You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/cse/administration/create-custom-threat-intel-source.md
+11-4Lines changed: 11 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ This topic has information about setting up a *custom threat intelligence source
12
12
13
13
You can set up and populate custom threat intelligence sources interactively from the Cloud SIEM UI, by uploading a .csv file, or using Cloud SIEM APIs. You can populate the sources with IP addresses, hostnames, URLs, email addresses, and file hashes.
14
14
15
-
###How Cloud SIEM uses indicators
15
+
## How Cloud SIEM uses indicators
16
16
17
17
When Cloud SIEM encounters an indicator from your threat source in an incoming
18
18
record it adds relevant information to the record. Because threat intelligence
@@ -24,7 +24,7 @@ this way.
24
24
Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a Rule Tuning Expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Threat Intelligence](/docs/cse/rules/about-cse-rules/#threat-intelligence) in the
25
25
*About Cloud SIEM Rules* topic.
26
26
27
-
###Create a threat intelligence source from Cloud SIEM UI
27
+
## Create a threat intelligence source from Cloud SIEM UI
28
28
29
29
1.[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Threat Intelligence**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**.
30
30
1. Click **Add Source** on the **Threat Intelligence** page.
@@ -34,6 +34,8 @@ Rule authors can also write rules that look for threat intelligence information
34
34
35
35
Your new source should now appear on the **Threat Intelligence** page.
36
36
37
+
## Add threat indicators
38
+
37
39
### Enter indicators manually
38
40
39
41
1. On the **Threat Intelligence** page, click the name of the source you want to update.
You can use Cloud SIEM threat intelligence APIs to create and manage indicators and custom threat sources. For information about Cloud SIEM APIs and how to access the API documentation, see [Cloud SIEM APIs](/docs/cse/administration/cse-apis/).
91
-
92
+
You can use Cloud SIEM threat intelligence APIs to create and manage indicators and custom threat sources. For information about Cloud SIEM APIs and how to access the API documentation, see [Cloud SIEM APIs](/docs/cse/administration/cse-apis/).
93
+
94
+
## Search indicators
95
+
96
+
To search threat indicators, click the **Search All Indicators** button at the top of the **Threat Intelligence** page.
97
+
98
+
You can search using the same functionality available for other Cloud SIEM searches, including regular expressions. For more information, see [Filter and Search Cloud SIEM List Pages](/docs/cse/administration/filter-search).
Copy file name to clipboardExpand all lines: docs/cse/administration/filter-search.md
+12-10Lines changed: 12 additions & 10 deletions
Original file line number
Diff line number
Diff line change
@@ -11,18 +11,20 @@ keywords:
11
11
12
12
import useBaseUrl from '@docusaurus/useBaseUrl';
13
13
14
-
You can filter and search the list pages in Cloud SIEM—**Insights**, **Signals**, **Entities**, **Records**, **Rules**, and **Network Blocks**—using the **Filters** bar near the top of the page.
14
+
## Search in Cloud SIEM
15
15
16
-
<img src={useBaseUrl('img/cse/list-page-search.png')} alt="Filters box at the top of the page " width="500" />
16
+
1.[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Cloud SIEM**.<br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Search Cloud SIEM**. You can also click the **Go To...** menu at the top of the screen and select **Search Cloud SIEM**.
17
+
1. Click in the **Find Insights, Signals, Entities and more...** search bar at the top of the page.<br/><img src={useBaseUrl('img/cse/list-page-search.png')} alt="Search box at the top of the page" width="400" />
18
+
1. Enter text to search.
19
+
1. To filter, click the filter icon <img src={useBaseUrl('img/cse/filter-icon.png')} alt="Filter icon" width="20" /> on the right side of the search box.
20
+
1. Select a source to filter on. <br/><img src={useBaseUrl('img/cse/search-sources.png')} alt="Search sources" width="250" />
21
+
1. A dropdown list of filters appears for that source. Select a field to filter on, or pick a suggestion.<br/><img src={useBaseUrl('img/cse/filter-options.png')} alt="List of fields to filter on" width="400"/>
22
+
1. Continue to select options to filter on from the options presented.
17
23
18
-
## Filter items
19
-
When you click in the **Filters** bar, a dropdown list of filters appears. After you select a filter you’ll be presented with a dialog so you can specify your filtering criteria.
24
+
## Search using regular expressions
20
25
21
-
<img src={useBaseUrl('img/cse/filter-options.png')} alt="List of fields to filter on" width="250"/>
26
+
You also enter a search string or regex in the search bar, and press Return to run a search. Note that Cloud SIEM's regular expression engine will return items that contain text matching the complete string. The engine implicitly adds anchors (`^` and `$`) to the beginning and end of your regex.
22
27
23
-
## Search items
24
-
You also enter a search string or regex in the **Filter** bar, and press Return to run a search. Note that Cloud SIEM's regular expression engine will return items that contain text matching the complete string. The engine implicitly adds anchors (`^` and `$`) to the beginning and end of your regex.
28
+
Cloud SIEM search uses Elasticsearch. For regular expressions allowed for use in Cloud SIEM search, see [Regular expression syntax](https://www.elastic.co/guide/en/elasticsearch/reference/current/regexp-syntax.html) in the Elastic documentation.
25
29
26
-
You can use `not` to search for items that do not contain a particular keyword, for example:
27
-
28
-
`not:Initial Access`
30
+
You can use `not` to search for items that do not contain a particular keyword, for example: `not:Initial Access`
0 commit comments