diff --git a/cid-redirects.json b/cid-redirects.json index 8c2974456a..819ad35b15 100644 --- a/cid-redirects.json +++ b/cid-redirects.json @@ -4072,6 +4072,8 @@ "/docs/cse/records-signals-entities-insights/cse-heads-up-display": "/docs/cse/get-started-with-cloud-siem/cse-heads-up-display", "/docs/cse/records-signals-entities-insights/insight-generation-process": "/docs/cse/get-started-with-cloud-siem/insight-generation-process", "/docs/cse/get-started-with-cloud-siem/introduction-to-cloud-siem": "/docs/cse/get-started-with-cloud-siem", + "/docs/cse/cloud-siem-content-catalog": "/docs/cse/get-started-with-cloud-siem/cloud-siem-content-catalog", + "/docs/cse/introduction-to-cloud-sie": "/docs/cse/get-started-with-cloud-siem", "/docs/integrations/sumo-apps/security-foundations": "/docs/integrations/sumo-apps/security-analytics", "/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs/collect-with-amazon-kinesis": "/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs", "/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs/collect-with-collector-script": "/docs/send-data/collect-from-other-data-sources/amazon-cloudwatch-logs", diff --git a/docs/cse/cloud-siem-content-catalog.md b/docs/cse/get-started-with-cloud-siem/cloud-siem-content-catalog.md similarity index 100% rename from docs/cse/cloud-siem-content-catalog.md rename to docs/cse/get-started-with-cloud-siem/cloud-siem-content-catalog.md diff --git a/docs/cse/get-started-with-cloud-siem/cloud-siem-ui.md b/docs/cse/get-started-with-cloud-siem/cloud-siem-ui.md new file mode 100644 index 0000000000..16af5a85d6 --- /dev/null +++ b/docs/cse/get-started-with-cloud-siem/cloud-siem-ui.md @@ -0,0 +1,180 @@ +--- +id: cloud-siem-ui +title: Cloud SIEM User Interface +sidebar_label: User Interface +description: Learn about the Cloud SIEM user interface. +--- + +import useBaseUrl from '@docusaurus/useBaseUrl'; +import Theme from '../../reuse/dark-light-theme.md'; + +## Access Cloud SIEM + +To access Cloud SIEM, in the main Sumo Logic menu select **Cloud SIEM**.
Cloud SIEM menu option + +Cloud SIEM must be enabled by Sumo Logic before it is accessible to users in your organization. For more information, see [Onboarding Checklist for Cloud SIEM Administrators](/docs/cse/get-started-with-cloud-siem/onboarding-checklist-cse/). + +## Theme + + + +## Heads Up Display + +The first screen you see when you access Cloud SIEM is the Heads Up Display, a single pane of information about your environment. In the center, you'll see a radar showing insights, surrounded by the signals and records used to generate the insights. On the left is summary information, and on the right is recent activity. Use this screen as the starting place for your investigations, focusing on insights as the most valuable place to start. + +For more information, see [Cloud SIEM Heads Up Display](/docs/cse/get-started-with-cloud-siem/cse-heads-up-display/). + +## Cloud SIEM menus + +### Classic UI + +The classic UI is the traditional way to navigate in Sumo Logic. For more information, see [Tour the Sumo Logic Classic UI](/docs/get-started/sumo-logic-ui-classic). + +#### Top menu + +This menu appears at the top of the Cloud SIEM screen:
Top menu bar + +Use the top menu to access: +* Insights menu icon [**Insights**](/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/). View Insights, clusters of events that require investigation. An insight is created when a high level of suspicious activity is detected for a single entity, such as a user, IP address, host, or domain. +* Signals menu icon [**Signals**](/docs/cse/records-signals-entities-insights/view-records-signal/). View Signals, indicators for events of interest that fire when rule conditions are met. +* Entities menu icon [**Entities**](/docs/cse/records-signals-entities-insights/view-manage-entities/). View Entities, unique actors encountered in incoming messages, such as a user, IP address, or host. +* Records menu icon [**Records**](/docs/cse/records-signals-entities-insights/view-records-signal/). View Records, collections of normalized data created from a message. +* Content menu icon [**Content**](#content-menu). Create Cloud SIEM content, such as rules. +* Configuration menu icon [**Configuration**](#configuration-menu). Configure Cloud SIEM. +* Help menu icon **Help**. Access feature guides, documentation, release notes, and system status. +* Switch Apps menu icon **Switch Apps**. Access the Sumo Logic [Log Analytics Platform](/docs/get-started/sumo-logic-ui/) or [Cloud SOAR](/docs/cloud-soar/) (if enabled in your organization). +* Profile menu icon **Profile**. View your Cloud SIEM username and time zone. + +#### Content menu + +The **Content** menu allows you to create elements to customize Cloud SIEM. To access the menu, click **Content** on the [top menu](#top-menu).
Content menu + +Use the **Content** menu to access: +* [**Rules**](/docs/cse/rules/). Manage rules, sets of logic that create signals based on information in incoming records. +* [**Rule Tuning**](/docs/cse/rules/rule-tuning-expressions/). Manage rule tuning expressions, which are extensions to rules. +* [**Threat Intelligence**](/docs/cse/administration/create-custom-threat-intel-source/). Manage sources of threat intelligence indicators, individual data points about threats that are gathered from external sources. +* [**Match Lists**](/docs/cse/match-lists-suppressed-lists/create-match-list/). Manage match lists, lists of important indicators and identifiers that you want to be addressed by rules. +* [**File Analysis**](/docs/cse/rules/import-yara-rules/). Manage sources for YARA rules. +* [**Custom Insights**](/docs/cse/records-signals-entities-insights/configure-custom-insight/). Manage custom Insights, methods to generate Insights on some basis other than Entity Activity Scores. +* [**Network Blocks**](/docs/cse/administration/create-use-network-blocks/). Manage network blocks, groups of IP addresses that you can use in rules. +* [**Suppressed Lists**](/docs/cse/match-lists-suppressed-lists/suppressed-lists/). Manage suppressed lists, lists of indicators that can suppress Signal generation. +* [**MITRE ATT&CK Coverage**](/docs/cse/administration/mitre-coverage/). View the MITRE ATT&CK Threat Coverage Explorer, a screen that shows the MITRE ATT&CK adversary tactics, techniques, and procedures that are covered by rules in your system. + +#### Configuration menu + +The **Configuration** menu allows you to configure Cloud SIEM. To access this menu, click Configuration menu icon on the [top menu](#top-menu).
Configuration menu + +Use the **Configuration** menu to access: +* **Incoming Data** + * [**Log Mappings**](/docs/cse/schema/create-structured-log-mapping/). Manage log mappings, maps that tell Cloud SIEM how to build a Record from the key-value pairs extracted from messages. +* **Entities** + * [**Groups**](/docs/cse/records-signals-entities-insights/create-an-entity-group/). Manage groupings of Entities that can be used in rules. + * [**Normalization**](/docs/cse/schema/username-and-hostname-normalization/). Manage normalizing usernames and hostnames in Records during the parsing and mapping process. + * [**Custom Types**](/docs/cse/records-signals-entities-insights/create-custom-entity-type/). Manage custom types to more precisely categorize entities. + * [**Criticality**](/docs/cse/records-signals-entities-insights/entity-criticality/). Adjust the severity of Signals for specific Entities based on some risk factor or other consideration. +* **Workflow** + * [**Detection**](/docs/cse/records-signals-entities-insights/set-insight-generation-window-threshold/). Set the Insight detection threshold. + * [**Statuses**](/docs/cse/administration/manage-custom-insight-statuses/). Manage custom Insight statuses. + * [**Resolutions**](/docs/cse/administration/manage-custom-insight-resolutions/). Manage custom Insight resolutions. + * [**Tag Schemas**](/docs/cse/administration/create-a-custom-tag-schema/). Manage schemas for tags, metadata you can attach to Insights, Signals, Entities, and Rules. +* **Integrations** + * [**Sumo Logic**](/docs/cse/ingestion/sumo-logic-ingest-mapping/). Configure mapping of message fields to Record attributes. + * [**Context Actions**](/docs/cse/administration/create-cse-context-actions/). Create actions that a Cloud SIEM analyst can use to query an external system for information about an Entity, IOC, or data encountered in a Record. + * [**Actions**](/docs/cse/administration/create-cse-actions/). Create actions to issue a notification to another service when certain events occur in Cloud SIEM. + * [**Enrichment**](/docs/cse/integrations/enrichments-and-indicators/). Manage elements that enrich data in Cloud SIEM. + * [**Automation**](/docs/cse/automation/). Create smart actions that trigger automatically when certain events occur in Cloud SIEM. + +### New UI + +The new UI provides a streamlined way to navigate in Sumo Logic. For more information, see [Tour the Sumo Logic UI](/docs/get-started/sumo-logic-ui). + +#### Sidebar menu + +Click **Cloud SIEM** in the main Sumo Logic menu to open the sidebar menu.
Cloud SIEM sidebar menu + +Use the **Cloud SIEM** sidebar menu to access: +* **Search Cloud SIEM**. Search for [Insights](/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/), [Signals](/docs/cse/records-signals-entities-insights/view-records-signal/), [Entities](/docs/cse/records-signals-entities-insights/view-manage-entities/), and [Records](/docs/cse/records-signals-entities-insights/view-records-signal/). When you click in the search bar, you're prompted to select one of those types. Once you select a type, you're presented with a list of fields to filter on. +* **Security Events** + * [**SIEM Overview**](/docs/cse/get-started-with-cloud-siem/cse-heads-up-display/). View the Cloud SIEM Heads Up Display. + * [**Insights**](/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/). View Insights, clusters of events that require investigation. An insight is created when a high level of suspicious activity is detected for a single entity, such as a user, IP address, host, or domain. + * [**Signals**](/docs/cse/records-signals-entities-insights/view-records-signal/). View Signals, indicators for events of interest that fire when rule conditions are met. + * [**Entities**](/docs/cse/records-signals-entities-insights/view-manage-entities/). View Entities, unique actors encountered in incoming messages, such as a user, IP address, or host. + * [**Records**](/docs/cse/records-signals-entities-insights/view-records-signal/). View Records, collections of normalized data created from a message. +* **Security Detection** + * [**Rules**](/docs/cse/rules/). Manage rules, sets of logic that create signals based on information in incoming records. + * [**Rule Tuning**](/docs/cse/rules/rule-tuning-expressions/). Manage rule tuning expressions, which are extensions to rules. + * [**Threat Intelligence**](/docs/cse/administration/create-custom-threat-intel-source/). Manage sources of threat intelligence indicators, individual data points about threats that are gathered from external sources. + * [**Match List**](/docs/cse/match-lists-suppressed-lists/create-match-list/). Manage match lists, lists of important indicators and identifiers that you want to be addressed by rules. + * [**File Analysis**](/docs/cse/rules/import-yara-rules/). Manage sources for YARA rules. + * [**Custom Insights**](/docs/cse/records-signals-entities-insights/configure-custom-insight/). Manage custom Insights, methods to generate Insights on some basis other than Entity Activity Scores. + * [**Network Blocks**](/docs/cse/administration/create-use-network-blocks/). Manage network blocks, groups of IP addresses that you can use in rules + * [**Suppressed Lists**](/docs/cse/match-lists-suppressed-lists/suppressed-lists/). Manage suppressed lists, lists of indicators that can suppress Signal generation. + * [**MITRE ATT&CK Coverage**](/docs/cse/administration/mitre-coverage/). View the MITRE ATT&CK Threat Coverage Explorer, a screen that shows the MITRE ATT&CK adversary tactics, techniques, and procedures that are covered by rules in your system. + +#### Top menu + +This menu appears at the top of the screen:
Top menu bar + +Use the top menu to access: +* Go To icon **Go To...** Launch Sumo Logic features, including for Cloud SIEM. +* Help icon **Help**. Access links to documentation, support, community, release notes, and system status. +* Configuration icon [**Configuration**](#configuration-menu-1). Configure Sumo Logic features, including for Cloud SIEM. +* Administration icon **Administration**. Access Sumo Logic administration settings, such as for for [account](/docs/manage/), [users and roles](/docs/manage/users-roles/), and [account security](/docs/manage/security/). +* Profile icon **Profile**. View your notification and [preference](/docs/get-started/account-settings-preferences/) settings. + +#### Go To... menu + +The **Go To...** menu allows you to launch Sumo Logic features, including for Cloud SIEM. To access this menu, click Go To icon on the [top menu](#top-menu-1).
Go To menu bar + +Use the **Go To...** menu to access these Cloud SIEM features: +* [**Actions**](/docs/cse/administration/create-cse-actions/). Create actions to issue a notification to another service when certain events occur in Cloud SIEM. +* [**Context Actions**](/docs/cse/administration/create-cse-context-actions/). Create actions that a Cloud SIEM analyst can use to query an external system for information about an Entity, IOC, or data encountered in a Record. +* [**Criticality**](/docs/cse/records-signals-entities-insights/entity-criticality/). Adjust the severity of Signals for specific Entities based on some risk factor or other consideration. +* [**Custom Insights**](/docs/cse/records-signals-entities-insights/configure-custom-insight/). Manage custom Insights, methods to generate Insights on some basis other than Entity Activity Scores. +* [**Custom Types**](/docs/cse/records-signals-entities-insights/create-custom-entity-type/). Manage custom types to more precisely categorize entities. +* [**Enrichment**](/docs/cse/integrations/enrichments-and-indicators/). Manage elements that enrich data in Cloud SIEM. +* [**Entities**](/docs/cse/records-signals-entities-insights/view-manage-entities/). View Entities, unique actors encountered in incoming messages, such as a user, IP address, or host. +* [**File Analysis**](/docs/cse/rules/import-yara-rules/). Manage sources for YARA rules. +* [**Ingest Mappings**](/docs/cse/ingestion/sumo-logic-ingest-mapping/). Manage the mapping for data ingestion from a data source to Cloud SIEM. +* [**Insight Detection**](/docs/cse/records-signals-entities-insights/set-insight-generation-window-threshold/). Set the Insight detection threshold. +* [**Insight Resolutions**](/docs/cse/administration/manage-custom-insight-resolutions/). Manage custom Insight resolutions. +* [**Insight Statuses**](/docs/cse/administration/manage-custom-insight-statuses/). Manage custom Insight statuses. +* [**Insights**](/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/). View Insights, clusters of events that require investigation. An insight is created when a high level of suspicious activity is detected for a single entity, such as a user, IP address, host, or domain. +* [**Log Mappings**](/docs/cse/schema/create-structured-log-mapping/). Manage log mappings, maps that tell Cloud SIEM how to build a Record from the key-value pairs extracted from messages. +* [**Match Lists**](/docs/cse/match-lists-suppressed-lists/create-match-list/). Manage match lists, lists of important indicators and identifiers that you want to be addressed by rules. +* [**MITRE ATT&CK Coverage**](/docs/cse/administration/mitre-coverage/). View the MITRE ATT&CK Threat Coverage Explorer, a screen that shows the MITRE ATT&CK adversary tactics, techniques, and procedures that are covered by rules in your system. +* [**Network Blocks**](/docs/cse/administration/create-use-network-blocks/). Manage network blocks, groups of IP addresses that you can use in rules. +* [**Normalization**](/docs/cse/schema/username-and-hostname-normalization/). Manage normalizing usernames and hostnames in Records during the parsing and mapping process. +* [**Records**](/docs/cse/records-signals-entities-insights/view-records-signal/). View Records, collections of normalized data created from a message. +* [**Rule Tuning**](/docs/cse/rules/rule-tuning-expressions/). Manage rule tuning expressions, which are extensions to rules. +* [**Rules**](/docs/cse/rules/). Manage rules, sets of logic that create signals based on information in incoming records. +* **Search Cloud SIEM**. Search for [Insights](/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/), [Signals](/docs/cse/records-signals-entities-insights/view-records-signal/), [Entities](/docs/cse/records-signals-entities-insights/view-manage-entities/), and [Records](/docs/cse/records-signals-entities-insights/view-records-signal/). When you click in the search bar, you're prompted to select one of those types. Once you select a type, you're presented with a list of fields to filter on. +* [**SIEM Overview**](/docs/cse/get-started-with-cloud-siem/cse-heads-up-display/). View the Cloud SIEM Heads Up Display. +* [**Signals**](/docs/cse/records-signals-entities-insights/view-records-signal/). View Signals, indicators for events of interest that fire when rule conditions are met. +* [**Suppressed Lists**](/docs/cse/match-lists-suppressed-lists/suppressed-lists/). Manage suppressed lists, lists of indicators that can suppress Signal generation. +* [**Tag Schemas**](/docs/cse/administration/create-a-custom-tag-schema/). Manage schemas for tags, metadata you can attach to Insights, Signals, Entities, and Rules. +* [**Threat Intelligence**](/docs/cse/administration/create-custom-threat-intel-source/). Manage sources of threat intelligence indicators, individual data points about threats that are gathered from external sources. + +#### Configuration menu + +The **Configuration** menu allows you to configure Sumo Logic features, including for Cloud SIEM. To access this menu, click the configuration icon Configuration icon on the [top menu](#top-menu-1). Scroll down the menu to see Cloud SIEM configuration options.
Configuration menu + +Use the **Configuration** menu to access: + +* **Cloud SIEM Integrations** + * [**Ingest Mappings**](/docs/cse/ingestion/sumo-logic-ingest-mapping/). Manage the mapping for data ingestion from a data source to Cloud SIEM. + * [**Log Mappings**](/docs/cse/schema/create-structured-log-mapping/). Manage log mappings, maps that tell Cloud SIEM how to build a Record from the key-value pairs extracted from messages. + * [**Context Actions**](/docs/cse/administration/create-cse-context-actions/). Create actions that a Cloud SIEM analyst can use to query an external system for information about an Entity, IOC, or data encountered in a Record. + * [**Actions**](/docs/cse/administration/create-cse-actions/). Create actions to issue a notification to another service when certain events occur in Cloud SIEM. + * [**Enrichment**](/docs/cse/integrations/enrichments-and-indicators/). Manage elements that enrich data in Cloud SIEM. + * [**Automation**](/docs/cse/automation/). Create smart actions that trigger automatically when certain events occur in Cloud SIEM. +* **Cloud SIEM Entities** + * [**Groups**](/docs/cse/records-signals-entities-insights/create-an-entity-group/). Manage groupings of Entities that can be used in rules. + * [**Normalization**](/docs/cse/schema/username-and-hostname-normalization/). Manage normalizing usernames and hostnames in Records during the parsing and mapping process. + * [**Custom Types**](/docs/cse/records-signals-entities-insights/create-custom-entity-type/). Manage custom types to more precisely categorize entities. + * [**Criticality**](/docs/cse/records-signals-entities-insights/entity-criticality/). Adjust the severity of Signals for specific Entities based on some risk factor or other consideration. +* **Cloud SIEM Workflow** + * [**Insight Detection**](/docs/cse/records-signals-entities-insights/set-insight-generation-window-threshold/). Set the Insight detection threshold. + * [**Insight Statuses**](/docs/cse/administration/manage-custom-insight-statuses/). Manage custom Insight statuses. + * [**Insight Resolutions**](/docs/cse/administration/manage-custom-insight-resolutions/). Manage custom Insight resolutions. + * [**Tag Schemas**](/docs/cse/administration/create-a-custom-tag-schema/). Manage schemas for tags, metadata you can attach to Insights, Signals, Entities, and Rules. \ No newline at end of file diff --git a/docs/cse/get-started-with-cloud-siem/index.md b/docs/cse/get-started-with-cloud-siem/index.md index f458a47099..5348a9378a 100644 --- a/docs/cse/get-started-with-cloud-siem/index.md +++ b/docs/cse/get-started-with-cloud-siem/index.md @@ -9,6 +9,23 @@ import useBaseUrl from '@docusaurus/useBaseUrl'; This guide helps you get started using Cloud SIEM for threat hunting.
+
+
+ Shield on a workflow icon

Cloud SIEM User Interface

+

Learn about the Cloud SIEM user interface.

+
+
+
+ Shield on a workflow icon

Introduction to Cloud SIEM for Analysts

+

Learn basic concepts about Cloud SIEM for security analysts.

+
+
+
+
+ Shield on a workflow icon

Introduction to Cloud SIEM for Administrators

+

Learn basic concepts about Cloud SIEM for administrators.

+
+
Shield on a workflow icon

Cloud SIEM Heads Up Display

@@ -27,6 +44,12 @@ This guide helps you get started using Cloud SIEM for threat hunting.

Learn about the contents of the Insights UI in Cloud SIEM.

+
+
+ Checklist icon

Cloud SIEM Content Catalog

+

See the out-of-the-box Rules, Schema, Mappings, and Parsers for Cloud SIEM.

+
+
Checklist icon

Cloud SIEM Onboarding Checklist

diff --git a/docs/cse/get-started-with-cloud-siem/intro-for-administrators.md b/docs/cse/get-started-with-cloud-siem/intro-for-administrators.md new file mode 100644 index 0000000000..265822190f --- /dev/null +++ b/docs/cse/get-started-with-cloud-siem/intro-for-administrators.md @@ -0,0 +1,510 @@ +--- +id: intro-for-administrators +title: Introduction to Cloud SIEM for Administrators +sidebar_label: Introduction for Administrators +description: Learn basic concepts about Cloud SIEM for administrators. +--- + +import useBaseUrl from '@docusaurus/useBaseUrl'; + +This article provides an introduction to Cloud SIEM for administrators. + +If you are unsure whether you are an analyst or administrator, you can view your role in **Preferences** (see [Onboarding Checklists](/docs/get-started/onboarding-checklists/)). To use Cloud SIEM as an administrator, you must be assigned [Cloud SIEM role capabilities](/docs/manage/users-roles/roles/role-capabilities/#cloud-siem) that allow you to view and manage Cloud SIEM elements as well as perform administration tasks. + +While this section provides an introduction to Cloud SIEM for administrators, it is not a how-to for setting up Cloud SIEM. If you're setting up Cloud SIEM for the first time, see [Onboarding Checklist for Cloud SIEM Administrators](/docs/cse/get-started-with-cloud-siem/onboarding-checklist-cse/). + +## Build your SOC + +### The Cloud SIEM data pipeline + +Cloud SIEM is a cloud-based, enterprise-grade security information and event management (SIEM) system. Cloud SIEM leverages Sumo Logic's core functionality, including data collection, ingestion, storage, and threat intelligence. + +This is Sumo Logic's Cloud SIEM home page. + +Cloud SIEM main page + +* A. **Count**. A count of the records created from incoming messages, and the signals and insights that have been generated. +* B. **Insights by Status**. An overview of recent insights and their statuses: New, In Progress, Closed, or Other. +* C. **Radar**. Visualizes the last 24 hours of security activity. Dark blue lines represent records, light blue bars represent signals, and red triangles represent insights. +* D. **Recent Activity**. Displays a feed of the latest insights that have been generated. + +Sumo Logic collects and ingests millions of your company's log messages. However, you may choose to send only a portion of these to Cloud SIEM. Cloud SIEM takes these messages and parses, maps, and enriches them into records. These records are compared to rules and, if there's a match, entities are extracted from them and Cloud SIEM uses that information to create signals. These signals and entities are correlated, and used in security detection use cases. Then, if a certain severity threshold is crossed, they become an insight. Some of these insights have actions available right in the Cloud SIEM platform, like alerting your SOC teammates. + +Cloud SIEM data flow + +As a Cloud SIEM administrator, it's your job to make sure that this pipeline flows smoothly. In this section, you'll learn how to partition your data in Sumo Logic, forward it to Cloud SIEM, customize the schema mappings, and tune the SOC content to support the analysts on your SOC team. All these customizations and optimizations will help reduce false positives and enable your SOC analyst teammates to investigate and hunt threats faster. + +### Ingest the right data + +The first part of the security data pipeline is collection and ingestion in Sumo Logic. + +First part of the data pipeline + +These messages are then forwarded to Cloud SIEM. It's a good idea to periodically examine the data you're ingesting and sending to Cloud SIEM. Ask yourself these questions: + +* **Are you ingesting enough data?** Cloud SIEM takes thousands or millions of records and boils them down into just a handful of insights. Most organizations ingest more than 50GB of data every day to start finding any insights. If your ingest volume is smaller than this, consider sending more data to Cloud SIEM or using other security solutions like the [Threat Intel Quick Analysis app](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/). +* **Are you ingesting too much data?** More data doesn't always mean more insights. The threat detection logic built into Cloud SIEM generally prevents false positives. However, some organizations choose to ingest or store less data as a way to cut costs. One solution is partitioning your data into different tiers, and only sending some of that data along to Cloud SIEM. +* **Are you ingesting the right data?** Cloud SIEM doesn't just work on quantity alone. Quality data will affect your performance as well. As a best practice, you'll need to bring in quality data sources that are supported by Cloud SIEM. High-value data sources include [CloudTrail logs](/docs/integrations/cloud-security-monitoring-analytics/aws-cloudtrail/), [Windows event logs](/docs/send-data/installed-collectors/sources/collect-forwarded-events-windows-event-collector/), [AWS logs](/docs/integrations/amazon-aws/), and [GuardDuty logs](/docs/integrations/amazon-aws/guardduty/). You should also consider whether your data is structured, like key-value pairs, or unstructured, like plain text files. Most data ingested into Sumo Logic is semi-structured, like JSON logs. + +Once you've answered these questions, you can assess what is and isn't working for you and your SOC team. You can then partition your data in Sumo Logic and forward some or all of it to Cloud SIEM. + +#### Extra resources + +* All data must be ingested into Sumo Logic before it can be forwarded to Cloud SIEM. See [Cloud SIEM Ingestion](/docs/cse/ingestion/) to learn more details about data ingestion, setting up collectors, partitioning your data, and designing good metadata. +* If you only want to forward some, but not all of your data to Cloud SIEM you can use data tiers and partitions. For more information, see [Partitions](/docs/manage/partitions/). + +### Which UI should I use? + +As a Cloud SIEM admin, you'll use both the Sumo Logic UI and the Cloud SIEM UI. Even if you're primarily focused on Cloud SIEM, you need to be comfortable using both interfaces. + +| Sumo Logic UI | Cloud SIEM UI | +| :-- | :-- | +|
  • Add collectors and data sources.
  • Write field extraction rues.
  • Configure partitions and data tiers
  • Forward data to Cloud SIEM.
  • Configure RBAC controls.
|
  • Configure log and ingest mappings.
  • Create custom content, such as rules, match lists, and insights.
  • Customize actions, context actions, and other workflows.
| + +In the Sumo Logic UI, you'll add the collectors and data sources that will be used in Cloud SIEM. You can write field extraction rules, which help parse your logs so they can be better used as records in Cloud SIEM. You can also configure partitions and data tiers in Sumo Logic, and decide which data gets forwarded to Cloud SIEM. Finally, you configure users and roles for both Sumo Logic and Cloud SIEM using the Sumo Logic interface. + +In the Cloud SIEM UI, you'll configure the log and ingest mappings that turn your log messages into records. You can also create custom content to help with threat investigations like rules, match lists, and insights. Finally, you can customize what the actions, context actions, and workflows do in the Cloud SIEM interface, using APIs and other playbooks. + +## Configure and enable Cloud SIEM + +### Get your data into Cloud SIEM + +After you've decided what data to ingest (or not ingest), you can work on forwarding that data to Cloud SIEM. + +When you enable data forwarding, Cloud SIEM automatically starts processing your log messages into records. Each record contains the information from a message, which is parsed into key-value pairs, mapped to a Cloud SIEM schema, and enriched with other data. + +Forward data + +As an admin, there are several steps you must complete to forward data to Cloud SIEM. +1. First, you request backend configuration. This is a one-time setup for each Sumo Logic organization. Often, your Sumo account rep will complete this process for you. +1. Next, you enable data forwarding. You can do this by adding the `_siemForward = True` field when you set up a collector. For cloud data sources, you can also toggle the **Forward to SIEM** checkbox. You'll need to enable data forwarding each time you add a new data source into Sumo Logic, update your partitions, or make other changes to your data ingestion process. + + Cloud SIEM will not ingest historic data. In other words, any new data ingested into Sumo Logic will be forwarded to Cloud SIEM as soon as you enable data forwarding. However, older data will not be processed by Cloud SIEM. Data will start flowing from Sumo Logic into Cloud SIEM within a few minutes of enabling data forwarding. You can expect signals and insights to start generating within a few hours. +1. Finally, you'll configure the log and ingest mappings. This process is usually automatic, but must be completed for certain types of custom data sources. + +If you do need to configure log and ingest mappings, there are certain details you need to know about your data: +* Is your data structured or unstructured? +* Does your data have a syslog header? +* Is your data CEF, LEEF, JSON, XML, or some other common data type? +* Have field extraction rules been applied to your messages in Sumo Logic? +* What product and vendor do your messages come from? For example, are they Windows Event Logs, Palo Alto Firewall logs, or AWS GuardDuty logs? + +Once you know these details of your data, you can consult the Sumo Logic documentation for specific help for configuring your data pipeline. + +Later in this introduction, we'll be ingesting and processing simple, structured JSON log messages to demonstrate this configuration process. + +#### Extra resources + +* There are many different data sources and data types you may be ingesting into Sumo Logic. You can read the details about forwarding data from various vendors and products to Cloud SIEM in [Cloud SIEM Ingestion](/docs/cse/ingestion/). +* For the best signals and insights with the fewest false positives in Cloud SIEM, you need to ingest high-quality data. You can ensure your data is high quality by making sure your data and metadata are clean and organized from the moment you first ingest them into Sumo Logic. One way to do this is by writing good field extraction rules. See [Create a Field Extraction Rule](/docs/manage/field-extractions/create-field-extraction-rule/). + +### Enable data forwarding for an HTTP source + +In this section, we'll show you how to create a new source using a pre-configured collector and enable data forwarding to Cloud SIEM by selecting the **Forward to SIEM** checkbox. Once the new source is configured with data forwarding, you'll be able to send data to it and observe the data flow. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data > Collection > Collection**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the Sumo Logic top menu select **Configuration**, and then under **Data Collection** select **Collection**. You can also click the **Go To...** menu at the top of the screen and select **Collection**. +1. Locate a hosted collector whose data you want to forward to Cloud SIEM. +1. Click **Add Source**. +1. Click **HTTP Logs & Metrics**. +1. Enter a name and source category. +1. Select the **Forward to SIEM** checkbox. +1. Leave other fields as their defaults and click **Save**. +1. A popup will appear with a URL. Copy the URL and keep it somewhere safe, like a Notes or TextEdit file. We'll use it in the next section. + +#### Tips and tricks + +* Read [Best Practices for Data Collection](/docs/send-data/best-practices/). +* If you need to find the HTTP source URL address again, click the **Show URL** link next to your source. + +### Send a log message to Cloud SIEM + +In this section, we'll send a simple JSON log message to the HTTP source we created in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source). Then, we'll look for that log message in Cloud SIEM. This will verify that we configured our source correctly, and demonstrate how quickly Cloud SIEM can ingest data. + +1. Open a CLI window, such as Terminal or PowerShell. +1. Type this command: + * Windows: + ``` + curl.exe -d "{"ip": "192.0.2.0", "threatName": ""}" -H "Content-Type: application/json" + ``` + * macOS: + ``` + curl -d '{"ip": "192.0.2.0", "threatName": ""}' -H 'Content-Type: application/json' + ``` + Replace `` with your own initials or another unique identifier. Replace the `` with the URL you copied in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source). + + This simple JSON log message, `{"ip": "192.0.2.0", "threatName": "trainingRS"}`, will be collected and ingested by Sumo Logic as soon as you press Enter. If data forwarding was enabled properly in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source), it's also forwarded to Cloud SIEM where it's parsed, mapped, and enriched. This process can take anywhere from a few seconds to up to 15 minutes. + +1. When you're ready, we'll find your log message as a record in Cloud SIEM. + 1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). Click **Records** at the top of the screen.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Records**. You can also click the **Go To...** menu at the top of the screen and select **Records**. + 1. In the **Filters** bar, select **Metadata Source Category** from the dropdown. + 1. Select the **is** operator from the dropdown. + 1. Type the source category you used in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source). + 1. You should see a failed record. This record failed because the custom JSON log message does not have a log or ingest mapping associated with it. Although the log message was forwarded from Sumo Logic to Cloud SIEM, it did not successfully complete the parse, map, and enrich steps of the pipeline. We'll fix this in the next sections. + +#### Tips and tricks + +* If you get an error after running the CURL command in step 2, make sure your quotation marks are straight. Copy and pasting the command sometimes changes the formatting of these quote marks into curly quotes. +* If you don't see any records, try: + * increasing the timestamp range to the last 60 minutes or the last 3 hours. + * making sure the metadata source category you searched in the **Filters** bar matches the one you created earlier. + * searching for the log in Sumo Logic with this query: `_index=sec_record_* metadata_sourceCategory=` Replace `source-category` with the source category you created. +* If you still don't see your custom JSON record after these troubleshooting steps, try sending another log message from your terminal window. Make sure the command completes without any errors. + +### Logs into records + +Logs into records + +Now that you have a source set up to send data Sumo Logic into Cloud SIEM, let's follow a simple log message down that data pipeline. + +``` +sso : ip-192-0-2-0 : alex@travellogic.com : "Successful Login" : “2024-05-25T22:11:42" +``` + +First, the message is parsed into a set of key-value pairs. This process also fixes basic formatting. This step creates semi-structured data. For example, instead of ip-127-0-0-1, the parsing step extracts the IP address into a key-value pair, where the key is something like `srcDeviceIP` and the value is `192.0.2.0`, with the hyphens normalized to dots. Then, this information is mapped onto the [Cloud SIEM schema](/docs/cse/schema/). Finally, the record is enriched with information from match lists or threat intelligence databases. + +These normalized records are then sent down the Cloud SIEM pipeline and compared to rules. When Cloud SIEM extracts an entity from a record to create a signal, it uses the parsed and mapped key-value pairs to categorize each signal. When signals with the same entity cluster together, an insight is created. Therefore, it's important for the records to have quality metadata from the start to produce the best insights. + +You can make sure these records are parsed, mapped, and enriched properly by maintaining good metadata design and setting up good log and ingest mappings, which we'll practice in the next sections. + +### Set up an ingest mapping + +In [Send a log message to Cloud SIEM](#send-a-log-message-to-cloud-siem), we sent a log message to Cloud SIEM, and received a "failed record" error. In this section and the next one, we'll create ingest and log mappings to ensure the custom JSON data from the log messages we send are used properly by Cloud SIEM. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then and under **Integrations** select **Sumo Logic**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Ingest Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Ingest Mappings**. +1. Click **Add Ingest Mapping**. +1. Enter the source category you used in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source). +1. Select **JSON** as the **Format**. This matches the format of the log message we sent in [Send a log message to Cloud SIEM](#send-a-log-message-to-cloud-siem). +1. Enter a **Vendor** and **Product**. As a best practice, avoid spaces in the vendor and product names. +1. Click **Save**. +1. Hover your mouse over the new ingest mapping, click the three-dot icon that appears to the right, and select **Enable**. + +#### Extra resources + +If you need help configuring other types of ingest mappings, see [Configure a Sumo Logic Ingest Mapping - Cloud SIEM](/docs/cse/ingestion/sumo-logic-ingest-mapping/). + +### Set up a log mapping + +In this section, we'll create a log mapping to ensure the custom ingest mapping we created in [Set up an ingest mapping](#set-up-an-ingest-mapping) is used properly by Cloud SIEM. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Incoming Data** select **Log Mappings**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Log Mappings**. You can also click the **Go To...** menu at the top of the screen and select **Log Mappings**. +1. Click **Add Log Mapping**. +1. Click **Structured Mapping**. In Cloud SIEM, JSON data is considered to be structured data. +1. Give your log mapping a name. +1. Under **If Input Matches**, use the vendor and product you created in [Set up an ingest mapping](#set-up-an-ingest-mapping). +1. Select **JSON** as the format. +1. Type `.*` for the regex. This will match all incoming logs. +1. Under **Then Create Record**, the vendor and product should match what you entered under **If Input Matches**. +1. In **Fields**, enter the fields from the JSON log message we sent in [Send a log message to Cloud SIEM](#send-a-log-message-to-cloud-siem) under **Input Field**. Then, under **Output Field**, map them to their equivalents in the Cloud SIEM schema. Then, click **Add Field**. Refer to this table for help: + | Input field | Output field | + | :-- | :-- | + | ip | device_ip | + | threatName | threat_name | + :::note + Typically, JSON logs have more than just two fields. In this section, we're using the simplified example log we sent in [Send a log message to Cloud SIEM](#send-a-log-message-to-cloud-siem), so we only need to add two new fields. + ::: +1. Scroll back up to **Then Create Record**. +1. For **Record of type** select **Authentication**. Selecting the record type now ensures you do not limit the fields you could selected in an earlier step. +1. Click **Submit**. + +#### Tips and tricks + +* See [Field Mapping for Security Event Sources](/docs/cse/schema/field-mapping-security-event-sources/) for a for a full list of the fields you can map to. +* Hover over the yellow triangle next to the **Submit** button to see a list of errors and warnings that need to be resolved before you can submit. + +### Send another log message to Cloud SIEM + +Your new log and ingest mappings won't apply to the first log message you sent in [Send a log message to Cloud SIEM](#send-a-log-message-to-cloud-siem). In this section, we'll send another log message to the HTTP source we created in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source). Then, we'll look for that new log message in Cloud SIEM. This time, the log and ingest mappings we created in [Set up an ingest mapping](#set-up-an-ingest-mapping) and [Set up a log mapping](#set-up-a-log-mapping) should apply to the new record. + +1. Open a CLI window, such as Terminal or PowerShell. +1. Type this command: + * Windows: + ``` + curl.exe -d "{"ip": "192.0.2.0", "threatName": ""}" -H "Content-Type: application/json" + ``` + * macOS: + ``` + curl -d '{"ip": "192.0.2.0", "threatName": ""}' -H 'Content-Type: application/json' + ``` + Replace `` with your own initials or another unique identifier so you can find it easily later. Replace the `` with the URL you copied in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source). + + :::tip + Since you already sent a CURL command in [Send a log message to Cloud SIEM](#send-a-log-message-to-cloud-siem), you may be able to press the up arrow key and Enter to send the command again in most CLI programs. + ::: + + This simple JSON log message, `{"ip": "192.0.2.0", "threatName": ""}`, will be collected and ingested by Sumo Logic as soon as you press Enter. If data forwarding was enabled properly in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source), it's also forwarded to Cloud SIEM where it's parsed, mapped, and enriched. This process can take anywhere from a few seconds to up to 15 minutes. + +1. When you're ready, we'll find your log message as a record in Cloud SIEM. + 1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). Click **Records** at the top of the screen.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Records**. You can also click the **Go To...** menu at the top of the screen and select **Records**. + 1. In the **Filters** bar, select **Metadata Source Category** from the dropdown. + 1. Select the **is** operator from the dropdown. + 1. Type the source category you used in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source). + 1. You should see a record with the IP address and threat name parsed properly. + +Although the log message and method of ingestion was identical, the log message failed to parse into a Cloud SIEM record in [Send a log message to Cloud SIEM](#send-a-log-message-to-cloud-siem) because the log and ingest mappings weren't configured. After we configured the log and ingest mappings, the new log messages forwarded to Cloud SIEM successfully completed the parse, map, and enrich steps to become a record. + +#### Tips and tricks + +* If you get an error after running the CURL command, make sure your quotation marks are straight. Copy and pasting the command sometimes changes the formatting of these quote marks into curly quotes. +* If you don't see any records, try: + * increasing the timestamp range to the last 60 minutes or the last 3 hours. + * making sure the metadata source category you searched in the **Filters** bar matches the one you created in [Enable data forwarding for an HTTP source](#enable-data-forwarding-for-an-http-source). + * searching for the log in Sumo Logic with this query: `_index=sec_record_* metadata_sourceCategory=` Replace `` with the source category you created earlier. +* If you still don't see your custom JSON record after these troubleshooting steps, try sending another log message from your terminal window. Make sure the command completes without any errors. +* If your new record failed too (you see two failed records), either your log or ingest mapping weren't configured correctly. Review those configurations and try again. + +## Tune your environment + +### Why tune? + +Once your data gets ingested in Cloud SIEM and is made into records, the records are compared to every rule in Cloud SIEM. If there's a match, an entity is extracted and a signal is created. Those entities are tracked and may correlate with other signals to create an insight, which is where most threat investigations begin. + +Records to signals + +You've already learned how to set up log and ingest mappings to ensure rules accurately match and track these entities. Now that you have a properly parsed a record in Cloud SIEM, it will be compared to rules and potentially generate signals and insights. + + +You've already learned how to set up log and ingest mappings to ensure rules accurately match and track these entities. Now that you have a properly parsed record in Cloud SIEM, it will be compared to rules and potentially generate signals and insights. + +Although you don't have to write rules from scratch, you can. In fact, there are several customizations you can do through Cloud SIEM. +* [Rule tuning expressions](/docs/cse/rules/rule-tuning-expressions/) are simple ways to add small exceptions and other clauses to existing rules. +* [Rules](/docs/cse/rules/about-cse-rules/) let you write logic that's unique to your system, to cover threats or data sources that aren't covered by built-in rules. +* [Custom insights](/docs/cse/records-signals-entities-insights/configure-custom-insight/) let you get alerts based on just one rule or a chain of rules. +* [Match lists](/docs/cse/match-lists-suppressed-lists/create-match-list/) can help create groups of entities, such as domains or IP addresses, that can be used when creating other custom content. + +Through [role-based access controls](/docs/manage/users-roles/roles/role-based-access-control/), you can allow analysts to customize content as well. However, as a best practice, you should limit who in your organization has the permission to edit and delete rules and other content, since they can impact the number of insights that are generated. + +### Custom rules + +You don't have to write rules from scratch. The Sumo Logic content team creates and maintains hundreds of out-of-the-box rules, to get you started. You can find documentation on all the out-of-the-box rules in the [Cloud SIEM Content Catalog](/docs/cse/get-started-with-cloud-siem/cloud-siem-content-catalog/). These rules are updated frequently, often every few days. You can check out the most recent updates in the [release notes](/release-notes-cse/). + +However, if you have a specific threat you're concerned about or a unique data source that isn't covered, you can write a custom rule. See [Rule types](/docs/cse/rules/about-cse-rules#rule-types) for the types of rules you can create: +* **Match rules** take a simple boolean statement, check if it's true or false. If it's true, then an entity is extracted and a signal is created. +* **Threshold rules** are triggered when a match is found a certain number of times. So, for example, if one failed login attempt is acceptable, but 5 isn't, then a threshold rule would fire after the fifth failed login attempt. +* **Chain rules** fire when certain events happen in a certain time window. So, for example, if you want to look for 5 failed login attempts followed by one successful log in within one hour, you'd use a chain rule. +* **Aggregation rules** are triggered when up to six different events accumulate over time. For example, if you want a rule that looks for a large number of event types from a single device IP, you'd use aggregation rules. +* **First Seen rules** are triggered when behavior by an entity (such as a user) is encountered for the first time. For instance, it fires the first time a user logged in from a new geographic location. +* **Outlier rules** are triggered when behavior by an entity is encountered that deviates from "normal" baseline activity. For instance, it fires when a user has an abnormal volume of downloaded data, or has a number of failed logins. + +As a Cloud SIEM admin, you'll be able to create all these rules. Work with the SOC analysts on your team to write rules that help them investigate threats and reduce response time. + +Before you create custom rules from scratch, there are some best practices you'll want to follow. +* **Check existing rules**. Sumo Logic already has hundreds of [built-in rules](/docs/cse/rules/cse-built-in-rules/), so you might not need to write a new one. Or, you may only need to make small changes to existing rules, like adding a rule tuning expression or adjusting a severity score. +* **Know your system**. You'll need to understand the [schema](/docs/cse/schema/) and [log mappings](/docs/cse/schema/create-structured-log-mapping/) of all the records ingested into Cloud SIEM to write effective rules. As an administrator, it's your responsibility to know this inside and out. +* **Know your risk appetite**. In addition to your system's details about log mappings and other metadata, you need to understand your company's risk appetite and risk tolerance. For example, some companies might want to monitor a large amount of outbound traffic, but not consider this a threat. So, they'd assign this rule a severity of zero. However, other companies might be alarmed by outbound traffic and consider it data exfiltration, assigning the same rule a severity of five. +* **Know the rule types**. You also need to understand all [the types of rules](/docs/cse/rules/about-cse-rules/#rule-types). If your use case requires a chain rule, but you try writing a threshold rule, the rule might not be as efficient or effective. +* **Make small changes**. As a best practice, when you do write a new rule or edit an existing one, make small changes. For example, instead of decreasing a severity score from 8 to 2, try decreasing it from 8 to 7 and monitoring the change for a while. +* **Save as a prototype**. Another best practice is to [save all new rules as a prototype](/docs/cse/rules/write-match-rule#save-as-prototype). This allows you to monitor the rule's behavior, without creating new insights and alerts. + +### Write a threshold rule + +In this section, we'll write a rule that looks for three unique Windows event IDs related to failed logins within an hour. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Rules**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Rules**. You can also click the **Go To...** menu at the top of the screen and select **Rules**. +1. Click **Create**. +1. On the **Threshold** tile click **Create**. +1. Give your rule a name. +1. Configure **If Triggered**. + 1. Under **Show Advanced**, select **Count only distinct values for a field**. + 1. Under **When a Record matches the expression**, look for event IDs from Windows by typing this logic: `metadata_deviceEventId=4625`. + 1. Select **matches Records with 3 distinct values**. + 1. In **for field** select **device_ip**. + 1. Select **within 1 hour(s)**. This configuration looks for any three records within one hour that have the event `ID 4625`, which is the Windows event ID for a failed login attempt. +1. Configure **Then Create Signal**. + 1. For **On Entity** select **device_ip**, since that's the unique entity we want to track. + 1. Enter a description in **with the description**. + 1. Under **with a severity of** select any severity score you think is appropriate for your rule. + 1. In **with tags** select **Tactic** and **TA0001 - Initial Access**. Because we're looking for failed logins, these are attempts at initial access. + 1. Select the **Save this rule as a prototype** checkbox. + 1. Click **Submit** to save your rule. + +#### Tips and tricks +* Rule names must be unique. If your rule won't submit, it's possible that there is a rule with the same name. +* The autocomplete feature can help you write the logic. For example, typing "ip" will bring up a dropdown showing all available fields related to IP addresses. +* The syntax coloring can help you write the logic. For example, try using single quotes ('...') instead of double quotes ("..."). Notice that the syntax coloring lights up correctly when you use double quotes, which is the best practice. +* Insights are named based on the tactics and techniques tagged in the signals. Consider which tactic or technique from the [MITRE ATT&CK](https://attack.mitre.org/) framework your rule is looking for when selecting tags. +* Whenever you create a new rule in Cloud SIEM, save it as a prototype so you can monitor its behavior for a few weeks before pushing it to your system live. +* Check for an orange triangle icon next to the **Submit** button before you submit. This will notify you of any errors or warnings. + +### Write a chain rule + +In this section, we'll write a chain rule that looks for 1 successful login after 10 failed login attempts from the same IP address within 5 minutes. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Rules**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Rules**. You can also click the **Go To...** menu at the top of the screen and select **Rules**. +1. Click **Create**. +1. On the **Chain** tile click **Create**. +1. Give your rule a name. +1. Configure **If Triggered**. + 1. For **When at least ___ Record matches expression** select **10**. For the rule expression enter `bro_rfb_authenticationSuccessful=False`. + 1. For **When at least ___ Record matches expression** select **1**. For the expression enter `bro_rfb_authenticationSuccessful=True`. + 1. Select **in exact order** and **within 5 minutes**. +1. Configure **Then Create Signal**. + 1. For **On Entity** select **device_ip**. This will also update the **Grouped by** field in the **If Triggered** section. + 1. In **with the description** write a description of the rule. + 1. For **with a severity of** select any severity score you think is appropriate for your rule. + 1. In **with tags** select **Tactic** and **TA0001 - Initial Access**. Because we're looking for failed logins, these are attempts at initial access. +1. Select the **Save this rule as a prototype** checkbox. +1. Click **Submit** to save your rule. + +### Other customizations + +Once your data is flowing into Cloud SIEM, millions of records will be compared to rules. From these, several hundred may match the rules in your system to create signals and a handful of insights. + +After you and the SOC analysts on your team monitor Cloud SIEM for a period of time, you may decide you want even further customizations and performance tuning. Many of these customizations can only be performed by an administrator. For example, as an admin, you can: +* **Customize the Actions button in Insights**. Admins can create custom actions. Analysts use the **Actions** button on the [insight details page](/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/#insight-details-page) to help complete their investigations. You can use APIs when creating custom actions, so you have a lot of flexibility and creativity here to do things like execute playbooks, create JIRA tickets, or send Slack notifications. +* **Create and update match lists and suppression lists**. [Match lists](/docs/cse/match-lists-suppressed-lists/) are groups of entities that Cloud SIEM can use in rules. They're similar to allowlists or denylists. Cloud SIEM comes with dozens of standard match lists, but you can also create your own. +* **Insight generation and custom insights**. There are several ways you can customize your insights. Although the default is to cluster entities together with an activity score of at least 12 over the last 14 days, the threshold for [insight generation](/docs/cse/get-started-with-cloud-siem/insight-generation-process/) is configurable. You can increase or decrease the time frame, or adjust the activity score threshold. You can also create [custom insights](/docs/cse/records-signals-entities-insights/configure-custom-insight/), which will be created when certain rules are triggered, regardless of their severity scores. +* **Create custom workflows**. By default, you can mark an insight as New, In Progress, or Closed. However, with [custom workflows](/docs/cse/administration/manage-custom-insight-resolutions/#create-a-custom-sub-resolution), you can create a new status. For example, if your analysts frequently like to keep insights open while digging deeper to find the root cause, you might want to create a custom workflow for that called Investigating to keep it separate from other insights that are at different stages of the In Progress stage. + +### Customize the Actions button + +The **Actions** button is available in all insights in Cloud SIEM and can help you collaborate with teammates. In this section, we'll create a custom **Actions** button to alert an incident response team. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Configuration**, and then under **Integrations** select **Actions**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Actions**. You can also click the **Go To...** menu at the top of the screen and select **Actions**. +1. On the **Actions** tab, click **+ Add Action**. +1. Give your action a name. +1. Under **Action Type** select **Email**. +1. Under **Notifications** select **On Demand**. +1. In the **Recipients** field, enter an email address. +1. Click **Save**. +1. Hover your mouse over the action, click the three-dot menu on the right, and select **Enable**. +1. Now, we'll test our new **Actions** button: + 1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). Click **Insights** at the top of the screen.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu select **Cloud SIEM > Insights**. You can also click **Go To...** at the top of the screen and select **Insights**. + 1. Click the name of any insight. + 1. In the left pane, click **Actions**. You should see your new action listed. + 1. Click the action on the list to execute it. + +### Next steps + +So far in this introduction article, you learned how data is forwarded from Sumo Logic to Cloud SIEM. You followed a simple log message down the data pipeline. Then you learned how to set up log and ingest mappings to ensure that message was parsed properly into a record in Cloud SIEM. You also learned how to create custom rules, to make sure the data you ingest gets used in Cloud SIEM's threat detection engine properly. And you created a custom **Actions** button, so the analysts on your team can alert others in our company. + +What's next? + +* **Configure the data you're ingesting**. Make sure you're familiar with types of data you [ingest](/docs/cse/ingestion/) and whether or not that data is forwarded properly to Cloud SIEM. Work with the analysts on your team to determine if you're ingesting too much or too little data. +* **Create the roles and capabilities of your team**. Assign [Cloud SIEM role capabilities](/docs/manage/users-roles/roles/role-capabilities/#cloud-siem) to ensure the analysts on your team have access to Cloud SIEM and can interact with the insights, signals, rules, and entities they need to complete their investigations. +* **Create custom content**. Work with your SOC teammates to create custom [log mappings](/docs/cse/schema/create-structured-log-mapping/) and [ingest mappings](/docs/cse/ingestion/sumo-logic-ingest-mapping/), [rules](/docs/cse/rules/about-cse-rules/), [insights](/docs/cse/records-signals-entities-insights/configure-custom-insight/), and [actions](/docs/cse/administration/create-cse-actions/) that suit your organization's needs. + +## Automation + +### Why automate? + +[Automation](/docs/cse/automation/) is a key feature of Cloud SIEM that can help manage insights without a lot of manual effort. Automations are composed of "smart actions" such as enrichments and notifications that can be automatically triggered under a set of circumstances, such as an insight being created or closed. Cloud SIEM automations use playbooks, a pre-defined set of actions in a linear or branching workflow to execute when the proper circumstances arise. + +There are several reasons you might want to automate some security tasks: +* **Faster responses**. Automating parts of your SOC can mean faster response times. +* **Consolidate tools**. Orchestrate all your security tools in one location with integrations and custom APIs. +* **Close the skills gap**. Analysts of all skill levels can deploy playbooks. Veteran analysts can spend more time on threat hunting. + +Typically, each playbook in Cloud SIEM will help partially or fully automate one or more steps of the incident response cycle. + +Incident response cycle + +### Automations and integrations + +Cloud SIEM comes with hundreds of pre-built playbooks, integrations, and use cases as part of [App Central](/docs/platform-services/automation-service/app-central/). + +As a Cloud SIEM administrator, you can explore App Central and install any integrations your team requests. You can also create custom integrations using APIs from the **Integrations** page. These integrations will connect Cloud SIEM to other tools like CrowdStrike, ServiceNow, or Jira. Once all your tools are integrated, Cloud SIEM can be a single, central location for orchestrating your security response. + +### Install a new integration + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Automation** and then and click **App Central** in the left navigation bar.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu select **Automation > App Central**. You can also click the **Go To...** menu at the top of the screen and select **App Central**. +1. Click **Integrations** at the top of the window. +1. Find any integration that isn't already installed and click **Install**. If an integration has already been installed by another user, you will not see the option to download it. Instead, it will say **Installed**. +1. A popup window will appear, summarizing the actions that will become available once the integration has been installed. Once you have reviewed these actions, click **Install**. The actions will vary based on which integration you chose to install. +1. Verify the integration is installed. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Automation** and then select **Integrations** in the left nav bar.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Automation > Integrations**. You can also click the **Go To...** menu at the top of the screen and select **Integrations**. + +You should see the integration you installed here. This is how you can verify which integrations are installed on your instance of Cloud SIEM. You can now use the integration as part of any new playbooks you customize or create. + +### Playbooks + +Once you've identified a potential security incident, you can respond to it in Cloud SIEM by executing a playbook. Playbooks are automated, or partially automated, workflows that act based on information from an incident. A playbook can enrich data, contain threats, notify teams, and other actions with custom APIs. These actions help automatically orchestrate many parts of the investigation, containment, eradication, and recovery processes. + +Custom playbooks allow you to automate any task that uses a custom API. You can also use them to automate tasks that aren't part of the hundreds of default playbooks included in Cloud SIEM. + +Playbooks are made up of nodes which are connected together in a flowchart. Whether you're customizing a playbook or creating one from scratch, you have several node options: +* **Actions**. Enrich data, execute APIs, send notifications, or use other integrations. +* **Conditions**. If-then statements that allow playbooks to branch in different directions. +* **Embedded playbooks**. Run another playbook. + +Each of these nodes are color-coded in a playbook. The following image shows a sample playbook. Note the different actions and enrichments, along with the branches that execute different sequences of actions based on conditions. + +Playbook example + +* A. **Condition**. Conditions, represented by a purple diamond, allow your playbook to branch in different directions based on an if-then statement. +* B. **Enrichment**. Green nodes are enrichments. These might add additional information from a threat intel database or convert data from one type to another. +* C. **Notification**. Blue nodes are notification actions, such as a Slack or email alert. + +Action nodes use integrations. These integrations broadly fall into several types: +* **Enrichment**. Add information, metadata, or context, such as from a threat intelligence database. +* **Containment**. Reduces further damage by isolating files or machines related to a threat. +* **Notification**. Alerts sent via email, Slack, PagerDuty, or most other services you can connect with an API. +* **Custom**. Scripts and any other automations you can create using YAML, Perl, Python, PowerShell, or Bash. +* **Daemons**. Background processes that can ingest data. + +Custom actions can also include trigger actions, which run based on an event type until certain criteria are met. For example, if malware is detected, a trigger action could run an anti-malware cleanup software until no malware is detected. Similarly, you can create scheduled actions that run at certain intervals. For example, you could create a scheduled action that checks for malicious IP addresses every 5 minutes until no more malicious IP addresses are found. + +#### Best practices + +Before you begin creating or customizing a playbook, decide what you'd like to automate. Think about what conditions you want met, and what actions or integrations you want to accomplish based on different flows. Once you have a design in mind for the flow of your playbook, you can create or customize a new one. Search App Central to see if the automations you want already exist, or if you can modify a playbook that's similar to what you have in mind. + +### Create a custom playbook + +In this section, we'll create a simple playbook from scratch. This playbook will send an email with insight details. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu of Cloud SIEM select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. +1. On the **Automation** tab, click **Manage Playbooks**. This opens the [Automation Service UI](/docs/platform-services/automation-service/about-automation-service/#automation-service-ui). +1. Near the top, click the **+** icon to create a new playbook. +1. Configure the playbook: + 1. Give your playbook a name. + 1. From the **Type** dropdown, select **Cloud SIEM**. + 1. Write a short description. For example, "Email Notification with Insight Details" + 1. Click **Create**. +1. Click the Edit (pencil) icon near the bottom of the playbook. +1. Hover over the **Start** node, then click the pencil icon. +1. Select **Insight** from the dropdown. This will populate the dialog with additional parameters from the insight input, which we can use in other places in the playbook. +1. Click **Update** to close the dialog window. +1. Click the plus icon on the **Start** node to add a new node. +1. Choose **Action** as the node type. +1. Configure the node with the following steps: + 1. In **Node name** type "Email Notification". + 1. From the **Integration** dropdown select **Basic Tools**. + 1. From the **Type** dropdown, select **Notification**. + 1. In the **Action** dropdown, select **Send Email**. + 1. For **Recipients**, enter an email address. (If you enter your own email address, you'll be able to check the email results later.) After entering the email address, press Enter to accept it. More than one email address can be entered to the **Recipients** field. + 1. In the **Subject** field, type "Insight Details". + 1. In the **HTML Content (Body)** field, click the **{ }** button to create a placeholder field. Click in the red field and select **Playbook.input.name**. Create two more placeholders with the following fields: **Playbook.input.id** and **Playbook.input.status.displayName**. Add any additional text content or formatting as desired. + 1. Click **Create**. +1. Back on the playbook edit screen, drag the mouse cursor from the half-circle on the right side of the **Email Notification** action to the equivalent node connector on the **End** node. +1. Click the **Save** button at the bottom of the screen to save your playbook. +1. Click the **Publish** button at the bottom of the screen to publish your playbook and make it available for automations. You can add a description to your playbook in the **Publish** dialog window if you'd like. + +If the playbook is published successfully, you will see "Published version" in the upper right, instead of "Draft". + +### Automations in Cloud SIEM + +[Automations in Cloud SIEM](/docs/cse/automation/automations-in-cloud-siem) define the conditions in which a playbook will be executed for Cloud SIEM. For instance, you might want to execute a specific playbook whenever Cloud SIEM creates a new insight. Or another playbook whenever an insight is closed to create and distribute appropriate notifications or reports. Automations can also be set to "manual execution", allowing operators to run the playbook on a specific insight when judged necessary. + +This way, potentially the entire incident response cycle can now be automated: Cloud SIEM identifies a threat, creates an insight, then a playbook is automatically deployed to perform necessary actions and email a final report for an analyst to review. + +### Create a custom automation + +In this section, you'll create a custom automation using the playbook you created in the previous lab. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu in Cloud SIEM select **Configuration**, and then under **Integrations** select **Automation**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the top menu select **Configuration**, and then under **Cloud SIEM Integrations** select **Automation**. You can also click the **Go To...** menu at the top of the screen and select **Automation**. +1. In the upper right of the **Automation** tab, click **+ Add Automation**. +1. In **Playbook**, select your custom playbook created in the previous section [Create a custom playbook](#create-a-custom-playbook). (If you do not see your playbook in the list, return to the previous steps and ensure your playbook was published as well as saved.) +1. For the **Object (expects attributes for)** field, select **Insight**. +1. Note that the checkboxes under **Execution** field show that you can trigger your automation when an insight is created or closed. For this example, however, select **Manually Done**. +1. Click **Save**. + +#### Test your automation + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). Click **Insights** at the top of the Cloud SIEM screen.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu select **Cloud SIEM > Insights**. You can also click **Go To...** at the top of the screen and select **Insights**. +1. Select any insight from the list by clicking on its name. +1. Click on the **Actions** menu in the left sidebar. +1. Select your automation from the **Insight Automations** list. (If you do not see your automation, you may need to leave and return to Cloud SIEM to refresh the list.) +1. You should see a green popup at the bottom indicating that your automation was executed successfully. +1. If your playbook included an email notification, and the recipient is your email address, your inbox should have an email from the Cloud SIEM system with the insight details. +1. While still on the insight details screen, click on the **Automations** tab on the top of the screen to see the results of executing your automation. This view will show the status of the automations run on that insight, such as "Running", "Success" or "Completed with errors". 1. +1. If errors occur, you can click the **View Playbook** link on the right side to see the Playbook view, along with any execution errors that occurred. For help, see [Troubleshoot playbooks](/docs/platform-services/automation-service/automation-service-playbooks/#troubleshoot-playbooks). + +You now have a custom automation that can be manually run or attached to an insight upton creation or closing. \ No newline at end of file diff --git a/docs/cse/get-started-with-cloud-siem/intro-for-analysts.md b/docs/cse/get-started-with-cloud-siem/intro-for-analysts.md new file mode 100644 index 0000000000..0918b81723 --- /dev/null +++ b/docs/cse/get-started-with-cloud-siem/intro-for-analysts.md @@ -0,0 +1,443 @@ +--- +id: intro-for-analysts +title: Introduction to Cloud SIEM for Analysts +sidebar_label: Introduction for Analysts +description: Learn basic concepts about Cloud SIEM for security analysts. +--- + +import useBaseUrl from '@docusaurus/useBaseUrl'; + +This article provides an introduction to Cloud SIEM for analysts. + +If you are unsure whether you are an analyst or administrator, you can view your role in **Preferences** (see [Onboarding Checklists](/docs/get-started/onboarding-checklists/)). To use Cloud SIEM as an analyst, you must be assigned [Cloud SIEM role capabilities](/docs/manage/users-roles/roles/role-capabilities/#cloud-siem) that allow you to view Cloud SIEM elements and perform analyst tasks. + +## From logs to security insights + +### What is Cloud SIEM? + +Cloud SIEM is a security information and event management (SIEM) system. Cloud SIEM leverages Sumo Logic's core functionality, including data collection, ingestion, storage, and threat intelligence. + +The following images show Sumo Logic's Cloud SIEM home page. + +Cloud SIEM main page + +* A. **Count**. A count of the records created from incoming messages, and the signals and insights that have been generated. +* B. **Insights by Status**. An overview of recent insights and their statuses: New, In Progress, Closed, or Other. +* C. **Radar**. Visualizes the last 24 hours of security activity. Dark blue lines represent records, light blue bars represent signals, and red triangles represent insights. +* D. **Recent Activity**. Displays a feed of the latest insights that have been generated. + +Cloud SIEM is a purchased add-on with an ever-expanding library of content designed for security operations. Cloud SIEM automatically normalizes, enriches, and correlates all your data across multiple data sources into actionable security insights. Because it's designed for larger data volumes, most organizations need to ingest a large amount of data each day for insights to surface in Cloud SIEM. For smaller organizations, [additional security features](/docs/security/additional-security-features/) may be a better fit for your data ingest volume. + +### Getting your data into Cloud SIEM + +If you already use Sumo Logic, you're probably familiar with the data pipeline: + +Sumo Logic data pipeline + +1. **Data collection**. To use Sumo Logic, first you must set up either an installed collector or a hosted collector and add a source. You can also set up source categories and other metadata, which helps you search and analyze the data you collect. +2. **Search and analyze**. Once data is in Sumo Logic, you can write queries to search and correlate events in real-time from the analytics platform UI. Or, you might configure the collector to forward data to Cloud SIEM, and let it do all the correlation work for you. +3. **Visualize and monitor**. Once you've found and analyzed data that's interesting, you can create dashboards to visualize it and set up alerts to monitor your data in real-time. +4. **Share the findings**. Export your dashboards or share with others on your team. You can control who can view and edit your dashboards to keep your data secure. + +Throughout this section, you'll learn more about the security data pipeline. Then, you'll be better prepared to discuss these things with your admin, or to set them up yourself if you need to. + +#### Data collection + +Before you can start investigating threats, you need data. As a data analyst, this step may have been done by your administrator. + +Your company collects and ingests millions of log messages into Sumo Logic. Typically, you can use these messages right away in many Sumo Logic apps. To use them in Cloud SIEM, however, your admin must enable data forwarding. Your admin may also need to create log mappings, field extraction rules, or complete other preprocessing steps to extract the right data. + +Sumo Logic data pipeline + +As a data analyst, you should periodically examine the data that's being ingested into Sumo Logic and Cloud SIEM. After you've been using Cloud SIEM for a while, you may want to fine-tune it to fit your organization's needs. If you discover that you're ingesting too much or too little data to do threat hunting, you can work with your admin to find that balance. + +So, what's the balance between too much and too little data? It depends. Work with your admin to answer these questions: + +* **Are you ingesting enough data?** Cloud SIEM takes thousands or millions of records and boils them down into just a handful of insights. Most organizations ingest more than 50GB of data every day to start finding any insights. If your ingest volume is smaller than this, consider sending more data to Cloud SIEM. +* **Are you ingesting too much data?** More data doesn't always mean more insights. The threat detection logic built into Cloud SIEM generally prevents false positives. However, some organizations choose to ingest or store less data as a way to cut costs. One solution is partitioning your data into different tiers, and only sending some of that data along to Cloud SIEM. +* **Are you ingesting the right data?** Cloud SIEM doesn't just work on quantity alone. Quality data will affect your performance as well. As a best practice, you'll need to bring in quality data sources that are supported by Cloud SIEM. High-value data sources include [CloudTrail logs](/docs/integrations/cloud-security-monitoring-analytics/aws-cloudtrail/), [Windows event logs](/docs/send-data/installed-collectors/sources/collect-forwarded-events-windows-event-collector/), [AWS logs](/docs/integrations/amazon-aws/), and [GuardDuty logs](/docs/integrations/amazon-aws/guardduty/). + +### Processing your data for Cloud SIEM + +Before Cloud SIEM can generate security insights, your log messages must go through a little processing first. First, Cloud SIEM processes the messages into records. Each record contains the information from a message, which is parsed into key-value pairs, mapped to a Cloud SIEM schema, and enriched with other data. + +Messages generate records + +Let's follow a simple log message down this pipeline: +``` +sso : ip-192-0-2-0 : alex@travellogic.com : +"Successful Login" : "2024-05-25T22:11:42" +``` + +First, the message is parsed into a set of key-value pairs. This process also fixes basic formatting. This step creates semi-structured data. For example, instead of `ip-192-0-2-0`, the parsing step extracts the IP address into a key-value pair, where the key is something like `srcDeviceIP` and the value is `192.0.2.0`, with the hyphens normalized to dots. Then, this information is mapped onto the Cloud SIEM schema. Finally, the record is enriched with information from match lists or threat intelligence databases, such as its [CrowdStrike threat level](/docs/integrations/security-threat-detection/threat-intel-quick-analysis#threat-intel-faq). These normalized records are then sent down the Cloud SIEM pipeline and compared to rules. + +### Extracting security insights from Cloud SIEM + +Each record ingested into Cloud SIEM is compared to hundreds of built-in and custom [rules](/docs/cse/rules/about-cse-rules/). If a record matches the criteria specified in a rule, then Cloud SIEM creates a signal. When a signal is created, it contains a name, entity, severity, stage, and description. A signal always contains, at minimum, an entity and a severity. This data is later used by Cloud SIEM's insight engine algorithm. + +A [signal](/docs/cse/records-signals-entities-insights/view-records-signal/) is an individual security event. The entity in a signal is something like an IP address, MAC address, or hostname. The entity tells us who or what was involved in the event that the record described. The stage or tags are assigned based on where the event fits in the [MITRE ATT&CK](https://attack.mitre.org/) framework. This can tell us a bit about how or why the event occurred. The severity is a number between 0 and 10 that tells Cloud SIEM how serious the potential threat is. + +Let's look at the details of one signal: + +Example signal + +* A. **Description**. Every signal's details page includes a description, detailed metadata, and other information to help your threat investigation. +* B. **Event Time**. The event time tells you when the event occurred. +* C. **Severity**. A signal's severity score is a number between 0 and 10. This score is used to track the entity's activity score. +* D. **Rule**. Signals are created when the conditions of a rule are met. You can click on the rule from the signal's details page to learn more. +* E. **Tags**. Tags or stages use the MITRE ATT&CK framework to point you toward how or why an event occurred. +* F. **Entity**. The entity can be any unique identifier like an IP address. In this case, it's a username. + +Cloud SIEM typically processes thousands or millions of records and boils them down into hundreds of signals. + +Records, signals, and insights + +On the Cloud SIEM main page, you'll see a panel similar to this one. In this case, 52 thousand records have been ingested and processed into 4 thousand signals. Some signals could be false alarms, but many could be worth investigating anyway. But, 4 thousand is still way too many for the average SOC analyst to sift through every day. So, how do you know which signals to pay attention to first? + +Cloud SIEM takes everything one step further and correlates those signals into a manageable number of insights. Here, just 1 insight was created out of 4 thousand signals. + +An [insight](/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/) is a group of signals clustered around a single entity. An insight is created when the sum of the severity scores of signals with the same entity goes above a certain activity score within a certain timeframe. By default, this is an activity score of 12 within the last 14 days. For example, if a rule was triggered with a severity of 5, and then ten days later another rule with the same entity and a severity of 5 was triggered, the total activity score would only be 10 in the last 14 days, so an insight would not be created. However, if those same two rules each had a severity score of 7, an insight would be created. + +### Explore the Cloud SIEM UI + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu select **Cloud SIEM**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu select **Cloud SIEM > SIEM Overview**. You can also click **Go To...** at the top of the screen and select **SIEM Overview**. +1. Near the top of the left pane of the Cloud SIEM UI, you'll see summary statistics. In the upper right corner of this pane, a dropdown menu lets you select the timeframe for the summary statistics. Use the summary panel and the dropdown to answer these questions: + * How many records have been ingested in the last 8 Hours? + * How many signals have been created in the last 7 Days? + * How many insights have been created in the last 24 Hours?
Select timeframe +1. In the center of the Cloud SIEM HUD is the insight radar. Hover over each piece of the radar to answer these questions: + * What time were the most records ingested in the last 24 hours? When were the fewest records ingested? Hint: Hover over the blue line to find out how many records were ingested at each time increment. + * What time were the most signals created in the last 24 hours? When were the fewest signals created? Hint: Hover over each bar to find out how many signals were generated at each time increment. + * How many insights have been generated in the last 24 hours? Hint: Each triangle represents one or more insights, so hover over each to find the number of insights each represents.
Explore the radar +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Rules**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Rules**. You can also click the **Go To...** menu at the top of the screen and select **Rules**. +1. Use the **Filters** bar in the **Rules** page to answer these questions: + * How many rules have a name that contains "firewall"? Hint: Use the autocomplete suggestions and dropdown menus to enter `Name contains firewall` in the **Filters** bar. + * How many rules have a severity score greater than 8? + * How many rules detect the "persistence" tactic"?
Filter rules +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). Click **Entities** at the top of the screen.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Entities**. You can also click the **Go To...** menu at the top of the screen and select **Entities**. +1. Use the **Filters** bar in the **Entities** page to answer these questions: + * How many entities have an activity score of 5 or greater? Hint: Use the autocomplete suggestions and dropdown menus to enter `Activity Score greater than` 5 in the **Filters** bar. + * How many entities have an activity score of 0?
Filter entities + +Your answer to all these questions may vary. Make sure you feel confident navigating the Cloud SIEM UI to find all this information. + +:::tip +* Filters persist each time you search. This is great if you want to drill down into subsets of data. +* Depending on your monitor size and the zoom settings of your browser, you may see two panes instead of three on the Cloud SIEM HUD. Try resizing your browser and adjusting your zoom settings to suit your needs. +* Depending on your monitor size and the zoom settings of your browser, you may only see the icons, and not the words, in the top navigation bar. Try resizing your browser and adjusting your zoom settings to suit your needs. +::: + +## Introduction to threat investigation + +### Different threats but one platform + +In this section, we'll help three fictional companies investigate their threats. Each company has their own unique security and compliance concerns. +* Company 1 is a small retail business with a big tech idea: automate the entire coffee business from bean to cup. In addition to consumer protections like PCI DSS, their main concerns include keeping compute costs down while their startup grows. +* Company 2 is a healthcare company that ships prescription meds to patients. While they meet all HIPAA standards and guidelines, they're still concerned about data privacy. They want to monitor all their data to make sure their patients are safe and healthy in the digital world, too. +* Company 3 is a major player in the banking industry. They meet all the GDPR and other international compliance standards but worry their big investors are still targets for hackers. + +Sumo Logic can help all of these companies meet their different security and compliance goals. Moreover, Cloud SIEM can help them identify potential threats before they become a problem. + +Think about it: What security and compliance issues are you most concerned about in your company today? How has that changed over the years? How were security concerns different at other companies you've worked for in the past? + +### Using the MITRE ATT&CK matrix + +The [MITRE ATT&CK matrix](https://attack.mitre.org/matrices/enterprise/) is published by MITRE, a non-profit research organization. ATT&CK stands for Adversarial Tactics, Techniques, and Common Knowledge. + +The framework organizes and categorizes the tactics and techniques that hactivists, cyber criminals, nation states, scripters, and other adversaries use. This includes attacks like exfiltrating databases, installing malware, stealing credentials, and all the other nefarious activities you and your SOC team are trying to stop. + +Cloud SIEM uses these same tactic names for the stages of signals and the names of insights. Once you're familiar with ATT&CK, navigating Cloud SIEM's insights page becomes easier. + +Let's return to our fictional companies, and which MITRE ATT&CK tactics and techniques they might prioritize: + +* Company 1 monitors their infrastructure to make sure their apps are as efficient as possible. Execution is a particular concern, since many executable files use precious compute resources. +* Company 2 is concerned about their patients' privacy and compliance with standards like HIPAA. Exfiltration of private data is a major concern. +* Company 3 needs to keep their client's data secure. Credential access is a concern, since all customers have user credentials tied to their financial accounts. + +If you read the news, or are familiar with other cybersecurity frameworks like the Pyramid of Pain, you know there are many kinds of threats out there. It's easy to become overwhelmed. However, Cloud SIEM helps organize all the potential threats in your system into one manageable dashboard, leveraging the knowledge found in the MITRE ATT&CK matrix along with the insights algorithm. + +### Get started with threat investigation + +Threat investigation is reactive while threat hunting is proactive. Typically, threat investigation happens in response to an alert. Once you've investigated a threat, you can hunt for similar threats and take precautionary steps to prevent attacks from happening again. + +Threat investigation is an iterative process, much like troubleshooting. In both threat investigation and troubleshooting, you first monitor your systems. Once an anomaly is detected, you can make a hypothesis about how it happened and diagnose the problem. As you dig deeper, you may revise this initial hypothesis and find more clues about why or how the attack or error happened. You can then take action to resolve the issue. + +Incident response process + +Cloud SIEM acts as your first line of defense, monitoring your system. Cloud SIEM's threat intelligence and correlation algorithms organize related potential security events into insights. When you get alerted to an insight, it's up to you to diagnose the problem and take action. + +Insight example + +* A. **Name**. The insight's name can point you to how the event occurred, or why the adversaries did it. In this case, the adversaries wanted to gain credential access. +* B. **Assignee**. You can assign the insight to a coworker, update the insight's status, send alerts, close the insight, and perform other actions here. +* C. **Entity**. The entity can point to who, where, or what was affected. In this case, the insight is clustered around a username. +* D. **Left pane**. A summary of the insight's key features, like its severity, can be found in the left pane. +* E. **Timeline**. The timeline can show you when the events occurred. Each event represents a signal. +* F. **Signals**. The signals below the timeline contain details of each event. + +The insight page shows everything you need to start unravelling the security event. As you start investigating, try to answer as many wh- questions as you can about the event: + +* Who is behind the event? +* What assets did the event affect? +* Where did the event occur? +* When did the event occur? +* Why did the event occur? +* How did the event occur? + +When signals cluster together, Cloud SIEM uses their tactics and techniques to name the insights they generate. The insight's name can point you to how the event occurred, or why the adversary is behaving that way. For example, a tactic name like discovery or persistence shows the reasons the adversary has. Similarly, tactic names like initial access or execution can tell you a little about the methods the adversary used. These names are just starting points, however, and you may need to revise your hypotheses as you continue your investigations. + +Example: An insight is named "Discovery with Execution". Why did the event occur? Probably so the adversary could discover your information. How did the event occur? By using an executable file or a similar technique. + +The timeline can tell you when the event occurred. You can see whether each signal was triggered at the same time, or sequentially, as well as whether everything happened over minutes, hours, or days. By default, insights are related signals that cluster together within the last 14 days. + +The entities within each signal can help point to who, what, or where the event occurred. An entity might point to the IP address of a hacked device, the location of the adversary, the location of the database that leaked, the owner of a website or domain, or some other piece of the puzzle. + +A day in the life of a SOC analyst can be summarized as follows: + +A day-in-the-life with Cloud SIEM + +Cloud SIEM can help with every step of the threat investigation process: +1. **Monitor**. Cloud SIEM automatically detects and monitors potential threats by analyzing millions of records and distilling them into a handful of insights with a low false positive rate. You can choose insights from the home page of Cloud SIEM in the insight radar, under the **Insight Activity** pane, or from the **Insights** panel. +1. **Investigate**. Once you choose an insight, you can dig through all the raw logs and signals to conduct deep-dive investigations and even proactive threat hunts. +1. **Hypothesize**. You can organize your thoughts, make hypotheses, and take notes about your investigation in the comments of each insight. This will share your ideas with your SOC teammates and help you keep track of your investigation. +1. **Take action**. You can also take certain actions directly from the insight. You can email teammates, create JIRA tickets, execute playbooks, and many other custom actions with the **Actions** button. +1. **Update**. Finally, you can update the insight. You can mark it as "in progress" or "closed". When you close it, you can mark it as "resolved," "false positive", "duplicate", or "no action". Updating the status correctly will help the Cloud SIEM insight engine produce more accurate insights for your organization in the future. + +Of course, this process will repeat each day as new insights are generated for you to investigate. + +### Investigating an insight + +In this section, you'll be investigating an insight for your organization that was detected through Cloud SIEM. Our goal is to analyze the insight details and complete the narrative of what happened. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). Click **Insights** at the top of the screen.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu select **Cloud SIEM > Insights**. You can also click **Go To...** at the top of the screen and select **Insights**. +1. Find an insight to investigate. +1. Click the insight's name to investigate it. For our example, we found one named **Discovery with Execution and Initial Access**.
Example threat insight +1. Use the insight's name (and the [MITRE ATT&CK matrix](https://attack.mitre.org/matrices/enterprise/)), timeline, signals, and entities to answer these questions: + * What events (signals) were detected and correlated together? + * What is the total of all the severity scores of the signals in this insight? + * What order did the events happen in? + * What hypotheses do you have about how and why the event happened? + * What other information can you find by exploring this insight? +1. Scroll to the bottom of the left navigation pane of the insight. Write a short summary of your answers from from the previous step in the **Comments** section. Here is a summary that we could have written for our example: + "*First, a known phishing link was received in a user's email. A few minutes later, a malicious file was allowed. It seems the user clicked a phishing link and downloaded the file. Then, threat intelligence detected a ZIP file with a known malicious file hash, coming from a domain that has also been recognized as suspicious by external threat monitoring services. Follow-up activity accessing the AWS APIs and Lambda service was detected, the first time that this user has been recorded using those services. This unusual activity also triggered Amazon's GuardDuty service, recognizing unusual network activity. All of these individual signals were correlated together into this insight. Given the likelihood of active malware in the network, the user's machine and credentials should be locked down immediately. Further investigation is needed to determine the total impact of the malicious file.*" + +### Dive into signals and entities + +Insights provide a great, high-level summary of potential security events. Because of Cloud SIEM's threat intelligence and sophisticated correlation engine, very few insights are false positives, so they're all worth investigating. + +However, sometimes you may want to investigate deeper, to really understand what happened. Or, you may want to do proactive threat hunting work, to find potential problems before they begin impacting your system, even if some of what you're looking at are false alarms. + +The **Signals** tab lists all the signals created by rules that have been triggered in your system in the last 14 days, by default. Signals provide summaries of potential security threats. Remember, not all signals are security incidents. After all, there are legitimate reasons why someone might be logged in to two different devices at the same time, or why there have been several failed password attempts on an account. + +Signals + +When you click into a signal, you'll have the option to see the full details of the record that triggered it. This includes information like the IP address, geolocation, threat level, and other information that can aid you in your investigation. + +Signals details + +The **Entities** tab lists all the entities that your rules have detected in the last 14 days, by default. Each entity has an activity score associated with it. The activity score is the sum of all the severity scores of all the unique signals associated with that entity. When an entity's activity score reaches at least 12, an insight is created. If you have several entities with relatively high activity scores, they might be a good starting point for a threat hunt. + +Entities tab + +### Bring it back to Sumo Logic search + +Sometimes you want to take your investigation even further. An in-depth threat investigation will use the most of both Cloud SIEM and Sumo Logic's core search functionality. + +There are several ways to bring the information you find in Cloud SIEM back to the Sumo Logic platform. One [context action](/docs/cse/administration/create-cse-context-actions) is **Sumo Logic Search**. Selecting this action will create a log search in Sumo Logic. This way, you can find all log messages with that entity, even if it wasn't detected by a rule in Cloud SIEM. Hover your mouse over the entity name, click the Context action button button that appears, and select **Sumo Logic Search** from the list. + +Sumo Logic Search context menu option + +Many entities in the insights, signals, and entities pages have context actions (six dots icon). Hover next to certain entities and the six dot icon may appear, if context actions are available for that object. Use the context actions to insert the entity into an API call, do a DNS lookup, or many other tasks. Your admin can add custom context actions too. + +You can also work with your admin to set up dashboards in Sumo Logic that track insights and other activity in Cloud SIEM. This allows you to monitor what's going on in Cloud SIEM without ever leaving Sumo Logic's core platform. + +### Continue the investigation + +In a previous section, we looked at an insight. In this section, we will use Sumo Logic search to continue the investigation. Then, we will update the status of your investigation in Cloud SIEM. + +1. Return to the insight you looked at in the previous section [Investigating an insight](#investigating-an-insight). +1. In the left pane, hover your mouse cursor over the **Entity** field (this is randomly generated and can be a user name or an IP address). Click the context actions (six dots) icon that appears next to the entity name. +1. From the dropdown (under **Actions**), select **Sumo Logic Search** as described in [Bring it back to Sumo Logic search](#bring-it-back-to-sumo-logic-search). You may need to scroll to find it. You'll be redirected to Sumo Logic search. +1. Make a note of the entity name that's pre-populated in the query builder. +1. Open another log search in Sumo Logic:
[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). Go to the **Home** screen and select **Log Search**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Logs > Log Search**. You can also click the **Go To...** menu at the top of the screen and select **Log Search**. +1. Find the top 10 records by threat type for that entity. For example, if the entity is a username, in the search bar type: + ``` + _index=sec_record_* + | where !isEmpty(threat_name) and user_username="" + | count by threat_name + | topk(10, _count) + ``` + Replace `` with the entity name from the previous step. +1. Click **Start** to run the log search. + * Make sure your quotes are straight. Copying and pasting the command sometimes changes the formatting of these quote marks to curly quotes. Manually typing the quote marks fixes this. + * You may need to increase the time of the search to the **Last 24 hours** to see results. The default is the **Last 15 minutes**. + * Make sure you're viewing the **Messages** tab when the results load. + 1. Explore the raw logs. The `_index=sec_record_*` query searches all the records that have been ingested by Cloud SIEM. This particular query excludes those records with nothing in the `threat_name` value. Additionally, it sorts it by threat name, and shows the most frequent threats. This will help you identify everything this user was doing around this timeframe, to see if anything not caught by the Cloud SIEM rules sticks out. +1. When you're done exploring the raw logs, return to the insight. +1. If you think there's still more work to do, use the **Status** dropdown to set the insight as **In Progress**. You can also use the **Assignee** field to reassign it. +1. If you've finished your investigation, use the **Close Insight** button or use the **Status** dropdown to set the status to **Closed**. + +### Take action on insights + +In addition to the context actions available in the Cloud SIEM UI, there are many other actions you might take in response to an insight. For example, you might work with your IT team to isolate and wipe laptops infected with malware to prevent spread of malicious code. Or, you might work with your HR team to enforce mandatory anti-phishing training among all employees to prevent future attacks. + +In Cloud SIEM, there are several different actions you can take on each insight. You can comment on the insight, or close it or assign a status to it. When you close an insight, Cloud SIEM uses the resolution information to reduce false positives and duplicates further. Assigning a status to the insight lets you keep working on it, and keep track of your progress. + +You can also assign the insight to yourself or to a colleague, and use the **Actions** button to alert colleagues, create JIRA tickets, send Slack messages, execute playbooks, or use other APIs. This **Actions** button is customizable, but can only be configured by admins. If you need a custom Action, ask your Admin or Sumo account rep for help creating one. + +## Tune your environment + +### Why tune? + +Once you've completed a few investigations, you may want to add or modify the rules, data sources, match lists, and other pieces of the Cloud SIEM puzzle. These modifications can help further reduce false positives or alert you even faster. The most common things to customize are rules and insights. + +[Rules](/docs/cse/rules/about-cse-rules/) are one of the most important pieces of Cloud SIEM's threat detection engine. All the records that are ingested in Cloud SIEM are compared to every rule in Cloud SIEM. If there's a match, an entity is extracted and a signal is created. Those entities are tracked and may correlate with other signals to create an insight, which is where most threat investigations begin. + +Records to signals + +You don't have to write rules from scratch. The Sumo Logic content team creates and maintains hundreds of [out-of-the box rules](/docs/cse/rules/cse-built-in-rules/), to get you started. These rules are updated frequently, often every few days. You can check out the most recent updates in the [Cloud SIEM release notes page](/release-notes-cse/). + +If you do decide to write a custom rule, insight, or rule tuning expression, these aren't updated or deleted by Sumo Logic during the regular updates. They're independent from the default rules. + +### Write a rule tuning expression + +You're updating some of the firewalls in your system, and you don't want to trigger unnecessary alerts. Write a rule tuning expression that will allow yourself to bypass firewall-related rules. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Rule Tuning**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Rule Tuning**. You can also click the **Go To...** menu at the top of the screen and select **Rule Tuning**. +1. On the **Rule Tuning** page, click **Create**. +1. Name your rule tuning expression. +1. **Tune selected Rules** should be selected by default. +1. Use the **Type to add a Rule** search bar to find rules to add your expression to. +1. Type "firewall" into the search bar to find all firewall-related rules. +1. Select a firewall rule, such as **Azure Firewall Rule Modified**. +Under **to include Records that also match the expression**, write the logic for the rule tuning expression. For help, see [Rule Tuning Expressions](/docs/cse/rules/rule-tuning-expressions/). +1. Click **Submit** to save your rule tuning expression. +1. Verify your tuning expression exists by going back to the rule tuning page (step 1 above). You should see it there. You may need to refresh the page to find it. + +#### Tips and tricks + +* When a rule tuning expression is added to a rule, it's appended with an AND statement. Rule tuning expressions are usually exceptions to the rule. Keep this in mind when writing the logic. It's common to use the is not (!=) operator to make exceptions. +* The autocomplete feature can help you write the logic. For example, typing "ip" will bring up a dropdown showing all available fields related to IP addresses. +* The syntax coloring can help you write the logic. For example, try using single quotes ('...') instead of double quotes ("..."). Notice that the syntax coloring lights up correctly when you use double quotes, which is the best practice. +* Check for an orange triangle icon next to the **Submit** button before you submit. This will notify you of any errors or warnings. + +### Custom rules + +Adding a rule tuning expression to an existing rule is one of the easiest and most common ways to customize your rules. But sometimes you need to [write a new rule from scratch](/docs/cse/rules/before-writing-custom-rule/). You might do this if your system has a source that isn't covered by the default rules, or if you're looking for a threat that isn't covered by the default rules. + +See [Rule types](/docs/cse/rules/about-cse-rules#rule-types) for the types of rules you can create: +* **Match rules** take a simple boolean statement, and check if it's true or false. If it's true, then an entity is extracted and a signal is created. Match rules are the simplest and most common type of rule. +* **Threshold rules** are triggered when a match is found a certain number of times. So, for example, if one failed login attempt is acceptable, but five failed login attempts would be suspicious, then a threshold rule would be set to fire after the fifth failed login attempt. +* **Chain rules** fire when different events happen together within a certain time window. So, for example, if you want to look for five failed login attempts followed by one successful log in within one hour, you'd use a chain rule. +* **Aggregation rules** are triggered when up to six different events accumulate over time. For example, if you want a rule that looks for a large number of event types from a single device IP, you'd use aggregation rules. +* **First Seen rules** generate a signal when behavior by an entity (such as a user) is encountered that hasn't been seen before, such as logging in from a distant location. +* **Outlier rules** generate a signal when behavior by an entity (such as a user) is encountered that deviates from its "normal" baseline activity, for instance, a sudden spike in failed login attempts or abnormally large downloads. + +The below image shows a blank rule template. + +Blank rule template + +* A. **If Triggered**. Configure the IF statement to decide what records will cause the rule to trigger. +* B. **Rule logic**. The rule's logic is a short piece of code. For match rules, it's usually simple boolean logic. +* C. **Add Tuning Expression**. You can optionally add rule tuning expressions when you create new rules. +* D. **Then Create a Signal**. The THEN statement of a rule configures the signal that will be created if there's a match with the IF statement. +* E. **On Entity**. The entity for a rule is usually something that is found in the IF statement. For example, if your boolean logic looks for matches on IP addresses, then the entity would be an IP address. +* F. **with the Summary**. The name, summary, and description are required fields. As a best practice, fill these out with details that will help other SOC analysts understand why you wrote this rule. +* G. **and a __ severity of**. You can configure the rule's severity score. This is on a scale from 0 to 10, with 10 being the most severe. Higher severity scores are more likely to trigger insights. +* H. **with tags**. The tags let you choose which tactics and techniques from the [MITRE ATT&CK](https://attack.mitre.org/) framework your rule is looking for. + +### Write a match rule + +You're concerned about traffic coming from a particular IP address that isn't covered by any of the default rules in Cloud SIEM. Write a match rule that looks for this IP address. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Rules**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Rules**. You can also click the **Go To...** menu at the top of the screen and select **Rules**. +1. Click **Create**. +1. On the **Match** tile click **Create**. +1. Provide a name for your rule. +1. Under **When a Record matches the expression**, write the logic for the rule. For example, if you want the rule to fire when it encounters an entity for a specific IP address, enter it here. For example, `device_ip='192.0.2.0'`. +1. Click **Add Tuning Expression**. Add the tuning expression you created in [Write a rule tuning expression](#write-a-rule-tuning-expression). +1. Configure the signal that will be created once the rule is triggered by filling out all the fields under **Then Create Signal**. + 1. **On Entity** should use an entity that's also used in your rule's logic. In this example, select **device_ip**. + 1. In **using the name** define the name for signals fired by the rule. + 1. Fill out the **with the summary** and **with the description** fields. + 1. Select **constant** from the **and a ___ severity of** dropdown. + 1. Drag the severity meter to select a severity for your rule. In this example, a low severity like 1 would be appropriate. + 1. Under tags, select some tactics and techniques from the MITRE ATT&CK framework. For this example, you could select **Tactic** and then **TA0001 - Initial Access**. +1. Select the **Save this rule as a prototype** checkbox. As a best practice, whenever you create a new rule, save it as a prototype so you can monitor its behavior for a few weeks before pushing it to your system live. +1. Click **Submit** to save your rule. +1. Verify your rule exists by going back to the rules page (step 1). You should see it there. You may need to refresh the page to find it. + +#### Tips and tricks + +* The logic under **When a Record matches the expression** can be anything you like, but is typically a simple boolean statement for match rules. +* The autocomplete feature can help you write the logic. For example, typing "ip" will bring up a dropdown showing all available fields related to IP addresses. +* The syntax coloring can help you write the logic. For example, try using single quotes ('...') instead of double quotes ("..."). Notice that the syntax coloring lights up correctly when you use double quotes, which is the best practice. +* Insights are named based on the tactics and techniques tagged in the signals. Consider which tactic or technique from the MITRE ATT&CK framework your rule is looking for when selecting tags. +* Check for an orange triangle icon next to the **Submit** button before you submit. This will notify you of any errors or warnings. + +### Custom insights + +Once a rule is in your system, whether it's a custom rule you created or one created by the Sumo Logic team, Cloud SIEM will use it to create signals. When a rule is created, you configure its severity score. This is on a scale from 0 to 10, with 10 being the most severe. + +If a record matches a rule, an entity is extracted from the record. The entity might be something like an IP address, a user name, a domain name. It tells you who the potential threat is. + +Records to signals + +Once an entity is in Cloud SIEM's system, Cloud SIEM tracks the total severity score of signals associated with each entity as an activity score. Once that activity score gets high enough, usually over 12 by default, then an insight is created. + +So, if you want an insight to be created with the default settings, you'd have to have rules with a severity score of 1 trigger 13 different times, or rules with higher severity scores trigger enough times to add up to 13. This is why insights typically have several signals associated with them. + +You can have a large number of low-severity score signals that won't create an insight. Or, you can have a small number of high-severity score signals that will create an insight. Keep this in mind when you're configuring the severity scores of your custom rules. + +Signals to insights + +But what if you want to be alerted right away when a certain rule is triggered? + +[Custom insights](/docs/cse/records-signals-entities-insights/configure-custom-insight/) let you create insights based on one specific signal, or a chain of signals. This is great for known threats specific to your system. You won't need to change any of your existing rules and insights. They'll keep working normally. + +### Create a custom insight + +You want to be alerted right away when your new custom match rule is triggered. Create a custom insight that looks for only this rule. + +1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu, select **Content > Custom Insights**.
[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Custom Insights**. You can also click the **Go To...** menu at the top of the screen and select **Custom Insights**. +1. Click **Create**. +1. Give your custom insight a name. +1. Under **When Signals are created from the following** select **rules**. +1. In **Type to add a rule**, search for the rule you created in [Write a match rule](#write-a-match-rule) and add it to your custom insight. +1. Choose **any** from the **in ___ order** dropdown. +1. Under **Then Create an Insight**, configure the insight. + 1. Fill out **Create an Insight with name**. + 1. You must fill out all the fields. For this exercise, you can add placeholder text like “This is a test” to the **and description** field. + 1. Select **constant** for **with a ___ severity**. + 1. Select **low** from the **that is** dropdown. + 1. Under **and tags**, select some tactics and techniques from the [MITRE ATT&CK](https://attack.mitre.org/) framework. For this example, you can select **Tactic** and then **TA0001 - Initial Access**. +1. Click **Submit** to save your custom insight configuration. +1. Verify your custom insight configuration exists by going back to the custom insights page (step 1). You should see it there. You may need to refresh the page. + +#### Tips and tricks + +* Insights are named based on the tactics and techniques tagged in the signals. Consider which tactic or technique from the MITRE ATT&CK framework your rule is looking for when selecting tags. +* Check for an orange triangle icon next to the **Submit** button before you submit. This will notify you of any errors or warnings. + +### Other customizations and best practices + +Remember, Cloud SIEM's out-of-the-box rules and insights are great. But we want you to have the flexibility to customize your environment. There are three simple three ways to customize Cloud SIEM's rules and insights. + +* [Rule tuning expressions](/docs/cse/rules/rule-tuning-expressions/) are simple ways to add small exceptions and other clauses to existing rules. +* [Custom rules](/docs/cse/rules/before-writing-custom-rule/) let you write logic that's unique to your system, to cover threats or data sources that aren't covered by built-in rules. +* [Custom insights](/docs/cse/records-signals-entities-insights/configure-custom-insight/) allow you to get alerts based on just one rule or a chain of rules. + +Before you create custom rules from scratch, there are some best practices you'll want to follow. + +* **Check existing rules**. Sumo Logic already has hundreds of [built-in rules](/docs/cse/rules/cse-built-in-rules/), so you might not need to write a new one. Or, you may only need to make small changes to existing rules, like adding a rule tuning expression or adjusting a severity score. +* **Know your system**. You'll need to understand the [schema](/docs/cse/schema/) and [log mappings](/docs/cse/schema/create-structured-log-mapping/) of all the records ingested into Cloud SIEM to write effective rules. You might want to work with an administrator on your team who knows this to write better rules. +* **Know your risk appetite**. In addition to your system's details about log mappings and other metadata, you need to understand your company's risk appetite and risk tolerance. For example, some companies might want to monitor a large amount of outbound traffic, but not consider this a threat. So, they'd assign this rule a severity of zero. However, other companies might be alarmed by outbound traffic and consider it data exfiltration, assigning the same rule a severity of five. +* **Know the rule types**. You also need to understand all [the types of rules](/docs/cse/rules/about-cse-rules/#rule-types). If your use case requires a chain rule, but you try writing a threshold rule, the rule might not be as efficient or effective. +* **Make small changes**. As a best practice, when you do write a new rule or edit an existing one, make small changes. For example, instead of decreasing a severity score from 8 to 2, try decreasing it from 8 to 7 and monitoring the change for a while. +* **Save as a prototype**. Another best practice is to [save all new rules as a prototype](/docs/cse/rules/write-match-rule#save-as-prototype). This allows you to monitor the rule's behavior, without creating new insights and alerts. + +Rule tuning, custom rules, and custom insights are just a taste of what you can customize in Cloud SIEM. However, some customizations, like configuring the [Actions button](/docs/cse/administration/create-cse-actions), need admin privileges. You can work with your admin or your Sumo Logic account rep to customize: +* [Log mappings](/docs/cse/schema/create-structured-log-mapping/) +* [Match lists](/docs/cse/match-lists-suppressed-lists/) +* [APIs](/docs/cse/administration/cse-apis/) and other [plugins](/docs/cse/integrations/) +* How much data Cloud SIEM [ingests](/docs/cse/ingestion/) \ No newline at end of file diff --git a/docs/cse/index.md b/docs/cse/index.md index f8063eedd7..99e9bbdb2c 100644 --- a/docs/cse/index.md +++ b/docs/cse/index.md @@ -19,12 +19,6 @@ Cloud SIEM is a cloud-based security information and event management (SIEM) sys This section contains the following topics:
-
-
- Shield on a cloud icon

Introduction to Cloud SIEM

-

Learn basic concepts about Cloud SIEM.

-
-
Shield on a cloud icon

Get Started with Cloud SIEM

diff --git a/docs/cse/introduction-to-cloud-siem.md b/docs/cse/introduction-to-cloud-siem.md deleted file mode 100644 index 975e19300c..0000000000 --- a/docs/cse/introduction-to-cloud-siem.md +++ /dev/null @@ -1,432 +0,0 @@ ---- -id: introduction-to-cloud-siem -title: Introduction to Cloud SIEM -sidebar_label: Introduction to Cloud SIEM -description: Learn basic concepts about Cloud SIEM. ---- - -import useBaseUrl from '@docusaurus/useBaseUrl'; - -Cloud SIEM is a cloud-based enterprise-grade security information and event management (SIEM) system. Cloud SIEM leverages Sumo Logic's core functionality, including data collection, ingestion, storage, and threat intelligence. Cloud SIEM is a purchased add-on with an ever-expanding library of content designed for security operations. - -Watch the following micro lesson to learn how to get started using Cloud SIEM for threat investigation. - -