diff --git a/cid-redirects.json b/cid-redirects.json index 8c2974456a..819ad35b15 100644 --- a/cid-redirects.json +++ b/cid-redirects.json @@ -4072,6 +4072,8 @@ "/docs/cse/records-signals-entities-insights/cse-heads-up-display": "/docs/cse/get-started-with-cloud-siem/cse-heads-up-display", "/docs/cse/records-signals-entities-insights/insight-generation-process": "/docs/cse/get-started-with-cloud-siem/insight-generation-process", "/docs/cse/get-started-with-cloud-siem/introduction-to-cloud-siem": "/docs/cse/get-started-with-cloud-siem", + "/docs/cse/cloud-siem-content-catalog": "/docs/cse/get-started-with-cloud-siem/cloud-siem-content-catalog", + "/docs/cse/introduction-to-cloud-sie": "/docs/cse/get-started-with-cloud-siem", "/docs/integrations/sumo-apps/security-foundations": "/docs/integrations/sumo-apps/security-analytics", "/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs/collect-with-amazon-kinesis": "/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs", "/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs/collect-with-collector-script": "/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs", diff --git a/docs/cse/administration/create-a-custom-tag-schema.md b/docs/cse/administration/create-a-custom-tag-schema.md index e08db23324..06605d8f66 100644 --- a/docs/cse/administration/create-a-custom-tag-schema.md +++ b/docs/cse/administration/create-a-custom-tag-schema.md @@ -21,7 +21,7 @@ For more information about tags in Cloud SIEM, see [Using Tags with Insights, Si ## Define a custom tag schema -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Workflow** select **Tag Schemas**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Workflow** select **Tag Schemas**. You can also click the **Go To...** menu at the top of the screen and select **Tag Schemas**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Workflow** select **Tag Schemas**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Workflow** select **Tag Schemas**. You can also click the **Go To...** menu at the top of the screen and select **Tag Schemas**. 1. On the **Tag Schemas** page, click **Create**.
Create tag schema 1. The **Tag Schema** popup appears. 1. **Key**. Enter an identifier for the tag you’re defining. It won’t appear in the UI for assigning tags to a content item, unless you leave the **Label** field blank. diff --git a/docs/cse/administration/create-cse-actions.md b/docs/cse/administration/create-cse-actions.md index 042725ad76..2ff2e27091 100644 --- a/docs/cse/administration/create-cse-actions.md +++ b/docs/cse/administration/create-cse-actions.md @@ -72,7 +72,7 @@ The notification sent by a Rule Action contains the name of the rule and the re ## Create an Action -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Integrations** select **Actions**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Actions**. You can also click the **Go To...** menu at the top of the screen and select **Actions**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Integrations** select **Actions**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Actions**. You can also click the **Go To...** menu at the top of the screen and select **Actions**. 1. On the **Actions** page, click **Create**. 1. The **Create Action** popup appears.
Create Action dialog 1. **Name**. Enter a name that communicates what the Action does. diff --git a/docs/cse/administration/create-cse-context-actions.md b/docs/cse/administration/create-cse-context-actions.md index dd8e88b3c6..9b9aa78a29 100644 --- a/docs/cse/administration/create-cse-context-actions.md +++ b/docs/cse/administration/create-cse-context-actions.md @@ -57,7 +57,7 @@ import Iframe from 'react-iframe';  ## Configure a Context Action -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Integrations** select **Context Actions**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Context Actions**. You can also click the **Go To...** menu at the top of the screen and select **Context Actions**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Integrations** select **Context Actions**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Context Actions**. You can also click the **Go To...** menu at the top of the screen and select **Context Actions**. 1. On the **Context Actions** page click **Create**. 1. Create the context action.
Configure action 1. **Enter Context Action Name**. Enter a name for the Context Action.  diff --git a/docs/cse/administration/create-custom-threat-intel-source.md b/docs/cse/administration/create-custom-threat-intel-source.md index 862b248f7b..d326d155d0 100644 --- a/docs/cse/administration/create-custom-threat-intel-source.md +++ b/docs/cse/administration/create-custom-threat-intel-source.md @@ -41,7 +41,7 @@ Rule authors can also write rules that look for threat intelligence information ### Create a threat intelligence source from Cloud SIEM UI -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Content > Threat Intelligence**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Threat Intelligence**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**. 1. Click **Add Source** on the **Threat Intelligence** page. 1. Click **Custom** on the **Add Source** popup. 1. On the **Add New Source** popup, enter a name, and if desired, a description for the source. diff --git a/docs/cse/administration/create-use-network-blocks.md b/docs/cse/administration/create-use-network-blocks.md index f73e929ebf..de2546dd82 100644 --- a/docs/cse/administration/create-use-network-blocks.md +++ b/docs/cse/administration/create-use-network-blocks.md @@ -65,7 +65,7 @@ When Cloud SIEM looks for the Network Block address `10.128.0.1`, it will ret Follow these instructions to create a Network Block using the Cloud SIEM UI. For information about creating multiple Network Blocks by file upload, see [Upload a CSV file of Network Blocks](#upload-a-csv-file-of-network-blocks). -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Content > Network Blocks**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the main Sumo Logic menu, select **Cloud SIEM > Network Blocks**. You can also click the **Go To...** menu at the top of the screen and select **Network Blocks**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Network Blocks**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Network Blocks**. You can also click the **Go To...** menu at the top of the screen and select **Network Blocks**. 1. On the **Create Network Block** popup: 1. **Address Block**. Enter a CIDR block that identifies a contiguous range of IP addresses. 1. **Label**. Enter a meaningful name for the Network Block. diff --git a/docs/cse/administration/manage-custom-insight-resolutions.md b/docs/cse/administration/manage-custom-insight-resolutions.md index d086313434..8be2a3d770 100644 --- a/docs/cse/administration/manage-custom-insight-resolutions.md +++ b/docs/cse/administration/manage-custom-insight-resolutions.md @@ -22,7 +22,7 @@ You can define custom *sub-resolutions* for any of the built-in resolutions. Thi ## Create a custom sub-resolution -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Workflow** select **Resolutions**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Workflow** select **Insight Resolutions**. You can also click the **Go To...** menu at the top of the screen and select **Insight Resolutions**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Workflow** select **Resolutions**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Workflow** select **Insight Resolutions**. You can also click the **Go To...** menu at the top of the screen and select **Insight Resolutions**. 1. On the **Insight Resolutions** page, click **Create**. 1. The **Create Insight Resolution** page appears. 1. **Name**. Enter a meaningful name for the new resolution. diff --git a/docs/cse/administration/manage-custom-insight-statuses.md b/docs/cse/administration/manage-custom-insight-statuses.md index 7eccd0b860..6f720ddb04 100644 --- a/docs/cse/administration/manage-custom-insight-statuses.md +++ b/docs/cse/administration/manage-custom-insight-statuses.md @@ -13,7 +13,7 @@ This page has information about creating and managing custom Insight statuses. To view Insight statuses: -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Workflow** select **Statuses**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Workflow** select **Insight Statuses**. You can also click the **Go To...** menu at the top of the screen and select **Insight Statuses**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Workflow** select **Statuses**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Workflow** select **Insight Statuses**. You can also click the **Go To...** menu at the top of the screen and select **Insight Statuses**. 1. This screenshot of the **Statuses** page shows the three Insight statuses that are preconfigured: * **New**. Insights that have not been worked on yet. * **In Progress**. Insights that are being investigated. If you want to create custom statuses to represent different types of "in progress" states, you can click the **Enabled** toggle to disable the default **In Progress** status to reduce confusion. @@ -25,7 +25,7 @@ Preconfigured Insight statuses cannot be edited or deleted. You can however crea To create a custom Insight status: -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Workflow** select **Statuses**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Workflow** select **Insight Statuses**. You can also click the **Go To...** menu at the top of the screen and select **Insight Statuses**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Workflow** select **Statuses**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Workflow** select **Insight Statuses**. You can also click the **Go To...** menu at the top of the screen and select **Insight Statuses**. 1. On the **Statuses** page, click **Create Status**. 1. On the **New Status** popup, enter a name and description for the status. 1. Click **Color** to select a color for the status. The color will appear on the status on the [Heads Up Display](/docs/cse/get-started-with-cloud-siem/cse-heads-up-display). @@ -41,7 +41,7 @@ To change the order that the statuses appear in the **Status** dropdown, you can To change the order of Insight statuses: -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Workflow** select **Statuses**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Workflow** select **Insight Statuses**. You can also click the **Go To...** menu at the top of the screen and select **Insight Statuses**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Workflow** select **Statuses**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Workflow** select **Insight Statuses**. You can also click the **Go To...** menu at the top of the screen and select **Insight Statuses**. 1. On the **Statuses** page, each status that can be moved has a handle to the left of its name.
Reorder icons 1. To move a status to a different location on the list, use your mouse to drag it to the desired location. diff --git a/docs/cse/administration/mitre-coverage.md b/docs/cse/administration/mitre-coverage.md index 705c56160c..ec868f5a7d 100644 --- a/docs/cse/administration/mitre-coverage.md +++ b/docs/cse/administration/mitre-coverage.md @@ -37,9 +37,9 @@ Watch this micro lesson to learn about the MITRE ATT&CK Threat Coverage Explorer ## User interface -[**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). To open the MITRE ATT&CK Threat Coverage Explorer, in the top menu select **Content > MITRE ATT&CK Coverage**. +[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). To open the MITRE ATT&CK Threat Coverage Explorer, in the top menu select **Content > MITRE ATT&CK Coverage**. -[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). To open the MITRE ATT&CK Threat Coverage Explorer, in the main Sumo Logic menu select **Cloud SIEM > MITRE ATT&CK Coverage**. You can also click the **Go To...** menu at the top of the screen and select **MITRE ATT&CK Coverage**. +[**New UI**](/docs/get-started/sumo-logic-ui). To open the MITRE ATT&CK Threat Coverage Explorer, in the main Sumo Logic menu select **Cloud SIEM > MITRE ATT&CK Coverage**. You can also click the **Go To...** menu at the top of the screen and select **MITRE ATT&CK Coverage**. MITRE Coverage page diff --git a/docs/cse/automation/about-automation-service-and-cloud-siem.md b/docs/cse/automation/about-automation-service-and-cloud-siem.md index 57c619764a..0a55a55aeb 100644 --- a/docs/cse/automation/about-automation-service-and-cloud-siem.md +++ b/docs/cse/automation/about-automation-service-and-cloud-siem.md @@ -46,7 +46,7 @@ Before you can access the Automation Service from Cloud SIEM, you must first [co ::: 1. To access the Automation Service from Cloud SIEM: - 1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. You can also click the **Go To...** menu at the top of the screen and select **Automation**.
The list of available Cloud SIEM automations appears. Each automation runs a playbook.
Automations list + 1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. You can also click the **Go To...** menu at the top of the screen and select **Automation**.
The list of available Cloud SIEM automations appears. Each automation runs a playbook.
Automations list 1. At the top of the screen, click **Manage Playbooks**.
Manage Playbooks menu option
The Automation Service screen displays:
Automation Playbook list :::note You can also launch the Automation Service by selecting **Automation** from the main menu:
Automation menu option in the nav bar
If you also have Cloud SOAR installed, a **Cloud SOAR** option appears instead, since all automation services are provided by Cloud SOAR when it installed in conjunction with Cloud SIEM. diff --git a/docs/cse/automation/automations-in-cloud-siem.md b/docs/cse/automation/automations-in-cloud-siem.md index 6019e1bed0..83c797c8d7 100644 --- a/docs/cse/automation/automations-in-cloud-siem.md +++ b/docs/cse/automation/automations-in-cloud-siem.md @@ -82,7 +82,7 @@ If you configured the automation to [run manually](#run-an-automation-manually), ## View automations -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. You can also click the **Go To...** menu at the top of the screen and select **Automation**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. You can also click the **Go To...** menu at the top of the screen and select **Automation**. 1. View the list of available automations. (If no automations display, you must first [create an automation](#create-an-automation)).
Automations list To view the automations that have run on Insights or Entities, see [View results of an automation](#view-results-of-an-automation). @@ -91,7 +91,7 @@ To view the automations that have run on Insights or Entities, see [View results The following procedure provides a brief introduction to how to create an automation. For detailed examples, see [Cloud SIEM Automation Examples](/docs/cse/automation/cloud-siem-automation-examples/). -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. You can also click the **Go To...** menu at the top of the screen and select **Automation**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. You can also click the **Go To...** menu at the top of the screen and select **Automation**. 1. At the top of the automations screen, click **Create**. (To modify an existing automation, click on the edit icon for the corresponding automation.)
Automations list 1. In the **New Automation** dialog, select a **Playbook** from the drop-down list. The playbook must be defined before associating it with an automation.
New Automation 1. In **Expects attributes for** select whether the playbook will run on an **Entity** or **Insight**. This defines what data payload will be sent to the playbook from Cloud SIEM. diff --git a/docs/cse/automation/cloud-siem-automation-examples.md b/docs/cse/automation/cloud-siem-automation-examples.md index 4946f98a18..98790f86d5 100644 --- a/docs/cse/automation/cloud-siem-automation-examples.md +++ b/docs/cse/automation/cloud-siem-automation-examples.md @@ -62,7 +62,7 @@ The following example shows how to add an enrichment to an Insight using the “ 1. To [test the playbook](/docs/platform-services/automation-service/automation-service-playbooks/#test-a-playbook), click the kebab button in the upper-right of the UI and select **Run Test**. 1. Click the **Publish** button (clipboard icon) at the bottom of the playbook view. The playbook should look like this:
Simple playbook for Insight enrichment 1. Create an automation in Cloud SIEM to run the playbook: - 1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the main Sumo Logic menu select **Cloud SIEM**. In the top menu select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. You can also click the **Go To...** menu at the top of the screen and select **Automation**. + 1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu select **Cloud SIEM**. In the top menu select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. You can also click the **Go To...** menu at the top of the screen and select **Automation**. 1. At the top of the automations screen, click **New Automation**. 1. For **Playbook**, select the playbook you created in the previous steps. 1. For **Expects attributes for**, select **Insight**. @@ -134,7 +134,7 @@ The following example shows how to configure a notification that sends an email 1. To [test the playbook](/docs/platform-services/automation-service/automation-service-playbooks/#test-a-playbook), click the kebab button in the upper-right of the UI and select **Run Test**. 1. Click the **Publish** button (clipboard icon) at the bottom of the playbook view. The playbook should look like this:
Playbook for notification 1. Create an automation in Cloud SIEM to run the playbook: - 1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the main Sumo Logic menu select **Cloud SIEM**. In the top menu of Cloud SIEM select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. + 1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu select **Cloud SIEM**. In the top menu of Cloud SIEM select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. 1. At the top of the automations screen, click **New Automation**. 1. For **Playbook**, select the playbook you created in the previous steps. 1. For **Expects attributes for**, select **Insight**. @@ -238,7 +238,7 @@ The action uses [IP Quality Score](https://www.ipqualityscore.com/) to gather IP 1. To [test the playbook](/docs/platform-services/automation-service/automation-service-playbooks/#test-a-playbook), click the kebab button in the upper-right of the UI and select **Run Test**. 1. Click the **Publish** button (clipboard icon) at the bottom of the playbook view. The playbook should look like this:
Custom playbook for Insight enrichment 1. Create an automation in Cloud SIEM to run the playbook: - 1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the main Sumo Logic menu select **Cloud SIEM**. In the top menu select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. + 1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu select **Cloud SIEM**. In the top menu select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. 1. At the top of the automations screen, click **New Automation**. 1. For **Playbook**, select the playbook you created in the previous steps. 1. For **Expects attributes for**, select **Insight**. @@ -278,7 +278,7 @@ The following example pulls together elements of the [Simple example](#simple-ex 1. Enter the **API Key**. See the [VirusTotal documentation](https://support.virustotal.com/hc/en-us/articles/115002100149-API) to learn how to obtain the API key. If you do not already have a VirusTotal account, you need to create one to get an API key. 1. Click **Save**.
Edit resource 1. Edit the Sumo Logic resource: - 1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. + 1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. 1. From the Automation screen, click **Manage Playbooks**. This opens the [Automation Service UI](/docs/platform-services/automation-service/about-automation-service/#automation-service-ui). 1. Click **Integrations** in the navigation menu. 1. Select **Sumo Logic**. @@ -361,7 +361,7 @@ The following example pulls together elements of the [Simple example](#simple-ex 1. To [test the playbook](/docs/platform-services/automation-service/automation-service-playbooks/#test-a-playbook), click the kebab button in the upper-right of the UI and select **Run Test**. 1. Click the **Publish** button (clipboard icon) at the bottom of the playbook view. The playbook should look like this:
Complex playbook 1. Create an automation in Cloud SIEM to run the playbook: - 1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the main Sumo Logic menu select **Cloud SIEM**. In the top menu select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. + 1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu select **Cloud SIEM**. In the top menu select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. 1. For **Playbook**, select the playbook you created in the previous steps. 1. For **Expects attributes for**, select **Insight**. 1. For **Executes when**, select **Manually Done**. diff --git a/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui.md b/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui.md index 25333eecb7..fa36135763 100644 --- a/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui.md +++ b/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui.md @@ -11,9 +11,9 @@ This topic describes the Cloud SIEM UI for working with Insights.  ## Insights list page -[**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). To open the Insights page, click **Insights** at the top of the screen. +[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). To open the Insights page, click **Insights** at the top of the screen. -[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). To open the Insights page, in the main Sumo Logic menu select **Cloud SIEM > Insights**. You can also click **Go To...** at the top of the screen and select **Insights**. +[**New UI**](/docs/get-started/sumo-logic-ui). To open the Insights page, in the main Sumo Logic menu select **Cloud SIEM > Insights**. You can also click **Go To...** at the top of the screen and select **Insights**. By default, the **Insights** page presents all Insights whose status is not “Closed”, in descending order by event time in a list view. If you’d like to see Insights organized by their status, click the **Show Board** icon near the top right corner of the page. For information about the board view, see [Board view](#board-view). diff --git a/docs/cse/cloud-siem-content-catalog.md b/docs/cse/get-started-with-cloud-siem/cloud-siem-content-catalog.md similarity index 100% rename from docs/cse/cloud-siem-content-catalog.md rename to docs/cse/get-started-with-cloud-siem/cloud-siem-content-catalog.md diff --git a/docs/cse/get-started-with-cloud-siem/cloud-siem-ui.md b/docs/cse/get-started-with-cloud-siem/cloud-siem-ui.md new file mode 100644 index 0000000000..c04e7a9330 --- /dev/null +++ b/docs/cse/get-started-with-cloud-siem/cloud-siem-ui.md @@ -0,0 +1,180 @@ +--- +id: cloud-siem-ui +title: Cloud SIEM User Interface +sidebar_label: User Interface +description: Learn about the Cloud SIEM user interface. +--- + +import useBaseUrl from '@docusaurus/useBaseUrl'; +import Theme from '../../reuse/dark-light-theme.md'; + +## Access Cloud SIEM + +To access Cloud SIEM, in the main Sumo Logic menu select **Cloud SIEM**.
Cloud SIEM menu option + +Cloud SIEM must be enabled by Sumo Logic before it is accessible to users in your organization. For more information, see [Onboarding Checklist for Cloud SIEM Administrators](/docs/cse/get-started-with-cloud-siem/onboarding-checklist-cse/). + +## Theme + + + +## Heads Up Display + +The first screen you see when you access Cloud SIEM is the Heads Up Display, a single pane of information about your environment. In the center, you'll see a radar showing insights, surrounded by the signals and records used to generate the insights. On the left is summary information, and on the right is recent activity. Use this screen as the starting place for your investigations, focusing on insights as the most valuable place to start. + +For more information, see [Cloud SIEM Heads Up Display](/docs/cse/get-started-with-cloud-siem/cse-heads-up-display/). + +## Cloud SIEM menus + +### Classic UI + +The classic UI is the traditional way to navigate in Sumo Logic. For more information, see [Tour the Sumo Logic Classic UI](/docs/get-started/sumo-logic-ui-classic). + +#### Top menu + +This menu appears at the top of the Cloud SIEM screen:
Top menu bar + +Use the top menu to access: +* Insights menu icon [**Insights**](/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/). View Insights, clusters of events that require investigation. An insight is created when a high level of suspicious activity is detected for a single entity, such as a user, IP address, host, or domain. +* Signals menu icon [**Signals**](/docs/cse/records-signals-entities-insights/view-records-signal/). View Signals, indicators for events of interest that fire when rule conditions are met. +* Entities menu icon [**Entities**](/docs/cse/records-signals-entities-insights/view-manage-entities/). View Entities, unique actors encountered in incoming messages, such as a user, IP address, or host. +* Records menu icon [**Records**](/docs/cse/records-signals-entities-insights/view-records-signal/). View Records, collections of normalized data created from a message. +* Content menu icon [**Content**](#content-menu). Create Cloud SIEM content, such as rules. +* Configuration menu icon [**Configuration**](#configuration-menu). Configure Cloud SIEM. +* Help menu icon **Help**. Access feature guides, documentation, release notes, and system status. +* Switch Apps menu icon **Switch Apps**. Access the Sumo Logic [Log Analytics Platform](/docs/get-started/sumo-logic-ui/) or [Cloud SOAR](/docs/cloud-soar/) (if enabled in your organization). +* Profile menu icon **Profile**. View your Cloud SIEM username and time zone. + +#### Content menu + +The **Content** menu allows you to create elements to customize Cloud SIEM. To access the menu, click **Content** on the [top menu](#top-menu).
Content menu + +Use the **Content** menu to access: +* [**Rules**](/docs/cse/rules/). Manage rules, sets of logic that create signals based on information in incoming records. +* [**Rule Tuning**](/docs/cse/rules/rule-tuning-expressions/). Manage rule tuning expressions, which are extensions to rules. +* [**Threat Intelligence**](/docs/cse/administration/create-custom-threat-intel-source/). Manage sources of threat intelligence indicators, individual data points about threats that are gathered from external sources. +* [**Match Lists**](/docs/cse/match-lists-suppressed-lists/create-match-list/). Manage match lists, lists of important indicators and identifiers that you want to be addressed by rules. +* [**File Analysis**](/docs/cse/rules/import-yara-rules/). Manage sources for YARA rules. +* [**Custom Insights**](/docs/cse/records-signals-entities-insights/configure-custom-insight/). Manage custom Insights, methods to generate Insights on some basis other than Entity Activity Scores. +* [**Network Blocks**](/docs/cse/administration/create-use-network-blocks/). Manage network blocks, groups of IP addresses that you can use in rules. +* [**Suppressed Lists**](/docs/cse/match-lists-suppressed-lists/suppressed-lists/). Manage suppressed lists, lists of indicators that can suppress Signal generation. +* [**MITRE ATT&CK Coverage**](/docs/cse/administration/mitre-coverage/). View the MITRE ATT&CK Threat Coverage Explorer, a screen that shows the MITRE ATT&CK adversary tactics, techniques, and procedures that are covered by rules in your system. + +#### Configuration menu + +The **Configuration** menu allows you to configure Cloud SIEM. To access this menu, click Configuration menu icon on the [top menu](#top-menu).
Configuration menu + +Use the **Configuration** menu to access: +* **Incoming Data** + * [**Log Mappings**](/docs/cse/schema/create-structured-log-mapping/). Manage log mappings, maps that tell Cloud SIEM how to build a Record from the key-value pairs extracted from messages. +* **Entities** + * [**Groups**](/docs/cse/records-signals-entities-insights/create-an-entity-group/). Manage groupings of Entities that can be used in rules. + * [**Normalization**](/docs/cse/schema/username-and-hostname-normalization/). Manage normalizing usernames and hostnames in Records during the parsing and mapping process. + * [**Custom Types**](/docs/cse/records-signals-entities-insights/create-custom-entity-type/). Manage custom types to more precisely categorize entities. + * [**Criticality**](/docs/cse/records-signals-entities-insights/entity-criticality/). Adjust the severity of Signals for specific Entities based on some risk factor or other consideration. +* **Workflow** + * [**Detection**](/docs/cse/records-signals-entities-insights/set-insight-generation-window-threshold/). Set the Insight detection threshold. + * [**Statuses**](/docs/cse/administration/manage-custom-insight-statuses/). Manage custom Insight statuses. + * [**Resolutions**](/docs/cse/administration/manage-custom-insight-resolutions/). Manage custom Insight resolutions. + * [**Tag Schemas**](/docs/cse/administration/create-a-custom-tag-schema/). Manage schemas for tags, metadata you can attach to Insights, Signals, Entities, and Rules. +* **Integrations** + * [**Sumo Logic**](/docs/cse/ingestion/sumo-logic-ingest-mapping/). Configure mapping of message fields to Record attributes. + * [**Context Actions**](/docs/cse/administration/create-cse-context-actions/). Create actions that a Cloud SIEM analyst can use to query an external system for information about an Entity, IOC, or data encountered in a Record. + * [**Actions**](/docs/cse/administration/create-cse-actions/). Create actions to issue a notification to another service when certain events occur in Cloud SIEM. + * [**Enrichment**](/docs/cse/integrations/enrichments-and-indicators/). Manage elements that enrich data in Cloud SIEM. + * [**Automation**](/docs/cse/automation/). Create smart actions that trigger automatically when certain events occur in Cloud SIEM. + +### New UI + +The new UI provides a streamlined way to navigate in Sumo Logic. For more information, see [Tour the Sumo Logic UI](/docs/get-started/sumo-logic-ui). + +#### Sidebar menu + +Click **Cloud SIEM** in the main Sumo Logic menu to open the sidebar menu.
Cloud SIEM sidebar menu + +Use the **Cloud SIEM** sidebar menu to access: +* **Search Cloud SIEM**. Search for [Insights](/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/), [Signals](/docs/cse/records-signals-entities-insights/view-records-signal/), [Entities](/docs/cse/records-signals-entities-insights/view-manage-entities/), and [Records](/docs/cse/records-signals-entities-insights/view-records-signal/). When you click in the search bar, you're prompted to select one of those types. Once you select a type, you're presented with a list of fields to filter on. +* **Security Events** + * [**SIEM Overview**](/docs/cse/get-started-with-cloud-siem/cse-heads-up-display/). View the Cloud SIEM Heads Up Display. + * [**Insights**](/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/). View Insights, clusters of events that require investigation. An insight is created when a high level of suspicious activity is detected for a single entity, such as a user, IP address, host, or domain. + * [**Signals**](/docs/cse/records-signals-entities-insights/view-records-signal/). View Signals, indicators for events of interest that fire when rule conditions are met. + * [**Entities**](/docs/cse/records-signals-entities-insights/view-manage-entities/). View Entities, unique actors encountered in incoming messages, such as a user, IP address, or host. + * [**Records**](/docs/cse/records-signals-entities-insights/view-records-signal/). View Records, collections of normalized data created from a message. +* **Security Detection** + * [**Rules**](/docs/cse/rules/). Manage rules, sets of logic that create signals based on information in incoming records. + * [**Rule Tuning**](/docs/cse/rules/rule-tuning-expressions/). Manage rule tuning expressions, which are extensions to rules. + * [**Threat Intelligence**](/docs/cse/administration/create-custom-threat-intel-source/). Manage sources of threat intelligence indicators, individual data points about threats that are gathered from external sources. + * [**Match List**](/docs/cse/match-lists-suppressed-lists/create-match-list/). Manage match lists, lists of important indicators and identifiers that you want to be addressed by rules. + * [**File Analysis**](/docs/cse/rules/import-yara-rules/). Manage sources for YARA rules. + * [**Custom Insights**](/docs/cse/records-signals-entities-insights/configure-custom-insight/). Manage custom Insights, methods to generate Insights on some basis other than Entity Activity Scores. + * [**Network Blocks**](/docs/cse/administration/create-use-network-blocks/). Manage network blocks, groups of IP addresses that you can use in rules + * [**Suppressed Lists**](/docs/cse/match-lists-suppressed-lists/suppressed-lists/). Manage suppressed lists, lists of indicators that can suppress Signal generation. + * [**MITRE ATT&CK Coverage**](/docs/cse/administration/mitre-coverage/). View the MITRE ATT&CK Threat Coverage Explorer, a screen that shows the MITRE ATT&CK adversary tactics, techniques, and procedures that are covered by rules in your system. + +#### Top menu + +This menu appears at the top of the screen:
Top menu bar + +Use the top menu to access: +* Go To icon **Go To...** Launch Sumo Logic features, including for Cloud SIEM. +* Help icon **Help**. Access links to documentation, support, community, release notes, and system status. +* Configuration icon [**Configuration**](#configuration-menu-1). Configure Sumo Logic features, including for Cloud SIEM. +* Administration icon **Administration**. Access Sumo Logic administration settings, such as for for [account](/docs/manage/), [users and roles](/docs/manage/users-roles/), and [account security](/docs/manage/security/). +* Profile icon **Profile**. View your notification and [preference](/docs/get-started/account-settings-preferences/) settings. + +#### Go To... menu + +The **Go To...** menu allows you to launch Sumo Logic features, including for Cloud SIEM. To access this menu, click Go To icon on the [top menu](#top-menu-1).
Go To menu bar + +Use the **Go To...** menu to access these Cloud SIEM features: +* [**Actions**](/docs/cse/administration/create-cse-actions/). Create actions to issue a notification to another service when certain events occur in Cloud SIEM. +* [**Context Actions**](/docs/cse/administration/create-cse-context-actions/). Create actions that a Cloud SIEM analyst can use to query an external system for information about an Entity, IOC, or data encountered in a Record. +* [**Criticality**](/docs/cse/records-signals-entities-insights/entity-criticality/). Adjust the severity of Signals for specific Entities based on some risk factor or other consideration. +* [**Custom Insights**](/docs/cse/records-signals-entities-insights/configure-custom-insight/). Manage custom Insights, methods to generate Insights on some basis other than Entity Activity Scores. +* [**Custom Types**](/docs/cse/records-signals-entities-insights/create-custom-entity-type/). Manage custom types to more precisely categorize entities. +* [**Enrichment**](/docs/cse/integrations/enrichments-and-indicators/). Manage elements that enrich data in Cloud SIEM. +* [**Entities**](/docs/cse/records-signals-entities-insights/view-manage-entities/). View Entities, unique actors encountered in incoming messages, such as a user, IP address, or host. +* [**File Analysis**](/docs/cse/rules/import-yara-rules/). Manage sources for YARA rules. +* [**Ingest Mappings**](/docs/cse/ingestion/sumo-logic-ingest-mapping/). Manage the mapping for data ingestion from a data source to Cloud SIEM. +* [**Insight Detection**](/docs/cse/records-signals-entities-insights/set-insight-generation-window-threshold/). Set the Insight detection threshold. +* [**Insight Resolutions**](/docs/cse/administration/manage-custom-insight-resolutions/). Manage custom Insight resolutions. +* [**Insight Statuses**](/docs/cse/administration/manage-custom-insight-statuses/). Manage custom Insight statuses. +* [**Insights**](/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/). View Insights, clusters of events that require investigation. An insight is created when a high level of suspicious activity is detected for a single entity, such as a user, IP address, host, or domain. +* [**Log Mappings**](/docs/cse/schema/create-structured-log-mapping/). Manage log mappings, maps that tell Cloud SIEM how to build a Record from the key-value pairs extracted from messages. +* [**Match Lists**](/docs/cse/match-lists-suppressed-lists/create-match-list/). Manage match lists, lists of important indicators and identifiers that you want to be addressed by rules. +* [**MITRE ATT&CK Coverage**](/docs/cse/administration/mitre-coverage/). View the MITRE ATT&CK Threat Coverage Explorer, a screen that shows the MITRE ATT&CK adversary tactics, techniques, and procedures that are covered by rules in your system. +* [**Network Blocks**](/docs/cse/administration/create-use-network-blocks/). Manage network blocks, groups of IP addresses that you can use in rules. +* [**Normalization**](/docs/cse/schema/username-and-hostname-normalization/). Manage normalizing usernames and hostnames in Records during the parsing and mapping process. +* [**Records**](/docs/cse/records-signals-entities-insights/view-records-signal/). View Records, collections of normalized data created from a message. +* [**Rule Tuning**](/docs/cse/rules/rule-tuning-expressions/). Manage rule tuning expressions, which are extensions to rules. +* [**Rules**](/docs/cse/rules/). Manage rules, sets of logic that create signals based on information in incoming records. +* **Search Cloud SIEM**. Search for [Insights](/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/), [Signals](/docs/cse/records-signals-entities-insights/view-records-signal/), [Entities](/docs/cse/records-signals-entities-insights/view-manage-entities/), and [Records](/docs/cse/records-signals-entities-insights/view-records-signal/). When you click in the search bar, you're prompted to select one of those types. Once you select a type, you're presented with a list of fields to filter on. +* [**SIEM Overview**](/docs/cse/get-started-with-cloud-siem/cse-heads-up-display/). View the Cloud SIEM Heads Up Display. +* [**Signals**](/docs/cse/records-signals-entities-insights/view-records-signal/). View Signals, indicators for events of interest that fire when rule conditions are met. +* [**Suppressed Lists**](/docs/cse/match-lists-suppressed-lists/suppressed-lists/). Manage suppressed lists, lists of indicators that can suppress Signal generation. +* [**Tag Schemas**](/docs/cse/administration/create-a-custom-tag-schema/). Manage schemas for tags, metadata you can attach to Insights, Signals, Entities, and Rules. +* [**Threat Intelligence**](/docs/cse/administration/create-custom-threat-intel-source/). Manage sources of threat intelligence indicators, individual data points about threats that are gathered from external sources. + +#### Configuration menu + +The **Configuration** menu allows you to configure Sumo Logic features, including for Cloud SIEM. To access this menu, click the configuration icon Configuration icon on the [top menu](#top-menu-1). Scroll down the menu to see Cloud SIEM configuration options.
Configuration menu + +Use the **Configuration** menu to access: + +* **Cloud SIEM Integrations** + * [**Ingest Mappings**](/docs/cse/ingestion/sumo-logic-ingest-mapping/). Manage the mapping for data ingestion from a data source to Cloud SIEM. + * [**Log Mappings**](/docs/cse/schema/create-structured-log-mapping/). Manage log mappings, maps that tell Cloud SIEM how to build a Record from the key-value pairs extracted from messages. + * [**Context Actions**](/docs/cse/administration/create-cse-context-actions/). Create actions that a Cloud SIEM analyst can use to query an external system for information about an Entity, IOC, or data encountered in a Record. + * [**Actions**](/docs/cse/administration/create-cse-actions/). Create actions to issue a notification to another service when certain events occur in Cloud SIEM. + * [**Enrichment**](/docs/cse/integrations/enrichments-and-indicators/). Manage elements that enrich data in Cloud SIEM. + * [**Automation**](/docs/cse/automation/). Create smart actions that trigger automatically when certain events occur in Cloud SIEM. +* **Cloud SIEM Entities** + * [**Groups**](/docs/cse/records-signals-entities-insights/create-an-entity-group/). Manage groupings of Entities that can be used in rules. + * [**Normalization**](/docs/cse/schema/username-and-hostname-normalization/). Manage normalizing usernames and hostnames in Records during the parsing and mapping process. + * [**Custom Types**](/docs/cse/records-signals-entities-insights/create-custom-entity-type/). Manage custom types to more precisely categorize entities. + * [**Criticality**](/docs/cse/records-signals-entities-insights/entity-criticality/). Adjust the severity of Signals for specific Entities based on some risk factor or other consideration. +* **Cloud SIEM Workflow** + * [**Insight Detection**](/docs/cse/records-signals-entities-insights/set-insight-generation-window-threshold/). Set the Insight detection threshold. + * [**Insight Statuses**](/docs/cse/administration/manage-custom-insight-statuses/). Manage custom Insight statuses. + * [**Insight Resolutions**](/docs/cse/administration/manage-custom-insight-resolutions/). Manage custom Insight resolutions. + * [**Tag Schemas**](/docs/cse/administration/create-a-custom-tag-schema/). Manage schemas for tags, metadata you can attach to Insights, Signals, Entities, and Rules. diff --git a/docs/cse/get-started-with-cloud-siem/cse-heads-up-display.md b/docs/cse/get-started-with-cloud-siem/cse-heads-up-display.md index c8fdcf505d..30d1706c8b 100644 --- a/docs/cse/get-started-with-cloud-siem/cse-heads-up-display.md +++ b/docs/cse/get-started-with-cloud-siem/cse-heads-up-display.md @@ -1,6 +1,7 @@ --- id: cse-heads-up-display title: Cloud SIEM Heads Up Display +sidebar_label: Heads Up Display description: Learn about Cloud SIEM's Heads Up Display (HUD), a UI that provides an at-a-glance overview of Insight status and activity. --- @@ -8,9 +9,9 @@ import useBaseUrl from '@docusaurus/useBaseUrl'; This topic describes Cloud SIEM *Heads Up Display (HUD)*, the landing page for the Cloud SIEM UI. The HUD provides an at-a-glance overview of Insight status and activity. -[**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). To access the HUD, in the main Sumo Logic menu select **Cloud SIEM**. +[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). To access the HUD, in the main Sumo Logic menu select **Cloud SIEM**. -[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). To access the HUD, in the main Sumo Logic menu select **Cloud SIEM > SIEM Overview**. You can also click **Go To...** at the top of the screen and select **SIEM Overview**. +[**New UI**](/docs/get-started/sumo-logic-ui). To access the HUD, in the main Sumo Logic menu select **Cloud SIEM > SIEM Overview**. You can also click **Go To...** at the top of the screen and select **SIEM Overview**. :::note Data on the HUD is generated by internal searches that may result in slightly different results than a [log search query](/docs/search/) for the same time period, because of the way each method calculates time periods. But these differences cancel out over time. So while there may be a small variance between numbers of Records, Signals, and Insights in a given time frame, the effect is only noticeable when viewing very small time slices, for example, under 30 minutes. If you need to get exact tracking for reporting or other use cases, use dashboards in apps like the [Enterprise Audit - Cloud SIEM](/docs/integrations/sumo-apps/cse/) app. diff --git a/docs/cse/get-started-with-cloud-siem/index.md b/docs/cse/get-started-with-cloud-siem/index.md index f458a47099..6e4ba3c5fc 100644 --- a/docs/cse/get-started-with-cloud-siem/index.md +++ b/docs/cse/get-started-with-cloud-siem/index.md @@ -6,9 +6,26 @@ description: Learn how to get started using Cloud SIEM for threat hunting. import useBaseUrl from '@docusaurus/useBaseUrl'; -This guide helps you get started using Cloud SIEM for threat hunting. +The following articles help you get started using Cloud SIEM.
+
+
+ Shield on a workflow icon

Cloud SIEM User Interface

+

Learn about the Cloud SIEM user interface.

+
+
+
+ Shield on a workflow icon

Introduction to Cloud SIEM for Analysts

+

Learn basic concepts about Cloud SIEM for security analysts.

+
+
+
+
+ Shield on a workflow icon

Introduction to Cloud SIEM for Administrators

+

Learn basic concepts about Cloud SIEM for administrators.

+
+
Shield on a workflow icon

Cloud SIEM Heads Up Display

@@ -33,4 +50,10 @@ This guide helps you get started using Cloud SIEM for threat hunting.

Get up and running quickly with Cloud SIEM administrator tasks.

+
+
+ Checklist icon

Cloud SIEM Content Catalog

+

See the out-of-the-box Rules, Schema, Mappings, and Parsers for Cloud SIEM.

+
+
\ No newline at end of file diff --git a/docs/cse/get-started-with-cloud-siem/intro-for-administrators.md b/docs/cse/get-started-with-cloud-siem/intro-for-administrators.md new file mode 100644 index 0000000000..1848d7c768 --- /dev/null +++ b/docs/cse/get-started-with-cloud-siem/intro-for-administrators.md @@ -0,0 +1,511 @@ +--- +id: intro-for-administrators +title: Introduction to Cloud SIEM for Administrators +sidebar_label: Introduction for Administrators +description: Learn basic concepts about Cloud SIEM for administrators. +--- + +import useBaseUrl from '@docusaurus/useBaseUrl'; + + +This article provides an introduction to Cloud SIEM for administrators. + +If you are unsure whether you are an analyst or administrator, you can view your role in **Preferences** (see [Onboarding Checklists](/docs/get-started/onboarding-checklists/)). To use Cloud SIEM as an administrator, you must be assigned [Cloud SIEM role capabilities](/docs/manage/users-roles/roles/role-capabilities/#cloud-siem) that allow you to view and manage Cloud SIEM elements as well as perform administration tasks. + +While this section provides an introduction to Cloud SIEM for administrators, it is not a how-to for setting up Cloud SIEM. If you're setting up Cloud SIEM for the first time, see [Onboarding Checklist for Cloud SIEM Administrators](/docs/cse/get-started-with-cloud-siem/onboarding-checklist-cse/). + +## Build your SOC + +### The Cloud SIEM data pipeline + +Cloud SIEM is a cloud-based, enterprise-grade security information and event management (SIEM) system. Cloud SIEM leverages Sumo Logic's core functionality, including data collection, ingestion, storage, and threat intelligence. + +This is Sumo Logic's Cloud SIEM home page. + +Cloud SIEM main page + +* A. **Count**. A count of the records created from incoming messages, and the signals and insights that have been generated. +* B. **Insights by Status**. An overview of recent insights and their statuses: New, In Progress, Closed, or Other. +* C. **Radar**. Visualizes the last 24 hours of security activity. Dark blue lines represent records, light blue bars represent signals, and red triangles represent insights. +* D. **Recent Activity**. Displays a feed of the latest insights that have been generated. + +Sumo Logic collects and ingests millions of your company's log messages. However, you may choose to send only a portion of these to Cloud SIEM. Cloud SIEM takes these messages and parses, maps, and enriches them into records. These records are compared to rules and, if there's a match, entities are extracted from them and Cloud SIEM uses that information to create signals. These signals and entities are correlated, and used in security detection use cases. Then, if a certain severity threshold is crossed, they become an insight. Some of these insights have actions available right in the Cloud SIEM platform, like alerting your SOC teammates. + +Cloud SIEM data flow + +As a Cloud SIEM administrator, it's your job to make sure that this pipeline flows smoothly. In this section, you'll learn how to partition your data in Sumo Logic, forward it to Cloud SIEM, customize the schema mappings, and tune the SOC content to support the analysts on your SOC team. All these customizations and optimizations will help reduce false positives and enable your SOC analyst teammates to investigate and hunt threats faster. + +### Ingest the right data + +The first part of the security data pipeline is collection and ingestion in Sumo Logic. + +First part of the data pipeline + +These messages are then forwarded to Cloud SIEM. It's a good idea to periodically examine the data you're ingesting and sending to Cloud SIEM. Ask yourself these questions: + +* **Are you ingesting enough data?** Cloud SIEM takes thousands or millions of records and boils them down into just a handful of insights. Most organizations ingest more than 50GB of data every day to start finding any insights. If your ingest volume is smaller than this, consider sending more data to Cloud SIEM or using other security solutions like the [Threat Intel Quick Analysis app](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/). +* **Are you ingesting too much data?** More data doesn't always mean more insights. The threat detection logic built into Cloud SIEM generally prevents false positives. However, some organizations choose to ingest or store less data as a way to cut costs. One solution is partitioning your data into different tiers, and only sending some of that data along to Cloud SIEM. +* **Are you ingesting the right data?** Cloud SIEM doesn't just work on quantity alone. Quality data will affect your performance as well. As a best practice, you'll need to bring in quality data sources that are supported by Cloud SIEM. High-value data sources include [CloudTrail logs](/docs/integrations/cloud-security-monitoring-analytics/aws-cloudtrail/), [Windows event logs](/docs/send-data/installed-collectors/sources/collect-forwarded-events-windows-event-collector/), [AWS logs](/docs/integrations/amazon-aws/), and [GuardDuty logs](/docs/integrations/amazon-aws/guardduty/). You should also consider whether your data is structured, like key-value pairs, or unstructured, like plain text files. Most data ingested into Sumo Logic is semi-structured, like JSON logs. + +Once you've answered these questions, you can assess what is and isn't working for you and your SOC team. You can then partition your data in Sumo Logic and forward some or all of it to Cloud SIEM. + +#### Extra resources + +* All data must be ingested into Sumo Logic before it can be forwarded to Cloud SIEM. See [Cloud SIEM Ingestion](/docs/cse/ingestion/) to learn more details about data ingestion, setting up collectors, partitioning your data, and designing good metadata. +* If you only want to forward some, but not all of your data to Cloud SIEM you can use data tiers and partitions. For more information, see [Partitions](/docs/manage/partitions/). + +### Which UI should I use? + +As a Cloud SIEM admin, you'll use both the Sumo Logic UI and the Cloud SIEM UI. Even if you're primarily focused on Cloud SIEM, you need to be comfortable using both interfaces. + +| Sumo Logic UI | Cloud SIEM UI | +| :-- | :-- | +| | | + +In the Sumo Logic UI, you'll add the collectors and data sources that will be used in Cloud SIEM. You can write field extraction rules, which help parse your logs so they can be better used as records in Cloud SIEM. You can also configure partitions and data tiers in Sumo Logic, and decide which data gets forwarded to Cloud SIEM. Finally, you configure users and roles for both Sumo Logic and Cloud SIEM using the Sumo Logic interface. + +In the Cloud SIEM UI, you'll configure the log and ingest mappings that turn your log messages into records. You can also create custom content to help with threat investigations like rules, match lists, and insights. Finally, you can customize what the actions, context actions, and workflows do in the Cloud SIEM interface, using APIs and other playbooks. + +## Configure and enable Cloud SIEM + +### Get your data into Cloud SIEM + +After you've decided what data to ingest (or not ingest), you can work on forwarding that data to Cloud SIEM. + +When you enable data forwarding, Cloud SIEM automatically starts processing your log messages into records. Each record contains the information from a message, which is parsed into key-value pairs, mapped to a Cloud SIEM schema, and enriched with other data. + +Forward data + +As an admin, there are several steps you must complete to forward data to Cloud SIEM. +1. First, you request backend configuration. This is a one-time setup for each Sumo Logic organization. Often, your Sumo account rep will complete this process for you. +1. Next, you enable data forwarding. You can do this by adding the `_siemForward = True` field when you set up a collector. For cloud data sources, you can also toggle the **Forward to SIEM** checkbox. You'll need to enable data forwarding each time you add a new data source into Sumo Logic, update your partitions, or make other changes to your data ingestion process. + + Cloud SIEM will not ingest historic data. In other words, any new data ingested into Sumo Logic will be forwarded to Cloud SIEM as soon as you enable data forwarding. However, older data will not be processed by Cloud SIEM. Data will start flowing from Sumo Logic into Cloud SIEM within a few minutes of enabling data forwarding. You can expect signals and insights to start generating within a few hours. +1. Finally, you'll configure the log and ingest mappings. This process is usually automatic, but must be completed for certain types of custom data sources. + +If you do need to configure log and ingest mappings, there are certain details you need to know about your data: +* Is your data structured or unstructured? +* Does your data have a syslog header? +* Is your data CEF, LEEF, JSON, XML, or some other common data type? +* Have field extraction rules been applied to your messages in Sumo Logic? +* What product and vendor do your messages come from? For example, are they Windows Event Logs, Palo Alto Firewall logs, or AWS GuardDuty logs? + +Once you know these details of your data, you can consult the Sumo Logic documentation for specific help for configuring your data pipeline. + +Later in this introduction, we'll be ingesting and processing simple, structured JSON log messages to demonstrate this configuration process. + +#### Extra resources + +* There are many different data sources and data types you may be ingesting into Sumo Logic. You can read the details about forwarding data from various vendors and products to Cloud SIEM in [Cloud SIEM Ingestion](/docs/cse/ingestion/). +* For the best signals and insights with the fewest false positives in Cloud SIEM, you need to ingest high-quality data. You can ensure your data is high quality by making sure your data and metadata are clean and organized from the moment you first ingest them into Sumo Logic. One way to do this is by writing good field extraction rules. See [Create a Field Extraction Rule](/docs/manage/field-extractions/create-field-extraction-rule/). + +### Enable data forwarding for an HTTP source + +In this section, we'll show you how to create a new source using a pre-configured collector and enable data forwarding to Cloud SIEM by selecting the **Forward to SIEM** checkbox. Once the new source is configured with data forwarding, you'll be able to send data to it and observe the data flow. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Collection > Collection**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the Sumo Logic top menu select **Configuration**, and then under **Data Collection** select **Collection**. You can also click the **Go To...** menu at the top of the screen and select **Collection**. +1. Locate a hosted collector whose data you want to forward to Cloud SIEM. +1. Click **Add Source**. +1. Click **HTTP Logs & Metrics**. +1. Enter a name and source category. +1. Select the **Forward to SIEM** checkbox. +1. Leave other fields as their defaults and click **Save**. +1. A popup will appear with a URL. Copy the URL and keep it somewhere safe, like a Notes or TextEdit file. We'll use it in the next section. + +#### Tips and tricks + +* Read [Best Practices for Data Collection](/docs/send-data/best-practices/). +* If you need to find the HTTP source URL address again, click the **Show URL** link next to your source. + +### Send a log message to Cloud SIEM + +In this section, we'll send a simple JSON log message to the HTTP source we created in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source). Then, we'll look for that log message in Cloud SIEM. This will verify that we configured our source correctly, and demonstrate how quickly Cloud SIEM can ingest data. + +1. Open a CLI window, such as Terminal or PowerShell. +1. Type this command: + * Windows: + ``` + curl.exe -d "{"ip": "192.0.2.0", "threatName": ""}" -H "Content-Type: application/json" + ``` + * macOS: + ``` + curl -d '{"ip": "192.0.2.0", "threatName": ""}' -H 'Content-Type: application/json' + ``` + Replace `` with your own initials or another unique identifier. Replace the `` with the URL you copied in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source). + + This simple JSON log message, `{"ip": "192.0.2.0", "threatName": "trainingRS"}`, will be collected and ingested by Sumo Logic as soon as you press Enter. If data forwarding was enabled properly in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source), it's also forwarded to Cloud SIEM where it's parsed, mapped, and enriched. This process can take anywhere from a few seconds to up to 15 minutes. + +1. When you're ready, we'll find your log message as a record in Cloud SIEM. + 1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). Click **Records** at the top of the screen.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Records**. You can also click the **Go To...** menu at the top of the screen and select **Records**. + 1. In the **Filters** bar, select **Metadata Source Category** from the dropdown. + 1. Select the **is** operator from the dropdown. + 1. Type the source category you used in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source). + 1. You should see a failed record. This record failed because the custom JSON log message does not have a log or ingest mapping associated with it. Although the log message was forwarded from Sumo Logic to Cloud SIEM, it did not successfully complete the parse, map, and enrich steps of the pipeline. We'll fix this in the next sections. + +#### Tips and tricks + +* If you get an error after running the CURL command in step 2, make sure your quotation marks are straight. Copy and pasting the command sometimes changes the formatting of these quote marks into curly quotes. +* If you don't see any records, try: + * increasing the timestamp range to the last 60 minutes or the last 3 hours. + * making sure the metadata source category you searched in the **Filters** bar matches the one you created earlier. + * searching for the log in Sumo Logic with this query: `_index=sec_record_* metadata_sourceCategory=` Replace `source-category` with the source category you created. +* If you still don't see your custom JSON record after these troubleshooting steps, try sending another log message from your terminal window. Make sure the command completes without any errors. + +### Logs into records + +Logs into records + +Now that you have a source set up to send data Sumo Logic into Cloud SIEM, let's follow a simple log message down that data pipeline. + +``` +sso : ip-192-0-2-0 : alex@travellogic.com : "Successful Login" : “2024-05-25T22:11:42" +``` + +First, the message is parsed into a set of key-value pairs. This process also fixes basic formatting. This step creates semi-structured data. For example, instead of ip-127-0-0-1, the parsing step extracts the IP address into a key-value pair, where the key is something like `srcDeviceIP` and the value is `192.0.2.0`, with the hyphens normalized to dots. Then, this information is mapped onto the [Cloud SIEM schema](/docs/cse/schema/). Finally, the record is enriched with information from match lists or threat intelligence databases. + +These normalized records are then sent down the Cloud SIEM pipeline and compared to rules. When Cloud SIEM extracts an entity from a record to create a signal, it uses the parsed and mapped key-value pairs to categorize each signal. When signals with the same entity cluster together, an insight is created. Therefore, it's important for the records to have quality metadata from the start to produce the best insights. + +You can make sure these records are parsed, mapped, and enriched properly by maintaining good metadata design and setting up good log and ingest mappings, which we'll practice in the next sections. + +### Set up an ingest mapping + +In [Send a log message to Cloud SIEM](#send-a-log-message-to-cloud-siem), we sent a log message to Cloud SIEM, and received a "failed record" error. In this section and the next one, we'll create ingest and log mappings to ensure the custom JSON data from the log messages we send are used properly by Cloud SIEM. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then and under **Integrations** select **Sumo Logic**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Ingest Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Ingest Mappings**. +1. Click **Add Ingest Mapping**. +1. Enter the source category you used in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source). +1. Select **JSON** as the **Format**. This matches the format of the log message we sent in [Send a log message to Cloud SIEM](#send-a-log-message-to-cloud-siem). +1. Enter a **Vendor** and **Product**. As a best practice, avoid spaces in the vendor and product names. +1. Click **Save**. +1. Hover your mouse over the new ingest mapping, click the three-dot icon that appears to the right, and select **Enable**. + +#### Extra resources + +If you need help configuring other types of ingest mappings, see [Configure a Sumo Logic Ingest Mapping - Cloud SIEM](/docs/cse/ingestion/sumo-logic-ingest-mapping/). + +### Set up a log mapping + +In this section, we'll create a log mapping to ensure the custom ingest mapping we created in [Set up an ingest mapping](#set-up-an-ingest-mapping) is used properly by Cloud SIEM. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. Click **Add Log Mapping**. +1. Click **Structured Mapping**. In Cloud SIEM, JSON data is considered to be structured data. +1. Give your log mapping a name. +1. Under **If Input Matches**, use the vendor and product you created in [Set up an ingest mapping](#set-up-an-ingest-mapping). +1. Select **JSON** as the format. +1. Type `.*` for the regex. This will match all incoming logs. +1. Under **Then Create Record**, the vendor and product should match what you entered under **If Input Matches**. +1. In **Fields**, enter the fields from the JSON log message we sent in [Send a log message to Cloud SIEM](#send-a-log-message-to-cloud-siem) under **Input Field**. Then, under **Output Field**, map them to their equivalents in the Cloud SIEM schema. Then, click **Add Field**. Refer to this table for help: + | Input field | Output field | + | :-- | :-- | + | ip | device_ip | + | threatName | threat_name | + :::note + Typically, JSON logs have more than just two fields. In this section, we're using the simplified example log we sent in [Send a log message to Cloud SIEM](#send-a-log-message-to-cloud-siem), so we only need to add two new fields. + ::: +1. Scroll back up to **Then Create Record**. +1. For **Record of type** select **Authentication**. Selecting the record type now ensures you do not limit the fields you could selected in an earlier step. +1. Click **Submit**. + +#### Tips and tricks + +* See [Field Mapping for Security Event Sources](/docs/cse/schema/field-mapping-security-event-sources/) for a for a full list of the fields you can map to. +* Hover over the yellow triangle next to the **Submit** button to see a list of errors and warnings that need to be resolved before you can submit. + +### Send another log message to Cloud SIEM + +Your new log and ingest mappings won't apply to the first log message you sent in [Send a log message to Cloud SIEM](#send-a-log-message-to-cloud-siem). In this section, we'll send another log message to the HTTP source we created in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source). Then, we'll look for that new log message in Cloud SIEM. This time, the log and ingest mappings we created in [Set up an ingest mapping](#set-up-an-ingest-mapping) and [Set up a log mapping](#set-up-a-log-mapping) should apply to the new record. + +1. Open a CLI window, such as Terminal or PowerShell. +1. Type this command: + * Windows: + ``` + curl.exe -d "{"ip": "192.0.2.0", "threatName": ""}" -H "Content-Type: application/json" + ``` + * macOS: + ``` + curl -d '{"ip": "192.0.2.0", "threatName": ""}' -H 'Content-Type: application/json' + ``` + Replace `` with your own initials or another unique identifier so you can find it easily later. Replace the `` with the URL you copied in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source). + + :::tip + Since you already sent a CURL command in [Send a log message to Cloud SIEM](#send-a-log-message-to-cloud-siem), you may be able to press the up arrow key and Enter to send the command again in most CLI programs. + ::: + + This simple JSON log message, `{"ip": "192.0.2.0", "threatName": ""}`, will be collected and ingested by Sumo Logic as soon as you press Enter. If data forwarding was enabled properly in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source), it's also forwarded to Cloud SIEM where it's parsed, mapped, and enriched. This process can take anywhere from a few seconds to up to 15 minutes. + +1. When you're ready, we'll find your log message as a record in Cloud SIEM. + 1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). Click **Records** at the top of the screen.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Records**. You can also click the **Go To...** menu at the top of the screen and select **Records**. + 1. In the **Filters** bar, select **Metadata Source Category** from the dropdown. + 1. Select the **is** operator from the dropdown. + 1. Type the source category you used in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source). + 1. You should see a record with the IP address and threat name parsed properly. + +Although the log message and method of ingestion was identical, the log message failed to parse into a Cloud SIEM record in [Send a log message to Cloud SIEM](#send-a-log-message-to-cloud-siem) because the log and ingest mappings weren't configured. After we configured the log and ingest mappings, the new log messages forwarded to Cloud SIEM successfully completed the parse, map, and enrich steps to become a record. + +#### Tips and tricks + +* If you get an error after running the CURL command, make sure your quotation marks are straight. Copy and pasting the command sometimes changes the formatting of these quote marks into curly quotes. +* If you don't see any records, try: + * increasing the timestamp range to the last 60 minutes or the last 3 hours. + * making sure the metadata source category you searched in the **Filters** bar matches the one you created in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source). + * searching for the log in Sumo Logic with this query: `_index=sec_record_* metadata_sourceCategory=` Replace `` with the source category you created earlier. +* If you still don't see your custom JSON record after these troubleshooting steps, try sending another log message from your terminal window. Make sure the command completes without any errors. +* If your new record failed too (you see two failed records), either your log or ingest mapping weren't configured correctly. Review those configurations and try again. + +## Tune your environment + +### Why tune? + +Once your data gets ingested in Cloud SIEM and is made into records, the records are compared to every rule in Cloud SIEM. If there's a match, an entity is extracted and a signal is created. Those entities are tracked and may correlate with other signals to create an insight, which is where most threat investigations begin. + +Records to signals + +You've already learned how to set up log and ingest mappings to ensure rules accurately match and track these entities. Now that you have a properly parsed a record in Cloud SIEM, it will be compared to rules and potentially generate signals and insights. + + +You've already learned how to set up log and ingest mappings to ensure rules accurately match and track these entities. Now that you have a properly parsed record in Cloud SIEM, it will be compared to rules and potentially generate signals and insights. + +Although you don't have to write rules from scratch, you can. In fact, there are several customizations you can do through Cloud SIEM. +* [Rule tuning expressions](/docs/cse/rules/rule-tuning-expressions/) are simple ways to add small exceptions and other clauses to existing rules. +* [Rules](/docs/cse/rules/about-cse-rules/) let you write logic that's unique to your system, to cover threats or data sources that aren't covered by built-in rules. +* [Custom insights](/docs/cse/records-signals-entities-insights/configure-custom-insight/) let you get alerts based on just one rule or a chain of rules. +* [Match lists](/docs/cse/match-lists-suppressed-lists/create-match-list/) can help create groups of entities, such as domains or IP addresses, that can be used when creating other custom content. + +Through [role-based access controls](/docs/manage/users-roles/roles/role-based-access-control/), you can allow analysts to customize content as well. However, as a best practice, you should limit who in your organization has the permission to edit and delete rules and other content, since they can impact the number of insights that are generated. + +### Custom rules + +You don't have to write rules from scratch. The Sumo Logic content team creates and maintains hundreds of out-of-the-box rules, to get you started. You can find documentation on all the out-of-the-box rules in the [Cloud SIEM Content Catalog](/docs/cse/get-started-with-cloud-siem/cloud-siem-content-catalog/). These rules are updated frequently, often every few days. You can check out the most recent updates in the [release notes](/release-notes-cse/). + +However, if you have a specific threat you're concerned about or a unique data source that isn't covered, you can write a custom rule. See [Rule types](/docs/cse/rules/about-cse-rules#rule-types) for the types of rules you can create: +* **Match rules** take a simple boolean statement, check if it's true or false. If it's true, then an entity is extracted and a signal is created. +* **Threshold rules** are triggered when a match is found a certain number of times. So, for example, if one failed login attempt is acceptable, but 5 isn't, then a threshold rule would fire after the fifth failed login attempt. +* **Chain rules** fire when certain events happen in a certain time window. So, for example, if you want to look for 5 failed login attempts followed by one successful log in within one hour, you'd use a chain rule. +* **Aggregation rules** are triggered when up to six different events accumulate over time. For example, if you want a rule that looks for a large number of event types from a single device IP, you'd use aggregation rules. +* **First Seen rules** are triggered when behavior by an entity (such as a user) is encountered for the first time. For instance, it fires the first time a user logged in from a new geographic location. +* **Outlier rules** are triggered when behavior by an entity is encountered that deviates from "normal" baseline activity. For instance, it fires when a user has an abnormal volume of downloaded data, or has a number of failed logins. + +As a Cloud SIEM admin, you'll be able to create all these rules. Work with the SOC analysts on your team to write rules that help them investigate threats and reduce response time. + +Before you create custom rules from scratch, there are some best practices you'll want to follow. +* **Check existing rules**. Sumo Logic already has hundreds of [built-in rules](/docs/cse/rules/cse-built-in-rules/), so you might not need to write a new one. Or, you may only need to make small changes to existing rules, like adding a rule tuning expression or adjusting a severity score. +* **Know your system**. You'll need to understand the [schema](/docs/cse/schema/) and [log mappings](/docs/cse/schema/create-structured-log-mapping/) of all the records ingested into Cloud SIEM to write effective rules. As an administrator, it's your responsibility to know this inside and out. +* **Know your risk appetite**. In addition to your system's details about log mappings and other metadata, you need to understand your company's risk appetite and risk tolerance. For example, some companies might want to monitor a large amount of outbound traffic, but not consider this a threat. So, they'd assign this rule a severity of zero. However, other companies might be alarmed by outbound traffic and consider it data exfiltration, assigning the same rule a severity of five. +* **Know the rule types**. You also need to understand all [the types of rules](/docs/cse/rules/about-cse-rules/#rule-types). If your use case requires a chain rule, but you try writing a threshold rule, the rule might not be as efficient or effective. +* **Make small changes**. As a best practice, when you do write a new rule or edit an existing one, make small changes. For example, instead of decreasing a severity score from 8 to 2, try decreasing it from 8 to 7 and monitoring the change for a while. +* **Save as a prototype**. Another best practice is to [save all new rules as a prototype](/docs/cse/rules/write-match-rule#save-as-prototype). This allows you to monitor the rule's behavior, without creating new insights and alerts. + +### Write a threshold rule + +In this section, we'll write a rule that looks for three unique Windows event IDs related to failed logins within an hour. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Rules**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Rules**. You can also click the **Go To...** menu at the top of the screen and select **Rules**. +1. Click **Create**. +1. On the **Threshold** tile click **Create**. +1. Give your rule a name. +1. Configure **If Triggered**. + 1. Under **Show Advanced**, select **Count only distinct values for a field**. + 1. Under **When a Record matches the expression**, look for event IDs from Windows by typing this logic: `metadata_deviceEventId=4625`. + 1. Select **matches Records with 3 distinct values**. + 1. In **for field** select **device_ip**. + 1. Select **within 1 hour(s)**. This configuration looks for any three records within one hour that have the event `ID 4625`, which is the Windows event ID for a failed login attempt. +1. Configure **Then Create Signal**. + 1. For **On Entity** select **device_ip**, since that's the unique entity we want to track. + 1. Enter a description in **with the description**. + 1. Under **with a severity of** select any severity score you think is appropriate for your rule. + 1. In **with tags** select **Tactic** and **TA0001 - Initial Access**. Because we're looking for failed logins, these are attempts at initial access. + 1. Select the **Save this rule as a prototype** checkbox. + 1. Click **Submit** to save your rule. + +#### Tips and tricks +* Rule names must be unique. If your rule won't submit, it's possible that there is a rule with the same name. +* The autocomplete feature can help you write the logic. For example, typing "ip" will bring up a dropdown showing all available fields related to IP addresses. +* The syntax coloring can help you write the logic. For example, try using single quotes ('...') instead of double quotes ("..."). Notice that the syntax coloring lights up correctly when you use double quotes, which is the best practice. +* Insights are named based on the tactics and techniques tagged in the signals. Consider which tactic or technique from the [MITRE ATT&CK](https://attack.mitre.org/) framework your rule is looking for when selecting tags. +* Whenever you create a new rule in Cloud SIEM, save it as a prototype so you can monitor its behavior for a few weeks before pushing it to your system live. +* Check for an orange triangle icon next to the **Submit** button before you submit. This will notify you of any errors or warnings. + +### Write a chain rule + +In this section, we'll write a chain rule that looks for 1 successful login after 10 failed login attempts from the same IP address within 5 minutes. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Rules**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Rules**. You can also click the **Go To...** menu at the top of the screen and select **Rules**. +1. Click **Create**. +1. On the **Chain** tile click **Create**. +1. Give your rule a name. +1. Configure **If Triggered**. + 1. For **When at least ___ Record matches expression** select **10**. For the rule expression enter `bro_rfb_authenticationSuccessful=False`. + 1. For **When at least ___ Record matches expression** select **1**. For the expression enter `bro_rfb_authenticationSuccessful=True`. + 1. Select **in exact order** and **within 5 minutes**. +1. Configure **Then Create Signal**. + 1. For **On Entity** select **device_ip**. This will also update the **Grouped by** field in the **If Triggered** section. + 1. In **with the description** write a description of the rule. + 1. For **with a severity of** select any severity score you think is appropriate for your rule. + 1. In **with tags** select **Tactic** and **TA0001 - Initial Access**. Because we're looking for failed logins, these are attempts at initial access. +1. Select the **Save this rule as a prototype** checkbox. +1. Click **Submit** to save your rule. + +### Other customizations + +Once your data is flowing into Cloud SIEM, millions of records will be compared to rules. From these, several hundred may match the rules in your system to create signals and a handful of insights. + +After you and the SOC analysts on your team monitor Cloud SIEM for a period of time, you may decide you want even further customizations and performance tuning. Many of these customizations can only be performed by an administrator. For example, as an admin, you can: +* **Customize the Actions button in Insights**. Admins can create custom actions. Analysts use the **Actions** button on the [insight details page](/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/#insight-details-page) to help complete their investigations. You can use APIs when creating custom actions, so you have a lot of flexibility and creativity here to do things like execute playbooks, create JIRA tickets, or send Slack notifications. +* **Create and update match lists and suppression lists**. [Match lists](/docs/cse/match-lists-suppressed-lists/) are groups of entities that Cloud SIEM can use in rules. They're similar to allowlists or denylists. Cloud SIEM comes with dozens of standard match lists, but you can also create your own. +* **Insight generation and custom insights**. There are several ways you can customize your insights. Although the default is to cluster entities together with an activity score of at least 12 over the last 14 days, the threshold for [insight generation](/docs/cse/get-started-with-cloud-siem/insight-generation-process/) is configurable. You can increase or decrease the time frame, or adjust the activity score threshold. You can also create [custom insights](/docs/cse/records-signals-entities-insights/configure-custom-insight/), which will be created when certain rules are triggered, regardless of their severity scores. +* **Create custom workflows**. By default, you can mark an insight as New, In Progress, or Closed. However, with [custom workflows](/docs/cse/administration/manage-custom-insight-resolutions/#create-a-custom-sub-resolution), you can create a new status. For example, if your analysts frequently like to keep insights open while digging deeper to find the root cause, you might want to create a custom workflow for that called Investigating to keep it separate from other insights that are at different stages of the In Progress stage. + +### Customize the Actions button + +The **Actions** button is available in all insights in Cloud SIEM and can help you collaborate with teammates. In this section, we'll create a custom **Actions** button to alert an incident response team. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Integrations** select **Actions**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Actions**. You can also click the **Go To...** menu at the top of the screen and select **Actions**. +1. On the **Actions** tab, click **+ Add Action**. +1. Give your action a name. +1. Under **Action Type** select **Email**. +1. Under **Notifications** select **On Demand**. +1. In the **Recipients** field, enter an email address. +1. Click **Save**. +1. Hover your mouse over the action, click the three-dot menu on the right, and select **Enable**. +1. Now, we'll test our new **Actions** button: + 1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). Click **Insights** at the top of the screen.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu select **Cloud SIEM > Insights**. You can also click **Go To...** at the top of the screen and select **Insights**. + 1. Click the name of any insight. + 1. In the left pane, click **Actions**. You should see your new action listed. + 1. Click the action on the list to execute it. + +### Next steps + +So far in this introduction article, you learned how data is forwarded from Sumo Logic to Cloud SIEM. You followed a simple log message down the data pipeline. Then you learned how to set up log and ingest mappings to ensure that message was parsed properly into a record in Cloud SIEM. You also learned how to create custom rules, to make sure the data you ingest gets used in Cloud SIEM's threat detection engine properly. And you created a custom **Actions** button, so the analysts on your team can alert others in our company. + +What's next? + +* **Configure the data you're ingesting**. Make sure you're familiar with types of data you [ingest](/docs/cse/ingestion/) and whether or not that data is forwarded properly to Cloud SIEM. Work with the analysts on your team to determine if you're ingesting too much or too little data. +* **Create the roles and capabilities of your team**. Assign [Cloud SIEM role capabilities](/docs/manage/users-roles/roles/role-capabilities/#cloud-siem) to ensure the analysts on your team have access to Cloud SIEM and can interact with the insights, signals, rules, and entities they need to complete their investigations. +* **Create custom content**. Work with your SOC teammates to create custom [log mappings](/docs/cse/schema/create-structured-log-mapping/) and [ingest mappings](/docs/cse/ingestion/sumo-logic-ingest-mapping/), [rules](/docs/cse/rules/about-cse-rules/), [insights](/docs/cse/records-signals-entities-insights/configure-custom-insight/), and [actions](/docs/cse/administration/create-cse-actions/) that suit your organization's needs. + +## Automation + +### Why automate? + +[Automation](/docs/cse/automation/) is a key feature of Cloud SIEM that can help manage insights without a lot of manual effort. Automations are composed of "smart actions" such as enrichments and notifications that can be automatically triggered under a set of circumstances, such as an insight being created or closed. Cloud SIEM automations use playbooks, a pre-defined set of actions in a linear or branching workflow to execute when the proper circumstances arise. + +There are several reasons you might want to automate some security tasks: +* **Faster responses**. Automating parts of your SOC can mean faster response times. +* **Consolidate tools**. Orchestrate all your security tools in one location with integrations and custom APIs. +* **Close the skills gap**. Analysts of all skill levels can deploy playbooks. Veteran analysts can spend more time on threat hunting. + +Typically, each playbook in Cloud SIEM will help partially or fully automate one or more steps of the incident response cycle. + +Incident response cycle + +### Automations and integrations + +Cloud SIEM comes with hundreds of pre-built playbooks, integrations, and use cases as part of [App Central](/docs/platform-services/automation-service/app-central/). + +As a Cloud SIEM administrator, you can explore App Central and install any integrations your team requests. You can also create custom integrations using APIs from the **Integrations** page. These integrations will connect Cloud SIEM to other tools like CrowdStrike, ServiceNow, or Jira. Once all your tools are integrated, Cloud SIEM can be a single, central location for orchestrating your security response. + +### Install a new integration + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Automation** and then and click **App Central** in the left navigation bar.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu select **Automation > App Central**. You can also click the **Go To...** menu at the top of the screen and select **App Central**. +1. Click **Integrations** at the top of the window. +1. Find any integration that isn't already installed and click **Install**. If an integration has already been installed by another user, you will not see the option to download it. Instead, it will say **Installed**. +1. A popup window will appear, summarizing the actions that will become available once the integration has been installed. Once you have reviewed these actions, click **Install**. The actions will vary based on which integration you chose to install. +1. Verify the integration is installed. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Automation** and then select **Integrations** in the left nav bar.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Automation > Integrations**. You can also click the **Go To...** menu at the top of the screen and select **Integrations**. + +You should see the integration you installed here. This is how you can verify which integrations are installed on your instance of Cloud SIEM. You can now use the integration as part of any new playbooks you customize or create. + +### Playbooks + +Once you've identified a potential security incident, you can respond to it in Cloud SIEM by executing a playbook. Playbooks are automated, or partially automated, workflows that act based on information from an incident. A playbook can enrich data, contain threats, notify teams, and other actions with custom APIs. These actions help automatically orchestrate many parts of the investigation, containment, eradication, and recovery processes. + +Custom playbooks allow you to automate any task that uses a custom API. You can also use them to automate tasks that aren't part of the hundreds of default playbooks included in Cloud SIEM. + +Playbooks are made up of nodes which are connected together in a flowchart. Whether you're customizing a playbook or creating one from scratch, you have several node options: +* **Actions**. Enrich data, execute APIs, send notifications, or use other integrations. +* **Conditions**. If-then statements that allow playbooks to branch in different directions. +* **Embedded playbooks**. Run another playbook. + +Each of these nodes are color-coded in a playbook. The following image shows a sample playbook. Note the different actions and enrichments, along with the branches that execute different sequences of actions based on conditions. + +Playbook example + +* A. **Condition**. Conditions, represented by a purple diamond, allow your playbook to branch in different directions based on an if-then statement. +* B. **Enrichment**. Green nodes are enrichments. These might add additional information from a threat intel database or convert data from one type to another. +* C. **Notification**. Blue nodes are notification actions, such as a Slack or email alert. + +Action nodes use integrations. These integrations broadly fall into several types: +* **Enrichment**. Add information, metadata, or context, such as from a threat intelligence database. +* **Containment**. Reduces further damage by isolating files or machines related to a threat. +* **Notification**. Alerts sent via email, Slack, PagerDuty, or most other services you can connect with an API. +* **Custom**. Scripts and any other automations you can create using YAML, Perl, Python, PowerShell, or Bash. +* **Daemons**. Background processes that can ingest data. + +Custom actions can also include trigger actions, which run based on an event type until certain criteria are met. For example, if malware is detected, a trigger action could run an anti-malware cleanup software until no malware is detected. Similarly, you can create scheduled actions that run at certain intervals. For example, you could create a scheduled action that checks for malicious IP addresses every 5 minutes until no more malicious IP addresses are found. + +#### Best practices + +Before you begin creating or customizing a playbook, decide what you'd like to automate. Think about what conditions you want met, and what actions or integrations you want to accomplish based on different flows. Once you have a design in mind for the flow of your playbook, you can create or customize a new one. Search App Central to see if the automations you want already exist, or if you can modify a playbook that's similar to what you have in mind. + +### Create a custom playbook + +In this section, we'll create a simple playbook from scratch. This playbook will send an email with insight details. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu of Cloud SIEM select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. +1. On the **Automation** tab, click **Manage Playbooks**. This opens the [Automation Service UI](/docs/platform-services/automation-service/about-automation-service/#automation-service-ui). +1. Near the top, click the **+** icon to create a new playbook. +1. Configure the playbook: + 1. Give your playbook a name. + 1. From the **Type** dropdown, select **Cloud SIEM**. + 1. Write a short description. For example, "Email Notification with Insight Details" + 1. Click **Create**. +1. Click the Edit (pencil) icon near the bottom of the playbook. +1. Hover over the **Start** node, then click the pencil icon. +1. Select **Insight** from the dropdown. This will populate the dialog with additional parameters from the insight input, which we can use in other places in the playbook. +1. Click **Update** to close the dialog window. +1. Click the plus icon on the **Start** node to add a new node. +1. Choose **Action** as the node type. +1. Configure the node with the following steps: + 1. In **Node name** type "Email Notification". + 1. From the **Integration** dropdown select **Basic Tools**. + 1. From the **Type** dropdown, select **Notification**. + 1. In the **Action** dropdown, select **Send Email**. + 1. For **Recipients**, enter an email address. (If you enter your own email address, you'll be able to check the email results later.) After entering the email address, press Enter to accept it. More than one email address can be entered to the **Recipients** field. + 1. In the **Subject** field, type "Insight Details". + 1. In the **HTML Content (Body)** field, click the **{ }** button to create a placeholder field. Click in the red field and select **Playbook.input.name**. Create two more placeholders with the following fields: **Playbook.input.id** and **Playbook.input.status.displayName**. Add any additional text content or formatting as desired. + 1. Click **Create**. +1. Back on the playbook edit screen, drag the mouse cursor from the half-circle on the right side of the **Email Notification** action to the equivalent node connector on the **End** node. +1. Click the **Save** button at the bottom of the screen to save your playbook. +1. Click the **Publish** button at the bottom of the screen to publish your playbook and make it available for automations. You can add a description to your playbook in the **Publish** dialog window if you'd like. + +If the playbook is published successfully, you will see "Published version" in the upper right, instead of "Draft". + +### Automations in Cloud SIEM + +[Automations in Cloud SIEM](/docs/cse/automation/automations-in-cloud-siem) define the conditions in which a playbook will be executed for Cloud SIEM. For instance, you might want to execute a specific playbook whenever Cloud SIEM creates a new insight. Or another playbook whenever an insight is closed to create and distribute appropriate notifications or reports. Automations can also be set to "manual execution", allowing operators to run the playbook on a specific insight when judged necessary. + +This way, potentially the entire incident response cycle can now be automated: Cloud SIEM identifies a threat, creates an insight, then a playbook is automatically deployed to perform necessary actions and email a final report for an analyst to review. + +### Create a custom automation + +In this section, you'll create a custom automation using the playbook you created in the previous lab. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu in Cloud SIEM select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. You can also click the **Go To...** menu at the top of the screen and select **Automation**. +1. In the upper right of the **Automation** tab, click **+ Add Automation**. +1. In **Playbook**, select your custom playbook created in the previous section [Create a custom playbook](#create-a-custom-playbook). (If you do not see your playbook in the list, return to the previous steps and ensure your playbook was published as well as saved.) +1. For the **Object (expects attributes for)** field, select **Insight**. +1. Note that the checkboxes under **Execution** field show that you can trigger your automation when an insight is created or closed. For this example, however, select **Manually Done**. +1. Click **Save**. + +#### Test your automation + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). Click **Insights** at the top of the Cloud SIEM screen.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu select **Cloud SIEM > Insights**. You can also click **Go To...** at the top of the screen and select **Insights**. +1. Select any insight from the list by clicking on its name. +1. Click on the **Actions** menu in the left sidebar. +1. Select your automation from the **Insight Automations** list. (If you do not see your automation, you may need to leave and return to Cloud SIEM to refresh the list.) +1. You should see a green popup at the bottom indicating that your automation was executed successfully. +1. If your playbook included an email notification, and the recipient is your email address, your inbox should have an email from the Cloud SIEM system with the insight details. +1. While still on the insight details screen, click on the **Automations** tab on the top of the screen to see the results of executing your automation. This view will show the status of the automations run on that insight, such as "Running", "Success" or "Completed with errors". 1. +1. If errors occur, you can click the **View Playbook** link on the right side to see the Playbook view, along with any execution errors that occurred. For help, see [Troubleshoot playbooks](/docs/platform-services/automation-service/automation-service-playbooks/#troubleshoot-playbooks). + +You now have a custom automation that can be manually run or attached to an insight upton creation or closing. \ No newline at end of file diff --git a/docs/cse/get-started-with-cloud-siem/intro-for-analysts.md b/docs/cse/get-started-with-cloud-siem/intro-for-analysts.md new file mode 100644 index 0000000000..0918b81723 --- /dev/null +++ b/docs/cse/get-started-with-cloud-siem/intro-for-analysts.md @@ -0,0 +1,443 @@ +--- +id: intro-for-analysts +title: Introduction to Cloud SIEM for Analysts +sidebar_label: Introduction for Analysts +description: Learn basic concepts about Cloud SIEM for security analysts. +--- + +import useBaseUrl from '@docusaurus/useBaseUrl'; + +This article provides an introduction to Cloud SIEM for analysts. + +If you are unsure whether you are an analyst or administrator, you can view your role in **Preferences** (see [Onboarding Checklists](/docs/get-started/onboarding-checklists/)). To use Cloud SIEM as an analyst, you must be assigned [Cloud SIEM role capabilities](/docs/manage/users-roles/roles/role-capabilities/#cloud-siem) that allow you to view Cloud SIEM elements and perform analyst tasks. + +## From logs to security insights + +### What is Cloud SIEM? + +Cloud SIEM is a security information and event management (SIEM) system. Cloud SIEM leverages Sumo Logic's core functionality, including data collection, ingestion, storage, and threat intelligence. + +The following images show Sumo Logic's Cloud SIEM home page. + +Cloud SIEM main page + +* A. **Count**. A count of the records created from incoming messages, and the signals and insights that have been generated. +* B. **Insights by Status**. An overview of recent insights and their statuses: New, In Progress, Closed, or Other. +* C. **Radar**. Visualizes the last 24 hours of security activity. Dark blue lines represent records, light blue bars represent signals, and red triangles represent insights. +* D. **Recent Activity**. Displays a feed of the latest insights that have been generated. + +Cloud SIEM is a purchased add-on with an ever-expanding library of content designed for security operations. Cloud SIEM automatically normalizes, enriches, and correlates all your data across multiple data sources into actionable security insights. Because it's designed for larger data volumes, most organizations need to ingest a large amount of data each day for insights to surface in Cloud SIEM. For smaller organizations, [additional security features](/docs/security/additional-security-features/) may be a better fit for your data ingest volume. + +### Getting your data into Cloud SIEM + +If you already use Sumo Logic, you're probably familiar with the data pipeline: + +Sumo Logic data pipeline + +1. **Data collection**. To use Sumo Logic, first you must set up either an installed collector or a hosted collector and add a source. You can also set up source categories and other metadata, which helps you search and analyze the data you collect. +2. **Search and analyze**. Once data is in Sumo Logic, you can write queries to search and correlate events in real-time from the analytics platform UI. Or, you might configure the collector to forward data to Cloud SIEM, and let it do all the correlation work for you. +3. **Visualize and monitor**. Once you've found and analyzed data that's interesting, you can create dashboards to visualize it and set up alerts to monitor your data in real-time. +4. **Share the findings**. Export your dashboards or share with others on your team. You can control who can view and edit your dashboards to keep your data secure. + +Throughout this section, you'll learn more about the security data pipeline. Then, you'll be better prepared to discuss these things with your admin, or to set them up yourself if you need to. + +#### Data collection + +Before you can start investigating threats, you need data. As a data analyst, this step may have been done by your administrator. + +Your company collects and ingests millions of log messages into Sumo Logic. Typically, you can use these messages right away in many Sumo Logic apps. To use them in Cloud SIEM, however, your admin must enable data forwarding. Your admin may also need to create log mappings, field extraction rules, or complete other preprocessing steps to extract the right data. + +Sumo Logic data pipeline + +As a data analyst, you should periodically examine the data that's being ingested into Sumo Logic and Cloud SIEM. After you've been using Cloud SIEM for a while, you may want to fine-tune it to fit your organization's needs. If you discover that you're ingesting too much or too little data to do threat hunting, you can work with your admin to find that balance. + +So, what's the balance between too much and too little data? It depends. Work with your admin to answer these questions: + +* **Are you ingesting enough data?** Cloud SIEM takes thousands or millions of records and boils them down into just a handful of insights. Most organizations ingest more than 50GB of data every day to start finding any insights. If your ingest volume is smaller than this, consider sending more data to Cloud SIEM. +* **Are you ingesting too much data?** More data doesn't always mean more insights. The threat detection logic built into Cloud SIEM generally prevents false positives. However, some organizations choose to ingest or store less data as a way to cut costs. One solution is partitioning your data into different tiers, and only sending some of that data along to Cloud SIEM. +* **Are you ingesting the right data?** Cloud SIEM doesn't just work on quantity alone. Quality data will affect your performance as well. As a best practice, you'll need to bring in quality data sources that are supported by Cloud SIEM. High-value data sources include [CloudTrail logs](/docs/integrations/cloud-security-monitoring-analytics/aws-cloudtrail/), [Windows event logs](/docs/send-data/installed-collectors/sources/collect-forwarded-events-windows-event-collector/), [AWS logs](/docs/integrations/amazon-aws/), and [GuardDuty logs](/docs/integrations/amazon-aws/guardduty/). + +### Processing your data for Cloud SIEM + +Before Cloud SIEM can generate security insights, your log messages must go through a little processing first. First, Cloud SIEM processes the messages into records. Each record contains the information from a message, which is parsed into key-value pairs, mapped to a Cloud SIEM schema, and enriched with other data. + +Messages generate records + +Let's follow a simple log message down this pipeline: +``` +sso : ip-192-0-2-0 : alex@travellogic.com : +"Successful Login" : "2024-05-25T22:11:42" +``` + +First, the message is parsed into a set of key-value pairs. This process also fixes basic formatting. This step creates semi-structured data. For example, instead of `ip-192-0-2-0`, the parsing step extracts the IP address into a key-value pair, where the key is something like `srcDeviceIP` and the value is `192.0.2.0`, with the hyphens normalized to dots. Then, this information is mapped onto the Cloud SIEM schema. Finally, the record is enriched with information from match lists or threat intelligence databases, such as its [CrowdStrike threat level](/docs/integrations/security-threat-detection/threat-intel-quick-analysis#threat-intel-faq). These normalized records are then sent down the Cloud SIEM pipeline and compared to rules. + +### Extracting security insights from Cloud SIEM + +Each record ingested into Cloud SIEM is compared to hundreds of built-in and custom [rules](/docs/cse/rules/about-cse-rules/). If a record matches the criteria specified in a rule, then Cloud SIEM creates a signal. When a signal is created, it contains a name, entity, severity, stage, and description. A signal always contains, at minimum, an entity and a severity. This data is later used by Cloud SIEM's insight engine algorithm. + +A [signal](/docs/cse/records-signals-entities-insights/view-records-signal/) is an individual security event. The entity in a signal is something like an IP address, MAC address, or hostname. The entity tells us who or what was involved in the event that the record described. The stage or tags are assigned based on where the event fits in the [MITRE ATT&CK](https://attack.mitre.org/) framework. This can tell us a bit about how or why the event occurred. The severity is a number between 0 and 10 that tells Cloud SIEM how serious the potential threat is. + +Let's look at the details of one signal: + +Example signal + +* A. **Description**. Every signal's details page includes a description, detailed metadata, and other information to help your threat investigation. +* B. **Event Time**. The event time tells you when the event occurred. +* C. **Severity**. A signal's severity score is a number between 0 and 10. This score is used to track the entity's activity score. +* D. **Rule**. Signals are created when the conditions of a rule are met. You can click on the rule from the signal's details page to learn more. +* E. **Tags**. Tags or stages use the MITRE ATT&CK framework to point you toward how or why an event occurred. +* F. **Entity**. The entity can be any unique identifier like an IP address. In this case, it's a username. + +Cloud SIEM typically processes thousands or millions of records and boils them down into hundreds of signals. + +Records, signals, and insights + +On the Cloud SIEM main page, you'll see a panel similar to this one. In this case, 52 thousand records have been ingested and processed into 4 thousand signals. Some signals could be false alarms, but many could be worth investigating anyway. But, 4 thousand is still way too many for the average SOC analyst to sift through every day. So, how do you know which signals to pay attention to first? + +Cloud SIEM takes everything one step further and correlates those signals into a manageable number of insights. Here, just 1 insight was created out of 4 thousand signals. + +An [insight](/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/) is a group of signals clustered around a single entity. An insight is created when the sum of the severity scores of signals with the same entity goes above a certain activity score within a certain timeframe. By default, this is an activity score of 12 within the last 14 days. For example, if a rule was triggered with a severity of 5, and then ten days later another rule with the same entity and a severity of 5 was triggered, the total activity score would only be 10 in the last 14 days, so an insight would not be created. However, if those same two rules each had a severity score of 7, an insight would be created. + +### Explore the Cloud SIEM UI + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu select **Cloud SIEM**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu select **Cloud SIEM > SIEM Overview**. You can also click **Go To...** at the top of the screen and select **SIEM Overview**. +1. Near the top of the left pane of the Cloud SIEM UI, you'll see summary statistics. In the upper right corner of this pane, a dropdown menu lets you select the timeframe for the summary statistics. Use the summary panel and the dropdown to answer these questions: + * How many records have been ingested in the last 8 Hours? + * How many signals have been created in the last 7 Days? + * How many insights have been created in the last 24 Hours?
Select timeframe +1. In the center of the Cloud SIEM HUD is the insight radar. Hover over each piece of the radar to answer these questions: + * What time were the most records ingested in the last 24 hours? When were the fewest records ingested? Hint: Hover over the blue line to find out how many records were ingested at each time increment. + * What time were the most signals created in the last 24 hours? When were the fewest signals created? Hint: Hover over each bar to find out how many signals were generated at each time increment. + * How many insights have been generated in the last 24 hours? Hint: Each triangle represents one or more insights, so hover over each to find the number of insights each represents.
Explore the radar +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Rules**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Rules**. You can also click the **Go To...** menu at the top of the screen and select **Rules**. +1. Use the **Filters** bar in the **Rules** page to answer these questions: + * How many rules have a name that contains "firewall"? Hint: Use the autocomplete suggestions and dropdown menus to enter `Name contains firewall` in the **Filters** bar. + * How many rules have a severity score greater than 8? + * How many rules detect the "persistence" tactic"?
Filter rules +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). Click **Entities** at the top of the screen.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Entities**. You can also click the **Go To...** menu at the top of the screen and select **Entities**. +1. Use the **Filters** bar in the **Entities** page to answer these questions: + * How many entities have an activity score of 5 or greater? Hint: Use the autocomplete suggestions and dropdown menus to enter `Activity Score greater than` 5 in the **Filters** bar. + * How many entities have an activity score of 0?
Filter entities + +Your answer to all these questions may vary. Make sure you feel confident navigating the Cloud SIEM UI to find all this information. + +:::tip +* Filters persist each time you search. This is great if you want to drill down into subsets of data. +* Depending on your monitor size and the zoom settings of your browser, you may see two panes instead of three on the Cloud SIEM HUD. Try resizing your browser and adjusting your zoom settings to suit your needs. +* Depending on your monitor size and the zoom settings of your browser, you may only see the icons, and not the words, in the top navigation bar. Try resizing your browser and adjusting your zoom settings to suit your needs. +::: + +## Introduction to threat investigation + +### Different threats but one platform + +In this section, we'll help three fictional companies investigate their threats. Each company has their own unique security and compliance concerns. +* Company 1 is a small retail business with a big tech idea: automate the entire coffee business from bean to cup. In addition to consumer protections like PCI DSS, their main concerns include keeping compute costs down while their startup grows. +* Company 2 is a healthcare company that ships prescription meds to patients. While they meet all HIPAA standards and guidelines, they're still concerned about data privacy. They want to monitor all their data to make sure their patients are safe and healthy in the digital world, too. +* Company 3 is a major player in the banking industry. They meet all the GDPR and other international compliance standards but worry their big investors are still targets for hackers. + +Sumo Logic can help all of these companies meet their different security and compliance goals. Moreover, Cloud SIEM can help them identify potential threats before they become a problem. + +Think about it: What security and compliance issues are you most concerned about in your company today? How has that changed over the years? How were security concerns different at other companies you've worked for in the past? + +### Using the MITRE ATT&CK matrix + +The [MITRE ATT&CK matrix](https://attack.mitre.org/matrices/enterprise/) is published by MITRE, a non-profit research organization. ATT&CK stands for Adversarial Tactics, Techniques, and Common Knowledge. + +The framework organizes and categorizes the tactics and techniques that hactivists, cyber criminals, nation states, scripters, and other adversaries use. This includes attacks like exfiltrating databases, installing malware, stealing credentials, and all the other nefarious activities you and your SOC team are trying to stop. + +Cloud SIEM uses these same tactic names for the stages of signals and the names of insights. Once you're familiar with ATT&CK, navigating Cloud SIEM's insights page becomes easier. + +Let's return to our fictional companies, and which MITRE ATT&CK tactics and techniques they might prioritize: + +* Company 1 monitors their infrastructure to make sure their apps are as efficient as possible. Execution is a particular concern, since many executable files use precious compute resources. +* Company 2 is concerned about their patients' privacy and compliance with standards like HIPAA. Exfiltration of private data is a major concern. +* Company 3 needs to keep their client's data secure. Credential access is a concern, since all customers have user credentials tied to their financial accounts. + +If you read the news, or are familiar with other cybersecurity frameworks like the Pyramid of Pain, you know there are many kinds of threats out there. It's easy to become overwhelmed. However, Cloud SIEM helps organize all the potential threats in your system into one manageable dashboard, leveraging the knowledge found in the MITRE ATT&CK matrix along with the insights algorithm. + +### Get started with threat investigation + +Threat investigation is reactive while threat hunting is proactive. Typically, threat investigation happens in response to an alert. Once you've investigated a threat, you can hunt for similar threats and take precautionary steps to prevent attacks from happening again. + +Threat investigation is an iterative process, much like troubleshooting. In both threat investigation and troubleshooting, you first monitor your systems. Once an anomaly is detected, you can make a hypothesis about how it happened and diagnose the problem. As you dig deeper, you may revise this initial hypothesis and find more clues about why or how the attack or error happened. You can then take action to resolve the issue. + +Incident response process + +Cloud SIEM acts as your first line of defense, monitoring your system. Cloud SIEM's threat intelligence and correlation algorithms organize related potential security events into insights. When you get alerted to an insight, it's up to you to diagnose the problem and take action. + +Insight example + +* A. **Name**. The insight's name can point you to how the event occurred, or why the adversaries did it. In this case, the adversaries wanted to gain credential access. +* B. **Assignee**. You can assign the insight to a coworker, update the insight's status, send alerts, close the insight, and perform other actions here. +* C. **Entity**. The entity can point to who, where, or what was affected. In this case, the insight is clustered around a username. +* D. **Left pane**. A summary of the insight's key features, like its severity, can be found in the left pane. +* E. **Timeline**. The timeline can show you when the events occurred. Each event represents a signal. +* F. **Signals**. The signals below the timeline contain details of each event. + +The insight page shows everything you need to start unravelling the security event. As you start investigating, try to answer as many wh- questions as you can about the event: + +* Who is behind the event? +* What assets did the event affect? +* Where did the event occur? +* When did the event occur? +* Why did the event occur? +* How did the event occur? + +When signals cluster together, Cloud SIEM uses their tactics and techniques to name the insights they generate. The insight's name can point you to how the event occurred, or why the adversary is behaving that way. For example, a tactic name like discovery or persistence shows the reasons the adversary has. Similarly, tactic names like initial access or execution can tell you a little about the methods the adversary used. These names are just starting points, however, and you may need to revise your hypotheses as you continue your investigations. + +Example: An insight is named "Discovery with Execution". Why did the event occur? Probably so the adversary could discover your information. How did the event occur? By using an executable file or a similar technique. + +The timeline can tell you when the event occurred. You can see whether each signal was triggered at the same time, or sequentially, as well as whether everything happened over minutes, hours, or days. By default, insights are related signals that cluster together within the last 14 days. + +The entities within each signal can help point to who, what, or where the event occurred. An entity might point to the IP address of a hacked device, the location of the adversary, the location of the database that leaked, the owner of a website or domain, or some other piece of the puzzle. + +A day in the life of a SOC analyst can be summarized as follows: + +A day-in-the-life with Cloud SIEM + +Cloud SIEM can help with every step of the threat investigation process: +1. **Monitor**. Cloud SIEM automatically detects and monitors potential threats by analyzing millions of records and distilling them into a handful of insights with a low false positive rate. You can choose insights from the home page of Cloud SIEM in the insight radar, under the **Insight Activity** pane, or from the **Insights** panel. +1. **Investigate**. Once you choose an insight, you can dig through all the raw logs and signals to conduct deep-dive investigations and even proactive threat hunts. +1. **Hypothesize**. You can organize your thoughts, make hypotheses, and take notes about your investigation in the comments of each insight. This will share your ideas with your SOC teammates and help you keep track of your investigation. +1. **Take action**. You can also take certain actions directly from the insight. You can email teammates, create JIRA tickets, execute playbooks, and many other custom actions with the **Actions** button. +1. **Update**. Finally, you can update the insight. You can mark it as "in progress" or "closed". When you close it, you can mark it as "resolved," "false positive", "duplicate", or "no action". Updating the status correctly will help the Cloud SIEM insight engine produce more accurate insights for your organization in the future. + +Of course, this process will repeat each day as new insights are generated for you to investigate. + +### Investigating an insight + +In this section, you'll be investigating an insight for your organization that was detected through Cloud SIEM. Our goal is to analyze the insight details and complete the narrative of what happened. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). Click **Insights** at the top of the screen.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu select **Cloud SIEM > Insights**. You can also click **Go To...** at the top of the screen and select **Insights**. +1. Find an insight to investigate. +1. Click the insight's name to investigate it. For our example, we found one named **Discovery with Execution and Initial Access**.
Example threat insight +1. Use the insight's name (and the [MITRE ATT&CK matrix](https://attack.mitre.org/matrices/enterprise/)), timeline, signals, and entities to answer these questions: + * What events (signals) were detected and correlated together? + * What is the total of all the severity scores of the signals in this insight? + * What order did the events happen in? + * What hypotheses do you have about how and why the event happened? + * What other information can you find by exploring this insight? +1. Scroll to the bottom of the left navigation pane of the insight. Write a short summary of your answers from from the previous step in the **Comments** section. Here is a summary that we could have written for our example: + "*First, a known phishing link was received in a user's email. A few minutes later, a malicious file was allowed. It seems the user clicked a phishing link and downloaded the file. Then, threat intelligence detected a ZIP file with a known malicious file hash, coming from a domain that has also been recognized as suspicious by external threat monitoring services. Follow-up activity accessing the AWS APIs and Lambda service was detected, the first time that this user has been recorded using those services. This unusual activity also triggered Amazon's GuardDuty service, recognizing unusual network activity. All of these individual signals were correlated together into this insight. Given the likelihood of active malware in the network, the user's machine and credentials should be locked down immediately. Further investigation is needed to determine the total impact of the malicious file.*" + +### Dive into signals and entities + +Insights provide a great, high-level summary of potential security events. Because of Cloud SIEM's threat intelligence and sophisticated correlation engine, very few insights are false positives, so they're all worth investigating. + +However, sometimes you may want to investigate deeper, to really understand what happened. Or, you may want to do proactive threat hunting work, to find potential problems before they begin impacting your system, even if some of what you're looking at are false alarms. + +The **Signals** tab lists all the signals created by rules that have been triggered in your system in the last 14 days, by default. Signals provide summaries of potential security threats. Remember, not all signals are security incidents. After all, there are legitimate reasons why someone might be logged in to two different devices at the same time, or why there have been several failed password attempts on an account. + +Signals + +When you click into a signal, you'll have the option to see the full details of the record that triggered it. This includes information like the IP address, geolocation, threat level, and other information that can aid you in your investigation. + +Signals details + +The **Entities** tab lists all the entities that your rules have detected in the last 14 days, by default. Each entity has an activity score associated with it. The activity score is the sum of all the severity scores of all the unique signals associated with that entity. When an entity's activity score reaches at least 12, an insight is created. If you have several entities with relatively high activity scores, they might be a good starting point for a threat hunt. + +Entities tab + +### Bring it back to Sumo Logic search + +Sometimes you want to take your investigation even further. An in-depth threat investigation will use the most of both Cloud SIEM and Sumo Logic's core search functionality. + +There are several ways to bring the information you find in Cloud SIEM back to the Sumo Logic platform. One [context action](/docs/cse/administration/create-cse-context-actions) is **Sumo Logic Search**. Selecting this action will create a log search in Sumo Logic. This way, you can find all log messages with that entity, even if it wasn't detected by a rule in Cloud SIEM. Hover your mouse over the entity name, click the Context action button button that appears, and select **Sumo Logic Search** from the list. + +Sumo Logic Search context menu option + +Many entities in the insights, signals, and entities pages have context actions (six dots icon). Hover next to certain entities and the six dot icon may appear, if context actions are available for that object. Use the context actions to insert the entity into an API call, do a DNS lookup, or many other tasks. Your admin can add custom context actions too. + +You can also work with your admin to set up dashboards in Sumo Logic that track insights and other activity in Cloud SIEM. This allows you to monitor what's going on in Cloud SIEM without ever leaving Sumo Logic's core platform. + +### Continue the investigation + +In a previous section, we looked at an insight. In this section, we will use Sumo Logic search to continue the investigation. Then, we will update the status of your investigation in Cloud SIEM. + +1. Return to the insight you looked at in the previous section [Investigating an insight](#investigating-an-insight). +1. In the left pane, hover your mouse cursor over the **Entity** field (this is randomly generated and can be a user name or an IP address). Click the context actions (six dots) icon that appears next to the entity name. +1. From the dropdown (under **Actions**), select **Sumo Logic Search** as described in [Bring it back to Sumo Logic search](#bring-it-back-to-sumo-logic-search). You may need to scroll to find it. You'll be redirected to Sumo Logic search. +1. Make a note of the entity name that's pre-populated in the query builder. +1. Open another log search in Sumo Logic:
[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). Go to the **Home** screen and select **Log Search**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Logs > Log Search**. You can also click the **Go To...** menu at the top of the screen and select **Log Search**. +1. Find the top 10 records by threat type for that entity. For example, if the entity is a username, in the search bar type: + ``` + _index=sec_record_* + | where !isEmpty(threat_name) and user_username="" + | count by threat_name + | topk(10, _count) + ``` + Replace `` with the entity name from the previous step. +1. Click **Start** to run the log search. + * Make sure your quotes are straight. Copying and pasting the command sometimes changes the formatting of these quote marks to curly quotes. Manually typing the quote marks fixes this. + * You may need to increase the time of the search to the **Last 24 hours** to see results. The default is the **Last 15 minutes**. + * Make sure you're viewing the **Messages** tab when the results load. + 1. Explore the raw logs. The `_index=sec_record_*` query searches all the records that have been ingested by Cloud SIEM. This particular query excludes those records with nothing in the `threat_name` value. Additionally, it sorts it by threat name, and shows the most frequent threats. This will help you identify everything this user was doing around this timeframe, to see if anything not caught by the Cloud SIEM rules sticks out. +1. When you're done exploring the raw logs, return to the insight. +1. If you think there's still more work to do, use the **Status** dropdown to set the insight as **In Progress**. You can also use the **Assignee** field to reassign it. +1. If you've finished your investigation, use the **Close Insight** button or use the **Status** dropdown to set the status to **Closed**. + +### Take action on insights + +In addition to the context actions available in the Cloud SIEM UI, there are many other actions you might take in response to an insight. For example, you might work with your IT team to isolate and wipe laptops infected with malware to prevent spread of malicious code. Or, you might work with your HR team to enforce mandatory anti-phishing training among all employees to prevent future attacks. + +In Cloud SIEM, there are several different actions you can take on each insight. You can comment on the insight, or close it or assign a status to it. When you close an insight, Cloud SIEM uses the resolution information to reduce false positives and duplicates further. Assigning a status to the insight lets you keep working on it, and keep track of your progress. + +You can also assign the insight to yourself or to a colleague, and use the **Actions** button to alert colleagues, create JIRA tickets, send Slack messages, execute playbooks, or use other APIs. This **Actions** button is customizable, but can only be configured by admins. If you need a custom Action, ask your Admin or Sumo account rep for help creating one. + +## Tune your environment + +### Why tune? + +Once you've completed a few investigations, you may want to add or modify the rules, data sources, match lists, and other pieces of the Cloud SIEM puzzle. These modifications can help further reduce false positives or alert you even faster. The most common things to customize are rules and insights. + +[Rules](/docs/cse/rules/about-cse-rules/) are one of the most important pieces of Cloud SIEM's threat detection engine. All the records that are ingested in Cloud SIEM are compared to every rule in Cloud SIEM. If there's a match, an entity is extracted and a signal is created. Those entities are tracked and may correlate with other signals to create an insight, which is where most threat investigations begin. + +Records to signals + +You don't have to write rules from scratch. The Sumo Logic content team creates and maintains hundreds of [out-of-the box rules](/docs/cse/rules/cse-built-in-rules/), to get you started. These rules are updated frequently, often every few days. You can check out the most recent updates in the [Cloud SIEM release notes page](/release-notes-cse/). + +If you do decide to write a custom rule, insight, or rule tuning expression, these aren't updated or deleted by Sumo Logic during the regular updates. They're independent from the default rules. + +### Write a rule tuning expression + +You're updating some of the firewalls in your system, and you don't want to trigger unnecessary alerts. Write a rule tuning expression that will allow yourself to bypass firewall-related rules. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Rule Tuning**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Rule Tuning**. You can also click the **Go To...** menu at the top of the screen and select **Rule Tuning**. +1. On the **Rule Tuning** page, click **Create**. +1. Name your rule tuning expression. +1. **Tune selected Rules** should be selected by default. +1. Use the **Type to add a Rule** search bar to find rules to add your expression to. +1. Type "firewall" into the search bar to find all firewall-related rules. +1. Select a firewall rule, such as **Azure Firewall Rule Modified**. +Under **to include Records that also match the expression**, write the logic for the rule tuning expression. For help, see [Rule Tuning Expressions](/docs/cse/rules/rule-tuning-expressions/). +1. Click **Submit** to save your rule tuning expression. +1. Verify your tuning expression exists by going back to the rule tuning page (step 1 above). You should see it there. You may need to refresh the page to find it. + +#### Tips and tricks + +* When a rule tuning expression is added to a rule, it's appended with an AND statement. Rule tuning expressions are usually exceptions to the rule. Keep this in mind when writing the logic. It's common to use the is not (!=) operator to make exceptions. +* The autocomplete feature can help you write the logic. For example, typing "ip" will bring up a dropdown showing all available fields related to IP addresses. +* The syntax coloring can help you write the logic. For example, try using single quotes ('...') instead of double quotes ("..."). Notice that the syntax coloring lights up correctly when you use double quotes, which is the best practice. +* Check for an orange triangle icon next to the **Submit** button before you submit. This will notify you of any errors or warnings. + +### Custom rules + +Adding a rule tuning expression to an existing rule is one of the easiest and most common ways to customize your rules. But sometimes you need to [write a new rule from scratch](/docs/cse/rules/before-writing-custom-rule/). You might do this if your system has a source that isn't covered by the default rules, or if you're looking for a threat that isn't covered by the default rules. + +See [Rule types](/docs/cse/rules/about-cse-rules#rule-types) for the types of rules you can create: +* **Match rules** take a simple boolean statement, and check if it's true or false. If it's true, then an entity is extracted and a signal is created. Match rules are the simplest and most common type of rule. +* **Threshold rules** are triggered when a match is found a certain number of times. So, for example, if one failed login attempt is acceptable, but five failed login attempts would be suspicious, then a threshold rule would be set to fire after the fifth failed login attempt. +* **Chain rules** fire when different events happen together within a certain time window. So, for example, if you want to look for five failed login attempts followed by one successful log in within one hour, you'd use a chain rule. +* **Aggregation rules** are triggered when up to six different events accumulate over time. For example, if you want a rule that looks for a large number of event types from a single device IP, you'd use aggregation rules. +* **First Seen rules** generate a signal when behavior by an entity (such as a user) is encountered that hasn't been seen before, such as logging in from a distant location. +* **Outlier rules** generate a signal when behavior by an entity (such as a user) is encountered that deviates from its "normal" baseline activity, for instance, a sudden spike in failed login attempts or abnormally large downloads. + +The below image shows a blank rule template. + +Blank rule template + +* A. **If Triggered**. Configure the IF statement to decide what records will cause the rule to trigger. +* B. **Rule logic**. The rule's logic is a short piece of code. For match rules, it's usually simple boolean logic. +* C. **Add Tuning Expression**. You can optionally add rule tuning expressions when you create new rules. +* D. **Then Create a Signal**. The THEN statement of a rule configures the signal that will be created if there's a match with the IF statement. +* E. **On Entity**. The entity for a rule is usually something that is found in the IF statement. For example, if your boolean logic looks for matches on IP addresses, then the entity would be an IP address. +* F. **with the Summary**. The name, summary, and description are required fields. As a best practice, fill these out with details that will help other SOC analysts understand why you wrote this rule. +* G. **and a __ severity of**. You can configure the rule's severity score. This is on a scale from 0 to 10, with 10 being the most severe. Higher severity scores are more likely to trigger insights. +* H. **with tags**. The tags let you choose which tactics and techniques from the [MITRE ATT&CK](https://attack.mitre.org/) framework your rule is looking for. + +### Write a match rule + +You're concerned about traffic coming from a particular IP address that isn't covered by any of the default rules in Cloud SIEM. Write a match rule that looks for this IP address. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Rules**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Rules**. You can also click the **Go To...** menu at the top of the screen and select **Rules**. +1. Click **Create**. +1. On the **Match** tile click **Create**. +1. Provide a name for your rule. +1. Under **When a Record matches the expression**, write the logic for the rule. For example, if you want the rule to fire when it encounters an entity for a specific IP address, enter it here. For example, `device_ip='192.0.2.0'`. +1. Click **Add Tuning Expression**. Add the tuning expression you created in [Write a rule tuning expression](#write-a-rule-tuning-expression). +1. Configure the signal that will be created once the rule is triggered by filling out all the fields under **Then Create Signal**. + 1. **On Entity** should use an entity that's also used in your rule's logic. In this example, select **device_ip**. + 1. In **using the name** define the name for signals fired by the rule. + 1. Fill out the **with the summary** and **with the description** fields. + 1. Select **constant** from the **and a ___ severity of** dropdown. + 1. Drag the severity meter to select a severity for your rule. In this example, a low severity like 1 would be appropriate. + 1. Under tags, select some tactics and techniques from the MITRE ATT&CK framework. For this example, you could select **Tactic** and then **TA0001 - Initial Access**. +1. Select the **Save this rule as a prototype** checkbox. As a best practice, whenever you create a new rule, save it as a prototype so you can monitor its behavior for a few weeks before pushing it to your system live. +1. Click **Submit** to save your rule. +1. Verify your rule exists by going back to the rules page (step 1). You should see it there. You may need to refresh the page to find it. + +#### Tips and tricks + +* The logic under **When a Record matches the expression** can be anything you like, but is typically a simple boolean statement for match rules. +* The autocomplete feature can help you write the logic. For example, typing "ip" will bring up a dropdown showing all available fields related to IP addresses. +* The syntax coloring can help you write the logic. For example, try using single quotes ('...') instead of double quotes ("..."). Notice that the syntax coloring lights up correctly when you use double quotes, which is the best practice. +* Insights are named based on the tactics and techniques tagged in the signals. Consider which tactic or technique from the MITRE ATT&CK framework your rule is looking for when selecting tags. +* Check for an orange triangle icon next to the **Submit** button before you submit. This will notify you of any errors or warnings. + +### Custom insights + +Once a rule is in your system, whether it's a custom rule you created or one created by the Sumo Logic team, Cloud SIEM will use it to create signals. When a rule is created, you configure its severity score. This is on a scale from 0 to 10, with 10 being the most severe. + +If a record matches a rule, an entity is extracted from the record. The entity might be something like an IP address, a user name, a domain name. It tells you who the potential threat is. + +Records to signals + +Once an entity is in Cloud SIEM's system, Cloud SIEM tracks the total severity score of signals associated with each entity as an activity score. Once that activity score gets high enough, usually over 12 by default, then an insight is created. + +So, if you want an insight to be created with the default settings, you'd have to have rules with a severity score of 1 trigger 13 different times, or rules with higher severity scores trigger enough times to add up to 13. This is why insights typically have several signals associated with them. + +You can have a large number of low-severity score signals that won't create an insight. Or, you can have a small number of high-severity score signals that will create an insight. Keep this in mind when you're configuring the severity scores of your custom rules. + +Signals to insights + +But what if you want to be alerted right away when a certain rule is triggered? + +[Custom insights](/docs/cse/records-signals-entities-insights/configure-custom-insight/) let you create insights based on one specific signal, or a chain of signals. This is great for known threats specific to your system. You won't need to change any of your existing rules and insights. They'll keep working normally. + +### Create a custom insight + +You want to be alerted right away when your new custom match rule is triggered. Create a custom insight that looks for only this rule. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu, select **Content > Custom Insights**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Custom Insights**. You can also click the **Go To...** menu at the top of the screen and select **Custom Insights**. +1. Click **Create**. +1. Give your custom insight a name. +1. Under **When Signals are created from the following** select **rules**. +1. In **Type to add a rule**, search for the rule you created in [Write a match rule](#write-a-match-rule) and add it to your custom insight. +1. Choose **any** from the **in ___ order** dropdown. +1. Under **Then Create an Insight**, configure the insight. + 1. Fill out **Create an Insight with name**. + 1. You must fill out all the fields. For this exercise, you can add placeholder text like “This is a test” to the **and description** field. + 1. Select **constant** for **with a ___ severity**. + 1. Select **low** from the **that is** dropdown. + 1. Under **and tags**, select some tactics and techniques from the [MITRE ATT&CK](https://attack.mitre.org/) framework. For this example, you can select **Tactic** and then **TA0001 - Initial Access**. +1. Click **Submit** to save your custom insight configuration. +1. Verify your custom insight configuration exists by going back to the custom insights page (step 1). You should see it there. You may need to refresh the page. + +#### Tips and tricks + +* Insights are named based on the tactics and techniques tagged in the signals. Consider which tactic or technique from the MITRE ATT&CK framework your rule is looking for when selecting tags. +* Check for an orange triangle icon next to the **Submit** button before you submit. This will notify you of any errors or warnings. + +### Other customizations and best practices + +Remember, Cloud SIEM's out-of-the-box rules and insights are great. But we want you to have the flexibility to customize your environment. There are three simple three ways to customize Cloud SIEM's rules and insights. + +* [Rule tuning expressions](/docs/cse/rules/rule-tuning-expressions/) are simple ways to add small exceptions and other clauses to existing rules. +* [Custom rules](/docs/cse/rules/before-writing-custom-rule/) let you write logic that's unique to your system, to cover threats or data sources that aren't covered by built-in rules. +* [Custom insights](/docs/cse/records-signals-entities-insights/configure-custom-insight/) allow you to get alerts based on just one rule or a chain of rules. + +Before you create custom rules from scratch, there are some best practices you'll want to follow. + +* **Check existing rules**. Sumo Logic already has hundreds of [built-in rules](/docs/cse/rules/cse-built-in-rules/), so you might not need to write a new one. Or, you may only need to make small changes to existing rules, like adding a rule tuning expression or adjusting a severity score. +* **Know your system**. You'll need to understand the [schema](/docs/cse/schema/) and [log mappings](/docs/cse/schema/create-structured-log-mapping/) of all the records ingested into Cloud SIEM to write effective rules. You might want to work with an administrator on your team who knows this to write better rules. +* **Know your risk appetite**. In addition to your system's details about log mappings and other metadata, you need to understand your company's risk appetite and risk tolerance. For example, some companies might want to monitor a large amount of outbound traffic, but not consider this a threat. So, they'd assign this rule a severity of zero. However, other companies might be alarmed by outbound traffic and consider it data exfiltration, assigning the same rule a severity of five. +* **Know the rule types**. You also need to understand all [the types of rules](/docs/cse/rules/about-cse-rules/#rule-types). If your use case requires a chain rule, but you try writing a threshold rule, the rule might not be as efficient or effective. +* **Make small changes**. As a best practice, when you do write a new rule or edit an existing one, make small changes. For example, instead of decreasing a severity score from 8 to 2, try decreasing it from 8 to 7 and monitoring the change for a while. +* **Save as a prototype**. Another best practice is to [save all new rules as a prototype](/docs/cse/rules/write-match-rule#save-as-prototype). This allows you to monitor the rule's behavior, without creating new insights and alerts. + +Rule tuning, custom rules, and custom insights are just a taste of what you can customize in Cloud SIEM. However, some customizations, like configuring the [Actions button](/docs/cse/administration/create-cse-actions), need admin privileges. You can work with your admin or your Sumo Logic account rep to customize: +* [Log mappings](/docs/cse/schema/create-structured-log-mapping/) +* [Match lists](/docs/cse/match-lists-suppressed-lists/) +* [APIs](/docs/cse/administration/cse-apis/) and other [plugins](/docs/cse/integrations/) +* How much data Cloud SIEM [ingests](/docs/cse/ingestion/) \ No newline at end of file diff --git a/docs/cse/get-started-with-cloud-siem/onboarding-checklist-cse.md b/docs/cse/get-started-with-cloud-siem/onboarding-checklist-cse.md index 2edac0575c..baa4f07eb0 100644 --- a/docs/cse/get-started-with-cloud-siem/onboarding-checklist-cse.md +++ b/docs/cse/get-started-with-cloud-siem/onboarding-checklist-cse.md @@ -1,6 +1,7 @@ --- id: onboarding-checklist-cse title: Onboarding Checklist for Cloud SIEM Administrators +sidebar_label: Onboarding Checklist description: Onboarding tasks to get up and running with Cloud SIEM. keywords: - cloud siem diff --git a/docs/cse/index.md b/docs/cse/index.md index f8063eedd7..99e9bbdb2c 100644 --- a/docs/cse/index.md +++ b/docs/cse/index.md @@ -19,12 +19,6 @@ Cloud SIEM is a cloud-based security information and event management (SIEM) sys This section contains the following topics:
-
-
- Shield on a cloud icon

Introduction to Cloud SIEM

-

Learn basic concepts about Cloud SIEM.

-
-
Shield on a cloud icon

Get Started with Cloud SIEM

diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/auth0.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/auth0.md index 0ec37f2a7d..a2aed3effc 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/auth0.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/auth0.md @@ -55,6 +55,6 @@ in Auth0 help.  In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for Auth0 and check under **Record Volume**.
Record volume 1. For a more granular look at the incoming records, you can also use the Sumo Logic platform to search for Auth0 security records.
Auth0 search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-application-load-balancer.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-application-load-balancer.md index 9e176ebc9a..7fc4068e7a 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-application-load-balancer.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-application-load-balancer.md @@ -70,6 +70,6 @@ It’s also possible to configure individual sources to forward to Cloud SIEM, a In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "AWS Application Load Balancer" and check under **Record Volume**.
AWS ELB record volume 1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for AWS ALB Flow security records.
AWS ELB search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-cloudtrail.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-cloudtrail.md index 6169ad900b..159b7349c9 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-cloudtrail.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-cloudtrail.md @@ -46,7 +46,7 @@ It’s also possible to configure individual sources to forward to Cloud SIEM, a In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "CloudTrail" and check under **Record Volume**.
CloudTrail record volume 1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for CloudTrail security records.
CloudTrail search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-guardduty.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-guardduty.md index d558d4ee46..6c686f8f6c 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-guardduty.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-guardduty.md @@ -75,6 +75,6 @@ In this step, you deploy the events processor. This will create the AWS resource In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "GuardDuty" and check under **Record Volume**.
GuardDuty record volume 1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for GuardDuty security records..
GuardDuty search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-network-firewall.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-network-firewall.md index a13d5e3fdc..57eb34426e 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-network-firewall.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-network-firewall.md @@ -61,7 +61,7 @@ It’s also possible to configure individual sources to forward to Cloud SIEM, a In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "AWS Network Firewall " and check under **Record Volume**.
AWS Network Firewall record volume 1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for AWS Network Firewall security records.
AWS Firewall search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-vpc-flow.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-vpc-flow.md index 589a146f74..329120c2b5 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-vpc-flow.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/aws-vpc-flow.md @@ -70,6 +70,6 @@ It’s also possible to configure individual sources to forward to Cloud SIEM, a In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "AWS VPC Flow" and check under **Record Volume**.  1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for AWS VPC Flow security records. diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/carbon-black.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/carbon-black.md index 5a5fe77e1f..fd19b3107f 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/carbon-black.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/carbon-black.md @@ -75,6 +75,6 @@ In this step you configure Carbon Black Cloud to send log messages to an S3 buck In this step, you verify that your logs are successfully making it into Cloud SIEM. -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 2. On the **Log Mappings** page search for Carbon Black Cloud and check under **Record Volume**.
Carbon Black Cloud on the Log Mappings page 3. For a more granular look at the incoming Records, you can also search Sumo Logic for Carbon Black Cloud Records.
A Carbon Black query diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/check-point-firewall.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/check-point-firewall.md index 399fbaaec3..e71abbf5a9 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/check-point-firewall.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/check-point-firewall.md @@ -61,6 +61,6 @@ In this step you configure Check Point Firewall to send log messages to the Sumo In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "checkpoint" and check under **Record Volume.** 
Checkpoint record volume 1. For a more granular look at the incoming Records, you can also search the Sumo Logic platform for Check Point Firewall security records.
Checkpoint search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/cisco-asa.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/cisco-asa.md index 0addb5ce3b..5706dc2187 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/cisco-asa.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/cisco-asa.md @@ -59,6 +59,6 @@ To configure Cisco ASA logging, follow the instructions in the [ASA Syslog Conf In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "Cisco ASA" and check under **Record Volume.** A list of mappers for Cisco ASA Syslog will appear and you can see if logs are coming in.
Cisco ASA record volume 1. For a more granular look at the incoming Records, you can also use search the Sumo Logic platform for Cisco ASA security records.
Cisco ASA search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/cisco-meraki.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/cisco-meraki.md index d40fb37e83..c35f05bc88 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/cisco-meraki.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/cisco-meraki.md @@ -60,6 +60,6 @@ Configure logging for Cisco Meraki as described in [Syslog Server Overview and In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "Cisco Meraki" and check under **Record Volume.** A list of mappers for Cisco Meraki will appear and you can see if logs are coming in.
Cisco Meraki record volume 1. For a more granular look at the incoming Records, you can also use search the Sumo Logic platform for Cisco Meraki security records.
Cisco Meraki search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/corelight-zeek.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/corelight-zeek.md index 2f401171eb..6666cee597 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/corelight-zeek.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/corelight-zeek.md @@ -57,7 +57,7 @@ In this step you configure Zeek to send log messages to the Sumo Logic platform. In this step, you configure a Sumo Logic Ingest Mapping in Cloud SIEM for the source category assigned to your source or collector you configured in [Step 1](#step-1-configure-collection). The mapping tells Cloud SIEM the information it needs to select the right mapper to process messages that have been tagged with that source category.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then and under **Integrations** select **Sumo Logic**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Ingest Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Ingest Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then and under **Integrations** select **Sumo Logic**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Ingest Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Ingest Mappings**. 1. On the **Sumo Logic Ingest Mappings** page, click **Create**. 1. On the **Create Sumo Logic Mapping** popup: 1. **Source Category**. Enter the category you assigned to the HTTP Source or Hosted Collector in [Step 1](#step-1-configure-collection).  @@ -69,6 +69,6 @@ In this step, you configure a Sumo Logic Ingest Mapping in Cloud SIEM for the so In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "Zeek" and check under **Record Volume.** 
Corelight record volume 1. For a more granular look at the incoming Records, you can also search the Sumo Logic platform for Corelight Zeek security records.
Corelight search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/fortigate-firewall.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/fortigate-firewall.md index 3a10d6a806..f8aea4bcab 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/fortigate-firewall.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/fortigate-firewall.md @@ -69,6 +69,6 @@ Different parsers are required for CEF and JSON format logs. In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "FortiGate" and check under **Record Volume.** A list of mappers for FortiGate will appear and you can see if logs are coming in.
Fortigate record volume  1. For a more granular look at the incoming Records, you can also search the Sumo Logic platform for FortiGate security records.
Fortigate search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/g-suite-alert-center.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/g-suite-alert-center.md index 5112ea73ec..6c7fb403d0 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/g-suite-alert-center.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/g-suite-alert-center.md @@ -49,6 +49,6 @@ In this step, you configure an HTTP Source to collect G Suite Alert Center log m In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the Log Mappings page search for "G Suite Alert Center" and check under **Record Volume**.
GSuite record volume 1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for G Suite Alert Center security records.
GSuite search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/google-workspace-apps-audit.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/google-workspace-apps-audit.md index 96334660c9..a2dc4a13a9 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/google-workspace-apps-audit.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/google-workspace-apps-audit.md @@ -36,6 +36,6 @@ In this step, you configure an Google Workspace Apps Audit Source to collect Goo In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "Google Workspace" and check under **Record Volume**.
GSuite record volume 1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for Google Workspace security records.
GSuite search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/kemp-loadmaster.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/kemp-loadmaster.md index fa5190fd95..81773cc8e3 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/kemp-loadmaster.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/kemp-loadmaster.md @@ -62,6 +62,6 @@ While the linked document only focuses on unexpected reboot logs, the process fo In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "Kemp" and check under **Record Volume**, a list of mappers for Kemp will appear and you can see if logs are coming in. 
Kemp record volume 1. For a more granular look at the incoming Records, you can also search the Sumo Logic platform for Kemp security records.
Kemp search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/linux-os-syslog.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/linux-os-syslog.md index 5d5f185053..83a079f81b 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/linux-os-syslog.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/linux-os-syslog.md @@ -86,6 +86,6 @@ In this step, you configure forwarding to the the Syslog Source. Follow the ins In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "Linux OS" and check under **Record Volume.** A list of mappers for Linux OS Syslog will appear and you can see if logs are coming in. 
Record volume 1. For a more granular look at the incoming Records, you can also search the Sumo Logic platform for Linux OS security records.
Search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-audit-office.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-audit-office.md index c60e0b51c5..93a80f3203 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-audit-office.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-audit-office.md @@ -41,6 +41,6 @@ In this step, you configure an Microsoft 365 Audit Source to collect Microsoft 3 In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for Office 365 and check under **Record Volume**.
Office 365 audit record volume 1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for Office 365 security records.
Office 365 audit search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-azure-activity-log.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-azure-activity-log.md index b365626bc9..77dfdc97e5 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-azure-activity-log.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-azure-activity-log.md @@ -53,6 +53,6 @@ In this step you configure Azure Activity Log to send log messages to the Sumo L In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "Azure" and check under **Record Volume**.
Azure activity log record volume 1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for Azure security records.
Azure activity log search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-windows.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-windows.md index 631b85969b..461a057a11 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-windows.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/microsoft-windows.md @@ -60,6 +60,6 @@ In this step, you configure a Local Windows Event Log Source to collect Microsof In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "Windows" and check under **Record Volume.** 
Windows record volume 1. For a more granular look at the incoming records, you can also use search the Sumo Logic platform for Windows security records.
Windows search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/nginx-access-logs.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/nginx-access-logs.md index 6233ff342e..93aef33c60 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/nginx-access-logs.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/nginx-access-logs.md @@ -64,6 +64,6 @@ Follow the Nginx [instructions](https://docs.nginx.com/nginx/admin-guide/monito In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "Nginx" and check under **Record Volume**, a list of mappers for Nginx will appear and you can see if logs are coming in.
Nginix record volume 1. For a more granular look at the incoming Records, you can also search the Sumo Logic platform for Nginx security records.
Nginix search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/okta.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/okta.md index cb786421c0..feb18648e0 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/okta.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/okta.md @@ -32,6 +32,6 @@ In this step, you configure an Okta Source to collect Okta log messages. You can In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for Okta and check under **Record Volume**.
Okta record volume 1. For a more granular look at the incoming records, you can also use the Sumo Logic platform to search for Okta security records.
Okta search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/onelogin.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/onelogin.md index 8e9285c21f..4cc6246357 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/onelogin.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/onelogin.md @@ -55,6 +55,6 @@ the OneLogin knowledge base. You must use the SIEM (NDJSON) format. Use the **S In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "OneLogin" and check under **Record Volume**.
OneLogin record volume 1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for OneLogin security records.
OneLogin search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/osquery.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/osquery.md index b7af31e976..5d7d3b55c7 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/osquery.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/osquery.md @@ -64,6 +64,6 @@ In this step you configure osquery to send log messages to Sumo Logic core platf In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page, search for *osquery* and check under **Record Volume**. 1. For a more granular look at the incoming records, you can also search Sumo Logic for osquery Records.
OSQuery record volume diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/palo-alto-firewall.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/palo-alto-firewall.md index 9b431986f2..6bfe26c50e 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/palo-alto-firewall.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/palo-alto-firewall.md @@ -116,6 +116,6 @@ In this step, you configure Palo Alto Firewall to send log messages to the Sumo In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "Palo Alto" and check under **Record Volume**. 
Palo Alto Firewall record volume 1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for Palo Alto Firewall security records.
Palo Alto Firewall search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/sentinelone.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/sentinelone.md index d4955b6e14..8f6d9b5694 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/sentinelone.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/sentinelone.md @@ -56,7 +56,7 @@ In this step you configure SentinelOne to send log messages to the Sumo Logic pl In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "SentinelOne" and check under **Record Volume**.
SentinelOne record volume 1. For a more granular look at the incoming records, you can also use the Sumo Logic platform to search for SentinelOne security records.
SentinelOne search   diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/signal-sciences-waf.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/signal-sciences-waf.md index b41cc2f08c..200589a465 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/signal-sciences-waf.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/signal-sciences-waf.md @@ -57,7 +57,7 @@ For more information on Generic Webhooks refer to the [Generic Webhooks](https:/ In this step, you configure a Sumo Logic Ingest Mapping in Cloud SIEM for the source category assigned to your source or collector you configured in [Step 1](#step-1-configurecollection). The mapping tells Cloud SIEM the information it needs to select the right mapper to process messages that have been tagged with that source category.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Integrations** select **Sumo Logic**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Ingest Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Ingest Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Integrations** select **Sumo Logic**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Ingest Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Ingest Mappings**. 1. On the **Sumo Logic Ingest Mappings** page, click **Create**. 1. On the **Create Sumo Logic Mapping** popup: * **Source Category**. Enter the category you assigned to the HTTP Source or Hosted Collector in [Step 1](#step-1-configurecollection).  @@ -71,7 +71,7 @@ In this step, you configure a Sumo Logic Ingest Mapping in Cloud SIEM for the so In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "Signal Sciences" and check under **Record Volume**.
Signal Sciences record volume 1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for Signal Sciences WAF security records.   diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/symantec-proxy-secure-gateway-blue-coat-proxy.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/symantec-proxy-secure-gateway-blue-coat-proxy.md index 9144404fc6..98d565faef 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/symantec-proxy-secure-gateway-blue-coat-proxy.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/symantec-proxy-secure-gateway-blue-coat-proxy.md @@ -67,6 +67,6 @@ In this step, you configure ProxySG to forward access logs to the the Syslog S In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "ProxySG" and check under **Record Volume.** A list of mappers for ProxySG will appear and you can see if logs are coming in.
ProxySG record volume 1. For a more granular look at the incoming Records, you can also search Sumo Logic for ProxySG Records.
ProxySG search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/symantec-proxy-secure-gateway.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/symantec-proxy-secure-gateway.md index 367c2da303..34bb5e2578 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/symantec-proxy-secure-gateway.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/symantec-proxy-secure-gateway.md @@ -71,6 +71,6 @@ Instructions for sending access logs to a syslog server are available on the [Br In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "ProxySG" and check under **Record Volume**. A list of mappers for ProxySG Syslog will appear and you can see if logs are coming in.
PSG record volume  1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for Proxy Secure Gateway security Records.
PSG search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/zscaler-nss.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/zscaler-nss.md index 5902b28375..2fd61e0926 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/zscaler-nss.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/zscaler-nss.md @@ -60,6 +60,6 @@ In this step, you configure ZScaler NSS to send log messages to the Sumo Logic In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "Nanolog Streaming Service" and check under **Record Volume.** 
Zscaler record volume  1. For a more granular look at the incoming Records, you can also search the Sumo Logic platform for ZScaler NSS security Records.
Zscaler NSS search diff --git a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/zscaler-private-access.md b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/zscaler-private-access.md index 57f7e110b4..6f49d4136d 100644 --- a/docs/cse/ingestion/ingestion-sources-for-cloud-siem/zscaler-private-access.md +++ b/docs/cse/ingestion/ingestion-sources-for-cloud-siem/zscaler-private-access.md @@ -56,6 +56,6 @@ In this step you configure Zscaler Private Access to send log messages to Sumo L In this step, you verify that your logs are successfully making it into Cloud SIEM.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. On the **Log Mappings** page search for "ZPA" and check under **Record Volume**.
Zscaler record volume 1. For a more granular look at the incoming records, you can also search the Sumo Logic platform for "ZPA" security records.
Zscaler search diff --git a/docs/cse/ingestion/sumo-logic-ingest-mapping.md b/docs/cse/ingestion/sumo-logic-ingest-mapping.md index 554af03be7..5b474c31cf 100644 --- a/docs/cse/ingestion/sumo-logic-ingest-mapping.md +++ b/docs/cse/ingestion/sumo-logic-ingest-mapping.md @@ -73,7 +73,7 @@ When you fill out the **Sumo Logic Ingest Mapping** page, for most of the suppor For these formats, Cloud SIEM uses the values you configure for **Product**, **Vendor**, and **Event ID** (in addition to **Format**) to select the appropriate Cloud SIEM mapper to process the messages. To verify the correct values, you can go to the **Log Mapping Details** page for the mapper in the Cloud SIEM UI. To do so: -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. The **Log Mappings** page displays a list of mappers.
Log Mappings page 1. In the **Filters** area, you can filter the list of log mappings by typing in a keyword, or by selecting a field to filter by.
Log Mappings filters @@ -104,7 +104,7 @@ This table in this section is a quick reference to supplying values for each su In this step, you configure a Sumo Logic Ingest Mapping in Cloud SIEM for the source category assigned to your source or collector you configured. The mapping tells Cloud SIEM the information it needs to select the right mapper to process messages that have been tagged with that source category.  -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Integrations** select **Sumo Logic**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Ingest Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Ingest Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Integrations** select **Sumo Logic**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Ingest Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Ingest Mappings**. 1. On the **Sumo Logic Ingest Mappings** page, click **Create**. 1. On the **Create Sumo Logic Mapping** popup: 1. **Source Category**. Enter the category you assigned to the HTTP Source or Hosted Collector.  diff --git a/docs/cse/ingestion/view-mappers-for-product.md b/docs/cse/ingestion/view-mappers-for-product.md index 115e26ddb4..a99904344f 100644 --- a/docs/cse/ingestion/view-mappers-for-product.md +++ b/docs/cse/ingestion/view-mappers-for-product.md @@ -13,5 +13,5 @@ See the [Cloud SIEM Content Catalog](https://github.com/SumoLogic/cloud-siem-con Cloud SIEM may have more than one log mapping for a particular product. For example, there may be a separate mapping for each message type issued by a product. You can view the available mappings in the Cloud SIEM UI. -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. 1. In the **Filters** area, filter by **Output Vendor**, **Output Product**, or both.
In the following screenshot, the list of mappings is filtered to display mappings for *Output Vendor is Proofpoint*. The list contains six mappings for two Proofpoint products: five for Targeted Attack Protection, and one for Proofpoint On Demand.
Proofpoint log mapping diff --git a/docs/cse/integrations/configuring-threatq-source-in-cse.md b/docs/cse/integrations/configuring-threatq-source-in-cse.md index ba803878ec..468f45c6ff 100644 --- a/docs/cse/integrations/configuring-threatq-source-in-cse.md +++ b/docs/cse/integrations/configuring-threatq-source-in-cse.md @@ -17,7 +17,7 @@ To do so, you simply configure a ThreatQ source in Cloud SIEM. You supply the in ## Configure a ThreatQ source -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Content > Threat Intelligence**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Threat Intelligence**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**. 1. On the **Threat Intelligence** page, click **Add Source**. 1. On the **Add New Source** page, click **Create** in the ThreatQ tile.
ThreatQ create icon 1. The **Add New Source** page updates.
ThreatQ Add New Source diff --git a/docs/cse/integrations/enable-virustotal-enrichment.md b/docs/cse/integrations/enable-virustotal-enrichment.md index c915309477..1a2ca9f19f 100644 --- a/docs/cse/integrations/enable-virustotal-enrichment.md +++ b/docs/cse/integrations/enable-virustotal-enrichment.md @@ -36,7 +36,7 @@ VirusTotal enrichments are only added to Signals that are part of an Insight. ## Configure VirusTotal enrichment -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Configuration**, and then under **Integrations** select **Enrichment**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Enrichment**. You can also click the **Go To...** menu at the top of the screen and select **Enrichment**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Integrations** select **Enrichment**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Enrichment**. You can also click the **Go To...** menu at the top of the screen and select **Enrichment**. 1. On the **Enrichment** page, click the pencil icon for VirusTotal.
Edit button on the VirusTotal enrichment 2. On the **Edit VirusTotal Configuration** popup, enter your VirusTotal API Key, and click Update.
Edit VirusTotal Configuration pop-up diff --git a/docs/cse/integrations/integrate-cse-with-taxii-feed.md b/docs/cse/integrations/integrate-cse-with-taxii-feed.md index 43f38728b5..61ae228ac8 100644 --- a/docs/cse/integrations/integrate-cse-with-taxii-feed.md +++ b/docs/cse/integrations/integrate-cse-with-taxii-feed.md @@ -29,7 +29,7 @@ Cloud SIEM supports TAXII v1.1 and v1.2.  ## Configure the integration -1. [**Classic UI**](/docs/cse/introduction-to-cloud-siem/#classic-ui). In the top menu select **Content > Threat Intelligence**.
[**New UI**](/docs/cse/introduction-to-cloud-siem/#new-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**. +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Threat Intelligence**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**. 1. On the **Threat Intelligence** page, click **Add Source**. 1. On the **Add New Source** popup, click **TAXII Feed**.
TAXII Feed option 1. The **Add Source** page appears.
Add new source diff --git a/docs/cse/introduction-to-cloud-siem.md b/docs/cse/introduction-to-cloud-siem.md deleted file mode 100644 index 975e19300c..0000000000 --- a/docs/cse/introduction-to-cloud-siem.md +++ /dev/null @@ -1,432 +0,0 @@ ---- -id: introduction-to-cloud-siem -title: Introduction to Cloud SIEM -sidebar_label: Introduction to Cloud SIEM -description: Learn basic concepts about Cloud SIEM. ---- - -import useBaseUrl from '@docusaurus/useBaseUrl'; - -Cloud SIEM is a cloud-based enterprise-grade security information and event management (SIEM) system. Cloud SIEM leverages Sumo Logic's core functionality, including data collection, ingestion, storage, and threat intelligence. Cloud SIEM is a purchased add-on with an ever-expanding library of content designed for security operations. - -Watch the following micro lesson to learn how to get started using Cloud SIEM for threat investigation. - -