|
1 | 1 | --- |
2 | 2 | id: create-custom-threat-intel-source |
3 | | -title: Create a Custom Threat Intelligence Source |
4 | | -sidebar_label: Create a Custom Threat Intelligence Source |
5 | | -description: Learn how to create and manage custom threat sources. |
| 3 | +title: Custom Threat Intelligence Sources |
| 4 | +sidebar_label: Custom Threat Intelligence Sources |
| 5 | +description: Learn how to manage custom threat intelligence sources in Cloud SIEM. |
6 | 6 | --- |
7 | 7 |
|
8 | 8 | import useBaseUrl from '@docusaurus/useBaseUrl'; |
9 | 9 |
|
10 | | -<!-- For threat intel. Put this back once we support cat with the threatlookup search operator: |
11 | | -
|
12 | 10 | :::info |
13 | | -This article describes functionality in Cloud SIEM that will be deprecated at a future time. **You can no longer add custom intelligence sources in Cloud SIEM**. To create new sources, use the Sumo Logic threat intelligence indicators framework. For more information, see [Sumo Logic Threat Intelligence](/docs/security/threat-intelligence/). |
14 | | -::: |
15 | | ---> |
16 | | - |
17 | | -This topic has information about setting up a *custom threat intelligence source* in Cloud SIEM, which is a threat intelligence list that you can populate manually, as opposed to using an automatic feed. |
18 | | - |
19 | | -You can set up and populate custom threat intelligence sources interactively from the Cloud SIEM UI, by uploading a .csv file, or using Cloud SIEM APIs. You can populate the sources with IP addresses, domains, URLs, email addresses, and file hashes. |
20 | | - |
21 | | -:::note |
22 | | -You can also use the Sumo Logic threat intelligence framework to add sources. See [Sumo Logic Threat Intelligence](/docs/security/threat-intelligence/). |
| 11 | +**You can no longer add custom threat intelligence sources in Cloud SIEM**. To create new sources, use the Sumo Logic threat intelligence framework. For more information, see [About Sumo Logic Threat Intelligence](/docs/security/threat-intelligence/about-threat-intelligence). [Contact Support](https://support.sumologic.com/support/s/) if you still need to create custom sources in Cloud SIEM. |
23 | 12 | ::: |
24 | 13 |
|
25 | | -## How Cloud SIEM uses indicators |
26 | | - |
27 | | -When Cloud SIEM encounters an indicator from your threat source in an incoming record it adds relevant information to the record. Because threat intelligence information is persisted within records, you can reference it downstream in both rules and search. The built-in rules that come with Cloud SIEM automatically create a signal for records that have been enriched in this way. |
28 | | - |
29 | | -Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a Rule Tuning Expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Threat Intelligence](/docs/cse/rules/about-cse-rules/#threat-intelligence) in the *About Cloud SIEM Rules* topic. |
30 | | - |
31 | | -## Create a threat intelligence source from Cloud SIEM UI |
32 | | - |
33 | | -1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Threat Intelligence**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**. |
34 | | -1. Click **Add Source** on the **Threat Intelligence** page. |
35 | | -1. In the **Custom** box click **Create**. |
36 | | -1. On the **Add New Source** popup, enter a name, and if desired, a description for the source. |
37 | | -1. Click **Add Custom Source**. |
38 | | - |
39 | | -Your new source should now appear on the **Threat Intelligence** page. |
40 | | - |
41 | | -## Add threat indicators |
| 14 | +Prior to the introduction of [Sumo Logic Threat Intelligence](/docs/security/threat-intelligence), administrators created their own custom threat intelligence sources, which they manually populated as opposed to using an automatic feed. This article has information about managing these custom threat intelligence sources in Cloud SIEM. |
42 | 15 |
|
43 | | -### Enter indicators manually |
| 16 | +Previously, administrators created custom threat intelligence sources interactively from the Cloud SIEM UI by uploading a .csv file, or using Cloud SIEM APIs. They populated the sources with IP addresses, domains, URLs, email addresses, and file hashes. |
44 | 17 |
|
45 | | -1. On the **Threat Intelligence** page, click the name of the source you want to update. |
46 | | -1. The **Details** page lists any indicators that have previously been added and have not expired. Click **Add Indicator**. |
47 | | -1. On the **New Threat Intelligence Indicator** popup. |
48 | | - 1. **Value**. Enter one of the following: |
49 | | - * Domain (valid domain name without protocol or path) |
50 | | - * Email (valid email address) |
51 | | - * File hash (hexadecimal string of 32, 40, 64, or 128 characters) |
52 | | - * IP (valid IPV4 or IPv6 address) |
53 | | - * URL (valid, complete URL) |
54 | | - :::note |
55 | | - For the fields the value will be compared to, see [Target fields for threat indicators](#target-fields-for-threat-indicators) below. |
56 | | - ::: |
57 | | - 1. **Description**. (Optional) |
58 | | - 1. **Expiration**. (Optional) If desired, you can specify an |
59 | | - expiration date and time for the indicator. When that time is |
60 | | - reached, the indicator will be removed from the source. When you |
61 | | - click in the field, you’ll be prompted to select a date and |
62 | | - time. |
63 | | - 1. Click **Add**. |
| 18 | +## View threat intelligence sources in Cloud SIEM |
64 | 19 |
|
65 | | -### Upload a file of indicators |
| 20 | +[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Threat Intelligence**. |
66 | 21 |
|
67 | | -If you have a large number of indicators to add to your source, you can save time by creating a .csv file and uploading it to Cloud SIEM. |
| 22 | +[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**. |
68 | 23 |
|
69 | | -#### Create a CSV file |
70 | | - |
71 | | -The .csv file can contain up to four columns, which are described below. |
72 | | - |
73 | | -| Column | Description | |
74 | | -| :-- | :-- | |
75 | | -| value | Required. Must be one of the following: <br/>- Domain (valid domain name without protocol or path)<br/>- Email (valid email address)<br/>- File hash (hexadecimal string of 32, 40, 64, or 128 characters)<br/>- IP (valid IPV4 or IPv6 address)<br/>- URL (valid, complete URL) <br/>For the fields the value will be compared to, see [Target fields for threat indicators](#target-fields-for-threat-indicators) below. | |
76 | | -| description | Optional. | |
77 | | -| expires| Optional. The data and time when you want the indicator to be removed, in any ISO date format. | |
78 | | -| active | Required. Specifies whether the indicator actively looks for threat intelligence in records. Valid values are `true` or `false`. | |
79 | | - |
80 | | -**Example .csv file** |
| 24 | +## Search indicators |
81 | 25 |
|
82 | | -``` |
83 | | -value,description,expires,active |
84 | | -22.333.22.252,Tante Intel,2022-06-01 01:00 PM,true |
85 | | -``` |
| 26 | +To search threat indicators, click the **Search All Indicators** button at the top of the **Threat Intelligence** page. |
86 | 27 |
|
87 | | -#### Upload the file |
| 28 | +You can search using the same functionality available for other Cloud SIEM searches, including regular expressions. For more information, see [Filter and Search Cloud SIEM List Pages](/docs/cse/administration/filter-search). |
88 | 29 |
|
89 | | -1. On the **Threat Intelligence** page, click the name of the target custom source. |
90 | | -1. Click **Import Indicators**. |
91 | | -1. On the import popup: |
92 | | - 1. Drag your file onto the import popup, or click to navigate to the file, and then click Import. |
93 | | - 1. Optionally, you can enter an expiration for the indicators on the list. If you do, it will override any expirations that are defined in the file. Enter the expiration in any ISO date format. For example: `2022-12-31` |
| 30 | +## How Cloud SIEM uses indicators |
94 | 31 |
|
95 | | -### Manage sources and indicators using APIs |
| 32 | +When Cloud SIEM encounters an indicator from a threat source in an incoming record, it adds relevant information to the record. Because threat intelligence information is persisted within records, you can reference it downstream in both rules and search. The built-in rules that come with Cloud SIEM automatically create a signal for records that have been enriched in this way. |
96 | 33 |
|
97 | | -You can use Cloud SIEM threat intelligence APIs to create and manage indicators and custom threat sources. For information about Cloud SIEM APIs and how to access the API documentation, see [Cloud SIEM APIs](/docs/cse/administration/cse-apis/). |
| 34 | +Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a rule tuning expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Threat Intelligence Indicators in Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/). |
98 | 35 |
|
99 | | -## Target fields for threat indicators |
| 36 | +### Target fields for threat indicators |
100 | 37 |
|
101 | 38 | Following are the fields that threat indicators are compared to. |
102 | 39 |
|
@@ -139,9 +76,3 @@ Following are the fields that threat indicators are compared to. |
139 | 76 | * srcDevice_natIp |
140 | 77 | * URL: |
141 | 78 | * http_url |
142 | | - |
143 | | -## Search indicators |
144 | | - |
145 | | -To search threat indicators, click the **Search All Indicators** button at the top of the **Threat Intelligence** page. |
146 | | - |
147 | | -You can search using the same functionality available for other Cloud SIEM searches, including regular expressions. For more information, see [Filter and Search Cloud SIEM List Pages](/docs/cse/administration/filter-search). |
0 commit comments