Skip to content

Commit 4836840

Browse files
DET-1139: shortened example
1 parent b43a188 commit 4836840

File tree

1 file changed

+7
-41
lines changed

1 file changed

+7
-41
lines changed

website/docs/r/cse_outlier_rule.html.markdown

Lines changed: 7 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -10,66 +10,32 @@ Provides a Sumo Logic CSE [Outlier Rule](https://help.sumologic.com/docs/cse/rul
1010

1111
## Example Usage
1212
```hcl
13-
resource "sumologic_cse_outlier_rule" "sample_outlier_rule_1" {
14-
name = "(Sample) Azure DevOps - Outlier in Pools Deleted Rapidly"
15-
name_expression = "Azure DevOps - Outlier in Agent Pools Deleted in an Hour"
16-
17-
description_expression = <<-EOT
18-
Context:
19-
An Attacker with sufficient administrative access to Azure DevOps (ADO) may abuse this access to destroy existing resources by deleting pools.
20-
21-
Detection:
22-
This detection identifies statistical outliers in user behavior for the number of pools deleted in an hourly window.
23-
24-
Recommended Actions:
25-
If an alert occurs, investigate the actions taken by the account to determine if this is normal operation of deleting pools or if this suspicious activity.
26-
27-
Tuning Recommendations:
28-
Determine if the baseline basis should be hourly or daily based on normal activity in your organization.
29-
If the detection is proving to be too sensitive to the number of pools deleted, adjust the floor value (currently 3) to a number that is less sensitive but within reason. Use Sumo Search using a count and the _timeslice function to aggregate on the number of pools deleted within the hourly (or daily) periods to find what is an acceptable level of activity to not alert on.
30-
EOT
31-
13+
resource "sumologic_cse_outlier_rule" "outlier_rule" {
14+
name = "Outlier Rule Example"
15+
name_expression = "Signal name"
16+
description_expression = "Signal description"
3217
enabled = true
33-
3418
baseline_window_size = "2592000000"
3519
floor_value = 3
3620
deviation_threshold = 3
37-
38-
group_by_fields = [
39-
"user_username",
40-
]
41-
4221
is_prototype = false
43-
match_expression = <<-EOT
44-
metadata_vendor = "Microsoft"
45-
AND metadata_product = "Azure DevOps Auditing"
46-
AND metadata_deviceEventId = "AzureDevOpsAuditEvent"
47-
AND action = "Library.AgentPoolDeleted"
48-
EOT
49-
22+
match_expression = "objectType = \"Network\""
5023
retention_window_size = "7776000000"
5124
window_size = "T60M"
52-
5325
severity = 3
54-
summary_expression = "User: {{user_username}} has deleted an abnormal amount of Agent Pools within an hour"
55-
26+
summary_expression = "Signal summary"
5627
aggregation_functions {
5728
arguments = [
5829
"true",
5930
]
6031
function = "count"
6132
name = "current"
6233
}
63-
6434
entity_selectors {
6535
entity_type = "_username"
6636
expression = "user_username"
6737
}
68-
69-
tags = [
70-
"_mitreAttackTechnique:T1578.002",
71-
"_mitreAttackTactic:TA0005",
72-
]
38+
tags = ["_mitreAttackTactic:TA0005"]
7339
}
7440
```
7541
## Argument Reference

0 commit comments

Comments
 (0)