligence/about-threat-intelligence/) source based on IP addresses from your log data. This provides security analytics that helps you to detect threats in your environment, while also protecting against sophisticated and persistent cyber-attacks.
7
+
The `threatip` operator correlates data in the [Sumo Logic threat intelligence sources](/docs/security/threat-intelligence/about-threat-intelligence/#sumo-logic-threat-intelligence-sources) based on IP addresses from your log data. This provides security analytics that helps you to detect threats in your environment, while also protecting against sophisticated and persistent cyber-attacks.
8
8
9
9
<!--
10
10
You can also use the [`threatlookup`](/docs/search/search-query-language/search-operators/threatlookup/) search operator to search threat intelligence indicators.
0 commit comments