Skip to content

Commit feeffd8

Browse files
authored
DOCS-736 - Legacy Cloud SIEM threat intel (#5141)
* DOCS-736 - Legacy Cloud SIEM threat intel * Updates from Oren Shevach review * Add note about STIX upload format
1 parent 90ec74f commit feeffd8

File tree

5 files changed

+30
-91
lines changed

5 files changed

+30
-91
lines changed
Lines changed: 16 additions & 85 deletions
Original file line numberDiff line numberDiff line change
@@ -1,102 +1,39 @@
11
---
22
id: create-custom-threat-intel-source
3-
title: Create a Custom Threat Intelligence Source
4-
sidebar_label: Create a Custom Threat Intelligence Source
5-
description: Learn how to create and manage custom threat sources.
3+
title: Custom Threat Intelligence Sources
4+
sidebar_label: Custom Threat Intelligence Sources
5+
description: Learn how to manage custom threat intelligence sources in Cloud SIEM.
66
---
77

88
import useBaseUrl from '@docusaurus/useBaseUrl';
99

10-
<!-- For threat intel. Put this back once we support cat with the threatlookup search operator:
11-
1210
:::info
13-
This article describes functionality in Cloud SIEM that will be deprecated at a future time. **You can no longer add custom intelligence sources in Cloud SIEM**. To create new sources, use the Sumo Logic threat intelligence indicators framework. For more information, see [Sumo Logic Threat Intelligence](/docs/security/threat-intelligence/).
14-
:::
15-
-->
16-
17-
This topic has information about setting up a *custom threat intelligence source* in Cloud SIEM, which is a threat intelligence list that you can populate manually, as opposed to using an automatic feed. 
18-
19-
You can set up and populate custom threat intelligence sources interactively from the Cloud SIEM UI, by uploading a .csv file, or using Cloud SIEM APIs. You can populate the sources with IP addresses, domains, URLs, email addresses, and file hashes.
20-
21-
:::note
22-
You can also use the Sumo Logic threat intelligence framework to add sources. See [Sumo Logic Threat Intelligence](/docs/security/threat-intelligence/).
11+
**You can no longer add custom threat intelligence sources in Cloud SIEM**. To create new sources, use the Sumo Logic threat intelligence framework. For more information, see [About Sumo Logic Threat Intelligence](/docs/security/threat-intelligence/about-threat-intelligence). [Contact Support](https://support.sumologic.com/support/s/) if you still need to create custom sources in Cloud SIEM.
2312
:::
2413

25-
## How Cloud SIEM uses indicators
26-
27-
When Cloud SIEM encounters an indicator from your threat source in an incoming record it adds relevant information to the record. Because threat intelligence information is persisted within records, you can reference it downstream in both rules and search. The built-in rules that come with Cloud SIEM automatically create a signal for records that have been enriched in this way.
28-
29-
Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a Rule Tuning Expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Threat Intelligence](/docs/cse/rules/about-cse-rules/#threat-intelligence) in the *About Cloud SIEM Rules* topic.
30-
31-
## Create a threat intelligence source from Cloud SIEM UI
32-
33-
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Threat Intelligence**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**.
34-
1. Click **Add Source** on the **Threat Intelligence** page.
35-
1. In the **Custom** box click **Create**.
36-
1. On the **Add New Source** popup, enter a name, and if desired, a description for the source.
37-
1. Click **Add Custom Source**.
38-
39-
Your new source should now appear on the **Threat Intelligence** page.
40-
41-
## Add threat indicators
14+
Prior to the introduction of [Sumo Logic Threat Intelligence](/docs/security/threat-intelligence), administrators created their own custom threat intelligence sources, which they manually populated as opposed to using an automatic feed. This article has information about managing these custom threat intelligence sources in Cloud SIEM.
4215

43-
### Enter indicators manually
16+
Previously, administrators created custom threat intelligence sources interactively from the Cloud SIEM UI by uploading a .csv file, or using Cloud SIEM APIs. They populated the sources with IP addresses, domains, URLs, email addresses, and file hashes.
4417

45-
1. On the **Threat Intelligence** page, click the name of the source you want to update.
46-
1. The **Details** page lists any indicators that have previously been added and have not expired. Click **Add Indicator**.
47-
1. On the **New Threat Intelligence Indicator** popup.
48-
1. **Value**. Enter one of the following:
49-
* Domain (valid domain name without protocol or path)
50-
* Email (valid email address)
51-
* File hash (hexadecimal string of 32, 40, 64, or 128 characters)
52-
* IP (valid IPV4 or IPv6 address)  
53-
* URL (valid, complete URL)
54-
:::note
55-
For the fields the value will be compared to, see [Target fields for threat indicators](#target-fields-for-threat-indicators) below.
56-
:::
57-
1. **Description**. (Optional)
58-
1. **Expiration**. (Optional) If desired, you can specify an
59-
expiration date and time for the indicator. When that time is
60-
reached, the indicator will be removed from the source. When you
61-
click in the field, you’ll be prompted to select a date and
62-
time.
63-
1. Click **Add**.
18+
## View threat intelligence sources in Cloud SIEM
6419

65-
### Upload a file of indicators 
20+
[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Threat Intelligence**.
6621

67-
If you have a large number of indicators to add to your source, you can save time by creating a .csv file and uploading it to Cloud SIEM.
22+
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**.
6823

69-
#### Create a CSV file
70-
71-
The .csv file can contain up to four columns, which are described below. 
72-
73-
| Column | Description |
74-
| :-- | :-- |
75-
| value | Required. Must be one of the following: <br/>- Domain (valid domain name without protocol or path)<br/>- Email (valid email address)<br/>- File hash (hexadecimal string of 32, 40, 64, or 128 characters)<br/>- IP (valid IPV4 or IPv6 address)<br/>- URL (valid, complete URL) <br/>For the fields the value will be compared to, see [Target fields for threat indicators](#target-fields-for-threat-indicators) below. |
76-
| description | Optional. |
77-
| expires| Optional. The data and time when you want the indicator to be removed, in any ISO date format. |
78-
| active | Required. Specifies whether the indicator actively looks for threat intelligence in records. Valid values are `true` or `false`. |
79-
80-
**Example .csv file**
24+
## Search indicators
8125

82-
```
83-
value,description,expires,active
84-
22.333.22.252,Tante Intel,2022-06-01 01:00 PM,true
85-
```
26+
To search threat indicators, click the **Search All Indicators** button at the top of the **Threat Intelligence** page.
8627

87-
#### Upload the file
28+
You can search using the same functionality available for other Cloud SIEM searches, including regular expressions. For more information, see [Filter and Search Cloud SIEM List Pages](/docs/cse/administration/filter-search).
8829

89-
1. On the **Threat Intelligence** page, click the name of the target custom source.
90-
1. Click **Import Indicators**.
91-
1. On the import popup:
92-
1. Drag your file onto the import popup, or click to navigate to the file, and then click Import.
93-
1. Optionally, you can enter an expiration for the indicators on the list. If you do, it will override any expirations that are defined in the file. Enter the expiration in any ISO date format. For example: `2022-12-31`
30+
## How Cloud SIEM uses indicators
9431

95-
### Manage sources and indicators using APIs
32+
When Cloud SIEM encounters an indicator from a threat source in an incoming record, it adds relevant information to the record. Because threat intelligence information is persisted within records, you can reference it downstream in both rules and search. The built-in rules that come with Cloud SIEM automatically create a signal for records that have been enriched in this way.
9633

97-
You can use Cloud SIEM threat intelligence APIs to create and manage indicators and custom threat sources. For information about Cloud SIEM APIs and how to access the API documentation, see [Cloud SIEM APIs](/docs/cse/administration/cse-apis/).
34+
Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a rule tuning expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Threat Intelligence Indicators in Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/).
9835

99-
## Target fields for threat indicators
36+
### Target fields for threat indicators
10037

10138
Following are the fields that threat indicators are compared to.
10239

@@ -139,9 +76,3 @@ Following are the fields that threat indicators are compared to.
13976
* srcDevice_natIp
14077
* URL:
14178
* http_url
142-
143-
## Search indicators
144-
145-
To search threat indicators, click the **Search All Indicators** button at the top of the **Threat Intelligence** page.
146-
147-
You can search using the same functionality available for other Cloud SIEM searches, including regular expressions. For more information, see [Filter and Search Cloud SIEM List Pages](/docs/cse/administration/filter-search).

docs/cse/administration/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,8 @@ Learn about onboarding tasks and best practices for Cloud SIEM administrators. I
3030
</div>
3131
<div className="box smallbox card">
3232
<div className="container">
33-
<a href="/docs/cse/administration/create-custom-threat-intel-source"><img src={useBaseUrl('img/icons/security/world-class-security.png')} alt="Shield with a globe icon" width="40"/><h4>Create a Custom Threat Intelligence Source</h4></a>
34-
<p>Learn how to create and manage Custom Threat Sources.</p>
33+
<a href="/docs/cse/administration/create-custom-threat-intel-source"><img src={useBaseUrl('img/icons/security/world-class-security.png')} alt="Shield with a globe icon" width="40"/><h4>Custom Threat Intelligence Sources</h4></a>
34+
<p>Learn how manage custom threat intelligence sources.</p>
3535
</div>
3636
</div>
3737
<div className="box smallbox card">

docs/cse/rules/cse-rules-syntax.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -626,7 +626,7 @@ The following expression returns "10.10.1.0":
626626

627627
### hasThreatMatch
628628

629-
The `hasThreatMatch` Cloud SIEM rules function matches incoming records in Cloud SIEM to [threat intelligence indicators](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/#hasthreatmatch-cloud-siem-rules-language-function). It can also match values in [Custom threat intelligence sources in Cloud SIEM](/docs/cse/administration/create-custom-threat-intel-source/).
629+
The `hasThreatMatch` Cloud SIEM rules function matches incoming records in Cloud SIEM to [threat intelligence indicators](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/#hasthreatmatch-cloud-siem-rules-language-function). It can also match values in [custom threat intelligence sources in Cloud SIEM](/docs/cse/administration/create-custom-threat-intel-source/).
630630

631631
**Syntax**
632632

docs/security/threat-intelligence/threat-indicators-in-cloud-siem.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,11 @@ description: Learn how to use threat intelligence indicators in Cloud SIEM.
77

88
import useBaseUrl from '@docusaurus/useBaseUrl';
99

10-
Threat intelligence indicators can be used in Cloud SIEM to find possible threat activity.
10+
Threat intelligence indicators can be used in Cloud SIEM to find possible threat activity.
11+
12+
:::note
13+
Previously, Cloud SIEM administrators could add [custom threat intelligence sources](/docs/cse/administration/create-custom-threat-intel-source/) in Cloud SIEM. **You can no longer add custom threat intelligence sources in Cloud SIEM**. To add new sources, [ingest threat intelligence indicators](/docs/security/threat-intelligence/about-threat-intelligence/#ingest-threat-intelligence-indicators) using the Sumo Logic threat intelligence framework. [Contact Support](https://support.sumologic.com/support/s/) if you still need to create custom sources in Cloud SIEM.
14+
:::
1115

1216
## hasThreatMatch Cloud SIEM rules language function
1317

docs/security/threat-intelligence/upload-formats.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,11 +7,11 @@ description: Learn how to format upload files containing threat intelligence ind
77

88
import useBaseUrl from '@docusaurus/useBaseUrl';
99

10-
Use the following formats for threat intelligence indicator files when you [add indicators in the **Threat Intelligence** tab](/docs/security/threat-intelligence/threat-intelligence-indicators/#add-indicators-in-the-threat-intelligence-tab) or when you use the upload APIs in the [Threat Intel Ingest Management](https://api.sumologic.com/docs/#tag/threatIntelIngest) API resource:
10+
Use the following formats for threat intelligence indicator files when you [add indicators in the **Threat Intelligence** tab](/docs/security/threat-intelligence/threat-intelligence-indicators/#add-indicators-in-the-threat-intelligence-tab) or when you use the upload APIs with the [Threat Intel Ingest Management API](/docs/api/threat-intel-ingest/) resource:
1111

1212
* [Normalized JSON format](#normalized-json-format)
1313
* [CSV format](#csv-format)
14-
* [STIX 2.x JSON format](#stix-2x-json-format)
14+
* [STIX 2.x JSON format](#stix-2x-json-format) (API use only)
1515

1616
## Normalized JSON format
1717

@@ -158,6 +158,10 @@ Columns for the following attributes are required in the upload file:
158158

159159
## STIX 2.x JSON format
160160

161+
:::note
162+
Use this format only with the [STIX 2.x JSON upload API](https://api.sumologic.com/docs/#operation/uploadStixIndicators) in the [Threat Intel Ingest Management API](/docs/api/threat-intel-ingest/) resource. You cannot [add indicators in the **Threat Intelligence** tab](/docs/security/threat-intelligence/threat-intelligence-indicators/#add-indicators-in-the-threat-intelligence-tab) using this format.
163+
:::
164+
161165
STIX 2.x JSON format is a method to present JSON data according to the STIX 2.x specification.
162166

163167
Note that if you want to upload indicators from multiple sources, you cannot use this format but instead should use the [Normalized JSON format](#normalized-json-format).

0 commit comments

Comments
 (0)