Skip to content

Commit 812a6f8

Browse files
authored
Add info on regular expressions (#4924)
1 parent c478ac6 commit 812a6f8

File tree

6 files changed

+23
-14
lines changed

6 files changed

+23
-14
lines changed

docs/cse/administration/create-custom-threat-intel-source.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ This topic has information about setting up a *custom threat intelligence source
1212

1313
You can set up and populate custom threat intelligence sources interactively from the Cloud SIEM UI, by uploading a .csv file, or using Cloud SIEM APIs. You can populate the sources with IP addresses, hostnames, URLs, email addresses, and file hashes.
1414

15-
### How Cloud SIEM uses indicators
15+
## How Cloud SIEM uses indicators
1616

1717
When Cloud SIEM encounters an indicator from your threat source in an incoming
1818
record it adds relevant information to the record. Because threat intelligence
@@ -24,7 +24,7 @@ this way.
2424
Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a Rule Tuning Expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Threat Intelligence](/docs/cse/rules/about-cse-rules/#threat-intelligence) in the
2525
*About Cloud SIEM Rules* topic.
2626

27-
### Create a threat intelligence source from Cloud SIEM UI
27+
## Create a threat intelligence source from Cloud SIEM UI
2828

2929
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Threat Intelligence**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**.
3030
1. Click **Add Source** on the **Threat Intelligence** page.
@@ -34,6 +34,8 @@ Rule authors can also write rules that look for threat intelligence information
3434

3535
Your new source should now appear on the **Threat Intelligence** page.
3636

37+
## Add threat indicators
38+
3739
### Enter indicators manually
3840

3941
1. On the **Threat Intelligence** page, click the name of the source you want to update.
@@ -87,5 +89,10 @@ value,description,expires,active
8789

8890
### Manage sources and indicators using APIs
8991

90-
You can use Cloud SIEM threat intelligence APIs to create and manage indicators and custom threat sources. For information about Cloud SIEM APIs and how to access the API documentation, see [Cloud SIEM APIs](/docs/cse/administration/cse-apis/).
91-
 
92+
You can use Cloud SIEM threat intelligence APIs to create and manage indicators and custom threat sources. For information about Cloud SIEM APIs and how to access the API documentation, see [Cloud SIEM APIs](/docs/cse/administration/cse-apis/).
93+
94+
## Search indicators
95+
96+
To search threat indicators, click the **Search All Indicators** button at the top of the **Threat Intelligence** page.
97+
98+
You can search using the same functionality available for other Cloud SIEM searches, including regular expressions. For more information, see [Filter and Search Cloud SIEM List Pages](/docs/cse/administration/filter-search).

docs/cse/administration/filter-search.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -11,18 +11,20 @@ keywords:
1111

1212
import useBaseUrl from '@docusaurus/useBaseUrl';
1313

14-
You can filter and search the list pages in Cloud SIEM**Insights**, **Signals**, **Entities**, **Records**, **Rules**, and **Network Blocks**—using the **Filters** bar near the top of the page.
14+
## Search in Cloud SIEM
1515

16-
<img src={useBaseUrl('img/cse/list-page-search.png')} alt="Filters box at the top of the page " width="500" />
16+
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Cloud SIEM**.<br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Search Cloud SIEM**. You can also click the **Go To...** menu at the top of the screen and select **Search Cloud SIEM**.
17+
1. Click in the **Find Insights, Signals, Entities and more...** search bar at the top of the page.<br/><img src={useBaseUrl('img/cse/list-page-search.png')} alt="Search box at the top of the page" width="400" />
18+
1. Enter text to search.
19+
1. To filter, click the filter icon <img src={useBaseUrl('img/cse/filter-icon.png')} alt="Filter icon" width="20" /> on the right side of the search box.
20+
1. Select a source to filter on. <br/><img src={useBaseUrl('img/cse/search-sources.png')} alt="Search sources" width="250" />
21+
1. A dropdown list of filters appears for that source. Select a field to filter on, or pick a suggestion.<br/><img src={useBaseUrl('img/cse/filter-options.png')} alt="List of fields to filter on" width="400"/>
22+
1. Continue to select options to filter on from the options presented.
1723

18-
## Filter items
19-
When you click in the **Filters** bar, a dropdown list of filters appears. After you select a filter you’ll be presented with a dialog so you can specify your filtering criteria.
24+
## Search using regular expressions
2025

21-
<img src={useBaseUrl('img/cse/filter-options.png')} alt="List of fields to filter on" width="250"/>
26+
You also enter a search string or regex in the search bar, and press Return to run a search. Note that Cloud SIEM's regular expression engine will return items that contain text matching the complete string. The engine implicitly adds anchors (`^` and `$`) to the beginning and end of your regex.
2227

23-
## Search items
24-
You also enter a search string or regex in the **Filter** bar, and press Return to run a search. Note that Cloud SIEM's regular expression engine will return items that contain text matching the complete string. The engine implicitly adds anchors (`^` and `$`) to the beginning and end of your regex.
28+
Cloud SIEM search uses Elasticsearch. For regular expressions allowed for use in Cloud SIEM search, see [Regular expression syntax](https://www.elastic.co/guide/en/elasticsearch/reference/current/regexp-syntax.html) in the Elastic documentation.
2529

26-
You can use `not` to search for items that do not contain a particular keyword, for example:
27-
28-
`not:Initial Access`
30+
You can use `not` to search for items that do not contain a particular keyword, for example: `not:Initial Access`

static/img/cse/filter-icon.png

4.25 KB
Loading

static/img/cse/filter-options.png

23.2 KB
Loading

static/img/cse/list-page-search.png

-9.08 KB
Loading

static/img/cse/search-sources.png

33.1 KB
Loading

0 commit comments

Comments
 (0)