Skip to content

DOCS-25 - Threat intelligence - GA #3817

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 234 commits into from
Mar 3, 2025
Merged
Show file tree
Hide file tree
Changes from 210 commits
Commits
Show all changes
234 commits
Select commit Hold shift + click to select a range
40a3d20
Threat intelligence GA
jpipkin1 Mar 11, 2024
a07113d
Merge branch 'main' into threat-intel-ga
jpipkin1 Mar 11, 2024
1935172
Add TAXII 1
jpipkin1 Mar 11, 2024
53a74c8
Add STIX to the product list article
jpipkin1 Mar 12, 2024
74172c1
Merge branch 'main' into threat-intel-ga
jpipkin1 Mar 12, 2024
fd4edb0
Add threat intel to audit event index article
jpipkin1 Mar 12, 2024
d802a14
Merge branch 'main' into threat-intel-ga
jpipkin1 Mar 13, 2024
b73d831
Edit Threat Intelligence section in About Cloud SIEM Rules
jpipkin1 Mar 19, 2024
269a1f4
Update references to Create a Custom Threat Intelligence Source
jpipkin1 Mar 19, 2024
d69b705
Change release note date to March 28
jpipkin1 Mar 19, 2024
5bfe186
Create CID for threatlookup article
jpipkin1 Mar 19, 2024
733da51
Update CID for threatlookup article
jpipkin1 Mar 19, 2024
73e751c
Update STIX 2.1 to STIX 2.x
jpipkin1 Mar 19, 2024
eb65c09
Merge branch 'main' into threat-intel-ga
jpipkin1 Mar 20, 2024
c98ae5c
Merge branch 'main' into threat-intel-ga
jpipkin1 Mar 20, 2024
ea073c0
Merge branch 'main' into threat-intel-ga
kimsauce Mar 20, 2024
286e674
Add CrowdStrike mapping section
jpipkin1 Mar 20, 2024
bf0607c
Merge branch 'main' into threat-intel-ga
jpipkin1 Mar 21, 2024
b8cd7b8
Merge branch 'main' into threat-intel-ga
jpipkin1 Mar 21, 2024
6df3f41
Break out beta article into multiple articles for GA
jpipkin1 Mar 21, 2024
ae181aa
Merge branch 'main' into threat-intel-ga
jpipkin1 Mar 21, 2024
961b761
Add CID for main Threat Intelligence article
jpipkin1 Mar 22, 2024
d31e211
Hide cat search operator
jpipkin1 Mar 22, 2024
2e57772
Remove note from 'Create a Custom Threat Intelligence Source' article
jpipkin1 Mar 25, 2024
5f29b45
Change release note date
jpipkin1 Mar 28, 2024
5dcfd03
Merge branch 'main' into threat-intel-ga
jpipkin1 Mar 29, 2024
997e86a
Fix redirect
jpipkin1 Mar 29, 2024
f330a04
Remove redirect for beta article
jpipkin1 Mar 29, 2024
9637455
Add timestamp section
jpipkin1 Mar 29, 2024
c449464
Tweak timestamp section
jpipkin1 Mar 29, 2024
d6968ea
Merge branch 'main' into threat-intel-ga
jpipkin1 Apr 1, 2024
3e73d84
Minor updates
jpipkin1 Apr 2, 2024
8420781
Change release note date to April 8 2024
jpipkin1 Apr 2, 2024
a72a901
Merge branch 'main' into threat-intel-ga
jpipkin1 Apr 2, 2024
29854e8
Update docs/platform-services/threat-intelligence-indicators.md
jpipkin1 Apr 2, 2024
3bc104a
Update docs/search/search-query-language/search-operators/threatlooku…
jpipkin1 Apr 2, 2024
293e7c6
Update docs/platform-services/threat-intelligence/find-threats.md
jpipkin1 Apr 2, 2024
9a5f64a
Update docs/platform-services/threat-intelligence/find-threats.md
jpipkin1 Apr 2, 2024
518f840
Update docs/platform-services/threat-intelligence/threat-indicators-i…
jpipkin1 Apr 2, 2024
422633e
Update docs/platform-services/threat-intelligence/threat-intelligence…
jpipkin1 Apr 2, 2024
6713b14
Update docs/platform-services/threat-intelligence/threat-intelligence…
jpipkin1 Apr 2, 2024
5e658e3
Update docs/platform-services/threat-intelligence/threat-intelligence…
jpipkin1 Apr 2, 2024
1651eed
Update docs/platform-services/threat-intelligence/threat-intelligence…
jpipkin1 Apr 2, 2024
63808f8
Update docs/platform-services/threat-intelligence/threat-indicators-i…
jpipkin1 Apr 2, 2024
c49ae68
Update docs/platform-services/threat-intelligence/about-threat-intell…
jpipkin1 Apr 2, 2024
52f5438
Update blog-service/2024-04-08-platform-services.md
jpipkin1 Apr 2, 2024
9c75e4a
Update docs/platform-services/threat-intelligence/about-threat-intell…
jpipkin1 Apr 2, 2024
16bae53
Update docs/platform-services/threat-intelligence/upload-formats.md
jpipkin1 Apr 2, 2024
cc25815
Update docs/platform-services/threat-intelligence/crowdstrike-threat-…
jpipkin1 Apr 2, 2024
d2c2939
Update docs/platform-services/threat-intelligence/threat-indicators-i…
jpipkin1 Apr 2, 2024
6fc0010
Update docs/platform-services/threat-intelligence/upload-formats.md
jpipkin1 Apr 2, 2024
4bdf2a7
Update docs/platform-services/threat-intelligence/upload-formats.md
jpipkin1 Apr 2, 2024
484647d
Update docs/search/search-query-language/search-operators/threatlooku…
jpipkin1 Apr 2, 2024
c1a21c5
Update docs/search/search-query-language/search-operators/threatlooku…
jpipkin1 Apr 2, 2024
1c2a1d9
Update docs/search/search-query-language/search-operators/threatlooku…
jpipkin1 Apr 2, 2024
14c4a83
Update docs/search/search-query-language/search-operators/threatlooku…
jpipkin1 Apr 2, 2024
cec7186
Update docs/search/search-query-language/search-operators/threatlooku…
jpipkin1 Apr 2, 2024
25849ff
Update docs/cse/integrations/integrate-cse-with-taxii-feed.md
jpipkin1 Apr 2, 2024
92d2705
Update docs/cse/integrations/integrate-cse-with-taxii-feed.md
jpipkin1 Apr 2, 2024
5485d91
Update docs/platform-services/threat-intelligence/index.md
jpipkin1 Apr 2, 2024
049e426
Merge branch 'main' into threat-intel-ga
jpipkin1 Apr 2, 2024
c58439b
Add Threat Intel Ingest API doc (#3943)
kimsauce Apr 2, 2024
b367ade
Remove extra space
jpipkin1 Apr 3, 2024
8fc5763
Remove old beta article
jpipkin1 Apr 3, 2024
ce70485
Merge branch 'main' into threat-intel-ga
jpipkin1 Apr 3, 2024
332597a
Update cid-redirects so that legacy URL /Manage/Threat-Intel-Ingest p…
kimsauce Apr 3, 2024
b0538a8
fix spaces
kimsauce Apr 3, 2024
ac858ba
Update cid-redirects.json
kimsauce Apr 3, 2024
b9fd7ab
Add micro lesson
jpipkin1 Apr 4, 2024
9b543a1
Revise delete indicators section
jpipkin1 Apr 4, 2024
7f98c47
Update release note
jpipkin1 Apr 4, 2024
effb60d
Update release note
jpipkin1 Apr 5, 2024
5b8dd25
Merge branch 'main' into threat-intel-ga
jpipkin1 Apr 8, 2024
ffa94d6
Add hasThreatMatch examples for TRIDENT-18911
jpipkin1 Apr 8, 2024
e38e3d4
Fix hasThreatMatch example
jpipkin1 Apr 8, 2024
7ea4477
Add note about simple indicators
jpipkin1 Apr 9, 2024
914a56d
Minor correction
jpipkin1 Apr 10, 2024
ec8282d
Add comments
jpipkin1 Apr 12, 2024
45b3d26
Changed release note date
jpipkin1 Apr 12, 2024
a56b3ae
Move threat intel from platform services to security section
jpipkin1 Apr 22, 2024
3ae87ed
Merge branch 'main' into threat-intel-ga
jpipkin1 Apr 22, 2024
ee773cd
Merge branch 'main' into threat-intel-ga
jpipkin1 May 6, 2024
53a4372
Add hidden Kanso instructions
jpipkin1 May 6, 2024
605d971
Merge branch 'main' into threat-intel-ga
jpipkin1 May 13, 2024
04cbfa3
Merge branch 'main' into threat-intel-ga
jpipkin1 May 17, 2024
65edc9f
Merge branch 'main' into threat-intel-ga
jpipkin1 Jun 1, 2024
e3b0616
Merge branch 'main' into threat-intel-ga
jpipkin1 Jun 12, 2024
fb46f82
Change release note date to June 18 2024
jpipkin1 Jun 13, 2024
7b332ca
Change release note date to Aug 1 2024
jpipkin1 Jun 13, 2024
5764d69
Merge branch 'main' into threat-intel-ga
jpipkin1 Jul 1, 2024
0bdc0ce
Fix broken link
jpipkin1 Jul 1, 2024
abca11d
Merge branch 'main' into threat-intel-ga
jpipkin1 Jul 18, 2024
6ae36aa
Update schedule-search.md (#4330)
wjakelee Jul 19, 2024
18a3cfe
Weekly 404 fixes (#4331)
kimsauce Jul 19, 2024
e827ede
announcementBar re: outages (#4333)
kimsauce Jul 20, 2024
af168b4
OpenTelemetry Remote Management index page (beta) (#4023)
kimsauce Jul 22, 2024
eefc9f9
Update collect-logs.md (#4341)
JV0812 Jul 23, 2024
3d1bfee
Update datadog.md (#4335)
JV0812 Jul 23, 2024
7c3ee12
Update netskope-source.md (#4337)
JV0812 Jul 23, 2024
1196fdc
Update sumo-logic-flex-accounts.md (#4342)
JV0812 Jul 23, 2024
82428d3
Update close-cancel-sumo-account.md (#4338)
JV0812 Jul 23, 2024
fa1fe77
Update keyboard shortcuts (#4323)
jpipkin1 Jul 23, 2024
943f490
Update collect-logs-oracle-cloud-infrastructure.md (#4344)
cameroneckles Jul 23, 2024
3c9f31e
Add sachin-sumologic to clabot file (#4345)
jpipkin1 Jul 23, 2024
4d5a21c
Real-time alerts/Sched Search edits (#4334)
kimsauce Jul 23, 2024
005d77c
Amazon Inspector doc update (#4346)
JV0812 Jul 25, 2024
f0dd8df
chore: update nodejs supported version (#4348)
mat-rumian Jul 25, 2024
282c85a
chore: update tracing k8s deployment docs (#4339)
mat-rumian Jul 25, 2024
936e7cf
New integration Sum-Logic-Notifaiction-By-Gmail (#4349)
rishav-sumo-dev Jul 25, 2024
f8263bd
chore: update java instr version (#4350)
mat-rumian Jul 25, 2024
a6f0587
Update github.md (#4353)
droonee Jul 25, 2024
8b90ff6
Weekly 404 fixes (#4355)
kimsauce Jul 26, 2024
27008e4
Changes for cassandra opentelemetry doc after with metric collection …
sumoanema Jul 26, 2024
d16eb14
Add metrics collection and metrics-based dashboards info to RabbitMQ …
yasar-sumologic Jul 26, 2024
aeae8ff
Log monitor trigger evaluation freq (#4305)
kimsauce Jul 26, 2024
c96e387
chore: update js instr deps (#4357)
mat-rumian Jul 26, 2024
040329e
DOCS-253 - Kanso cleanup (#4352)
jpipkin1 Jul 26, 2024
022b2de
DOCS-350 - Ensure that the Product List article is indexed (#4354)
jpipkin1 Jul 26, 2024
0cd1112
Update cloud-soar-bridge.md - Ammend SIEM_URL setting (#4359)
mvirga-sumo Jul 26, 2024
36873ab
Update automation-service-bridge.md - Amend SIEM_URL setting (#4358)
mvirga-sumo Jul 26, 2024
6b864c0
Changing the dashboard screenshot file name from png to jpg (#4361)
sumoanema Jul 29, 2024
237d9ec
VMWare Otel App Documentation (#4336)
ankurch627 Jul 29, 2024
d00e0f3
CONN-3431, CONN-3432: Added FAQ sections for Akamai SIEM API (#4362)
parth-sumo Jul 29, 2024
40dbd57
chore: update python instr deps (#4364)
mat-rumian Jul 29, 2024
7c44623
chore: update ruby deps (#4366)
mat-rumian Jul 29, 2024
44d6940
chore: update .net instr logs location (#4365)
mat-rumian Jul 29, 2024
dacbacb
Add integrations (#4367)
jpipkin1 Jul 29, 2024
1a3d853
DOCS-76 - Integrate UX style guidance (#4085)
kimsauce Jul 30, 2024
6e9db8e
Update faq.md (#4343)
JV0812 Jul 30, 2024
36275b3
Weekly 404 Fixes (#4373)
kimsauce Jul 30, 2024
9881d7f
Formatting fixes - OTEL Traces Instrumentation (#4368)
kimsauce Jul 30, 2024
749c214
Update lookup.md (#4356)
JV0812 Jul 30, 2024
d0f3160
Merge branch 'main' into threat-intel-ga
jpipkin1 Jul 30, 2024
f5d6a0b
Add STIX to product list article
jpipkin1 Jul 30, 2024
0cdff2e
Merge branch 'main' into threat-intel-ga
jpipkin1 Aug 28, 2024
12e77ef
Merge branch 'main' into threat-intel-ga
jpipkin1 Sep 11, 2024
e9a308a
Change release note date to Nov 29 2024
jpipkin1 Sep 11, 2024
2c8720f
Credit usage information screenshot updated (#4496)
JV0812 Sep 12, 2024
5c01c01
Documentation Azure Load Balancer (#4526)
sachin-sumologic Sep 12, 2024
226f89d
Update sdo-manual-configuration.md (#4523)
himanshu219 Sep 12, 2024
a419b8c
Image updated (#4529)
JV0812 Sep 12, 2024
615dcfa
Zendesk Source Docs (#4524)
JV0812 Sep 12, 2024
acdaecc
CONN-3352 Release atlassian-source.md (#4519)
yleiferman Sep 12, 2024
a0cf03a
DOCS-443 - Clean up API articles (#4498)
jpipkin1 Sep 12, 2024
4176820
Micro Lesson added to the Flex app doc (#4525)
JV0812 Sep 13, 2024
721b5e2
Correct KinesisLog JSON contentType (#4530)
kimsauce Sep 13, 2024
5a1f24a
Estimate Infrequent tier data docs update (#4289)
JV0812 Sep 16, 2024
20058ac
Fix spelling (#4531)
jpipkin1 Sep 16, 2024
9f41901
added the content. (#4532)
rishav-sumo-dev Sep 16, 2024
b8a1da7
modified date (#4521)
ruturajsumo Sep 16, 2024
fd6b349
Added metrics collection and metrics-based dashboards info to MongoDB…
yasar-sumologic Sep 16, 2024
a1358e1
Add new video (#4533)
jpipkin1 Sep 16, 2024
62f6576
Update python.md (#4534)
wjakelee Sep 16, 2024
3b7fd38
updated docs for slack (#4536)
ruturajsumo Sep 17, 2024
7e618e0
Moved 1Password to SaaS apps (#4535)
kimsauce Sep 17, 2024
75c7080
Edit config to throw warning for broken anchors (#4520)
kimsauce Sep 17, 2024
0bafa0d
Clean up upload-formats file
jpipkin1 Sep 17, 2024
8766b9a
DOCS-443 - Clean up API articles (#4498)
jpipkin1 Sep 12, 2024
ceb4e28
Edit config to throw warning for broken anchors (#4520)
kimsauce Sep 17, 2024
92789ad
Update python version (#4537)
jpipkin1 Sep 17, 2024
c0df5a5
Remove duplicate entry in sidebar
jpipkin1 Sep 17, 2024
821dc44
DOCS-443 - Clean up API articles (#4498)
jpipkin1 Sep 12, 2024
9e385cf
DOCS-443 - Clean up API articles (#4498)
jpipkin1 Sep 12, 2024
d3f501c
Edit config to throw warning for broken anchors (#4520)
kimsauce Sep 17, 2024
a2ef86f
DOCS-443 - Clean up API articles (#4498)
jpipkin1 Sep 12, 2024
891ad01
DOCS-443 - Clean up API articles (#4498)
jpipkin1 Sep 12, 2024
42628ad
Merge branch 'main' into threat-intel-ga
jpipkin1 Sep 17, 2024
c475014
Fix conflict
jpipkin1 Sep 20, 2024
4f7bc2d
Merge branch 'main' into threat-intel-ga
jpipkin1 Sep 20, 2024
fb6ee43
Fixes for Kanso
jpipkin1 Sep 20, 2024
f7c1392
Merge branch 'main' into threat-intel-ga
jpipkin1 Sep 24, 2024
e4d7c84
Merge branch 'main' into threat-intel-ga
jpipkin1 Oct 28, 2024
4aa645e
Merge branch 'main' into threat-intel-ga
jpipkin1 Oct 29, 2024
393e562
Merge branch 'main' into threat-intel-ga
jpipkin1 Nov 11, 2024
3a10bbe
Merge branch 'main' into threat-intel-ga
jpipkin1 Dec 2, 2024
950ebce
Minor edit
jpipkin1 Dec 2, 2024
f246637
Change release note date to Jan 16 2025
jpipkin1 Dec 2, 2024
d24259f
Merge branch 'main' into threat-intel-ga
jpipkin1 Dec 11, 2024
9194680
Merge branch 'main' into threat-intel-ga
jpipkin1 Dec 17, 2024
5f5da5f
Make terms lowercase
jpipkin1 Dec 18, 2024
860dad6
Merge branch 'main' into threat-intel-ga
jpipkin1 Dec 18, 2024
1b0f968
Remove beta tagging from Intel471 and Mandiant threat intel sources
jpipkin1 Dec 18, 2024
0bb6514
Clean up threat intel source intros
jpipkin1 Dec 18, 2024
decc133
Merge branch 'main' into threat-intel-ga
jpipkin1 Dec 18, 2024
53b7212
Remove video
jpipkin1 Dec 26, 2024
4b7af83
Merge branch 'main' into threat-intel-ga
jpipkin1 Dec 30, 2024
8fc3444
Merge branch 'main' into threat-intel-ga
jpipkin1 Jan 3, 2025
48ea9b8
Remove beta from ZeroFox
jpipkin1 Jan 3, 2025
1ce3a08
Updates to Cloud SIEM threat intel article
jpipkin1 Jan 3, 2025
e0e38ea
Merge branch 'main' into threat-intel-ga
jpipkin1 Jan 6, 2025
82573d0
Add Intel471 and Mandiant to product list
jpipkin1 Jan 6, 2025
9a3d73b
Merge branch 'main' into threat-intel-ga
jpipkin1 Jan 6, 2025
122dc28
Merge branch 'main' into threat-intel-ga
jpipkin1 Jan 6, 2025
fd06078
Merge branch 'main' into threat-intel-ga
jpipkin1 Jan 6, 2025
85cfdf8
Make CrowdStrike Threat Intel Source GA
jpipkin1 Jan 6, 2025
8c864d3
App migration away from CrowdStrike to Sumo Logic threat intelligence
jpipkin1 Jan 7, 2025
57ac4bb
Merge branch 'main' into threat-intel-ga
jpipkin1 Jan 8, 2025
7047ec8
Fix broken anchor link
jpipkin1 Jan 8, 2025
bcbb852
Added PR #4190 changes
jpipkin1 Jan 8, 2025
08bd666
Fix broken link
jpipkin1 Jan 8, 2025
8a1e414
Merge branch 'main' into threat-intel-ga
jpipkin1 Jan 9, 2025
7ea6452
Add notes about Cloud SIEM admins
jpipkin1 Jan 13, 2025
4ad6852
Fix broken link
jpipkin1 Jan 13, 2025
6ac7e23
Add comments for DOCS-643
jpipkin1 Jan 17, 2025
f0b3f03
Update pattern_type to stix
jpipkin1 Jan 21, 2025
2dcd1f1
Comment out text
jpipkin1 Jan 21, 2025
1e6880b
Updates from Mike Pomraning comments
jpipkin1 Jan 22, 2025
4ba25fd
Merge branch 'main' into threat-intel-ga
jpipkin1 Jan 23, 2025
2e529ca
Merge branch 'main' into threat-intel-ga
jpipkin1 Jan 31, 2025
ca1d32d
Remove STIX from UI
jpipkin1 Jan 31, 2025
eba2544
Merge main
jpipkin1 Feb 4, 2025
4e4ebf7
Merge branch 'main' into threat-intel-ga
jpipkin1 Feb 11, 2025
207aee6
Add file hashes and remove APIs
jpipkin1 Feb 11, 2025
1fa7a5a
Merge branch 'main' into threat-intel-ga
jpipkin1 Feb 13, 2025
e506bfa
Add info to hasThreatMatch and threatlookup operators
jpipkin1 Feb 13, 2025
ce459f8
Change release note date to Jan 24 2025
jpipkin1 Feb 20, 2025
d1d4ce4
Merge branch 'main' into threat-intel-ga
jpipkin1 Feb 20, 2025
3d78148
Update release note
jpipkin1 Feb 20, 2025
59fe661
First set of updates for GA
jpipkin1 Feb 21, 2025
dfb00f3
Next set of updates
jpipkin1 Feb 21, 2025
87e4e1f
Final pass
jpipkin1 Feb 21, 2025
434ff0b
Merge branch 'main' into threat-intel-ga
jpipkin1 Feb 21, 2025
d89c48b
Change release note date to Feb 28 2025
jpipkin1 Feb 25, 2025
fb94698
Update screenshots
jpipkin1 Feb 27, 2025
7ab9708
Updates from review
jpipkin1 Feb 28, 2025
f3d88e8
More updates from review
jpipkin1 Feb 28, 2025
0e0448c
Yet more updates from review
jpipkin1 Feb 28, 2025
f9d9631
Change to 10 million
jpipkin1 Mar 3, 2025
b5db1cc
Update release note from review
jpipkin1 Mar 3, 2025
250f0da
Update types values
jpipkin1 Mar 3, 2025
f6d5297
Final updates from review
jpipkin1 Mar 3, 2025
9d30e41
Merge branch 'main' into threat-intel-ga
jpipkin1 Mar 3, 2025
bfce14c
Fix file:hashes example
jpipkin1 Mar 3, 2025
ce06007
Merge branch 'main' into threat-intel-ga
jpipkin1 Mar 3, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
26 changes: 26 additions & 0 deletions blog-service/2025-01-31-security.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
---
title: Threat Intelligence (Security)
image: https://www.sumologic.com/img/logo.svg
keywords:
- platform services
- threat intel
hide_table_of_contents: true
---

import useBaseUrl from '@docusaurus/useBaseUrl';

<a href="https://help.sumologic.com/release-notes-service/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a>

We’re excited to introduce Sumo Logic Threat Intelligence, a powerful feature set that enables you to seamlessly import threat intelligence indicator files directly into Sumo Logic to aid in security analysis. Threat intelligence indicators are individual data points about threats that are gathered from external sources about various entities such as host names, file hashes, IP addresses, and other known targets for compromise.

To see threat intelligence indicators, go to **Manage Data > Logs > Threat Intelligence**. Once indicators are ingested and appear on the **Threat Intelligence** tab, you can use them to search logs for threats.

Sumo Logic Threat Intelligence will help you stay ahead of emerging threats and enhance your security posture.

[Learn more](/docs/security/threat-intelligence/).

<img src={useBaseUrl('img/security/threat-intelligence-tab-example.png')} alt="Threat Intelligence tab" style={{border: '1px solid gray'}} width="800" />

:::note
Only Cloud SIEM administrators can add threat intelligence indicators to the system. However, all Sumo Logic users can run queries against the indicators to uncover threats.
:::
8 changes: 5 additions & 3 deletions cid-redirects.json
Original file line number Diff line number Diff line change
Expand Up @@ -1549,7 +1549,9 @@
"/cid/1": "/docs/search/get-started-with-search/build-search/search-syntax-overview",
"/cid/0100": "/docs/manage/security/installation-tokens",
"/cid/0020": "/docs/manage/health-events",
"/cid/0020001": "/docs/platform-services/threat-intelligence-indicators",
"/cid/0020001": "/docs/security/threat-intelligence/upload-formats",
"/cid/20002": "/docs/search/search-query-language/search-operators/threatlookup",
"/cid/0020003": "/docs/security/threat-intelligence",
"/cid/0523": "/docs/manage/manage-subscription/upgrade-sumo-logic-credits-account",
"/cid/0524": "/docs/manage/manage-subscription/cloud-flex-legacy-accounts",
"/cid/1000": "/docs/send-data/installed-collectors/sources/local-file-source",
Expand Down Expand Up @@ -2833,7 +2835,7 @@
"/Cloud_SIEM_Enterprise/Administration/Cloud_SIEM_Enterprise_Feature_Update_(2022)": "/docs/cse/administration",
"/Cloud_SIEM_Enterprise/Administration/Create_a_Custom_Tag_Schema": "/docs/cse/administration/create-a-custom-tag-schema",
"/Cloud_SIEM_Enterprise/Administration/Configure_a_Custom_Inventory_Source": "/docs/cse/administration/custom-inventory-sources",
"/Cloud_SIEM_Enterprise/Administration/Create_a_Custom_Threat_Intel_Source": "/docs/cse/administration/create-custom-threat-intel-source",
"/Cloud_SIEM_Enterprise/Administration/Create_a_Custom_Threat_Intel_Source": "/docs/security/threat-intelligence/threat-indicators-in-cloud-siem",
"/Cloud_SIEM_Enterprise/Administration/Create_and_Use_Network_Blocks": "/docs/cse/administration/create-use-network-blocks",
"/Cloud_SIEM_Enterprise/Administration/Create_CSE_Actions": "/docs/cse/administration/create-cse-actions",
"/Cloud_SIEM_Enterprise/Administration/Create_CSE_Context_Actions": "/docs/cse/administration/create-cse-context-actions",
Expand Down Expand Up @@ -3263,7 +3265,7 @@
"/Manage/Security/Set_a_Limit_for_User_Concurrent_Sessions": "/docs/manage/security/set-limit-user-concurrent-sessions",
"/Manage/Security/Set_a_Maximum_Web_Session_Timeout": "/docs/manage/security/set-max-web-session-timeout",
"/Manage/Security/Set-the-Password-Policy": "/docs/manage/security/set-password-policy",
"/Manage/Threat-Intel-Ingest": "/docs/integrations/amazon-aws/threat-intel",
"/Manage/Threat-Intel-Ingest": "/docs/security/threat-intelligence",
"/Manage/Users-and-Roles": "/docs/manage/users-roles",
"/Manage/Users-and-Roles/Manage-Roles": "/docs/manage/users-roles",
"/Manage/Users-and-Roles/Manage-Roles/About-Roles": "/docs/manage/users-roles/roles",
Expand Down
32 changes: 32 additions & 0 deletions docs/api/threat-intel-ingest.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
---
id: threat-intel-ingest
title: Threat Intel Ingest Management APIs
sidebar_label: Threat Intel Ingest Management
description: The Threat Intel Ingest Management API allows you to upload STIX 2.x threat intel indicators, view storage status of threat intel ingest service, and view and set the retention period for threat intel indicators.
hide_table_of_contents: true
---

import useBaseUrl from '@docusaurus/useBaseUrl';
import ApiIntro from '../reuse/api-intro.md';

<img src={useBaseUrl('img/icons/security/cloud-siem.png')} alt="icon" width="60"/>

The [Threat Intel Ingest Management](/docs/security/threat-intelligence) API allows you to:

* Upload STIX 2.x threat intel indicators
* View storage status of threat intel ingest service
* View and set the retention period for threat intel indicators

<ApiIntro/>

| Deployment | Documentation URL |
|:-----------|:---------|
| AU | https://api.au.sumologic.com/docs/#tag/threatIntelIngest |
| CA | https://api.ca.sumologic.com/docs/#tag/threatIntelIngest |
| DE | https://api.de.sumologic.com/docs/#tag/threatIntelIngest |
| EU | https://api.eu.sumologic.com/docs/#tag/threatIntelIngest |
| FED | https://api.fed.sumologic.com/docs/#tag/threatIntelIngest |
| IN | https://api.in.sumologic.com/docs/#tag/threatIntelIngest |
| JP | https://api.jp.sumologic.com/docs/#tag/threatIntelIngest |
| US1 | https://api.sumologic.com/docs/#tag/threatIntelIngest |
| US2 | https://api.us2.sumologic.com/docs/#tag/threatIntelIngest |
2 changes: 1 addition & 1 deletion docs/cloud-soar/introduction.md
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ As the newest member of your company's SOC team, it’s your task to set up some

Your company's apps and services generate logs, metrics, and tracing data.

When you ingest that data into Sumo Logic, you have one centralized location to query and visualize all that data. Sumo Logic’s Log Analytics Platform integrates with CrowdStrike’s threat intel database, so you can start getting security alerts and hunt threats. You can learn more in [Additional Security Features](/docs/security/additional-security-features/).
When you ingest that data into Sumo Logic, you have one centralized location to query and visualize all that data. Sumo Logic’s Log Analytics Platform uses [threat intelligence](/docs/security/threat-intelligence/), so you can start getting security alerts and hunt threats. You can learn more in [Additional Security Features](/docs/security/additional-security-features/).

You can take your security one step further with [Cloud SIEM](/docs/cse/). When you forward your log messages to Cloud SIEM, they are parsed, mapped, and enriched into Cloud SIEM records. These records are compared to security rules. If a rule is triggered, an entity is extracted, a severity score is assigned, and a signal is created. If enough signals with the same entity cluster together, they become an Insight. Insights are likely risks that need your attention.

Expand Down
14 changes: 12 additions & 2 deletions docs/cse/administration/create-custom-threat-intel-source.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,13 +5,23 @@ sidebar_label: Create a Custom Threat Intelligence Source
description: Learn how to create and manage custom threat sources.
---


import useBaseUrl from '@docusaurus/useBaseUrl';

<!-- For threat intel. Put this back once we support cat with the threatlookup search operator:

:::info
This article describes functionality in Cloud SIEM that will be deprecated at a future time. **You can no longer add custom intelligence sources in Cloud SIEM**. To create new sources, use the Sumo Logic threat intelligence indicators framework. For more information, see [Threat Intelligence](/docs/security/threat-intelligence/).
:::
-->

This topic has information about setting up a *custom threat intelligence source* in Cloud SIEM, which is a threat intelligence list that you can populate manually, as opposed to using an automatic feed. 

You can set up and populate custom threat intelligence sources interactively from the Cloud SIEM UI, by uploading a .csv file, or using Cloud SIEM APIs. You can populate the sources with IP addresses, domains, URLs, email addresses, and file hashes.

:::note
You can also use the Sumo Logic threat intelligence framework to add sources. See [Threat Intelligence](/docs/security/threat-intelligence/).
:::

## How Cloud SIEM uses indicators

When Cloud SIEM encounters an indicator from your threat source in an incoming record it adds relevant information to the record. Because threat intelligence information is persisted within records, you can reference it downstream in both rules and search. The built-in rules that come with Cloud SIEM automatically create a signal for records that have been enriched in this way.
Expand All @@ -20,7 +30,7 @@ Rule authors can also write rules that look for threat intelligence information

## Create a threat intelligence source from Cloud SIEM UI

1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Threat Intelligence**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**.
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Threat Intelligence**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**.
1. Click **Add Source** on the **Threat Intelligence** page.
1. In the **Custom** box click **Create**.
1. On the **Add New Source** popup, enter a name, and if desired, a description for the source.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -69,7 +69,7 @@ sso : ip-192-0-2-0 : alex@travellogic.com :
"Successful Login" : "2024-05-25T22:11:42"
```

First, the message is parsed into a set of key-value pairs. This process also fixes basic formatting. This step creates semi-structured data. For example, instead of `ip-192-0-2-0`, the parsing step extracts the IP address into a key-value pair, where the key is something like `srcDeviceIP` and the value is `192.0.2.0`, with the hyphens normalized to dots. Then, this information is mapped onto the Cloud SIEM schema. Finally, the record is enriched with information from match lists or threat intelligence databases, such as its [CrowdStrike threat level](/docs/integrations/security-threat-detection/threat-intel-quick-analysis#threat-intel-faq). These normalized records are then sent down the Cloud SIEM pipeline and compared to rules.
First, the message is parsed into a set of key-value pairs. This process also fixes basic formatting. This step creates semi-structured data. For example, instead of `ip-192-0-2-0`, the parsing step extracts the IP address into a key-value pair, where the key is something like `srcDeviceIP` and the value is `192.0.2.0`, with the hyphens normalized to dots. Then, this information is mapped onto the Cloud SIEM schema. Finally, the record is enriched with information from match lists or Sumo Logic [threat intelligence](/docs/security/threat-intelligence/). These normalized records are then sent down the Cloud SIEM pipeline and compared to rules.

### Extracting security insights from Cloud SIEM

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -130,16 +130,16 @@ Perform the following tasks to install security apps that provide data to Cloud

Install the Cloud SIEM App to monitor data that is parsed, along with all the signals and insights that records generate. The app contains multiple folders of searches and dashboards related to Cloud SIEM.

Also install any out-of-the-box apps or dashboards for security data sources we support, including CrowdStrike’s Threat Intel Quick Analysis app. These apps are useful for quick visualizations and configuring context actions to pivot directly to from Cloud SIEM.
Also install any out-of-the-box apps or dashboards for security data sources we support, including the Threat Intel Quick Analysis app. These apps are useful for quick visualizations and configuring context actions to pivot directly to from Cloud SIEM.

See:
* [Enterprise Audit - Cloud SIEM](/docs/integrations/sumo-apps/cse/)
* [Security and Threat Detection](/docs/integrations/security-threat-detection/)
* [Threat Intel Quick Analysis](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/)

#### Import Crowdstrike threat intel searches
#### Import threat intel searches

You can configure Crowdstrike threat indicator matches from the Threat Intel Quick Analysis app to become signals within Cloud SIEM using scheduled searches. An example would be to fire a Cloud SIEM signal from a scheduled search when there is a highly malicious threat intel match on device IPs. Review other current scheduled search alerts that might be candidates for generating signals.
You can configure Sumo Logic [threat intelligence](/docs/security/threat-intelligence/) matches from the Threat Intel Quick Analysis app to become signals within Cloud SIEM using scheduled searches. An example would be to fire a Cloud SIEM signal from a scheduled search when there is a highly malicious threat intel match on device IPs. Review other current scheduled search alerts that might be candidates for generating signals.

See:
* [Threat Intel Quick Analysis](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/)
Expand Down Expand Up @@ -169,9 +169,9 @@ See: [Create and Use Network Blocks](/docs/cse/administration/create-use-network

### Configure threat intel feeds

Cloud SIEM heavily leverages threat intelligence to do real-time comparisons against known bad indicators. You can configure popular free threat feeds. But if your security team pays for premium threat intelligence (such as RecordedFuture, Anomali, Crowdstrike, ThreatConnect, etc), you can configure these too.
Cloud SIEM heavily leverages threat intelligence to do real-time comparisons against known bad indicators. You can configure popular free threat feeds. But if your security team pays for premium threat intelligence (such as RecordedFuture, Anomali, Crowdstrike, ThreatConnect, and so on), you can configure these too.

See: [Create a Custom Threat Intel Source](/docs/cse/administration/create-custom-threat-intel-source/)
See: [Manage Threat Intelligence Indicators](/docs/security/threat-intelligence/threat-intelligence-indicators/)

### Create lists
Perform the following steps to create lists to allow or suppress information monitored for Cloud SIEM.
Expand Down
18 changes: 14 additions & 4 deletions docs/cse/integrations/configuring-threatq-source-in-cse.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,11 +7,22 @@ description: Learn how to set up a ThreatQ source.

import useBaseUrl from '@docusaurus/useBaseUrl';

<!-- For threat intel. Once we support cat with the threatlookup search operator, REPLACE THE CONTENTS OF THIS ARTICLE WITH THE FOLLOWING:

ThreatQ is a threat intelligence platform that centrally manages and correlates external sources of threat intel information. If you have a ThreatQ subscription, you can leverage ThreatQ threat intel feeds. 

To do so, [ingest threat intelligence indicators](/docs/security/threat-intelligence/about-threat-intelligence/#ingest-threat-intelligence-indicators) from your ThreatQ source.

## Looking for ThreatQ indicators using Cloud SIEM rules

Threat Intelligence sources are used at the time of record ingestion. When a record is ingested, Cloud SIEM determines whether any of the fields in the record exist in any of your Threat Intelligence sources. When a record contains a value that matches an entry in one or more Threat Intelligence sources, the `hasThreatMatch` Cloud SIEM rules function searches incoming records in Cloud SIEM for matches to threat intelligence indicators. For more information, see [Threat Intelligence Indicators in Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/).
-->

This topic has information about configuring a ThreatQ source in Cloud SIEM.

ThreatQ is a threat intelligence platform that centrally manages and correlates external sources of threat intel information. 
ThreatQ is a threat intelligence platform that centrally manages and correlates external sources of threat intel information.

If you have a ThreatQ subscription, Cloud SIEM’s ThreatQ integration allows you to leverage ThreatQ threat intel feeds. 
If you have a ThreatQ subscription, Cloud SIEM’s ThreatQ integration allows you to leverage ThreatQ threat intel feeds.

To do so, you simply configure a ThreatQ source in Cloud SIEM. You supply the information Cloud SIEM needs to connect to ThreatQ and fetch feed updates on a periodic basis.

Expand Down Expand Up @@ -51,7 +62,7 @@ Because the threat intel information is persisted within records, you can refere

`array_contains(listMatches, "threat_intel_list_name")`

where 
where

`threat_intel_list_name` is the name of the threat intel list.

Expand All @@ -60,4 +71,3 @@ If the name of the list you are referencing with `array_contains` contains any s
:::

For more information, see [Rules and other content](/docs/cse/rules/about-cse-rules#rules-and-other-content) in the *About Cloud SIEM Rules* topic.

2 changes: 2 additions & 0 deletions docs/cse/integrations/enrichments-and-indicators.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,8 @@ No icon is displayed for entities with the **Not Flagged** label.
**Not Flagged** is not the default value (which is no indicator at all). Cloud SIEM will not automatically determine the indicator value; enrichments must explicitly set it.
:::

For more information, see [Threat Intelligence Indicators in Cloud SIEM](/docs/security/threat-intelligence/threat-indicators-in-cloud-siem/).

## Enrichment attributes

The enrichment schema includes support for the following optional attributes:
Expand Down
Loading