<?xml version="1.0" encoding="utf-8"?><?xml-stylesheet type="text/xsl" href="rss.xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
    <channel>
        <title>Sumo Logic Cloud SIEM Release Notes</title>
        <link>https://www.sumologic.com/help/release-notes-cse/</link>
        <description>New and enhanced Cloud SIEM features, bug fixes, updated rules, log mappers, parsers, and more.</description>
        <lastBuildDate>Thu, 12 Mar 2026 00:00:00 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <copyright>Copyright © 2026 Sumo Logic</copyright>
        <item>
            <title><![CDATA[March 12th, 2026 - Content Release]]></title>
            <link>https://www.sumologic.com/help/release-notes-cse/2026/03/12/content/</link>
            <guid>https://www.sumologic.com/help/release-notes-cse/2026/03/12/content/</guid>
            <pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[This content release includes:]]></description>
            <content:encoded><![CDATA[<p>This content release includes:</p>
<ul>
<li class="">New Cloudflare DNS event visibility with a dedicated log mapper and enhanced parser support for DNS query logging.</li>
<li class="">Improved Infoblox DHCP event handling with updated field mappings and additional timestamp format support.</li>
<li class="">Refined detection logic for Office 365 MailItemsAccessed events. Now using global baselines for more accurate first-seen analysis.</li>
<li class="">Performance optimization for Windows critical service monitoring rule.</li>
</ul>
<p>Additional changes are enumerated below.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2026/03/12/content/#rules" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h3>
<ul>
<li class="">[Updated] FIRST-S00044 First Seen AppID Generating MailItemsAccessed Event from User</li>
<li class="">[Updated] MATCH-S00521 Windows - Critical Service Disabled via Command Line</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2026/03/12/content/#log-mappers" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h3>
<ul>
<li class="">[New] Cloudflare - DNS Events</li>
<li class="">[Updated] Infoblox DDI - DHCP</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2026/03/12/content/#parsers" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h3>
<ul>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ASA</li>
<li class="">[Updated] /Parsers/System/Cloudflare/Cloudflare Logpush</li>
<li class="">[Updated] /Parsers/System/Infoblox/Infoblox</li>
<li class="">[Updated] /Parsers/System/Linux/Linux OS Syslog</li>
</ul>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[February 24th, 2026 - Content Release]]></title>
            <link>https://www.sumologic.com/help/release-notes-cse/2026/02/24/content/</link>
            <guid>https://www.sumologic.com/help/release-notes-cse/2026/02/24/content/</guid>
            <pubDate>Tue, 24 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[* This content release includes:]]></description>
            <content:encoded><![CDATA[<ul>
<li class="">This content release includes:<!-- -->
<ul>
<li class="">Added MITRE ATLAS Tactics and Techniques to tag schema for improved attack pattern classification and detection rule development.</li>
<li class="">Expanded Ubiquiti Unifi network visibility with 7 new log mappers and parser enhancements covering process execution, DHCP events, DNS queries, and general network traffic.</li>
<li class="">Enhanced field mappings and parsing for email security, web traffic analysis, and authentication monitoring:<!-- -->
<ul>
<li class="">Abnormal Security threat detection now captures email metadata, sender/recipient details, and threat categorization.</li>
<li class="">Netskope web transactions include network connection details, file hashes, and error context.</li>
<li class="">Okta Active Directory authentication events provide standardized user identification.</li>
</ul>
</li>
</ul>
</li>
</ul>
<p>Additional changes are enumerated below.</p>
<h2 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2026/02/24/content/#log-mappers" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h2>
<ul>
<li class="">[New] Unifi - Process Cron - Command Execution</li>
<li class="">[New] Unifi - Process sudo - Superuser Do Command Execution</li>
<li class="">[New] Unifi DHCP ACK Event</li>
<li class="">[New] Unifi DHCP Offer Event</li>
<li class="">[New] Unifi DHCP Request and DHCP DISCOVER Event</li>
<li class="">[New] Unifi DNS Network Event</li>
<li class="">[New] Unifi Network Event</li>
<li class="">[Updated] Abnormal Security Threats</li>
<li class="">[Updated] Netskope - WebTx Events</li>
<li class="">[Updated] Okta Authentication - auth_via_AD_agent</li>
<li class="">[Updated] Unifi Catch All</li>
<li class="">[Updated] Unifi HTTP Request Logs</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2026/02/24/content/#parsers" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h3>
<ul>
<li class="">[Updated] /Parsers/System/Abnormal Security/Abnormal Security</li>
<li class="">[Updated] /Parsers/System/Netskope/Netskope WebTx</li>
<li class="">[Updated] /Parsers/System/Okta/Okta</li>
<li class="">[Updated] /Parsers/System/Ubiquiti/Ubiquiti Unifi</li>
</ul>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[February 18, 2026 - Application Update]]></title>
            <link>https://www.sumologic.com/help/release-notes-cse/2026/02/18/application/</link>
            <guid>https://www.sumologic.com/help/release-notes-cse/2026/02/18/application/</guid>
            <pubDate>Wed, 18 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Bulk update insights]]></description>
            <content:encoded><![CDATA[<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="bulk-update-insights">Bulk update insights<a href="https://www.sumologic.com/help/release-notes-cse/2026/02/18/application/#bulk-update-insights" class="hash-link" aria-label="Direct link to Bulk update insights" title="Direct link to Bulk update insights" translate="no">​</a></h3>
<p>We're happy to announce that you can use the UI or API to update multiple insights at a time, including closing, reassigning, adding comments, or giving them a new status. Acting on multiple insights at once speeds up your insight resolution. <a class="" href="https://www.sumologic.com/help/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/#bulk-update-insights">Learn more</a>.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[February 9th, 2026 - Content Release]]></title>
            <link>https://www.sumologic.com/help/release-notes-cse/2026/02/09/content/</link>
            <guid>https://www.sumologic.com/help/release-notes-cse/2026/02/09/content/</guid>
            <pubDate>Mon, 09 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[This content release includes:]]></description>
            <content:encoded><![CDATA[<p>This content release includes:</p>
<ul>
<li class="">New support for OpenAI and Anthropic Claude Code audit logging to monitor AI platform usage, API key lifecycle, and organizational access.</li>
<li class="">New support for Akamai Noname API Security threat detection and analysis.</li>
<li class="">Enhanced CrowdStrike Falcon detection coverage including XDR events, automated lead summaries, and data protection alerts.</li>
<li class="">Standardized device IP field mappings across Cisco ASA log mappers for improved asset correlation.</li>
</ul>
<p>Additional changes are enumerated below.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2026/02/09/content/#rules" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h3>
<ul>
<li class="">[Updated] MATCH-S00521 Windows - Critical Service Disabled via Command Line. Updated detection expression for improved query performance.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2026/02/09/content/#log-mappers" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h3>
<ul>
<li class="">[New] Akamai Noname API Security Insight Log</li>
<li class="">[New] Anthropic Claude Code - api_request|api_error|user_prompt|tool_result|tool_decision</li>
<li class="">[New] Anthropic Claude Code Catch All</li>
<li class="">[New] CrowdStrike Alert - All Detections</li>
<li class="">[New] CrowdStrike Falcon - AutomatedLeadSummaryEvent|XdrDetectionSummaryEvent</li>
<li class="">[New] CrowdStrike Falcon - DataProtectionDetectionSummaryEvent</li>
<li class="">[New] OpenAI Audit - API Key Events</li>
<li class="">[New] OpenAI Audit - Invite Events</li>
<li class="">[New] OpenAI Audit - Login Events</li>
<li class="">[New] OpenAI Audit - Organization Events</li>
<li class="">[New] OpenAI Audit - Project Events</li>
<li class="">[New] OpenAI Audit - Role Assignment Events</li>
<li class="">[New] OpenAI Audit - Role Events</li>
<li class="">[New] OpenAI Audit - Service Account Events</li>
<li class="">[New] OpenAI Audit - User Management Events</li>
<li class="">[New] OpenAI Audit - Workflow Events</li>
<li class="">[New] OpenAI Audit Catch All</li>
<li class="">[Updated] Cisco ASA 106001 JSON</li>
<li class="">[Updated] Cisco ASA 106102-3 JSON</li>
<li class="">[Updated] Cisco ASA 109201|109207|113022</li>
<li class="">[Updated] Cisco ASA 4180(18|19|44)</li>
<li class="">[Updated] Cisco ASA 609002 JSON</li>
<li class="">[Updated] Cisco ASA 713172 JSON</li>
<li class="">[Updated] Cisco ASA 713nnn JSON</li>
<li class="">[Updated] Cisco ASA 716039 JSON</li>
<li class="">[Updated] Cisco ASA 716059 JSON</li>
<li class="">[Updated] Cisco ASA 725016|771002</li>
<li class="">[Updated] Cisco ASA 733100|734001|737005|737017|737036|737029|746014|746015|746016 JSON</li>
<li class="">[Updated] Cisco Umbrella DNS Logs</li>
<li class="">[Updated] Unifi HTTP Request Logs</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2026/02/09/content/#parsers" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h3>
<ul>
<li class="">[New] /Parsers/System/Akamai/Noname API Security</li>
<li class="">[New] /Parsers/System/Anthropic/Claude Code</li>
<li class="">[New] /Parsers/System/OpenAI/OpenAI Audit</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ASA</li>
<li class="">[Updated] /Parsers/System/CrowdStrike/CrowdStrike Falcon Endpoint - JSON</li>
</ul>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[January 23rd, 2026 - Content Release]]></title>
            <link>https://www.sumologic.com/help/release-notes-cse/2026/01/23/content/</link>
            <guid>https://www.sumologic.com/help/release-notes-cse/2026/01/23/content/</guid>
            <pubDate>Fri, 23 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[This content release includes:]]></description>
            <content:encoded><![CDATA[<p>This content release includes:</p>
<ul>
<li class="">New parsing and mapping support for Ubiquiti Unifi.</li>
<li class="">Updates to Infoblox DDI and NIOS log mappers and parsers to extract and map hostname, IP, port, and MAC address fields.</li>
<li class="">Updates to Check Point Firewall Syslog parser to improve user extraction.</li>
<li class="">Update to Netskope Security Cloud JSON parser to add a static alert name in the absence of specific alert name data.</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2026/01/23/content/#log-mappers" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h3>
<ul>
<li class="">[New] Unifi Catch All</li>
<li class="">[New] Unifi Http Request Logs</li>
<li class="">[New] Unifi Traffic Logs</li>
<li class="">[Updated] Infoblox DDI - Catch All</li>
<li class="">[Updated] Infoblox DDI - DHCP</li>
<li class="">[Updated] Infoblox DDI - DNS</li>
<li class="">[Updated] Infoblox NIOS - Catch All</li>
<li class="">[Updated] Infoblox NIOS - DHCP</li>
<li class="">[Updated] Infoblox NIOS - DNS</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2026/01/23/content/#parsers" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h3>
<ul>
<li class="">[New] /Parsers/System/Ubiquiti/Ubiquiti Unifi</li>
<li class="">[Updated] /Parsers/System/Check Point/Check Point Firewall Syslog</li>
<li class="">[Updated] /Parsers/System/Infoblox/Infoblox</li>
<li class="">[Updated] /Parsers/System/Netskope/Netskope Security Cloud JSON</li>
</ul>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[January 15th, 2026 - Content Release]]></title>
            <link>https://www.sumologic.com/help/release-notes-cse/2026/01/15/content/</link>
            <guid>https://www.sumologic.com/help/release-notes-cse/2026/01/15/content/</guid>
            <pubDate>Thu, 15 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[This release adds support for OCSF 1.6 and Netskope WebTx logs. Changes are enumerated below.]]></description>
            <content:encoded><![CDATA[<p>This release adds support for OCSF 1.6 and Netskope WebTx logs. Changes are enumerated below.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2026/01/15/content/#rules" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h3>
<ul>
<li class="">[New] MATCH-S01148 OCSF IAM Analysis Finding<!-- -->
<ul>
<li class="">Passes through IAM analysis findings from OCSF conforming sources.</li>
</ul>
</li>
<li class="">[Updated] MATCH-S00445 Known Ransomware File Extensions<!-- -->
<ul>
<li class="">Corrects spelling in rule description.</li>
</ul>
</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2026/01/15/content/#log-mappers" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h3>
<ul>
<li class="">[Updated] Netskope - WebTx Events</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2026/01/15/content/#parsers" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h3>
<ul>
<li class="">[New] /Parsers/System/Netskope/Netskope WebTx</li>
</ul>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[January 9th, 2026 - Content Release]]></title>
            <link>https://www.sumologic.com/help/release-notes-cse/2026/01/09/content/</link>
            <guid>https://www.sumologic.com/help/release-notes-cse/2026/01/09/content/</guid>
            <pubDate>Fri, 09 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[This content release includes:]]></description>
            <content:encoded><![CDATA[<p>This content release includes:</p>
<ul>
<li class="">Rule update.</li>
<li class="">New parsing and mapping support for VMware vSphere Web Services.</li>
<li class="">Updates to Fortinet parsing and mapping to better capture inbound and outbound traffic bytes and packets.</li>
<li class="">Updates to Okta mapping to standardize <code>srcDevice_ip</code> mappings.</li>
</ul>
<p>Changes are enumerated below.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2026/01/09/content/#rules" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h3>
<ul>
<li class="">[Updated] FIRST-S00067 Okta - First Seen Client ID/ASN combo in successful OIDC token grant<!-- -->
<ul>
<li class="">Added exclusion to rule expression to exclude consideration of null values in baseline.</li>
</ul>
</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2026/01/09/content/#log-mappers" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h3>
<ul>
<li class="">[New] Check Point Anti Malware</li>
<li class="">[New] Check Point New Anti Virus</li>
<li class="">[New] vSphere Web Services - Login/Logout</li>
<li class="">[New] vSphere Web Services - default</li>
<li class="">[Updated] Cisco ASA 722051|722022|722023|722028|722032|722033|722036|722037|722041|722011<!-- -->
<ul>
<li class="">Update to parser and mapper to correctly capture IP directionality.</li>
</ul>
</li>
<li class="">[Updated] Fortinet Appctrl1</li>
<li class="">[Updated] Fortinet Traffic Logs</li>
<li class="">[Updated] Fortinet Traffic Syslog 1</li>
<li class="">[Updated] Fortinet Traffic1</li>
<li class="">[Updated] Fortinet Traffic2</li>
<li class="">[Updated] Fortinet Webfilter Logs</li>
<li class="">[Updated] Okta Authentication - auth_via_AD_agent</li>
<li class="">[Updated] Okta Authentication - auth_via_mfa</li>
<li class="">[Updated] Okta Authentication - auth_via_radius</li>
<li class="">[Updated] Okta Authentication - sso</li>
<li class="">[Updated] Okta Authentication Events</li>
<li class="">[Updated] Okta Catch All</li>
<li class="">[Updated] Okta Security Threat Events</li>
<li class="">[Updated] Oracle Cloud Infrastructure Audit Catch All<!-- -->
<ul>
<li class="">Update to mapper to correctly capture source IP address.</li>
</ul>
</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2026/01/09/content/#parsers" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h3>
<ul>
<li class="">[New] /Parsers/System/VMware/vSphere Web Services</li>
<li class="">[Updated] /Parsers/System/Check Point/Check Point Firewall Syslog</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ASA</li>
<li class="">[Updated] /Parsers/System/Fortinet/Fortigate/Fortigate-JSON</li>
</ul>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[2025 Release Notes Archive - Cloud SIEM]]></title>
            <link>https://www.sumologic.com/help/release-notes-cse/2025/12/31/</link>
            <guid>https://www.sumologic.com/help/release-notes-cse/2025/12/31/</guid>
            <pubDate>Wed, 31 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[This is an archive of 2025 Cloud SIEM release notes. To view the full archive, click here. Release notes are available on our website for a rolling multi-year period. For information about older releases, contact Support.]]></description>
            <content:encoded><![CDATA[<p>This is an archive of 2025 Cloud SIEM release notes. To view the full archive, <a class="" href="https://www.sumologic.com/help/release-notes-cse/archive/">click here</a>. Release notes are available on our website for a rolling multi-year period. For information about older releases, contact <a href="https://support.sumologic.com/support/s" target="_blank" rel="noopener noreferrer" class="">Support</a>.</p>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="december-15-2025---application-update">December 15, 2025 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#december-15-2025---application-update" class="hash-link" aria-label="Direct link to December 15, 2025 - Application Update" title="Direct link to December 15, 2025 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="threat-intel-471-update">Threat Intel 471 update<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#threat-intel-471-update" class="hash-link" aria-label="Direct link to Threat Intel 471 update" title="Direct link to Threat Intel 471 update" translate="no">​</a></h4>
<p>We're happy to announce that the <a class="" href="https://www.sumologic.com/help/docs/security/threat-intelligence/about-threat-intelligence/#sumo-logic-threat-intelligence-sources">SumoLogic_ThreatIntel source</a> and the <a class="" href="https://www.sumologic.com/help/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/intel471-threat-intel-source/">Intel 471 Threat Intel Source</a>, which incorporate threat indicators supplied by <a href="https://www.intel471.com/" target="_blank" rel="noopener noreferrer" class="">Intel 471</a>, now include domain and email threat indicators. Now you can use these sources to identify threats based on domain URLs and email addresses.</p>
<p>For instructions on how to use these and other sources, see <a class="" href="https://www.sumologic.com/help/docs/security/threat-intelligence/about-threat-intelligence/">About Sumo Logic Threat Intelligence</a>.</p>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="december-10-2025---application-update">December 10, 2025 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#december-10-2025---application-update" class="hash-link" aria-label="Direct link to December 10, 2025 - Application Update" title="Direct link to December 10, 2025 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-look-for-list-pages">New look for list pages<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#new-look-for-list-pages" class="hash-link" aria-label="Direct link to New look for list pages" title="Direct link to New look for list pages" translate="no">​</a></h4>
<p>We're excited to announce a new look for list pages in Cloud SIEM. We've replaced "cards" with table rows for a simpler, cleaner appearance that more closely matches how we present data in the rest of Sumo Logic. This new presentation lets you see more at a glance, allowing you to more quickly evaluate your SIEM data.</p>
<p>To learn more, see our list view documentation for:</p>
<ul>
<li class=""><a class="" href="https://www.sumologic.com/help/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/#list-view">Insights</a></li>
<li class=""><a class="" href="https://www.sumologic.com/help/docs/cse/records-signals-entities-insights/view-manage-entities/#about-the-entities-list-page">Entities</a></li>
<li class=""><a class="" href="https://www.sumologic.com/help/docs/cse/get-started-with-cloud-siem/intro-for-analysts/#dive-into-signals-and-entities">Signals</a></li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="december-05-2025---content-release">December 05, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#december-05-2025---content-release" class="hash-link" aria-label="Direct link to December 05, 2025 - Content Release" title="Direct link to December 05, 2025 - Content Release" translate="no">​</a></h3>
<p>This new and updated content is effective as of December 4, 2025.</p>
<p>This content release includes:</p>
<ul>
<li class="">Updates to product naming from "G Suite" to "Google Workspace" across rules, log mappers, and parsers to reflect the current branding.</li>
<li class="">Update to product naming from "Dell SonicWall" to "SonicWall Firewall" in parsers and log mappers.</li>
<li class="">New support for Asana audit logging.</li>
</ul>
<p>Additional changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#rules" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00630 GCP Audit IAM DeleteServiceAccount Observed</li>
<li class="">[Updated] MATCH-S00629 GCP Audit IAM DisableServiceAccount Observed</li>
<li class="">[Updated] MATCH-S00117 Google Workspace - Access - Access Transparency</li>
<li class="">[Updated] MATCH-S00115 Google Workspace - Admin - User Settings - Turn Off 2SV</li>
<li class="">[Updated] MATCH-S00133 Google Workspace - Admin Activity</li>
<li class="">[Updated] MATCH-S00125 Google Workspace - Drive - Drive Open To Public</li>
<li class="">[Updated] MATCH-S00301 Google Workspace - Excessive OAuth Application Permissions Scope</li>
<li class="">[Updated] MATCH-S00128 Google Workspace - Login - Account Warning</li>
<li class="">[Updated] MATCH-S00129 Google Workspace - Login - Government Attack Warning</li>
<li class="">[Updated] MATCH-S00121 Google Workspace - Mobile - Suspicious Activity</li>
<li class="">[Updated] MATCH-S00227 Google Workspace - Unauthorized OAuth Application</li>
<li class="">[Updated] MATCH-S00120 Google Workspace - User Accounts - 2SV Disabled</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Asana Audit Authentication</li>
<li class="">[New] Asana Audit Catch All</li>
<li class="">[Updated] Azure ResourceHealth and ServiceHealth</li>
<li class="">[Updated] AzureActivityLog AuditLogs</li>
<li class="">[Updated] Google Workspace - access_transparency/GSUITE_RESOURCE/ACCESS</li>
<li class="">[Updated] Google Workspace - admin</li>
<li class="">[Updated] Google Workspace - calendar</li>
<li class="">[Updated] Google Workspace - drive.access</li>
<li class="">[Updated] Google Workspace - drive.acl_change</li>
<li class="">[Updated] Google Workspace - gcp</li>
<li class="">[Updated] Google Workspace - gplus</li>
<li class="">[Updated] Google Workspace - groups</li>
<li class="">[Updated] Google Workspace - groups_enterprise</li>
<li class="">[Updated] Google Workspace - login - password_change/recovery_info_change</li>
<li class="">[Updated] Google Workspace - login - risky_sensitive_action_allowed</li>
<li class="">[Updated] Google Workspace - login challenge</li>
<li class="">[Updated] Google Workspace - login-blocked_sender_change</li>
<li class="">[Updated] Google Workspace - login-email_forwarding_change</li>
<li class="">[Updated] Google Workspace - login.account_warning</li>
<li class="">[Updated] Google Workspace - login.gov_attack_warning</li>
<li class="">[Updated] Google Workspace - login.login</li>
<li class="">[Updated] Google Workspace - logout</li>
<li class="">[Updated] Google Workspace - meet</li>
<li class="">[Updated] Google Workspace - mobile</li>
<li class="">[Updated] Google Workspace - rules</li>
<li class="">[Updated] Google Workspace - saml</li>
<li class="">[Updated] Google Workspace - token</li>
<li class="">[Updated] Google Workspace - user_accounts</li>
<li class="">[Updated] Google Workspace Alert Center - AppMaker Editor</li>
<li class="">[Updated] Google Workspace Alert Center - Data Loss Prevention</li>
<li class="">[Updated] Google Workspace Alert Center - Domain wide takeout</li>
<li class="">[Updated] Google Workspace Alert Center - Gmail phishing</li>
<li class="">[Updated] Google Workspace Alert Center - Gmail phishing (Misconfigured whitelist)</li>
<li class="">[Updated] Google Workspace Alert Center - Google Operations</li>
<li class="">[Updated] Google Workspace Alert Center - Google identity</li>
<li class="">[Updated] Google Workspace Alert Center - Mobile device management (Device compromised)</li>
<li class="">[Updated] Google Workspace Alert Center - Mobile device management (Suspicious activity)</li>
<li class="">[Updated] Google Workspace Alert Center - Security Center rules</li>
<li class="">[Updated] Google Workspace Alert Center - Sensitive Admin Action</li>
<li class="">[Updated] Google Workspace Alert Center - State Sponsored Attack</li>
<li class="">[Updated] Google Workspace Alert Center - User Changes</li>
<li class="">[Updated] Netskope - Alerts<!-- -->
<ul>
<li class="">Updated action and normalizedAction field mappings.</li>
</ul>
</li>
<li class="">[Updated] SonicWall Firewall - Custom Parser</li>
<li class="">[Updated] SonicWall Flows</li>
<li class="">[Updated] Thinkst Canary Parser - Catch All<!-- -->
<ul>
<li class="">Added additional field mappings.</li>
</ul>
</li>
<li class="">[Updated] Windows - Security - 5145<!-- -->
<ul>
<li class="">Removes redundant mapping of <code>baseimage</code> and <code>device_ip</code> fields.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Asana/Asana Audit</li>
<li class="">[New] /Parsers/System/Google/Google Workspace Alert Center</li>
<li class="">[New] /Parsers/System/Google/Google Workspace Audit</li>
<li class="">[New] /Parsers/System/SonicWall/SonicWall Firewall</li>
<li class="">[Updated] /Parsers/System/Dell/Dell SonicWall</li>
<li class="">[Updated] /Parsers/System/Google/G Suite Alert Center</li>
<li class="">[Updated] /Parsers/System/Google/G Suite Audit</li>
<li class="">[Updated] /Parsers/System/Linux/Linux OS Syslog<!-- -->
<ul>
<li class="">Updated parser to drop certain systemd events not useful for security monitoring.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Thinkst Canary/Thinkst Canary<!-- -->
<ul>
<li class="">Modified parser to improve field extraction.</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="november-14-2025---content-release">November 14, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#november-14-2025---content-release" class="hash-link" aria-label="Direct link to November 14, 2025 - Content Release" title="Direct link to November 14, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">Updates to Microsoft Azure rules so rule summaries contain richer information around groups and roles that have been modified.</li>
<li class="">New and updated mappers for various products, including new support for PingIdentity MFA logs, better handling of severity scores for Netskope DLP alerts, and improved entity handling for Okta logs.</li>
<li class="">New and updated parsers, including new support for PingIdentity MFA logs and improved parsing for Netskope DLP events.</li>
</ul>
<p>Changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-1">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#rules-1" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00226 Azure - Add Member to Group</li>
<li class="">[Updated] MATCH-S00220 Azure - Add Member to Role Outside of PIM</li>
<li class="">[Updated] MATCH-S00231 Azure - Member Added to Global Administrator Role</li>
<li class="">[Updated] MATCH-S00233 Azure - Member Added to Global Administrator Role Non-PIM</li>
<li class="">[Updated] MATCH-S00229 Azure - Member Added to Non-Global Administrator Role</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-1">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-1" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Netskope - DLP Alerts</li>
<li class="">[New] Netskope - Incidents</li>
<li class="">[New] PingIdentity MFA - Authentication Event</li>
<li class="">[New] PingIdentity MFA - Catch All</li>
<li class="">[Updated] AzureActivityLog AuditLogs</li>
<li class="">[Updated] Keeper Authentication</li>
<li class="">[Updated] Netskope - Alerts</li>
<li class="">[Updated] Netskope - Catch All</li>
<li class="">[Updated] Okta Authentication - auth_via_AD_agent</li>
<li class="">[Updated] Okta Authentication - auth_via_mfa</li>
<li class="">[Updated] Okta Authentication - auth_via_radius</li>
<li class="">[Updated] Okta Authentication - sso</li>
<li class="">[Updated] Okta Authentication Events</li>
<li class="">[Updated] Okta Catch All</li>
<li class="">[Updated] Okta Security Threat Events</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-1">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-1" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/PingIdentity/PingIdentity MFA</li>
<li class="">[Updated] /Parsers/System/Netskope/Netskope Security Cloud JSON</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="november-06-2025---content-release">November 06, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#november-06-2025---content-release" class="hash-link" aria-label="Direct link to November 06, 2025 - Content Release" title="Direct link to November 06, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">An updated parser and new log mappers for Netskope Cloud Security for improved handling of Netskope DLP logs.</li>
<li class="">An updated mapper for Azure Audit Logs which repurposes the <code>changeTarget</code> field mapping for changed items such as groups.</li>
<li class="">Updated Azure rules to accommodate the repurposed <code>changeTarget</code> field</li>
<li class="">Updated Keeper Authentication mapper to include the <code>Success</code> field.</li>
</ul>
<div class="theme-admonition theme-admonition-note alert alert--secondary admonition_WoCw"><div class="admonitionHeading_TMsN"><span class="admonitionIcon_Ibzs"><svg viewBox="0 0 14 16"><path fill-rule="evenodd" d="M6.3 5.69a.942.942 0 0 1-.28-.7c0-.28.09-.52.28-.7.19-.18.42-.28.7-.28.28 0 .52.09.7.28.18.19.28.42.28.7 0 .28-.09.52-.28.7a1 1 0 0 1-.7.3c-.28 0-.52-.11-.7-.3zM8 7.99c-.02-.25-.11-.48-.31-.69-.2-.19-.42-.3-.69-.31H6c-.27.02-.48.13-.69.31-.2.2-.3.44-.31.69h1v3c.02.27.11.5.31.69.2.2.42.31.69.31h1c.27 0 .48-.11.69-.31.2-.19.3-.42.31-.69H8V7.98v.01zM7 2.3c-3.14 0-5.7 2.54-5.7 5.68 0 3.14 2.56 5.7 5.7 5.7s5.7-2.55 5.7-5.7c0-3.15-2.56-5.69-5.7-5.69v.01zM7 .98c3.86 0 7 3.14 7 7s-3.14 7-7 7-7-3.12-7-7 3.14-7 7-7z"></path></svg></span>note</div><div class="admonitionContent_vXIg"><p>If you are ingesting Netskope Cloud Security Logs or Azure Audit Logs ensure that the log source is set to use the appropriate system parser:</p><ul>
<li class="">Netskope Cloud Security: /Parsers/System/Netskope/Netskope Security Cloud JSON</li>
<li class="">Azure Audit Logs: /Parsers/System/Microsoft/Microsoft Azure JSON</li>
</ul></div></div>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-2">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#rules-2" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00226 Azure - Add Member to Group</li>
<li class="">[Updated] MATCH-S00220 Azure - Add Member to Role Outside of PIM</li>
<li class="">[Updated] MATCH-S00231 Azure - Member Added to Global Administrator Role</li>
<li class="">[Updated] MATCH-S00233 Azure - Member Added to Global Administrator Role Non-PIM</li>
<li class="">[Updated] MATCH-S00229 Azure - Member Added to Non-Global Administrator Role</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-2">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-2" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Netskope - DLP Alerts</li>
<li class="">[New] Netskope - Incidents</li>
<li class="">[Updated] AzureActivityLog AuditLogs</li>
<li class="">[Updated] Keeper Authentication</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-2">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-2" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Netskope/Netskope Security Cloud JSON</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="october-29-2025---content-release">October 29, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#october-29-2025---content-release" class="hash-link" aria-label="Direct link to October 29, 2025 - Content Release" title="Direct link to October 29, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">New log mappers for Crowdstrike Falcon to support eppDetectionSummary events from multiple ingest methods.</li>
<li class="">New parsers and log mappers for Databricks Audit logs and Varonis Alerts.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-3">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-3" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] CrowdStrike Falcon - EppDetectionSummaryEvents (CNC)</li>
<li class="">[New] DataBricks Audit Catch All</li>
<li class="">[New] DataBricks Authentication</li>
<li class="">[New] Varonis Alerts Catch All</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-3">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-3" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Databricks/Databricks Audit</li>
<li class="">[New] /Parsers/System/Varonis/Varonis Alert JSON</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="october-28-2025---content-release">October 28, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#october-28-2025---content-release" class="hash-link" aria-label="Direct link to October 28, 2025 - Content Release" title="Direct link to October 28, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">New mappers for Crowdstrike Falcon events.</li>
<li class="">Updates to existing mappers for Crowdstrike Falcon, F5, and Okta events to support additional fields and events.</li>
<li class="">Updates to F5 Networks and Okta SSO parsers.</li>
</ul>
<p>This new and updated content is effective as of October 22, 2025. Changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-4">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-4" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] CrowdStrike Falcon Host API IdpDetectionSummaryEvent</li>
<li class="">[New] CrowdStrike Falcon Identity Protection</li>
<li class="">[Updated] CrowdStrike UserActivity Logs</li>
<li class="">[Updated] F5 Authentication Catch All</li>
<li class="">[Updated] F5 HTTPd Audit - Custom Parser</li>
<li class="">[Updated] F5 Session and adfs proxy - Custom Parser</li>
<li class="">[Updated] Okta Authentication - auth_via_AD_agent</li>
<li class="">[Updated] Okta Authentication - auth_via_mfa</li>
<li class="">[Updated] Okta Authentication - auth_via_radius</li>
<li class="">[Updated] Okta Authentication - sso</li>
<li class="">[Updated] Okta Authentication Events</li>
<li class="">[Updated] Okta Catch All</li>
<li class="">[Updated] Okta Security Threat Events</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-4">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-4" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/F5/F5 Syslog</li>
<li class="">[Updated] /Parsers/System/Okta/Okta</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="october-10-2025---content-release">October 10, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#october-10-2025---content-release" class="hash-link" aria-label="Direct link to October 10, 2025 - Content Release" title="Direct link to October 10, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">New and updated rules.</li>
<li class="">Updated Threat Intelligence rules with match lists which can be populated with exclusions to prevent the generation of undesired signals.</li>
<li class="">Mapping update.</li>
</ul>
<p>Changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-3">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#rules-3" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] CHAIN-S00023 Administrative Remote Interactive Brute Force Login
<br>This rule correlates a high number of failed authentication attempts with  a successful remote interactive login (such as via RDP) coming from the same source IP address and user account.</li>
<li class="">[New] CHAIN-S00024 RDP Brute Force Login Attempt
<br>This rule correlates a high number of failed authentication attempts with repeated inbound connections over port 3389 (the default RDP port).</li>
<li class="">[New] MATCH-S01056 Administrative Remote Interactive Login
<br>This rule triggers on a successful remote interactive login (such as via RDP) of a privileged user.</li>
<li class="">[Updated] MATCH-S00139 Abnormal Parent-Child Process Combination
<br>Updated to reduce false positive matches for certain parent-child process combinations.</li>
<li class="">[Updated] MATCH-S01024 Threat Intel - Destination IP Address (High Confidence)</li>
<li class="">[Updated] MATCH-S01026 Threat Intel - Destination IP Address (Low Confidence)</li>
<li class="">[Updated] MATCH-S01028 Threat Intel - Destination IP Address (Medium Confidence)</li>
<li class="">[Updated] MATCH-S01023 Threat Intel - Inbound Traffic from Threat Feed IP (High Confidence)</li>
<li class="">[Updated] MATCH-S01025 Threat Intel - Inbound Traffic from Threat Feed IP (Low Confidence)</li>
<li class="">[Updated] MATCH-S01027 Threat Intel - Inbound Traffic from Threat Feed IP (Medium Confidence)</li>
<li class="">[Updated] MATCH-S01018 Threat Intel - Successful Authentication from Threat Feed IP</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-5">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-5" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Slack Anomaly Event
<br>Updated to include <code>threat_name</code> mapping for improved context in alerts.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="october-01-2025---content-release">October 01, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#october-01-2025---content-release" class="hash-link" aria-label="Direct link to October 01, 2025 - Content Release" title="Direct link to October 01, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">Support for CrowdStrike Falcon EppDetectionSummaryEvents.</li>
<li class="">Updates to Barracuda CloudGen log mappers and parser to fix unmatching logs and expand coverage.</li>
<li class="">Enhancements to Check Point Avanan log mapper to support passthrough signals.</li>
<li class="">Updates to Sophos Masters log mappers for improved IP address mapping.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-6">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-6" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] CrowdStrike Falcon - EppDetectionSummaryEvents</li>
<li class="">[Updated] Barracuda CloudGen Authenticaton Events</li>
<li class="">[Updated] Barracuda CloudGen Network Events</li>
<li class="">[Updated] Check Point Avanan</li>
<li class="">[Updated] Sophos - Masters</li>
<li class="">[Updated] Sophos - Masters - Threat Events</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-5">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-5" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Barracuda/Barracuda CloudGen</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="september-22-2025---application-update">September 22, 2025 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#september-22-2025---application-update" class="hash-link" aria-label="Direct link to September 22, 2025 - Application Update" title="Direct link to September 22, 2025 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="insight-summary">Insight summary<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#insight-summary" class="hash-link" aria-label="Direct link to Insight summary" title="Direct link to Insight summary" translate="no">​</a></h4>
<p>We’re excited to announce the new insight summary pane, an AI-generated synopsis for each insight that describes the threat incidents that led to its creation. This helps security teams understand incidents faster and accelerate response time. The summary is generated by Sumo Logic's Summary Agent, an agentic AI tool.</p>
<p><a class="" href="https://www.sumologic.com/help/docs/cse/get-started-with-cloud-siem/insight-summary/">Learn more</a>.</p>
<img src="https://www.sumologic.com/help/img/cse/insight-summary-pane.png" alt="Insight summary" style="border:1px solid gray" width="300">
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="september-19-2025---content-release">September 19, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#september-19-2025---content-release" class="hash-link" aria-label="Direct link to September 19, 2025 - Content Release" title="Direct link to September 19, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">New rules for passing through OCSF Findings, such as those generated by AWS Security Hub.</li>
<li class="">Updates to rules for impossible travel to exclude local system accounts.</li>
<li class="">New log mappers for Cisco Meraki Traffic Events, OCI Authentication Events, and TippingPoint TPS Cloud.</li>
<li class="">Updates to existing log mappers to support new event IDs and enhance functionality.</li>
<li class="">New parser for TippingPoint TPS Cloud.</li>
<li class="">Updates to existing parsers for Cisco ASA, Cisco Meraki C2C, Kaspersky Endpoint Security, and Oracle Cloud Infrastructure to support new events.</li>
<li class="">Schema update to include <code>ocsf</code> as an enforced value for <code>threat_ruleType</code>.</li>
</ul>
<p>Changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-4">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#rules-4" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S01053 OCSF Compliance Finding
<br>Passes through compliance findings from OCSF sources.</li>
<li class="">[New] MATCH-S01054 OCSF Detection Finding
<br>Passes through detection findings from OCSF sources.</li>
<li class="">[New] MATCH-S01055 OCSF Vulnerability Finding
<br>Passes through vulnerability findings from OCSF sources.</li>
<li class="">[Updated] THRESHOLD-S00097 Impossible Travel - Successful
<br>Exclude local system accounts from the rule.</li>
<li class="">[Updated] THRESHOLD-S00098 Impossible Travel - Unsuccessful
<br>Exclude local system accounts from the rule.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-7">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-7" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Cisco Meraki Traffic Events</li>
<li class="">[New] OCI Catch Authentication events</li>
<li class="">[New] TippingPoint TPS Cloud Catch All</li>
<li class="">[Updated] AWS GuardDuty - OCSF Finding Events
<br>Modified to support dedicated OCSF finding rules.</li>
<li class="">[Updated] AWS Inspector - OCSF Finding Events
<br>Modified to support dedicated OCSF finding rules.</li>
<li class="">[Updated] AWS Security Hub - OCSF Finding Events
<br>Modified to support dedicated OCSF finding rules.</li>
<li class="">[Updated] AWS Security Hub Coverage - OCSF Finding Events
<br>Modified to support dedicated OCSF finding rules.</li>
<li class="">[Updated] AWS Security Hub Exposure Detection - OCSF Finding Events
<br>Modified to support dedicated OCSF finding rules.</li>
<li class="">[Updated] Cisco ASA 109201|109207|113022</li>
<li class="">[Updated] Cisco ASA 722051|722022|722023|722028|722032|722033|722036|722037|722041|722011</li>
<li class="">[Updated] Kaspersky Endpoint Security Catch All</li>
<li class="">[Updated] Oracle Cloud Infrastructure Audit Catch All</li>
<li class="">[Updated] Windows - Security - 4624
<br>Added <code>user_role</code> field to identify admin users</li>
<li class="">[Updated] Windows - Security - 4648
<br>Added <code>user_role</code> field to identify admin users.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-6">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-6" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/TippingPoint/TippingPoint TPS Cloud</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ASA</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco Meraki C2C</li>
<li class="">[Updated] /Parsers/System/Kaspersky/Kaspersky Endpoint Security</li>
<li class="">[Updated] /Parsers/System/Oracle/Oracle Cloud Infrastructure Schema</li>
<li class="">[Updated] threat_ruleType
<br>Updated enforced values to include <code>ocsf</code> as an option for mappers representing Findings records as categorized in the Open Cybersecurity Schema Framework (OCSF).</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="august-27-2025---content-release">August 27, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#august-27-2025---content-release" class="hash-link" aria-label="Direct link to August 27, 2025 - Content Release" title="Direct link to August 27, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">New mappers and parsing support for additional Cisco ASA events and updates to existing Cisco ASA mappers to support additional fields.</li>
<li class="">Updates to AWS Security Hub OCSF Findings mappers to handle username alternate mappings.</li>
<li class="">Updates to McAfee Web Gateway CSV parser and mapper to support additional fields.</li>
<li class="">Fix to Sysdig Policy Detection JSON mapper to correctly map threat signal name and summary.</li>
</ul>
<p>Changes are enumerated below.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-8">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-8" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h3>
<ul>
<li class="">[New] Cisco ASA 109201|109207|113022</li>
<li class="">[New] Cisco ASA 317077|317078</li>
<li class="">[New] Cisco ASA 725016|771002</li>
<li class="">[Updated] AWS GuardDuty - OCSF Finding Events</li>
<li class="">[Updated] AWS Inspector - OCSF Finding Events</li>
<li class="">[Updated] AWS Security Hub - OCSF Finding Events</li>
<li class="">[Updated] AWS Security Hub Coverage - OCSF Finding Events</li>
<li class="">[Updated] AWS Security Hub Exposure Detection - OCSF Finding Events</li>
<li class="">[Updated] Cisco ASA 113008 JSON</li>
<li class="">[Updated] Cisco ASA 302010 JSON</li>
<li class="">[Updated] Cisco ASA 303002 JSON</li>
<li class="">[Updated] Cisco ASA 313001 JSON</li>
<li class="">[Updated] Cisco ASA 50000(4|3) JSON</li>
<li class="">[Updated] Cisco ASA 602303-4|602101</li>
<li class="">[Updated] Cisco ASA 710005|716058</li>
<li class="">[Updated] Cisco ASA 713nnn JSON</li>
<li class="">[Updated] Cisco ASA 722034</li>
<li class="">[Updated] Cisco ASA 722051|722022|722023|722028|722032|722033|722036|722037|722041 JSON</li>
<li class="">[Updated] Cisco ASA 733100|734001|737005|737017|737036|737029|746014|746015|746016 JSON</li>
<li class="">[Updated] Cisco ASA 751023|725001|725002|725003|725006|725007|750001|750003|750006|750007|751022 JSON</li>
<li class="">[Updated] Cisco ASA Network events</li>
<li class="">[Updated] McAfee WebGateway - Parser</li>
<li class="">[Updated] Sysdig Policy Detection JSON</li>
</ul>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-7">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-7" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h3>
<ul>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ASA</li>
<li class="">[Updated] /Parsers/System/McAfee/McAfee Web Gateway CSV</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="august-20-2025---content-release">August 20, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#august-20-2025---content-release" class="hash-link" aria-label="Direct link to August 20, 2025 - Content Release" title="Direct link to August 20, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes new log mappers to cover additional security finding sources collected via AWS Security Hub.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-9">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-9" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] AWS GuardDuty - OCSF Finding Events</li>
<li class="">[New] AWS Inspector - OCSF Finding Events</li>
<li class="">[New] AWS Security Hub Coverage - OCSF Finding Events</li>
<li class="">[New] AWS Security Hub Exposure Detection - OCSF Finding Events</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="august-19-2025---application-update">August 19, 2025 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#august-19-2025---application-update" class="hash-link" aria-label="Direct link to August 19, 2025 - Application Update" title="Direct link to August 19, 2025 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-taxii-2-threat-intelligence-sources">New TAXII 2 Threat Intelligence Sources<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#new-taxii-2-threat-intelligence-sources" class="hash-link" aria-label="Direct link to New TAXII 2 Threat Intelligence Sources" title="Direct link to New TAXII 2 Threat Intelligence Sources" translate="no">​</a></h4>
<p>We're excited to announce the following new threat intelligence sources that allow you to collect TAXII feeds with greater ease. These sources are based on the underlying code of our STIX/TAXII 2 Client Source, but are tailored for each of the vendors to facilitate setup:</p>
<ul>
<li class="">CISA TAXII Client</li>
<li class="">Dragos TAXII Client</li>
<li class="">Nozomi TAXII Client</li>
<li class="">Recorded Future TAXII Client</li>
<li class="">Unit42 TAXII Client</li>
</ul>
<p>When you set up a source, search for "taxii" and select the tile for the source you want to install:<br><img src="https://www.sumologic.com/help/img/security/taxii-sources.png" alt="TAXII sources" style="border:1px solid gray" width="800"></p>
<p><a class="" href="https://www.sumologic.com/help/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/stix-taxii-2-client-source/#taxii-2-sources">Learn more</a>.</p>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="august-15-2025---content-release">August 15, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#august-15-2025---content-release" class="hash-link" aria-label="Direct link to August 15, 2025 - Content Release" title="Direct link to August 15, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">New product support for Vectra AI.</li>
<li class="">Updated parsers and log mappers for Azure Event Hub, Barracuda CloudGen Firewall, Microsoft IIS, and Surepass.</li>
<li class="">Updated Surepass to the correct vendor name.</li>
</ul>
<p>Changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-10">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-10" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Vectra AI Catch All</li>
<li class="">[New] Vectra AI User Login</li>
<li class="">[Updated] Azure Event Hub - Windows Defender Logs<!-- -->
<ul>
<li class="">Updated field mappings to include new fields.</li>
</ul>
</li>
<li class="">[Updated] Barracuda CloudGen Firewall Activity<!-- -->
<ul>
<li class="">Updated <code>event_id</code> criteria to handle abridged event types in some logs.</li>
</ul>
</li>
<li class="">[Updated] Microsoft IIS Parser - Catch All<!-- -->
<ul>
<li class="">Updated to support <code>http_url</code> and downstream enrichment.</li>
</ul>
</li>
<li class="">[Updated] Surepass Authentication</li>
<li class="">[Updated] Surepass Catch All</li>
<li class="">[Updated] Surepass Network Event</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-8">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-8" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Vectra/Vectra AI</li>
<li class="">[Updated] /Parsers/System/Barracuda/Barracuda CloudGen<!-- -->
<ul>
<li class="">Updated <code>event_id</code> criteria to handle abridged event types in some logs and to support additional log formats.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Cylance/Cylance Syslog<!-- -->
<ul>
<li class="">Updated timestamp parsing.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/DocuSign/DocuSign Monitor<!-- -->
<ul>
<li class="">Updated timestamp parsing.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Microsoft/Microsoft Azure JSON<!-- -->
<ul>
<li class="">Updated parser to parse additional nested fields.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Microsoft/Microsoft IIS<!-- -->
<ul>
<li class="">Updated to form <code>http_url</code> for downstream enrichment.</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="august-01-2025---content-release">August 01, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#august-01-2025---content-release" class="hash-link" aria-label="Direct link to August 01, 2025 - Content Release" title="Direct link to August 01, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">New rules to assist in detection of the ToolShell exploit against Microsoft SharePoint Server (CVE-2025-53770, CVE-2025-53771) and other web shell attack activity.</li>
<li class="">Updates to rules.</li>
<li class="">Parsing support for Open Cybersecurity Schema Framework (OCSF) logging.<!-- -->
<ul>
<li class="">Designed to support AWS Security Hub Findings via OCSF, but broadly compatible with other OCSF data sources.</li>
</ul>
</li>
<li class="">Mapping support for AWS Security Hub Findings via OCSF.<!-- -->
<ul>
<li class="">AWS Security Hub via OCSF mapping support includes mappers which can be easily cloned and repurposed to support additional sources of data which use OCSF. Not all OCSF categories and classes are necessarily pertinent to AWS Security Hub data produced at this time.</li>
<li class="">Additional mappers for OCSF data sources will be added in future releases.</li>
</ul>
</li>
<li class="">Updates to AWS Security Hub (non-OCSF) mapper to reduce signal volume by using a less granular field for <code>threat_signalName</code> and to map general resources into <code>resource</code> field.</li>
<li class="">New mappers for Citrix NetScaler and Palo Alto Firewall events.</li>
<li class="">Updates to existing mappers/parsers for AWS, Azure, Citrix NetScaler, Linux Sysmon, Windows Sysmon, and Zscaler to support additional events and field mappings.</li>
<li class="">Allows <code>resource</code> to be used as an entity in rules.</li>
</ul>
<p>Other changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-5">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#rules-5" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S01050 IIS - Executable File Added to Directory<!-- -->
<ul>
<li class="">Executable files added to Microsoft Internet Information Server (IIS) directories can indicate the installation of a web shell by an attacker. For example, the ToolShell exploit (CVE-2025-53770, CVE-2025-53771) included the installation of spinstall10.aspx in an executable directory.</li>
</ul>
</li>
<li class="">[New] MATCH-S01051 SharePoint Server ToolShell Exploitation (CVE-2025-53770, CVE-2025-53771)<!-- -->
<ul>
<li class="">Exploits against two vulnerabilities in Microsoft SharePoint server, CVE-2025-53770 and CVE-2025-53771, are combined to execute code on Microsoft SharePoint without authentication. This attack has been nicknamed "ToolShell".</li>
</ul>
</li>
<li class="">[New] MATCH-S01052 SharePoint Server ToolShell Web Shell Interaction (CVE-2025-53771)<!-- -->
<ul>
<li class="">Exploits against two vulnerabilities in Microsoft SharePoint server, CVE-2025-53770 and CVE-2025-53771, are combined to execute code on Microsoft SharePoint without authentication. This attack has been nicknamed "ToolShell".</li>
</ul>
</li>
<li class="">[Updated] MATCH-S00402 Normalized Security Signal<!-- -->
<ul>
<li class="">Adjusted summary to remove <code>{{device_hostname}}</code> to avoid <code>null</code> values for blank hostnames.</li>
<li class="">Added <code>resource</code> to entity selector</li>
</ul>
</li>
<li class="">[Updated] MATCH-S00061 Zscaler - Allowed Elevated Risk Score Events<!-- -->
<ul>
<li class="">Updated rule expression and severity score to use normalized fields.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-11">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-11" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] AWS Security Hub - OCSF Finding Events</li>
<li class="">[New] AWS Security Hub - Application Activity *</li>
<li class="">[New] AWS Security Hub - Authentication Event*</li>
<li class="">[New] AWS Security Hub - DHCP Activity*</li>
<li class="">[New] AWS Security Hub - DNS Activity*</li>
<li class="">[New] AWS Security Hub - Discovery Event*</li>
<li class="">[New] AWS Security Hub - Email Activity*</li>
<li class="">[New] AWS Security Hub - File System events*</li>
<li class="">[New] AWS Security Hub - HTTP Activity*</li>
<li class="">[New] AWS Security Hub - IAM Account change|Authorize Session|Entity Management|User Access Management|Group Management*</li>
<li class="">[New] AWS Security Hub - Kernel Extension Activity|Kernel Activity|Memory Activity|Module Activity|Scheduled Job Activity|Process Activity|Event Log Activity|Script Activity*</li>
<li class="">[New] AWS Security Hub - Network Activity|RDP Activity|SMB Activity|SMB Activity|SSH Activity|FTP Activity|NTP Activity|Tunnel Activity|Network Remediation Activity*</li>
<li class="">[New] AWS Security Hub - Remediation Activity|Process Remediation Activity*</li>
<li class="">[New] AWS Security Hub - Unmanned Systems*</li>
<li class="">[New] Citrix NetScaler - AAA-AUTH-REQ</li>
<li class="">[New] Palo Alto Audit Authentication logs</li>
<li class="">[New] Palo Alto Audit Catch All</li>
<li class="">[Updated] AWS Security Hub</li>
<li class="">[Updated] Azure Event Hub - Windows Defender Audit file events</li>
<li class="">[Updated] Citrix NetScaler - AAA-LOGIN_FAILED</li>
<li class="">[Updated] Citrix NetScaler - Command Executed</li>
<li class="">[Updated] Citrix NetScaler - MESSAGE</li>
<li class="">[Updated] Citrix NetScaler - SSL Handshake Success</li>
<li class="">[Updated] Citrix NetScaler - SSLVPN-LOGIN</li>
<li class="">[Updated] Keeper Authentication</li>
<li class="">[Updated] Keeper Catch All</li>
<li class="">[Updated] Mimecast AV Event</li>
<li class="">[Updated] Mimecast Email logs</li>
<li class="">[Updated] Linux-Sysmon/Operational - 11<!-- -->
<ul>
<li class="">Added more normalized fields</li>
</ul>
</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 11<!-- -->
<ul>
<li class="">Added more normalized fields.</li>
</ul>
</li>
<li class="">[Updated] Zscaler - Nanolog Streaming Service - JSON<!-- -->
<ul>
<li class="">Added normalizedAction for allow/deny actions and alternate values for IPs.</li>
</ul>
</li>
</ul>
<p>* Security Hub via OCSF is currently limited to the OCSF Findings category. Additional mappers are in place to support potential future Security Hub events that utilize other OCSF categories and classes. These can be cloned and repurposed to support additional sources of data which use OCSF.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-9">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-9" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Deleted] /Parsers/System/Mindpoint Group/Mindpoint SurePass<!-- -->
<ul>
<li class="">Updated erroneous vendor name in parser.</li>
<li class="">Any existing references to this parser path will need to be updated to the new parser path.</li>
</ul>
</li>
<li class="">[New] /Parsers/System/Keeper/Keeper<!-- -->
<ul>
<li class="">New parser for Keeper with correct vendor name.</li>
</ul>
</li>
<li class="">[New] /Parsers/System/OCSF/OCSF</li>
<li class="">[New] /Parsers/System/SurePass/SurePass<!-- -->
<ul>
<li class="">New parser path for Surepass to reflect correct vendor name.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Mindpoint Group/Mindpoint Group Keeper<!-- -->
<ul>
<li class="">Updated parser to point to new parser path with correct vendor name.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Microsoft/Office 365<!-- -->
<ul>
<li class="">Updated to fix issue with <code>normalizedLogon</code> field not being populated correctly.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Citrix/Citrix NetScaler Syslog<!-- -->
<ul>
<li class="">Updated header regex, added support for new events, and added new time format.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Palo Alto/PAN Firewall CSV<!-- -->
<ul>
<li class="">Updated to handle new log formats and fields.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="schema">Schema<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#schema" class="hash-link" aria-label="Direct link to Schema" title="Direct link to Schema" translate="no">​</a></h4>
<ul>
<li class="">[Updated] resource<!-- -->
<ul>
<li class="">Enables <code>resource</code> as an entity.</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="july-09-2025---content-release">July 09, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#july-09-2025---content-release" class="hash-link" aria-label="Direct link to July 09, 2025 - Content Release" title="Direct link to July 09, 2025 - Content Release" translate="no">​</a></h3>
<p>This release includes:</p>
<ul>
<li class="">Rule bug fix.</li>
<li class="">New device support for Aruba WAP, Oracle Cloud Infrastructure, and Mindpoint SurePass.</li>
<li class="">Updated mapper alternate values for Cloudflare Logpush.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-6">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#rules-6" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] LEGACY-S00005 Possible Black Energy Command and Control<!-- -->
<ul>
<li class="">Corrected rule expression for rootDomain to use correct schema field name.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-12">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-12" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Aruba WAP</li>
<li class="">[New] Oracle Cloud Infrastructure Audit Catch All</li>
<li class="">[New] Surepass Authentication</li>
<li class="">[New] Surepass Cath All</li>
<li class="">[New] Surepass Network Event</li>
<li class="">[Updated] Cloudflare - Logpush</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-10">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-10" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/HP/Aruba WAP</li>
<li class="">[New] /Parsers/System/Mindpoint Group/Mindpoint SurePass</li>
<li class="">[New] /Parsers/System/Oracle/Oracle Cloud Infrastructure</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="june-26-2025---content-release">June 26, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#june-26-2025---content-release" class="hash-link" aria-label="Direct link to June 26, 2025 - Content Release" title="Direct link to June 26, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">Device support for AWS VPN and VMware Avi Load Balancer.</li>
<li class="">Updates to Cisco ASA and Umbrella parsers to support additional log pattern variations.</li>
<li class="">Bug fix for year timestamp parsing with the potential of creating incorrect timestamps around the new year for records.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-13">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-13" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] AWS VPN</li>
<li class="">[New] VMware Avi Load Balancer Catch All</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-11">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-11" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/AWS/AWS VPN</li>
<li class="">[New] /Parsers/System/VMware/VMware Avi Load Balancer</li>
<li class="">[Updated] /Parsers/System/Atlassian/Atlassian Audit Events</li>
<li class="">[Updated] /Parsers/System/Microsoft/Azure Storage Analytics</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ASA</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco Umbrella CSV</li>
<li class="">[Updated] /Parsers/System/Cylance/Cylance Syslog</li>
<li class="">[Updated] /Parsers/System/Cylance/Cylance Threat JSON</li>
<li class="">[Updated] /Parsers/System/JumpCloud/JumpCloud Directory Insights</li>
<li class="">[Updated] /Parsers/System/Miro/Miro Audit C2C</li>
<li class="">[Updated] /Parsers/System/Palo Alto/PAN Firewall LEEF</li>
<li class="">[Updated] /Parsers/System/Pulse Secure/Pulse Secure Appliance</li>
<li class="">[Updated] /Parsers/System/RSA/RSA SecurID SinglePoint</li>
<li class="">[Updated] /Parsers/System/Symantec/Symantec Endpoint Protection/Symantec Endpoint Protection-Syslog</li>
<li class="">[Updated] /Parsers/System/Tanium/Tanium CEF</li>
<li class="">[Updated] /Parsers/System/Trellix/Trellix MVision EPO</li>
<li class="">[Updated] /Parsers/System/Twistlock/Twistlock</li>
<li class="">[Updated] /Parsers/System/Zeek/Zeek</li>
<li class="">[Updated] /Parsers/System/Zscaler/Zscaler Nanolog Streaming Service/Zscaler Nanolog Streaming Service-CEF</li>
<li class="">[Updated] /Parsers/System/Zscaler/Zscaler Nanolog Streaming Service/Zscaler Nanolog Streaming Service-JSON</li>
<li class="">[Updated] /Parsers/System/Zscaler/Zscaler Nanolog Streaming Service/Zscaler Nanolog Streaming Service-LEEF</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="june-12-2025---content-release">June 12, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#june-12-2025---content-release" class="hash-link" aria-label="Direct link to June 12, 2025 - Content Release" title="Direct link to June 12, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">New detection rules for browser extension persistence, Kerberos certificate authentication, GitHub vulnerability alerts, Okta application access monitoring, and threat intelligence email matching.</li>
<li class="">New product support for Atlassian audit and login events.</li>
<li class="">Enhanced Azure Event Hub Windows Defender integration with new threat event mapping for passthrough alerts.</li>
<li class="">Cisco ASA updates with new network event support and NAT IP handling improvements.</li>
<li class="">Citrix NetScaler mapping updates to support additional events.</li>
<li class="">Update to Auth0 successful/unsuccessful login mappings to properly classify each.</li>
<li class="">CrowdStrike NextGen SIEM Alert event support.</li>
<li class="">Mimecast security event mapping improvements across several event types.</li>
<li class="">AWS CloudTrail network event enhancements with event success/failure handling and protocol support.</li>
<li class="">Parser updates to support additional event formats for multiple platforms.</li>
</ul>
<p>Changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-7">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#rules-7" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00897 Chromium Extension Installed<!-- -->
<ul>
<li class="">Threat actors may install browser extensions as a form of persistence on victim systems. Look up the 32 character extension ID in order to ensure that the extension is valid and expected to be installed as part of normal business operations. This extension ID can be found in the following values: <code>file_path</code> and/or <code>changeTarget</code> depending on the source of the telemetry. This rule logic utilizes Sysmon file creation events, which need to be enabled and configured on relevant assets.</li>
</ul>
</li>
<li class="">[New] FIRST-S00064 First Seen Certificate Thumbprint in Successful Kerberos Authentication<!-- -->
<ul>
<li class="">This alert looks for a first seen certificate thumbprint being used to authenticate to an Active Directory environment, resulting in a Kerberos ticket being successfully issued. This alert is designed to catch Active Directory Certificate Services related attacks, ensure the certificate thumprint is valid, correlate the thumbprint ID with other Certificate Services events, particularly looking for recently issued templates.</li>
</ul>
</li>
<li class="">[New] MATCH-S00949 GitHub - Vulnerability Alerts<!-- -->
<ul>
<li class="">Detects vulnerability alerts created for a GitHub repository.</li>
</ul>
</li>
<li class="">[New] FIRST-S00070 Okta - First Seen Application Accessed by User<!-- -->
<ul>
<li class="">This signal looks for a user that is accessing an application behind Okta SSO that is first seen since the baseline period. Ensure that access of this application is expected and authorized, look for other Okta events around the user account in question to determine whether access to this application is expected and authorized.</li>
</ul>
</li>
<li class="">[New] AGGREGATION-S00007 Okta - Session Anomaly (Multiple Operating Systems)<!-- -->
<ul>
<li class="">This rule detects when a user has utilized multiple distinct operating systems when performing authentication through Okta. This activity could potentially indicate credential theft or a general session anomaly. Examine other Okta related events surrounding the time period for this signal, pivoting off the username value to examine if any other suspicious activity has taken place. If this rule is generating false positives, adjust the threshold value and consider excluding certain user accounts via tuning expression or a match list.</li>
</ul>
</li>
<li class="">[New] MATCH-S01020 Threat Intel - Matched Target Email<!-- -->
<ul>
<li class="">Detects email addresses associated with known malicious actor(s) or campaign(s) as designated by a threat intelligence provider.</li>
</ul>
</li>
<li class="">[New] MATCH-S01019 Threat Intel - Matched User Email<!-- -->
<ul>
<li class="">Detects email addresses associated with known malicious actor(s) or campaign(s) as designated by a threat intelligence provider.</li>
</ul>
</li>
<li class="">[Updated] MATCH-S00170 Windows - Scheduled Task Creation<!-- -->
<ul>
<li class="">Fixed spelling error.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-14">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-14" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Altassian audit events</li>
<li class="">[New] Altassian login events</li>
<li class="">[New] Azure Event Hub - Windows Defender Azure Alert</li>
<li class="">[New] Cisco ASA 4180(18|19|44)</li>
<li class="">[New] Cisco ASA 713nnn JSON</li>
<li class="">[New] Cisco ASA Network events</li>
<li class="">[New] Citrix NetScaler - SSL Handshake Failure</li>
<li class="">[New] CrowdStrike NextGen SIEM</li>
<li class="">[Updated] Auth0 Failed Authentication</li>
<li class="">[Updated] Auth0 Successful Authentication</li>
<li class="">[Updated] Azure Event Hub - Windows Defender Logs</li>
<li class="">[Updated] Cisco ASA 106010 JSON</li>
<li class="">[Updated] Cisco ASA 20900(4|5) JSON</li>
<li class="">[Updated] Cisco ASA 50000(4|3) JSON</li>
<li class="">[Updated] Citrix NetScaler - TCP Connection</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - All Network Events</li>
<li class="">[Updated] F5 HTTP Request</li>
<li class="">[Updated] Mimecast AV Event</li>
<li class="">[Updated] Mimecast Audit Authentication Logs</li>
<li class="">[Updated] Mimecast Audit Hold Messages</li>
<li class="">[Updated] Mimecast Audit Logs</li>
<li class="">[Updated] Mimecast DLP Logs</li>
<li class="">[Updated] Mimecast Email logs</li>
<li class="">[Updated] Mimecast Impersonation Event</li>
<li class="">[Updated] Mimecast Spam Event</li>
<li class="">[Updated] Mimecast Targeted Threat Protection Logs</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-12">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-12" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Atlassian/Atlassian Audit Events</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ASA</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco Umbrella CSV</li>
<li class="">[Updated] /Parsers/System/Citrix/Citrix NetScaler Syslog</li>
<li class="">[Updated] /Parsers/System/AWS/CloudTrail</li>
<li class="">[Updated] /Parsers/System/CrowdStrike/CrowdStrike Falcon Endpoint - JSON</li>
<li class="">[Updated] /Parsers/System/F5/F5 Syslog</li>
<li class="">[Updated] /Parsers/System/Microsoft/Microsoft Azure JSON</li>
<li class="">[Updated] /Parsers/System/Microsoft/Windows-JSON-Open Telemetry</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="june-02-2025---application-update">June 02, 2025 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#june-02-2025---application-update" class="hash-link" aria-label="Direct link to June 02, 2025 - Application Update" title="Direct link to June 02, 2025 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-method-for-building-baselines">New method for building baselines<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#new-method-for-building-baselines" class="hash-link" aria-label="Direct link to New method for building baselines" title="Direct link to New method for building baselines" translate="no">​</a></h4>
<p>We're happy to announce that now when you create or update a first seen or outlier rule, the baseline starts building immediately using existing system data. Typically, the baseline is ready within minutes. You no longer need to wait days for a baseline learning period to complete before it becomes usable. This change enables you to gain insights faster and iterate on your first seen and outlier rules rapidly, reducing tuning time from weeks to minutes.</p>
<p>To learn more, see our information about baselines for <a class="" href="https://www.sumologic.com/help/docs/cse/rules/write-first-seen-rule/">first seen rules</a> and <a class="" href="https://www.sumologic.com/help/docs/cse/rules/write-outlier-rule/#baselines-for-outlier-rules">outlier rules</a>.</p>
<div class="theme-admonition theme-admonition-note alert alert--secondary admonition_WoCw"><div class="admonitionHeading_TMsN"><span class="admonitionIcon_Ibzs"><svg viewBox="0 0 14 16"><path fill-rule="evenodd" d="M6.3 5.69a.942.942 0 0 1-.28-.7c0-.28.09-.52.28-.7.19-.18.42-.28.7-.28.28 0 .52.09.7.28.18.19.28.42.28.7 0 .28-.09.52-.28.7a1 1 0 0 1-.7.3c-.28 0-.52-.11-.7-.3zM8 7.99c-.02-.25-.11-.48-.31-.69-.2-.19-.42-.3-.69-.31H6c-.27.02-.48.13-.69.31-.2.2-.3.44-.31.69h1v3c.02.27.11.5.31.69.2.2.42.31.69.31h1c.27 0 .48-.11.69-.31.2-.19.3-.42.31-.69H8V7.98v.01zM7 2.3c-3.14 0-5.7 2.54-5.7 5.68 0 3.14 2.56 5.7 5.7 5.7s5.7-2.55 5.7-5.7c0-3.15-2.56-5.69-5.7-5.69v.01zM7 .98c3.86 0 7 3.14 7 7s-3.14 7-7 7-7-3.12-7-7 3.14-7 7-7z"></path></svg></span>note</div><div class="admonitionContent_vXIg"><p>This feature update applies only to new and changed first seen and outlier rules. Unchanged existing rules will continue to use their existing baselines.</p></div></div>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-30-2025---content-release">May 30, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#may-30-2025---content-release" class="hash-link" aria-label="Direct link to May 30, 2025 - Content Release" title="Direct link to May 30, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">Rule updates.</li>
<li class="">New log parsers and mappers to support Akamai CPC and Contrast Security ADR.</li>
<li class="">New and updated log mappers for Azure Event Hub - Windows Defender logs, Cisco ISE, Microsoft Office 365, and Snowflake.</li>
<li class="">Modifications to existing parsers for Microsoft Azure JSON, Nginx Syslog, and Snowflake to support additional formats and events.</li>
</ul>
<p>Changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-8">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#rules-8" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00068 O365 - Users Password Changed<!-- -->
<ul>
<li class="">Updated entity selectors to include both <code>user_username</code> and <code>targetUser_username</code></li>
</ul>
</li>
<li class="">[Updated] MATCH-S00069 O365 - Users Password Reset<!-- -->
<ul>
<li class="">Updated entity selectors to include both <code>user_username</code> and <code>targetUser_username</code></li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-15">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-15" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Akamai CPC</li>
<li class="">[New] Azure Event Hub - Windows Defender Audit events</li>
<li class="">[New] Azure Event Hub - Windows Defender Audit file events</li>
<li class="">[New] Azure Event Hub - Windows Defender Authentication events</li>
<li class="">[New] Azure Event Hub - Windows Defender Email events</li>
<li class="">[New] Azure Event Hub - Windows Defender Endpoint Process events</li>
<li class="">[New] Azure Event Hub - Windows Defender Network events</li>
<li class="">[New] Contrast Security ADR Default Mapping</li>
<li class="">[New] Snowflake Query History</li>
<li class="">[New] Snowflake Session</li>
<li class="">[Updated] Azure Event Hub - Windows Defender Logs - DeviceAlertEvents</li>
<li class="">[Updated] Azure Event Hub - Windows Defender Logs and Azure Alert</li>
<li class="">[Updated] Cisco ISE Catch All</li>
<li class="">[Updated] Microsoft Office 365 Active Directory Authentication Events</li>
<li class="">[Updated] Snowflake Catch All</li>
<li class="">[Updated] Snowflake Login</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-13">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-13" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Akamai/Akamai CPC</li>
<li class="">[New] /Parsers/System/Contrast Security/Contrast ADR</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ISE</li>
<li class="">[Updated] /Parsers/System/Microsoft/Microsoft Azure JSON</li>
<li class="">[Updated] /Parsers/System/Nginx/Nginx Syslog</li>
<li class="">[Updated] /Parsers/System/Microsoft/Office 365</li>
<li class="">[Updated] /Parsers/System/Snowflake/Snowflake</li>
<li class="">[Updated] /Parsers/System/Microsoft/Windows PowerShell-JSON</li>
<li class="">[Updated] /Parsers/System/Microsoft/Windows-JSON-Open Telemetry</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-23-2025----content-release">May 23, 2025  - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#may-23-2025----content-release" class="hash-link" aria-label="Direct link to May 23, 2025  - Content Release" title="Direct link to May 23, 2025  - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">Rule update</li>
<li class="">New support for CommScope Ruckus SmartZone</li>
<li class="">Additional mappers for CrowdStrike FDR, Google G Suite (Workspace), and Windows PowerShell</li>
<li class="">Updates for existing mappers for CrowdStrike FDR, Google G Suite (Workspace), and Windows PowerShell<!-- -->
<ul>
<li class="">Added normalizedAction and action fields to Windows PowerShell mappers</li>
</ul>
</li>
<li class="">Changes to Windows PowerShell JSON parsing to support additional log formats</li>
</ul>
<p>Changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-9">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#rules-9" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00068 O365 - Users Password Changed<!-- -->
<ul>
<li class="">Updated to use targetUser_username</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-16">Log mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-16" class="hash-link" aria-label="Direct link to Log mappers" title="Direct link to Log mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] CommScope Ruckus SmartZone Default</li>
<li class="">[New] CrowdStrike FDR - DNSRequest</li>
<li class="">[New] Google G Suite - login - risky_sensitive_action_allowed</li>
<li class="">[New] Google G Suite - login challange</li>
<li class="">[New] Windows - Windows PowerShell</li>
<li class="">[Updated] CrowdStrike Falcon Host API DetectionSummaryEvent (CNC)<!-- -->
<ul>
<li class="">Added alternate field for threat_name</li>
</ul>
</li>
<li class="">[Updated] CrowdStrike Falcon Host API IdpDetectionSummaryEvent (CNC)<!-- -->
<ul>
<li class="">Added alternate field for threat_name</li>
</ul>
</li>
<li class="">[Updated] Google G Suite - login - password_change/recovery_info_change<!-- -->
<ul>
<li class="">Added additional mapped fields</li>
</ul>
</li>
<li class="">[Updated] Google G Suite - login.login<!-- -->
<ul>
<li class="">Added additional mapped fields</li>
</ul>
</li>
<li class="">[Updated] Google G Suite - logout<!-- -->
<ul>
<li class="">Added additional mapped fields</li>
</ul>
</li>
<li class="">[Updated] Windows - Microsoft-Windows-PowerShell/Operational - 4103</li>
<li class="">[Updated] Windows - Microsoft-Windows-PowerShell/Operational - 4104</li>
<li class="">[Updated] Windows - Microsoft-Windows-PowerShell/Operational - 4105</li>
<li class="">[Updated] Windows - Microsoft-Windows-PowerShell/Operational - 4106</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-14">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-14" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/CommScope/CommScope Ruckus SmartZone</li>
<li class="">[Updated] /Parsers/System/Microsoft/Windows PowerShell-JSON</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-09-2025---content-release">May 09, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#may-09-2025---content-release" class="hash-link" aria-label="Direct link to May 09, 2025 - Content Release" title="Direct link to May 09, 2025 - Content Release" translate="no">​</a></h3>
<p>This release includes:</p>
<ul>
<li class="">New rules for monitoring AWS services (see below for tuning guidance).</li>
<li class="">Updated rules for Microsoft O365 and Powershell.</li>
<li class="">Updates to Cisco ASA mappers to add normalizedAction and normalizedSeverity.</li>
<li class="">Updates to Cisco Umbrella mappers to add user_username.</li>
<li class="">Updates to SentinelOne mappers to drop null values.</li>
<li class="">New parsers for Azure Virtual Network and SentinelOne MGMT API.</li>
<li class="">Updates to existing parsers for Abnormal Security, Cisco ASA, Cisco ISE, Cisco Umbrella CSV, Cylance Syslog, and KnowBe4 KMSAT C2C.</li>
</ul>
<p>Changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-10">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#rules-10" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] OUTLIER-S00033 AWS DynamoDB Outlier in PutItem Events from User<!-- -->
<ul>
<li class="">[Disabled by Default] This rule detects an unusual amount of PutItem events to a DynamoDB resource within an hour time period (DynamoDB data events are required). Verify the user is authorized to modify the DynamoDB tables and instances. This rule is disabled by default due to potential volume of signals, before enabling consider excluding authorized users via match lists, and adjust floor value and model sensitivity as needed.</li>
</ul>
</li>
<li class="">[New] FIRST-S00100 First Seen User Enumerating Custom AWS Bedrock Models<!-- -->
<ul>
<li class="">[Disabled by Default] Detection of a user account's first enumeration of custom AWS Bedrock models via ListCustomModels API. Verify the user is authorized for AWS Bedrock access. The http_userAgent field indicates whether a browser or CLI tool was used. This rule is disabled by default due to potential high volume of alerts, particularly from service accounts. Before enabling, consider excluding authorized users and service accounts (such as CNAPP monitoring accounts with timestamp-based usernames) through rule tuning expressions.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00032 Outlier in Data Transferred from an S3 Bucket by User<!-- -->
<ul>
<li class="">[Disabled by Default] This rule detects an unusual amount of data transferred outbound from an S3 bucket (requires AWS Data events are required). Verify if the user, role and IP address associated with this activity are authorized. This rule is disabled by default due to potential signal volume. Before enabling, consider excluding authorized users with regular large transfers via match lists, and adjust floor value and model sensitivity as needed.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00031 Outlier in Data Transferred into an S3 Bucket by User<!-- -->
<ul>
<li class="">[Disabled by Default] Detects unusual amounts of inbound data transfers to S3 buckets (requires AWS Data events). Verify if the user, role, and IP address associated with this activity are authorized. This rule is disabled by default due to potential alert volume. Before enabling, consider excluding authorized users with regular large transfers via match lists, and adjust floor value and model sensitivity as needed.</li>
</ul>
</li>
<li class="">[Updated] MATCH-S00069 O365 - Users Password Reset<!-- -->
<ul>
<li class="">Changed Entity and Summary, replacing user_username with targetUser_username.</li>
</ul>
</li>
<li class="">[Updated] MATCH-S00449 Powershell Execution Policy Bypass<!-- -->
<ul>
<li class="">Fixed camel case in commandLine field.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-17">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-17" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Azure Virtual Network Flow logs</li>
<li class="">[Updated] Abnormal Security Threats</li>
<li class="">[Updated] Cisco ASA 103001 JSON</li>
<li class="">[Updated] Cisco ASA 103004 JSON</li>
<li class="">[Updated] Cisco ASA 106001 JSON</li>
<li class="">[Updated] Cisco ASA 106002 JSON</li>
<li class="">[Updated] Cisco ASA 106006 JSON</li>
<li class="">[Updated] Cisco ASA 106007 JSON</li>
<li class="">[Updated] Cisco ASA 106010 JSON</li>
<li class="">[Updated] Cisco ASA 106012 JSON</li>
<li class="">[Updated] Cisco ASA 106014 JSON</li>
<li class="">[Updated] Cisco ASA 106015 JSON</li>
<li class="">[Updated] Cisco ASA 106021 JSON</li>
<li class="">[Updated] Cisco ASA 106023 JSON</li>
<li class="">[Updated] Cisco ASA 106027 JSON</li>
<li class="">[Updated] Cisco ASA 106100 JSON</li>
<li class="">[Updated] Cisco ASA 106102-3 JSON</li>
<li class="">[Updated] Cisco ASA 109005-8 JSON</li>
<li class="">[Updated] Cisco ASA 110002 JSON</li>
<li class="">[Updated] Cisco ASA 111008-9 JSON</li>
<li class="">[Updated] Cisco ASA 111010 JSON</li>
<li class="">[Updated] Cisco ASA 113003 JSON</li>
<li class="">[Updated] Cisco ASA 113004 JSON</li>
<li class="">[Updated] Cisco ASA 113005 JSON</li>
<li class="">[Updated] Cisco ASA 113006 JSON</li>
<li class="">[Updated] Cisco ASA 113007 JSON</li>
<li class="">[Updated] Cisco ASA 113008 JSON</li>
<li class="">[Updated] Cisco ASA 113009 JSON</li>
<li class="">[Updated] Cisco ASA 113012-17 JSON</li>
<li class="">[Updated] Cisco ASA 113019 JSON</li>
<li class="">[Updated] Cisco ASA 113021 JSON</li>
<li class="">[Updated] Cisco ASA 113039 JSON</li>
<li class="">[Updated] Cisco ASA 209004 JSON</li>
<li class="">[Updated] Cisco ASA 302010 JSON</li>
<li class="">[Updated] Cisco ASA 302020-1 JSON</li>
<li class="">[Updated] Cisco ASA 303002 JSON</li>
<li class="">[Updated] Cisco ASA 304001 JSON</li>
<li class="">[Updated] Cisco ASA 304002 JSON</li>
<li class="">[Updated] Cisco ASA 305011-12 JSON</li>
<li class="">[Updated] Cisco ASA 313001 JSON</li>
<li class="">[Updated] Cisco ASA 313004 JSON</li>
<li class="">[Updated] Cisco ASA 313005 JSON</li>
<li class="">[Updated] Cisco ASA 314003 JSON</li>
<li class="">[Updated] Cisco ASA 315011 JSON</li>
<li class="">[Updated] Cisco ASA 322001 JSON</li>
<li class="">[Updated] Cisco ASA 322003 JSON</li>
<li class="">[Updated] Cisco ASA 338001-8+338201-4 JSON</li>
<li class="">[Updated] Cisco ASA 4000nn JSON</li>
<li class="">[Updated] Cisco ASA 402117 JSON</li>
<li class="">[Updated] Cisco ASA 402119 JSON</li>
<li class="">[Updated] Cisco ASA 405001 JSON</li>
<li class="">[Updated] Cisco ASA 405002 JSON</li>
<li class="">[Updated] Cisco ASA 406001 JSON</li>
<li class="">[Updated] Cisco ASA 406002 JSON</li>
<li class="">[Updated] Cisco ASA 419001 JSON</li>
<li class="">[Updated] Cisco ASA 419002 JSON</li>
<li class="">[Updated] Cisco ASA 500004 JSON</li>
<li class="">[Updated] Cisco ASA 502101-2 JSON</li>
<li class="">[Updated] Cisco ASA 502103 JSON</li>
<li class="">[Updated] Cisco ASA 602303-4 JSON</li>
<li class="">[Updated] Cisco ASA 605004-5 JSON</li>
<li class="">[Updated] Cisco ASA 609002 JSON</li>
<li class="">[Updated] Cisco ASA 611101-2 JSON</li>
<li class="">[Updated] Cisco ASA 611103 JSON</li>
<li class="">[Updated] Cisco ASA 710002-3 JSON</li>
<li class="">[Updated] Cisco ASA 710005 JSON</li>
<li class="">[Updated] Cisco ASA 713052 JSON</li>
<li class="">[Updated] Cisco ASA 713172 JSON</li>
<li class="">[Updated] Cisco ASA 713228 JSON</li>
<li class="">[Updated] Cisco ASA 716014-7-8 JSON</li>
<li class="">[Updated] Cisco ASA 716038 JSON</li>
<li class="">[Updated] Cisco ASA 716039 JSON</li>
<li class="">[Updated] Cisco ASA 716059 JSON</li>
<li class="">[Updated] Cisco ASA 719022-3 JSON</li>
<li class="">[Updated] Cisco ASA 721016-8 JSON</li>
<li class="">[Updated] Cisco ASA 722034 JSON</li>
<li class="">[Updated] Cisco ASA 722051 JSON</li>
<li class="">[Updated] Cisco ASA 722055 JSON</li>
<li class="">[Updated] Cisco ASA 733100 JSON</li>
<li class="">[Updated] Cisco ASA 751011 JSON</li>
<li class="">[Updated] Cisco ASA 751023 JSON</li>
<li class="">[Updated] Cisco ASA 751025 JSON</li>
<li class="">[Updated] Cisco ASA tcp_udp_sctp_builds JSON</li>
<li class="">[Updated] Cisco ASA tcp_udp_sctp_teardowns JSON</li>
<li class="">[Updated] Cisco Umbrella DNS Logs</li>
<li class="">[Updated] Cisco Umbrella IP Logs</li>
<li class="">[Updated] Cisco Umbrella Proxy Logs</li>
<li class="">[Updated] SentinelOne Logs - C2C activities</li>
<li class="">[Updated] SentinelOne Logs - C2C agents</li>
<li class="">[Updated] SentinelOne Logs - C2C alerts</li>
<li class="">[Updated] SentinelOne Logs - C2C threats</li>
<li class="">[Updated] SentinelOne Logs - C2C users</li>
<li class="">[Updated] SentinelOne Logs - Syslog Custom Parser</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-15">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-15" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Microsoft/Azure Virtual Network</li>
<li class="">[New] /Parsers/System/SentinelOne/SentinelOne MGMT API</li>
<li class="">[Updated] /Parsers/System/Abnormal Security/Abnormal Security<!-- -->
<ul>
<li class="">Updated the parser to support new events.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ASA<!-- -->
<ul>
<li class="">Updated regex to fix ASA-6-721016 events.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ISE<!-- -->
<ul>
<li class="">Updated parser to drop certain non-actionable logs.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco Umbrella CSV<!-- -->
<ul>
<li class="">Updated parser to support additional event format variations.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Cylance/Cylance Syslog<!-- -->
<ul>
<li class="">Updated parser to support new events.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/KnowBe4/KnowBe4 KMSAT C2C<!-- -->
<ul>
<li class="">Updated parser to drop phishing test events.</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-25-2025---content-release">April 25, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#april-25-2025---content-release" class="hash-link" aria-label="Direct link to April 25, 2025 - Content Release" title="Direct link to April 25, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">Fixes for Threat Intelligence rules to correct match expression syntax for hash and HTTP referrer.</li>
<li class="">Parsing and mapping updates for Microsoft Office 365 to improve target user visibility.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-11">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#rules-11" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S01009 Threat Intel - HTTP Referrer</li>
<li class="">[Updated] MATCH-S01012 Threat Intel - HTTP Referrer Root Domain</li>
<li class="">[Updated] MATCH-S00999 Threat Intel - IMPHASH Match</li>
<li class="">[Updated] MATCH-S01000 Threat Intel - MD5 Match</li>
<li class="">[Updated] MATCH-S01001 Threat Intel - PEHASH Match</li>
<li class="">[Updated] MATCH-S01003 Threat Intel - SHA1 Match</li>
<li class="">[Updated] MATCH-S01004 Threat Intel - SHA256 Match</li>
<li class="">[Updated] MATCH-S01002 Threat Intel - SSDEEP Match</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-18">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-18" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Microsoft Office 365 Active Directory Authentication Events</li>
<li class="">[Updated] Microsoft Office 365 AzureActiveDirectory Events</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-16">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-16" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Microsoft/Office 365</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-14-2025---content-release">April 14, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#april-14-2025---content-release" class="hash-link" aria-label="Direct link to April 14, 2025 - Content Release" title="Direct link to April 14, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">Additional data requirements for GitHub rules added to rule descriptions.</li>
<li class="">Spelling corrections for AWS Lambda rules.</li>
<li class="">New Slack Anomaly Event log mapper and supporting parsing changes:<!-- -->
<ul>
<li class="">Enables passthrough detection of Slack Anomaly Events using Normalized Security Signal (MATCH-S00402).</li>
<li class="">Requires parser be defined for passthrough detection.</li>
</ul>
</li>
<li class="">Updates to Sysdig parsing and mapping to support additional events.</li>
<li class="">Support for Microsoft Windows Sysmon-29 event.</li>
<li class="">Additional normalized field mappings for Microsoft Windows Sysmon events.</li>
<li class="">New <code>user_phoneNumber</code> and <code>targetUser_phoneNumber</code> schema fields.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-12">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#rules-12" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00874 AWS Lambda Function Recon</li>
<li class="">[Updated] MATCH-S00952 GitHub - Administrator Added or Invited</li>
<li class="">[Updated] MATCH-S00953 GitHub - Audit Logging Modification</li>
<li class="">[Updated] MATCH-S00954 GitHub - Copilot Seat Cancelled by GitHub</li>
<li class="">[Updated] FIRST-S00091 GitHub - First Seen Activity From Country for User</li>
<li class="">[Updated] FIRST-S00090 GitHub - First Seen Application Interacting with API</li>
<li class="">[Updated] MATCH-S00950 GitHub - Member Invitation or Addition</li>
<li class="">[Updated] MATCH-S00955 GitHub - Member Permissions Modification</li>
<li class="">[Updated] MATCH-S00956 GitHub - OAuth Application Activity</li>
<li class="">[Updated] MATCH-S00957 GitHub - Organization Transfer</li>
<li class="">[Updated] OUTLIER-S00026 GitHub - Outlier in Distinct User Agent Strings by User</li>
<li class="">[Updated] OUTLIER-S00027 GitHub - Outlier in Repository Cloning or Downloads</li>
<li class="">[Updated] MATCH-S00958 GitHub - PR Review Requirement Removed</li>
<li class="">[Updated] MATCH-S00959 GitHub - Repository Public Key Deletion</li>
<li class="">[Updated] MATCH-S00960 GitHub - Repository Transfer</li>
<li class="">[Updated] MATCH-S00961 GitHub - Repository Visibility Changed to Public</li>
<li class="">[Updated] MATCH-S00962 GitHub - Repository Visibility Permissions Changed</li>
<li class="">[Updated] MATCH-S00963 GitHub - SSH Key Created for Private Repo</li>
<li class="">[Updated] MATCH-S00964 GitHub - SSO Recovery Codes Access Activity</li>
<li class="">[Updated] MATCH-S00951 GitHub - Secret Scanning Alert</li>
<li class="">[Updated] MATCH-S00965 GitHub - Secret Scanning Potentially Disabled</li>
<li class="">[Updated] MATCH-S00966 GitHub - Two-Factor Authentication Disabled for Organization</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-19">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-19" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Slack Anomaly Event</li>
<li class="">[New] Windows - Microsoft-Windows-Sysmon/Operational - 16</li>
<li class="">[New] Windows - Microsoft-Windows-Sysmon/Operational - 19|20</li>
<li class="">[New] Windows - Microsoft-Windows-Sysmon/Operational-29</li>
<li class="">[Updated] Sysdig Secure Packages</li>
<li class="">[Updated] Sysdig Secure Vulnerability</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 1</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 2</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 3</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 4</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 5</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 6</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 7</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 8</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 9</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 10</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 11</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 15</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 17</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 18</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 23</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 24</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 26</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 27</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-17">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-17" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Slack/Slack Enterprise Audit</li>
<li class="">[Updated] /Parsers/System/Sysdig/Sysdig Secure</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="schema-1">Schema<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#schema-1" class="hash-link" aria-label="Direct link to Schema" title="Direct link to Schema" translate="no">​</a></h4>
<ul>
<li class="">[New] <code>targetUser_phoneNumber</code></li>
<li class="">[New] <code>user_phoneNumber</code></li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-08-2025---application-update">April 08, 2025 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#april-08-2025---application-update" class="hash-link" aria-label="Direct link to April 08, 2025 - Application Update" title="Direct link to April 08, 2025 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-threat-intelligence-source">New Threat Intelligence Source<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#new-threat-intelligence-source" class="hash-link" aria-label="Direct link to New Threat Intelligence Source" title="Direct link to New Threat Intelligence Source" translate="no">​</a></h4>
<p>We’re excited to announce a new default source for Sumo Logic Threat Intelligence incorporating Indicators of Compromise (IoC) from Intel 471.</p>
<p>For more information, <a class="" href="https://www.sumologic.com/help/release-notes-service/2025/12/31/#april-08-2025-security">see our release note</a> in the <em>Service</em> release notes section.</p>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-03-2025---content-release">April 03, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#april-03-2025---content-release" class="hash-link" aria-label="Direct link to April 03, 2025 - Content Release" title="Direct link to April 03, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes new and updated log mappers and parsers for Bitwarden, CommScope, Mimecast, and Sysdig Secure. Updates to Mimecast mappers are to support additional fields and events with new log parser.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-20">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-20" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Bitwarden Authentication</li>
<li class="">[New] Bitwarden Catch All</li>
<li class="">[New] CommScope Authentication Event</li>
<li class="">[New] CommScope STP and DHCPC Event</li>
<li class="">[New] CommScope System|Security</li>
<li class="">[New] Sysdig Secure Packages</li>
<li class="">[New] Sysdig Secure Vulnerability</li>
<li class="">[Updated] Mimecast AV Event</li>
<li class="">[Updated] Mimecast Audit Authentication Logs</li>
<li class="">[Updated] Mimecast Audit Hold Messages</li>
<li class="">[Updated] Mimecast Audit Logs</li>
<li class="">[Updated] Mimecast DLP Logs</li>
<li class="">[Updated] Mimecast Email logs</li>
<li class="">[Updated] Mimecast Impersonation Event</li>
<li class="">[Updated] Mimecast Spam Event</li>
<li class="">[Updated] Mimecast Targeted Threat Protection Logs</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-18">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-18" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Bitwarden/Bitwarden</li>
<li class="">[New] /Parsers/System/CommScope/CommScope</li>
<li class="">[New] /Parsers/System/Mimecast/Mimecast</li>
<li class="">[New] /Parsers/System/Sysdig/Sysdig Secure</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="march-24-2025---content-release">March 24, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#march-24-2025---content-release" class="hash-link" aria-label="Direct link to March 24, 2025 - Content Release" title="Direct link to March 24, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes Threat Intelligence match rules that use the new <a class="" href="https://www.sumologic.com/help/docs/cse/rules/cse-rules-syntax/#hasthreatmatch"><code>hasThreatMatch</code></a> operator to support both global and custom threat intelligence feeds.</p>
<p>To reduce initial signal volume, basic inbound and outbound IP address threat match rules with a low or medium confidence level are disabled by default (see below). We highly recommend tuning these rules before enabling them to reduce signal volume, and therefore entity risk assignment, to manageable levels.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-13">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#rules-13" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">MATCH-S00999 Threat Intel - IMPHASH Match</li>
<li class="">MATCH-S01000 Threat Intel - MD5 Match</li>
<li class="">MATCH-S01001 Threat Intel - PEHASH Match</li>
<li class="">MATCH-S01002 Threat Intel - SSDEEP Match</li>
<li class="">MATCH-S01003 Threat Intel - SHA1 Match</li>
<li class="">MATCH-S01004 Threat Intel - SHA256 Match</li>
<li class="">MATCH-S01005 Threat Intel - Source Hostname</li>
<li class="">MATCH-S01006 Threat Intel - Device Hostname</li>
<li class="">MATCH-S01007 Threat Intel - Destination Device Hostname</li>
<li class="">MATCH-S01008 Threat Intel - HTTP Hostname</li>
<li class="">MATCH-S01009 Threat Intel - HTTP Referrer Hostname</li>
<li class="">MATCH-S01010 Threat Intel - DNS Query Domain</li>
<li class="">MATCH-S01011 Threat Intel - DNS Reply Domain</li>
<li class="">MATCH-S01012 Threat Intel - HTTP Referrer Domain</li>
<li class="">MATCH-S01013 Threat Intel - HTTP URL Root Domain</li>
<li class="">MATCH-S01014 Threat Intel - HTTP URL FQDN</li>
<li class="">MATCH-S01015 Threat Intel - HTTP URL</li>
<li class="">MATCH-S01025 Threat Intel - Inbound Traffic from Threat Feed IP (Low Confidence) - Disabled By Default</li>
<li class="">MATCH-S01026 Threat Intel - Destination IP Address (Low Confidence) - Disabled By Default</li>
<li class="">MATCH-S01027 Threat Intel - Inbound Traffic from Threat Feed IP (Medium Confidence) - Disabled By Default</li>
<li class="">MATCH-S01028 Threat Intel - Destination IP Address (Medium Confidence) - Disabled By Default</li>
<li class="">MATCH-S01023 Threat Intel - Inbound Traffic from Threat Feed IP (High Confidence)</li>
<li class="">MATCH-S01024 Threat Intel - Destination IP Address (High Confidence)</li>
<li class="">MATCH-S01018 Threat Intel - Successful Authentication from Threat Feed IP</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="march-18-2025---content-release">March 18, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#march-18-2025---content-release" class="hash-link" aria-label="Direct link to March 18, 2025 - Content Release" title="Direct link to March 18, 2025 - Content Release" translate="no">​</a></h3>
<p>This release includes::</p>
<ul>
<li class="">Updates to parsing and mapping for Airtable and Windows Defender to support additional events and field mappings.</li>
<li class="">New parsing and mapping for VMware ESXi.</li>
<li class="">Updates to Baracuda Firewall and System Event mapping for normalizedSeverity lookup translation.</li>
</ul>
<p>Changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-21">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-21" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Airtable Audit C2C Authentication</li>
<li class="">[New] VMware ESXi Authentication</li>
<li class="">[New] VMware ESXi Catch All</li>
<li class="">[New] Windows Defender Catch All</li>
<li class="">[Updated] Airtable Audit C2C Catch All</li>
<li class="">[Updated] Barracuda Network Firewall Event|Web Firewall Event|Access Firewall Event</li>
<li class="">[Updated] Barracuda System Event</li>
<li class="">[Updated] Windows Defender ATP Alert<!-- -->
<ul>
<li class="">Enables additional passthrough alerts.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-19">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-19" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/VMware/VMware ESXi</li>
<li class="">[Updated] /Parsers/System/Airtable/Airtable Audit C2C</li>
<li class="">[Updated] /Parsers/System/Microsoft/Windows Defender ATP Alert JSON</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="march-13-2025---content-release">March 13, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#march-13-2025---content-release" class="hash-link" aria-label="Direct link to March 13, 2025 - Content Release" title="Direct link to March 13, 2025 - Content Release" translate="no">​</a></h3>
<p>This release includes:</p>
<ul>
<li class="">New detection rules for Azure DevOps to identify suspicious or sensitive activity in CI/CD pipelines</li>
<li class="">New support for Barracuda WAF and CloudGen Firewall</li>
<li class="">Support for CyberArk Audit events</li>
<li class="">Updates to 1Password mappers to realign field mappings to reflect proper directionality</li>
<li class="">Fix for normalizedActions in AWS CloudTrail Policy Change mapper</li>
<li class="">Additions to CrowdStrike Audit and UserActivity log mappers to map additional fields and add alternate values</li>
<li class="">Support for additional events from Kubernetes and Linux OS logs</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-14">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#rules-14" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] CHAIN-S00022 Azure DevOps - Agent Pool Created and Deleted within a Short Period<!-- -->
<ul>
<li class="">This detection monitors for the creation and deletion of Agent Pools within 5 days by the same user, with the intent of finding Agent Pools active for short durations.</li>
</ul>
</li>
<li class="">[New] MATCH-S00997 Azure DevOps - Browser Observed in Personal Access Token (PAT) Use<!-- -->
<ul>
<li class="">This detection monitors for the use of a PAT for authentication from a User Agent String indicating a web browser.</li>
</ul>
</li>
<li class="">[New] MATCH-S00995 Azure DevOps - Change Made to Administrator Group<!-- -->
<ul>
<li class="">This detection monitors for additions to the following groups: Project Administrators, Project Collection Administrators, Project Collection Service Accounts, Build Administrators, Project Collection Build Administrators</li>
</ul>
</li>
<li class="">[New] FIRST-S00098 Azure DevOps - First Seen Pull Request Policy Bypassed<!-- -->
<ul>
<li class="">This detection monitors for when a user performs a pull request bypass for the first time.</li>
</ul>
</li>
<li class="">[New] FIRST-S00099 Azure DevOps - First Seen User Creating Agent Pool<!-- -->
<ul>
<li class="">This detection monitors for new users creating an agent pool. This user has not been observed creating agent pools during the baseline period and may be a new admin or involved in suspicious account activity.</li>
</ul>
</li>
<li class="">[New] FIRST-S00092 Azure DevOps - First Seen User Creating Release Pipeline<!-- -->
<ul>
<li class="">This detection monitors for users creating a release pipeline for the first time after the baseline period (by default, 90 days).</li>
</ul>
</li>
<li class="">[New] FIRST-S00097 Azure DevOps - First Seen User Modifying Build Variables<!-- -->
<ul>
<li class="">This detection monitors for a user modifying a variable group for the first time.</li>
</ul>
</li>
<li class="">[New] FIRST-S00096 Azure DevOps - First Seen User Modifying Release Pipeline<!-- -->
<ul>
<li class="">This detection monitors for users modifying a release pipeline for the first time after the baseline period (by default, 90 days).</li>
</ul>
</li>
<li class="">[New] MATCH-S00998 Azure DevOps - Known Malicious Tooling Detected ADOKit<!-- -->
<ul>
<li class="">This is a simple detection matching on “ADOKit” at the start of the HTTP User Agent String (UAS). This detection effectively catches basic ADOKit use. It is brittle to attackers changing the User Agent String to another more innocuous browser to mask the traffic.</li>
</ul>
</li>
<li class="">[New] MATCH-S00994 Azure DevOps - Member Added to Sensitive Group<!-- -->
<ul>
<li class="">This detection monitors for changes to the following groups: Project Administrators, Project Collection Administrators, Project Collection Service Accounts, Build Administrator</li>
</ul>
</li>
<li class="">[New] FIRST-S00095 Azure DevOps - New Agent OS Added to Agent Pool<!-- -->
<ul>
<li class="">This detection monitors for the addition of an agent to an agent pool when the OS of the agent has not been observed in this pool during the baseline period.</li>
</ul>
</li>
<li class="">[New] FIRST-S00094 Azure DevOps - New Extension Installed<!-- -->
<ul>
<li class="">This detection monitors for new extensions installed organization-wide after a 30-day baseline, based on the user installing the new extension.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00030 Azure DevOps - Outlier in Pools Deleted Rapidly<!-- -->
<ul>
<li class="">This detection identifies statistical outliers in user behavior for the number of pools deleted in an hourly window.</li>
</ul>
</li>
<li class="">[New] MATCH-S00996 Azure DevOps - Personal Access Token (PAT) Misuse Observed<!-- -->
<ul>
<li class="">This detection monitors for use of a Personal Access Token in conjunction with categories of action that aren’t normally associated with PAT authentication.</li>
</ul>
</li>
<li class="">[New] CHAIN-S00021 Azure DevOps - Pipeline Created and Deleted within a Short Period<!-- -->
<ul>
<li class="">This detection monitors for the creation and deletion of the same pipeline within a short period (by default, a day).</li>
</ul>
</li>
<li class="">[New] MATCH-S00993 Azure DevOps - Pipeline Retention Settings Reduced<!-- -->
<ul>
<li class="">This detection monitors for any reduction in the pipeline retention settings.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-22">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-22" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Barracuda Authentication</li>
<li class="">[New] Barracuda Catch All</li>
<li class="">[New] Barracuda CloudGen Auth Service dcclient and events</li>
<li class="">[New] Barracuda CloudGen Firewall Activity</li>
<li class="">[New] Barracuda CloudGen Settings DNS</li>
<li class="">[New] Barracuda Network Firewall Event|Web Firewall Event|Access Firewall Event</li>
<li class="">[New] Barracuda System Event</li>
<li class="">[New] CyberArk Audit Authentication</li>
<li class="">[New] CyberArk Audit Catch All</li>
<li class="">[Updated] 1Password Item Audit Actions</li>
<li class="">[Updated] 1Password Item Usage Actions</li>
<li class="">[Updated] 1Password Item Usage C2C</li>
<li class="">[Updated] 1Password Signin C2C</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - Policy Change</li>
<li class="">[Updated] CrowdStrike Audit Logs</li>
<li class="">[Updated] CrowdStrike Falcon Host API DetectionSummaryEvent</li>
<li class="">[Updated] CrowdStrike Falcon Host API DetectionSummaryEvent (CNC)</li>
<li class="">[Updated] CrowdStrike UserActivity Logs</li>
<li class="">[Updated] Linux OS Syslog - Process sshd - SSH Auth Failure</li>
<li class="">[Updated] Linux OS Syslog - Process sshd - SSH Bind Listening and negotiate event</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-20">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-20" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Barracuda/Barracuda CloudGen</li>
<li class="">[New] /Parsers/System/Barracuda/Barracuda WAF</li>
<li class="">[New] /Parsers/System/Cyber-Ark/CyberArk Audit</li>
<li class="">[Updated] /Parsers/System/Kubernetes/Kubernetes</li>
<li class="">[Updated] /Parsers/System/Linux/Linux OS Syslog</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="march-10-2025---application-update">March 10, 2025 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#march-10-2025---application-update" class="hash-link" aria-label="Direct link to March 10, 2025 - Application Update" title="Direct link to March 10, 2025 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="strict-signal-configuration">Strict signal configuration<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#strict-signal-configuration" class="hash-link" aria-label="Direct link to Strict signal configuration" title="Direct link to Strict signal configuration" translate="no">​</a></h4>
<p>We're happy to announce that now when you create custom insights, you can select an option to generate insights only on those signals defined in your custom insight. Any additional signals related to the applicable entity are excluded. This allows you to generate insights for an immediate and targeted response.</p>
<p><a class="" href="https://www.sumologic.com/help/docs/cse/records-signals-entities-insights/configure-custom-insight/#for-only-signals-defined-in-the-custom-insight">Learn more</a>.</p>
<img src="https://www.sumologic.com/help/img/cse/strict-signal-configuration-checkbox.png" alt="Strict Signal Configuration checkbox" style="border:1px solid gray" width="400">
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="march-03-2025---application-update">March 03, 2025 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#march-03-2025---application-update" class="hash-link" aria-label="Direct link to March 03, 2025 - Application Update" title="Direct link to March 03, 2025 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="threat-intelligence">Threat Intelligence<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#threat-intelligence" class="hash-link" aria-label="Direct link to Threat Intelligence" title="Direct link to Threat Intelligence" translate="no">​</a></h4>
<p>We’re excited to introduce Sumo Logic Threat Intelligence, a powerful feature set that enables Cloud SIEM administrators to seamlessly import indicators of Compromise (IoC) files and feeds directly into Sumo Logic to aid in security analysis.</p>
<p>For more information, <a class="" href="https://www.sumologic.com/help/release-notes-service/2025/12/31/#march-03-2025-security">see our release note</a> in the <em>Service</em> release notes section.</p>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="february-27-2025---content-release">February 27, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#february-27-2025---content-release" class="hash-link" aria-label="Direct link to February 27, 2025 - Content Release" title="Direct link to February 27, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes updates to mapping and parsing to support additional AWS CloudTrail, F5 Firewall, and modify behavior in Microsoft Office 365 login events.</p>
<p>Changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-23">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-23" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] CloudTrail Batch get Partition</li>
<li class="">[New] F5 Tmm Audit and APMD Audit - Custom Parser</li>
<li class="">[New] F5 Session and adfs proxy - Custom Parser</li>
<li class="">[Updated] F5 SSHD and Apmd - Custom Parser<!-- -->
<ul>
<li class="">Expands scope of existing mapper to include Apmd events.</li>
</ul>
</li>
<li class="">[Updated] Microsoft Office 365 Active Directory Authentication Events<!-- -->
<ul>
<li class="">Adds exclusion for invalid user ID <code>00000000-0000-0000-0000-000000000000</code>.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-21">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-21" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/F5/F5 Syslog</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="february-20-2025---content-release">February 20, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#february-20-2025---content-release" class="hash-link" aria-label="Direct link to February 20, 2025 - Content Release" title="Direct link to February 20, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes updates to Netskope Security Cloud log parsers and mappers to ensure anomaly events are properly mapped by adjusting parser logic to map event IDs from varying locations depending on event type.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-24">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-24" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Netskope - Anomaly - Bulk Download</li>
<li class="">[Updated] Netskope - Anomaly - User Shared Credentials</li>
<li class="">[Updated] Netskope - nspolicy</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-22">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-22" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Netskope/Netskope Security Cloud JSON</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="february-14-2025---content-release">February 14, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#february-14-2025---content-release" class="hash-link" aria-label="Direct link to February 14, 2025 - Content Release" title="Direct link to February 14, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes new and updated mappers and parsers for Carbon Black, Cisco ISE, Cisco Umbrella, PAN Firewall CSV and LEEF, and Signal Science (Fastly) WAF.</p>
<p>Changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-25">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-25" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Carbon Black Cloud - alert event</li>
<li class="">[Updated] Cisco ISE Radius Diagnostics<!-- -->
<ul>
<li class="">Supports additional Radius Diagnostic messages.</li>
</ul>
</li>
<li class="">[Updated] Cisco Umbrella DNS Logs<!-- -->
<ul>
<li class="">Adds <code>dstDevice_ip</code>, <code>normalizedAction</code>, and <code>user_email</code>.</li>
</ul>
</li>
<li class="">[Updated] Cisco Umbrella IP Logs<!-- -->
<ul>
<li class="">Adds alternate value for <code>dstDevice_ip</code> and adds <code>user_email</code>.</li>
</ul>
</li>
<li class="">[Updated] Cisco Umbrella Proxy Logs<!-- -->
<ul>
<li class="">Adds <code>user_email</code>.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-23">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-23" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/VMware/Carbon Black Cloud<!-- -->
<ul>
<li class="">Adds support for alert event event ID.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ISE<!-- -->
<ul>
<li class="">Adds key value parsing for descriptions.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco Umbrella CSV<!-- -->
<ul>
<li class="">Adds a transform for capturing email addresses.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Palo Alto/PAN Firewall CSV<!-- -->
<ul>
<li class="">Modifies <code>parse_system_format_1</code> regular expression to support additional events.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Palo Alto/PAN Firewall LEEF<!-- -->
<ul>
<li class="">Normalizes parsing of subtype to have consistent case.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Signal Science/Signal Science WAF<!-- -->
<ul>
<li class="">Adds additional timestamp handling.</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="january-31-2025---content-release">January 31, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#january-31-2025---content-release" class="hash-link" aria-label="Direct link to January 31, 2025 - Content Release" title="Direct link to January 31, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">Removal and updates to Cloud SIEM rules.</li>
<li class="">Parsing and mapping support for new products.</li>
<li class="">Updates to existing parsing and mappers to support additional events and field mappings.</li>
</ul>
<p>Changes are enumerated below.</p>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-15">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#rules-15" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h3>
<ul>
<li class="">[Deleted] MATCH-S00604 OneLogin - API Credentials - Key Used from Untrusted Location</li>
<li class="">[Updated] FIRST-S00044 First Seen AppID Generating MailItemsAccessed Event from User<!-- -->
<ul>
<li class="">Corrected typo in "MailItemsAccessed".</li>
</ul>
</li>
<li class="">[Updated] FIRST-S00046 First Seen Client Generating MailItemsAccessed Event from User<!-- -->
<ul>
<li class="">Corrected typo in "MailItemsAccessed".</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-26">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-26" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Crowdstrike FileVantage Catch All</li>
<li class="">[New] Dragos Communication</li>
<li class="">[New] Dragos Indicator</li>
<li class="">[New] Dragos System|Asset</li>
<li class="">[New] Extrahop JSON Catch All</li>
<li class="">[New] F5 TMM Http Request|TMM Network|TMM Connection error</li>
<li class="">[New] F5 TMSH - Custom Parser</li>
<li class="">[New] Zendesk - Login events</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="updated-field-mappings">Updated Field Mappings<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#updated-field-mappings" class="hash-link" aria-label="Direct link to Updated Field Mappings" title="Direct link to Updated Field Mappings" translate="no">​</a></h5>
<ul>
<li class="">[Updated] Code42 Incydr Alerts C2C</li>
<li class="">[Updated] Cyber Ark EPM AggregateEvent</li>
<li class="">[Updated] Google G Suite - meet</li>
<li class="">[Updated] Palo Alto GlobalProtect - Custom Parser</li>
<li class="">[Updated] Palo Alto GlobalProtect Auth - Custom Parser</li>
<li class="">[Updated] Zendesk Catch All</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-24">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-24" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/CrowdStrike/CrowdStrike Filevantage</li>
<li class="">[New] /Parsers/System/Extrahop/Extrahop JSON</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="updated-parsers-to-handle-additional-events-and-field-parsing">Updated parsers to handle additional events and field parsing<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#updated-parsers-to-handle-additional-events-and-field-parsing" class="hash-link" aria-label="Direct link to Updated parsers to handle additional events and field parsing" title="Direct link to Updated parsers to handle additional events and field parsing" translate="no">​</a></h5>
<ul>
<li class="">[Updated] /Parsers/System/Code42/Code42 Incydr</li>
<li class="">[Updated] /Parsers/System/Dragos/Dragos</li>
<li class="">[Updated] /Parsers/System/F5/F5 Syslog</li>
<li class="">[Updated] /Parsers/System/Microsoft/Microsoft Azure JSON</li>
<li class="">[Updated] /Parsers/System/Microsoft/Office 365</li>
<li class="">[Updated] /Parsers/System/Palo Alto/PAN Firewall CSV</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="january-28-2025---content-release">January 28, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#january-28-2025---content-release" class="hash-link" aria-label="Direct link to January 28, 2025 - Content Release" title="Direct link to January 28, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">Fix to Azure DevOps Auditing mapper to ensure only Azure DevOps logs are mapped by it when ingested via Event Hubs C2C.</li>
<li class="">Adds parsing and mapping support for additional OpenVPN events.</li>
<li class="">Adds additional timestamp format handling to Azure JSON log parsing.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-27">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-27" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Azure DevOps Auditing Catch All</li>
<li class="">[Updated] OpenVPN Audit Event</li>
<li class="">[Updated] OpenVPN Network Event</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-25">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-25" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Microsoft/Microsoft Azure JSON</li>
<li class="">[Updated] /Parsers/System/OpenVPN/OpenVPN Syslog</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="january-14-2025---content-release">January 14, 2025 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#january-14-2025---content-release" class="hash-link" aria-label="Direct link to January 14, 2025 - Content Release" title="Direct link to January 14, 2025 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">Parsing and mapping support for Azure DevOps Auditing via EventHubs, and Pfsense Firewall.</li>
<li class="">Parsing and mapping additions and updates for Cisco ISE, Cloudflare, Check Point Firewall, and Linux OS Syslog.</li>
</ul>
<div class="theme-admonition theme-admonition-note alert alert--secondary admonition_WoCw"><div class="admonitionHeading_TMsN"><span class="admonitionIcon_Ibzs"><svg viewBox="0 0 14 16"><path fill-rule="evenodd" d="M6.3 5.69a.942.942 0 0 1-.28-.7c0-.28.09-.52.28-.7.19-.18.42-.28.7-.28.28 0 .52.09.7.28.18.19.28.42.28.7 0 .28-.09.52-.28.7a1 1 0 0 1-.7.3c-.28 0-.52-.11-.7-.3zM8 7.99c-.02-.25-.11-.48-.31-.69-.2-.19-.42-.3-.69-.31H6c-.27.02-.48.13-.69.31-.2.2-.3.44-.31.69h1v3c.02.27.11.5.31.69.2.2.42.31.69.31h1c.27 0 .48-.11.69-.31.2-.19.3-.42.31-.69H8V7.98v.01zM7 2.3c-3.14 0-5.7 2.54-5.7 5.68 0 3.14 2.56 5.7 5.7 5.7s5.7-2.55 5.7-5.7c0-3.15-2.56-5.69-5.7-5.69v.01zM7 .98c3.86 0 7 3.14 7 7s-3.14 7-7 7-7-3.12-7-7 3.14-7 7-7z"></path></svg></span>note</div><div class="admonitionContent_vXIg"><p>In two weeks, MATCH-S00604 "OneLogin - API Credentials - Key Used from Untrusted Location" will be deleted from the out-of-the-box Cloud SIEM rules due to unmanageable deny list logic and low adoption. To retain this rule, a duplicate must be made prior to the deletion.</p></div></div>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-28">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#log-mappers-28" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Azure DevOps Auditing Catch All</li>
<li class="">[New] Check Point Application Control URL Filtering</li>
<li class="">[New] Cisco ISE Radius Diagnostics</li>
<li class="">[New] Linux OS Syslog - KRB5 Child - Authentication Failure</li>
<li class="">[New] Linux OS Syslog - Process systemd - Systemd Session</li>
<li class="">[New] Linux OS Syslog - Process systemd - Systemd Session Scope</li>
<li class="">[New] Linux OS Syslog - Process systemd - session logout</li>
<li class="">[New] Pfsense Firewall filterlog</li>
<li class="">[New] Pfsense Firewall nginx</li>
<li class="">[New] Pfsense Firewall openvpn Authentication</li>
<li class="">[New] Pfsense Firewall openvpn_peer_info|openvpn_error|php_log|sshguard|sshd_log</li>
<li class="">[New] Pfsense Firewall openvpn_server_connected|openvpn_server_disconnected|cron_log</li>
<li class="">[Updated] Cisco ISE Authentication Failure<!-- -->
<ul>
<li class="">Adds <code>normalizedSeverity</code> mapping</li>
</ul>
</li>
<li class="">[Updated] Cisco ISE Authentication Success<!-- -->
<ul>
<li class="">Adds <code>normalizedSeverity</code> mapping</li>
</ul>
</li>
<li class="">[Updated] Cloudflare - Logpush<!-- -->
<ul>
<li class="">Adds mapping for <code>dns_query</code>, <code>http_hostname</code>, <code>http_response_contentLength</code>, <code>http_response_contentType</code>, and an alternative value for <code>ipProtocol</code>.</li>
</ul>
</li>
<li class="">[Updated] Linux OS Syslog - Process sshd - SSH Session Closed|disconnect<!-- -->
<ul>
<li class="">Adds mapping for <code>normalizedAction</code></li>
</ul>
</li>
<li class="">[Updated] Linux OS Syslog - Process systemd - Systemd Session Start and Systemd File Configuration<!-- -->
<ul>
<li class="">Added support for additional events and mapping of <code>file_path</code></li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-26">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2025/12/31/#parsers-26" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Pfsense/Pfsense Firewall</li>
<li class="">[Updated] /Parsers/System/Check Point/Check Point Firewall JSON</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ISE</li>
<li class="">[Updated] /Parsers/System/Cloudflare/Cloudflare Logpush</li>
<li class="">[Updated] /Parsers/System/Linux/Linux OS Syslog</li>
<li class="">[Updated] /Parsers/System/Linux/Shared/Linux Shared Syslog Headers</li>
<li class="">[Updated] /Parsers/System/Linux/Shared/Linux Shared Syslog Headers</li>
</ul>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[2024 Release Notes Archive - Cloud SIEM]]></title>
            <link>https://www.sumologic.com/help/release-notes-cse/2024/12/31/</link>
            <guid>https://www.sumologic.com/help/release-notes-cse/2024/12/31/</guid>
            <pubDate>Tue, 31 Dec 2024 00:00:00 GMT</pubDate>
            <description><![CDATA[This is an archive of 2024 Cloud SIEM release notes. To view the full archive, click here. Release notes are available on our website for a rolling multi-year period. For information about older releases, contact Support.]]></description>
            <content:encoded><![CDATA[<p>This is an archive of 2024 Cloud SIEM release notes. To view the full archive, <a class="" href="https://www.sumologic.com/help/release-notes-cse/archive/">click here</a>. Release notes are available on our website for a rolling multi-year period. For information about older releases, contact <a href="https://support.sumologic.com/support/s" target="_blank" rel="noopener noreferrer" class="">Support</a>.</p>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="december-20-2024---content-release">December 20, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#december-20-2024---content-release" class="hash-link" aria-label="Direct link to December 20, 2024 - Content Release" title="Direct link to December 20, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">New product support for Dragos WorldView Threat Intelligence, Mindpoint Proactive Security Services, and Trust IAM (Identity and Access Management).</li>
<li class="">AWS Cloudtrail updates.<!-- -->
<ul>
<li class="">Adds alternate mapping for <code>user_userId</code> in anticipation of AWS Identity Center CloudTrail logging change. For more information on the change, see <a href="https://aws.amazon.com/blogs/security/modifications-to-aws-cloudtrail-event-data-of-iam-identity-center/" target="_blank" rel="noopener noreferrer" class="">Important changes to CloudTrail events for AWS IAM Identity Center</a>.</li>
</ul>
</li>
<li class="">Parsing and mapping updates for Palo Alto Firewall and Cisco Firepower.</li>
<li class="">Rule updates.</li>
</ul>
<p>Changes are are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rules" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Deleted] FIRST-S00029 First Seen Successful Authentication From Unexpected Country<!-- -->
<ul>
<li class="">Rule has been replaced by FIRST-S00065 as this version was not enabled by default.</li>
</ul>
</li>
<li class="">[Updated] FIRST-S00046 First Seen Client Generating MailIItemsAccessed Event from User<!-- -->
<ul>
<li class="">Updated "First Seen" value from ClientInfoString to Client to reduce false positives.</li>
</ul>
</li>
<li class="">[Updated] FIRST-S00065 First Seen Successful Authentication From Unexpected Country<!-- -->
<ul>
<li class="">Replaces FIRST-S00029.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Dragos Catch All</li>
<li class="">[New] Mindpoint Group Keeper Authentication</li>
<li class="">[New] Mindpoint Group Keeper Catch All</li>
<li class="">[New] Trust Login Authentication</li>
<li class="">[New] Trust Login Catch All</li>
<li class="">[Updated] CloudTrail - application-insights.amazonaws.com - ListApplications</li>
<li class="">[Updated] CloudTrail - signin.amazonaws.com - All AwsConsoleSignIn events</li>
<li class="">[Updated] CloudTrail - sso.amazonaws.com - Federate|ListProfilesForApplication</li>
<li class="">[Updated] CloudTrail Default Mapping</li>
<li class="">[Updated] Firepower Catch All<!-- -->
<ul>
<li class="">Additional new field mappings to support Firepower events and improve records classification.</li>
</ul>
</li>
<li class="">[Updated] Palo Alto Config - Custom Parser<!-- -->
<ul>
<li class="">Adds alternate field mappings.</li>
</ul>
</li>
<li class="">[Updated] Palo Alto System - Custom Parser<!-- -->
<ul>
<li class="">Adds alternate field mappings.</li>
</ul>
</li>
<li class="">[Updated] Palo Alto System Auth - Custom Parser<!-- -->
<ul>
<li class="">Support additional panorama-auth-success and alternate fields for mapped fields.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#parsers" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Dragos/Dragos</li>
<li class="">[New] /Parsers/System/Mindpoint Group/Mindpoint Group Keeper</li>
<li class="">[New] /Parsers/System/Trust Login/Trust Login</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco Firepower Syslog<!-- -->
<ul>
<li class="">Adds support for FTD 430002 and 430003 events.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Palo Alto/PAN Firewall LEEF<!-- -->
<ul>
<li class="">Adds support for 'panorama-auth-success' events and improves timestamp handling.</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="december-6-2024---content-release">December 6, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#december-6-2024---content-release" class="hash-link" aria-label="Direct link to December 6, 2024 - Content Release" title="Direct link to December 6, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release:</p>
<ul>
<li class="">Introduces new Cloud SIEM detection rules for monitoring activity and alerts from GitHub Enterprise.</li>
<li class="">New and updated log parsing and mapping support for:<!-- -->
<ul>
<li class="">AWS VPC Transit Gateways Flow Logs</li>
<li class="">Alert Logic</li>
<li class="">Google G Suite Alert Center</li>
<li class="">Microsoft Defender Advanced Hunting</li>
<li class="">Azure Provisioning, Alert, ResourceHealth, and ServiceHealth events</li>
</ul>
</li>
</ul>
<p>Changes are enumerated below.</p>
<div class="theme-admonition theme-admonition-note alert alert--secondary admonition_WoCw"><div class="admonitionHeading_TMsN"><span class="admonitionIcon_Ibzs"><svg viewBox="0 0 14 16"><path fill-rule="evenodd" d="M6.3 5.69a.942.942 0 0 1-.28-.7c0-.28.09-.52.28-.7.19-.18.42-.28.7-.28.28 0 .52.09.7.28.18.19.28.42.28.7 0 .28-.09.52-.28.7a1 1 0 0 1-.7.3c-.28 0-.52-.11-.7-.3zM8 7.99c-.02-.25-.11-.48-.31-.69-.2-.19-.42-.3-.69-.31H6c-.27.02-.48.13-.69.31-.2.2-.3.44-.31.69h1v3c.02.27.11.5.31.69.2.2.42.31.69.31h1c.27 0 .48-.11.69-.31.2-.19.3-.42.31-.69H8V7.98v.01zM7 2.3c-3.14 0-5.7 2.54-5.7 5.68 0 3.14 2.56 5.7 5.7 5.7s5.7-2.55 5.7-5.7c0-3.15-2.56-5.69-5.7-5.69v.01zM7 .98c3.86 0 7 3.14 7 7s-3.14 7-7 7-7-3.12-7-7 3.14-7 7-7z"></path></svg></span>note</div><div class="admonitionContent_vXIg"><p>First Seen Successful Authentication From Unexpected Country (FIRST-S00029), which is disabled by default, has been replaced by a rule of the same name (FIRST-S00065) which is enabled by default. FIRST-S00029 will be removed in a subsequent release in 2 weeks (week of December 16). Any tuning expressions applied to FIRST-S00029 will need to be migrated to FIRST-S00065 to continue functioning.</p></div></div>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-1">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rules-1" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00952 GitHub - Administrator Added or Invited<!-- -->
<ul>
<li class="">Detects additions or invitations of GitHub Administrators. Illegitimate addition of administrative users could be an indication of privilege escalation or persistence by adversaries.</li>
</ul>
</li>
<li class="">[New] MATCH-S00953 GitHub - Audit Logging Modification<!-- -->
<ul>
<li class="">Detects modifications to the GitHub Enterprise Audit Log. Modifications and deletions have the potential to reduce visibility of malicious activity.</li>
</ul>
</li>
<li class="">[New] MATCH-S00954 GitHub - Copilot Seat Cancelled by GitHub<!-- -->
<ul>
<li class="">Observes for GitHub staff manually revoking copilot access for a user. This action is likely to be rare and may be indicative of a user violating the <a href="https://docs.github.com/en/site-policy/acceptable-use-policies" target="_blank" rel="noopener noreferrer" class="">acceptable use policy for GitHub</a>.</li>
</ul>
</li>
<li class="">[New] FIRST-S00091 GitHub - First Seen Activity From Country for User<!-- -->
<ul>
<li class="">Detects GitHub user activity from a new country. User account compromises can be detected through unusual geolocation in some cases. To lower possible false positives, a tuning expression for expected country names or codes can be added,.</li>
</ul>
</li>
<li class="">[New] FIRST-S00090 GitHub - First Seen Application Interacting with API<!-- -->
<ul>
<li class="">Detects new application usage of the GitHub API. New applications utilizing the API may be routine, however this may also reveal malicious applications utilizing the API.</li>
</ul>
</li>
<li class="">[New] MATCH-S00950 GitHub - Member Invitation or Addition<!-- -->
<ul>
<li class="">Detects new user additions or invitations to the business or organization GitHub. New user additions/invitations should be monitored as they could be a vector for malicious actors to establish access or persistence.</li>
</ul>
</li>
<li class="">[New] MATCH-S00955 GitHub - Member Permissions Modification<!-- -->
<ul>
<li class="">Detects modifications of GitHub user permissions. Added permissions for a user should be monitored for potential privilege escalation by an adversary.</li>
</ul>
</li>
<li class="">[New] MATCH-S00956 GitHub - OAuth Application Activity<!-- -->
<ul>
<li class="">Detects OAuth application activities within GitHub. OAuth application management and access activity should be monitored for potential abuse by potential malicious actors, either by creating malicious access paths within GitHub, or destruction of GitHub infrastructure.</li>
</ul>
</li>
<li class="">[New] MATCH-S00957 GitHub - Organization Transfer<!-- -->
<ul>
<li class="">Detects transfers of an organization to another enterprise This is a sensitive activity that should be monitored to ensure organizations and their repositories are not being transferred without proper authorization.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00026 GitHub - Outlier in Distinct User Agent Strings by User<!-- -->
<ul>
<li class="">Detects an outlier in the number of distinct user agent strings for a GitHub user. Unusual user agent strings for a user account could indicate account takeover.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00028 GitHub - Outlier in Removal Actions by User<!-- -->
<ul>
<li class="">Detects a higher than usual number of removal actions undertaken by a user. This detection has a broad scope to detect any unusual number of destroy, delete, or remove actions undertaken by a user to help detect a range of different potential destructive activities in GitHub.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00027 GitHub - Outlier in Repository Cloning or Downloads<!-- -->
<ul>
<li class="">Detects an unusual number of repository clones for a user. Unusual repository cloning could indicate data exfiltration or discovery.</li>
</ul>
</li>
<li class="">[New] MATCH-S00958 GitHub - PR Review Requirement Removed<!-- -->
<ul>
<li class="">Detects GitHub pull request review requirements being removed from a repository either via branch protection rule or ruleset.</li>
</ul>
</li>
<li class="">[New] MATCH-S00959 GitHub - Repository Public Key Deletion<!-- -->
<ul>
<li class="">Detects deletions of SSH keys in GitHub. Unusual deletions could represent an adversary attempting to disrupt normal operations by denying access.</li>
</ul>
</li>
<li class="">[New] MATCH-S00960 GitHub - Repository Transfer<!-- -->
<ul>
<li class="">Detects transfers of a repository to another organization or user. This is a sensitive activity that GitHub places in the "Danger Zone" of repository setting and should be monitored to ensure no unauthorized transfers are taking place.</li>
</ul>
</li>
<li class="">[New] MATCH-S00961 GitHub - Repository Visibility Changed to Public<!-- -->
<ul>
<li class="">Detects a user making a repository public. This action should be closely monitored and mitigative actions taken even if the published repository is deleted, or reverted to private. Reference: <a href="https://trufflesecurity.com/blog/anyone-can-access-deleted-and-private-repo-data-github" target="_blank" rel="noopener noreferrer" class="">https://trufflesecurity.com/blog/anyone-can-access-deleted-and-private-repo-data-github</a></li>
</ul>
</li>
<li class="">[New] MATCH-S00962 GitHub - Repository Visibility Permissions Changed<!-- -->
<ul>
<li class="">Detects repository visibility permissions being changed to allow members of an organization to change the visibility of repositories. This activity introduces the potential for data leakage if a private or internal repository is changed to public and should be monitored to ensure no inadvertent or malicious publication of a repository.</li>
</ul>
</li>
<li class="">[New] MATCH-S00963 GitHub - SSH Key Created for Private Repo<!-- -->
<ul>
<li class="">Detects the creation of an SSH key for a private GitHub repository.  Performed maliciously, creating an SSH key could create a parallel access path for an attacker.</li>
</ul>
</li>
<li class="">[New] MATCH-S00964 GitHub - SSO Recovery Codes Access Activity<!-- -->
<ul>
<li class="">Detects activities accessing SSO recovery codes. SSO recovery codes can enable a user to bypass normal more stringent authentication routes.</li>
</ul>
</li>
<li class="">[New] MATCH-S00951 GitHub - Secret Scanning Alert<!-- -->
<ul>
<li class="">Observes for secret scanning alerts from GitHub. Secrets detected by GitHub Enterprise Cloud undergo validation by GitHub automatically, to determine whether they are actively in use, this is not surfaced in the audit log, and will require separate inspection. For more information see <a href="https://docs.github.com/en/code-security/secret-scanning/managing-alerts-from-secret-scanning/evaluating-alerts" target="_blank" rel="noopener noreferrer" class="">Evaluating alerts from secret scanning</a>.</li>
</ul>
</li>
<li class="">[New] MATCH-S00965 GitHub - Secret Scanning Potentially Disabled<!-- -->
<ul>
<li class="">Detects actions which disable or modify secret scanning policies for an organization or repository. Modifying or disabling secret scanning may lead to inadvertent leaking of credentials.</li>
</ul>
</li>
<li class="">[New] MATCH-S00966 GitHub - Two-Factor Authentication Disabled for Organization<!-- -->
<ul>
<li class="">Observes for two-factor authentication being disabled for a GitHub organization. Removing two-factor authentication requirements significantly degrades the security of the GitHub organization by permitting password only authentication.</li>
</ul>
</li>
<li class="">[Updated] THRESHOLD-S00095 Password Attack from Host<!-- -->
<ul>
<li class="">Modified the rule expression to remove the <code>srcDevice_ip</code> entity selector and the <code>isNull</code> from the rule expression for entities from the existing rule, and creates a new rule for those entities so that there are 2 versions of the rule's intent.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-1">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-1" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] AWS VPC Transit Gateways Flow Logs</li>
<li class="">[New] Alert Logic Catch All</li>
<li class="">[New] Azure ResourceHealth and ServiceHealth</li>
<li class="">[New] Google G Suite Alert Center - User Changes</li>
<li class="">[New] Microsoft Defender Advanced Hunting - Alert</li>
<li class="">[New] Microsoft Defender Advanced Hunting - Audit</li>
<li class="">[New] Microsoft Defender Advanced Hunting - Email events</li>
<li class="">[New] Microsoft Defender Advanced Hunting - Logon</li>
<li class="">[New] Microsoft Defender Advanced Hunting - Network</li>
<li class="">[Updated] Azure Event Hub - Windows Defender Logs and Azure Alert<!-- -->
<ul>
<li class="">Adds support for additional event types and field mappings.</li>
</ul>
</li>
<li class="">[Updated] Trend Micro Vision One Custom Parser<!-- -->
<ul>
<li class="">Supports additional field names.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-1">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#parsers-1" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/AWS/AWS VPC Transit Gateways Flow Logs</li>
<li class="">[New] /Parsers/System/Alert Logic/Alert Logic</li>
<li class="">[New] /Parsers/System/Microsoft/Microsoft Defender Advanced Hunting</li>
<li class="">[Updated] /Parsers/System/Trend Micro/Trend Micro Vision One<!-- -->
<ul>
<li class="">Parser updated to support additional event format.</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="november-22-2024---content-release">November 22, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#november-22-2024---content-release" class="hash-link" aria-label="Direct link to November 22, 2024 - Content Release" title="Direct link to November 22, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">New mapping support for: Qumulo Core, and Teramind Teraserver.</li>
<li class="">Updates to existing parsers for: Code42 Incydr, Palo Alto, and Okta.</li>
<li class="">Updates to the existing Okta log mappings to support a new HTTP source log formatting.</li>
<li class="">Updates to Code42 Incydr Alerts C2C mapping to support new alert log format.</li>
</ul>
<p>Changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-2">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rules-2" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Deleted] FIRST-S00031 First Seen IP Address Associated with User for a Successful Azure AD Sign In Event<!-- -->
<ul>
<li class="">Consider using FIRST-S00047 (First Seen ASN Associated with User for a Successful Azure AD Sign In Event) in its place.</li>
</ul>
</li>
<li class="">[New] THRESHOLD-S00116 Password Attack from IP<!-- -->
<ul>
<li class="">This is a fork of THRESHOLD-S00095 Password Attack to address a bug with null values causing backend issues with detection rules. Rule has been forked to ensure no null values are considered in the entity grouping.</li>
</ul>
</li>
<li class="">[Updated] FIRST-S00095 Password Attack from Host<!-- -->
<ul>
<li class="">Updates rule to remove IP entity (now handled in THRESHOLD-S00116) and ensure no null values are considered for the host entity.</li>
</ul>
</li>
<li class="">[Updated] FIRST-S00068 Okta - First Seen User Accessing Admin Application<!-- -->
<ul>
<li class="">Baseline retention window size increased from 35 days to the standard 90 day retention.</li>
<li class="">Modified the summary description to read as follows: "User: <code>{{user_username}}</code> has successfully accessed the Okta Admin Application".</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-2">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-2" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Palo Alto Threat DLP non File - Custom Parser<!-- -->
<ul>
<li class="">Mapping support added for event id pattern: threat-dlp-non-file.</li>
</ul>
</li>
<li class="">[New] Qumulo Core - Catch All</li>
<li class="">[New] Qumulo Core - Login</li>
<li class="">[New] Teramind Authentication</li>
<li class="">[New] Teramind Catch All</li>
<li class="">[New] Teramind Email</li>
<li class="">[Updated] Code42 Incydr Alerts C2C</li>
<li class="">[Updated] Okta Authentication - auth_via_AD_agent</li>
<li class="">[Updated] Okta Authentication - auth_via_mfa</li>
<li class="">[Updated] Okta Authentication - auth_via_radius</li>
<li class="">[Updated] Okta Authentication - sso</li>
<li class="">[Updated] Okta Authentication Events</li>
<li class="">[Updated] Okta Catch All</li>
<li class="">[Updated] Okta Security Threat Events</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-2">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#parsers-2" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Qumulo/Qumulo Core</li>
<li class="">[New] /Parsers/System/Salesforce/Salesforce</li>
<li class="">[New] /Parsers/System/Teramind/Teramind Teraserver</li>
<li class="">[Updated] /Parsers/System/Code42/Code42 Incydr<!-- -->
<ul>
<li class="">Transform update for a new alert log format for tenantId.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Okta/Okta<!-- -->
<ul>
<li class="">Modified event_id from eventType to event_type.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Palo Alto/PAN Firewall CSV<!-- -->
<ul>
<li class="">Additional parsing support for a new Palo Alto Threat event format.</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="november-8-2024---application-update">November 8, 2024 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#november-8-2024---application-update" class="hash-link" aria-label="Direct link to November 8, 2024 - Application Update" title="Direct link to November 8, 2024 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="cloud-siem-network-sensor-end-of-life">Cloud SIEM network sensor end-of-life<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#cloud-siem-network-sensor-end-of-life" class="hash-link" aria-label="Direct link to Cloud SIEM network sensor end-of-life" title="Direct link to Cloud SIEM network sensor end-of-life" translate="no">​</a></h4>
<p>The Sumo Logic Product Team is discontinuing our on-premise network sensor feature for Sumo Logic Cloud SIEM. The feature will no longer receive updates as of November 8, 2024, and support ends as of April 30, 2025. We fully support a customer or partner managed <a class="" href="https://www.sumologic.com/help/docs/cse/sensors/ingest-zeek-logs/">Zeek network sensor</a> as a data source for our Cloud SIEM product that will provide equivalent monitoring of your network.</p>
<p>Learn more <a class="" href="https://www.sumologic.com/help/docs/cse/sensors/network-sensor-end-of-life/">here</a>.</p>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="november-7-2024---content-release">November 7, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#november-7-2024---content-release" class="hash-link" aria-label="Direct link to November 7, 2024 - Content Release" title="Direct link to November 7, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">New detection rules.</li>
<li class="">Updates to existing detection rules to correct rule logic and reduce false positives.</li>
<li class="">New parsing and mapping support for Automox, WatchGuard Firewall, and Digital Guardian ARC.</li>
<li class="">Update to existing AWS Application Load Balancer parsing and mapping to support Connection logs.</li>
<li class="">Update to MITRE ATT&amp;CK tag schema to support ATT&amp;CK v16.0.</li>
</ul>
<p>Changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-3">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rules-3" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] CHAIN-S00018 Autorun file created after USB disk mount on host<!-- -->
<ul>
<li class="">This signal looks for a USB drive being mounted on a Windows host followed by a file creation event with the file name of "autorun.inf" within a 5-minute time frame. This activity could be indicative of an attempt at lateral movement or initial access avenues through a USB device. Ensure that the machine in question is authorized to use USB devices and look for other file creation events from this host around the same time frame.</li>
</ul>
</li>
<li class="">[New] FIRST-S00071 First Seen AWS ConsoleLogin by User<!-- -->
<ul>
<li class="">First observance of a user logging on to the Amazon AWS console. This could be indicative of new administrator onboarding, or an unauthorized access to the AWS console. Recommended to investigate the nature of the user account and the login.</li>
</ul>
</li>
<li class="">[New] FIRST-S00080 First Seen Azure Portal access by User<!-- -->
<ul>
<li class="">First observance of a user logging on to the Microsoft Azure Portal. This could be indicative of new user onboarding, or an unauthorized access to the Azure portal. Recommended to investigate the nature of the user account and the login.</li>
</ul>
</li>
<li class="">[New] FIRST-S00073 First Seen Get-ADDefaultDomainPasswordPolicy<!-- -->
<ul>
<li class="">The first observed execution of the PowerShell CMDLet Get-ADDefaultDomainPasswordPolicy on this host. This CMDLet can be used in the discovery of Windows Domain Password Policies by threat actors. Investigating the host and active users for additional activity around the time of execution is recommended.</li>
</ul>
</li>
<li class="">[New] FIRST-S00072 First Seen Group Policy Discovery Operation<!-- -->
<ul>
<li class="">This detection is a first observed execution of Windows process or PowerShell commands that can be run by users or administrators in order to gather password policy and other types of system information in an enterprise environment. The detections in this signal are based off variations found in Atomic Red Team test cases. Reference:  <a href="https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1615/T1615.md" target="_blank" rel="noopener noreferrer" class="">https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1615/T1615.md</a>. Look at the command line and parent process details of the signal in order to determine if this execution is legitimate or part of system provisioning or systems administration operations.</li>
</ul>
</li>
<li class="">[New] FIRST-S00076 First Seen Net Command Use on Host<!-- -->
<ul>
<li class="">Microsoft’s Net.exe can be used for multiple Discovery tactics, including Password Policy, Permissions, Account and Domain Trust Discovery. This detection identifies the first observance of a Net related command on a system related to these discovery tactics. It is recommended to investigate the host and user to determine if this is authorized admin activity or needs further inspection.</li>
</ul>
</li>
<li class="">[New] FIRST-S00065 First Seen Successful Authentication From Unexpected Country<!-- -->
<ul>
<li class="">First Seen rule which triggers when there are at least two successful logins from the same user with different country codes indicating possible credential theft. It is recommended to add filtering criteria to the expression to reduce false positives, such as known VPN addresses.(If degradation issues occur it is recommendation implementing tuning around your expected network.)</li>
</ul>
</li>
<li class="">[New] FIRST-S00074 First Seen driverquery execution on host<!-- -->
<ul>
<li class="">First observed execution of the driverquery command on the following device host: <code>{{device_hostname}}</code>. Driverquery is a useful command for an attacker to enumerate local device drivers to determine next steps in the attack. Vulnerability scanners and automated processes may trigger this detection. It is recommended to identify and filter these processes out using a Tuning Expression for the corresponding baseImage. On detection, investigate the host and process executing the command to assist in understanding the context of the execution.</li>
</ul>
</li>
<li class="">[New] FIRST-S00079 First Seen gpresult execution on host<!-- -->
<ul>
<li class="">This detection is first observed execution of gpresult on a host. This command may be used by attackers to access detailed password policy information in an enterprise environment. Vulnerability scanners and automated processes may trigger this detection. It is recommended to identify and filter these processes out using a Tuning Expression for the corresponding baseImage. On detection, investigate the host and process executing the command to assist in understanding the context of the execution.</li>
</ul>
</li>
<li class="">[New] FIRST-S00067 Okta - First Seen Client ID/ASN combo in successful OIDC token grant<!-- -->
<ul>
<li class="">This signal looks for a new Client ID value ( mapped to the <code>user_username</code> field ) and ASN combination being issued an OIDC token, excluding the Okta Browser Plugin and Okta Dashboard. Use the Okta admin portal and look at the "Applications" section to cross-reference the Client ID value. Ensure that the IP address that is requesting the token is known and that this operation is expected and authorized.</li>
</ul>
</li>
<li class="">[New] FIRST-S00068 Okta - First Seen User Accessing Admin Application<!-- -->
<ul>
<li class="">A user not seen since the baseline period has accessed the Okta admin application. Ensure that this user is expected to perform Okta administrative activities. If this user is expected and authroized, consider adding the user to the "Okta_Admins" match list to exclude the user from this signal.</li>
</ul>
</li>
<li class="">[New] FIRST-S00066 Okta - First Seen User Requesting Report<!-- -->
<ul>
<li class="">This signal looks for a first seen user requesting an export of an Okta report. The various Okta report types can be found in the “Reports” section of the Okta administrative portal and can include various report types such as application password help, MFA usage, and reports around user access. During the October 2023 Okta incident, threat actors downloaded reports from Okta portals to extract information regarding user contact information. Ensure that the user that is requesting such reports is authorized and that this activity is expected. If a suspicious report generation event occurs, look at the “target” element within the event to gain more detailed information as to the type of report being generated and exported.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00018 Okta - Outlier in ASNs Used to Access Applications<!-- -->
<ul>
<li class="">This signal looks for an outlier in the number of distinct autonomous system numbers (ASNs) that a particular user utilizes to access Okta resources within an hour time period. This is designed to alert on various forms of token or credential theft as well as general Okta session anomalies.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00017 Okta - Outlier in MFA Attempts Denied by User<!-- -->
<ul>
<li class="">This signal builds an hourly baseline of MFA denied events per user and triggers when an outlier in the number of denied attempts is detected. This signal is designed to trigger on MFA-fatigue type attacks. If false positives are detected, consider excluding certain users from the alerting logic or raise the minimum count value within the rule configuration.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00016 Okta - Outlier in OIDC token request failures<!-- -->
<ul>
<li class="">This signal looks for an outlier in the number of OpenID Connect (OIDC) token request failures for an Okta client application. Use the Okta admin portal to correlate the Client ID (mapped to <code>user_username</code>) to determine what application is being targeted. Pivot off the Client ID and IP address values to examine the raw Okta events in order to ensure that this activity is planned and expected. This activity can occur during setup and development of Okta applications and integrations.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00013 Outlier in Data Outbound Per Day by Admin or Sensitive Device<!-- -->
<ul>
<li class="">A larger than typical amount of data has been observed being sent outbound from a Sensitive Device or an Admin user. It is recommended to investigate the device associated with this IP, the Internet destinations, and traffic associated with this anomalous behavior. A normalized record search for the source IP and external network traffic within the period of time of the detection will help identify suspicious activity. This rule is dependent on the Match Lists "domain_controllers" and "admin_usernames" being populated with the sensitive device IPs and admin usernames. Additionally, Entity Tagging offers a similar and extensible alternative to Match Lists. To add more sensitive Match Lists or Entity Tagging, use Rule Tuning Expressions. For further customization, consider adjusting the severity of this rule and/or using entity severity as needed to increase the severity of this rule.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00015 Outlier in Data Outbound Per Hour by Admin or Sensitive Device<!-- -->
<ul>
<li class="">A larger than typical amount of data has been observed being sent outbound from a Sensitive Device or an Admin user. It is recommended to investigate the device associated with this IP, the Internet destinations, and traffic associated with this anomalous behavior. A normalized record search for the source IP and external network traffic within the period of time of the detection will help identify suspicious activity. This rule is dependent on the Match Lists "domain_controllers" and "admin_usernames" being populated with the sensitive device IPs and admin usernames. Additionally, Entity Tagging offers a similar and extensible alternative to Match Lists. To add more sensitive Match Lists or Entity Tagging, use Rule Tuning Expressions. For further customization, consider adjusting the severity of this rule and/or using entity severity as needed to increase the severity of this rule.</li>
</ul>
</li>
<li class="">[Updated] THRESHOLD-S00095 Password Attack<!-- -->
<ul>
<li class="">Added NULL exclusion to rule expression to prevent false-positives stemming from NULL IP or hostnames.</li>
</ul>
</li>
<li class="">[Updated] MATCH-S00556 Outbound Data Transfer Protocol Over Non-standard Port<!-- -->
<ul>
<li class="">Added missing parenthesis to match expression.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-3">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-3" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] AWS - Application Load Balancer - Connection</li>
<li class="">[New] Automox - Audit logs</li>
<li class="">[New] Automox - Audit logs - Logon</li>
<li class="">[New] Automox - Event logs</li>
<li class="">[New] Digital Guardian ARC - Audit Events</li>
<li class="">[New] Digital Guardian ARC - Mail</li>
<li class="">[New] Digital Guardian ARC - Network</li>
<li class="">[New] Digital Guardian ARC - User Login|Logoff</li>
<li class="">[New] Watchguard Fireware - Firewall</li>
<li class="">[New] Watchguard Fireware - http/https-proxy</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-3">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#parsers-3" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Automox/Automox</li>
<li class="">[New] /Parsers/System/Digital Guardian/Digital Guardian ARC</li>
<li class="">[New] /Parsers/System/WatchGuard/WatchGuard Fireware</li>
<li class="">[Updated] /Parsers/System/AWS/AWS ALB<!-- -->
<ul>
<li class="">Updated parser to support AWS Application Load Balancer Connection logs</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="october-31-2024---content-release">October 31, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#october-31-2024---content-release" class="hash-link" aria-label="Direct link to October 31, 2024 - Content Release" title="Direct link to October 31, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">New Detection rules for Github Enterprise Audit.</li>
<li class="">New Detection rules for Okta identity and access management.</li>
<li class="">Updated parser and mappers for Cisco Meraki firewall, and Cisco Meraki Flows:<!-- -->
<ul>
<li class="">Updated the pattern lookup for: action, normalized action, and success.</li>
</ul>
</li>
<li class="">Updated log mappers for Github Enterprise Audit:<!-- -->
<ul>
<li class="">Updated the name of the product and the internal ID that corresponds to it.</li>
</ul>
</li>
<li class="">Updated parser for Github Enterprise Audit time handling.</li>
<li class="">New parsers and mappers for Apache HTTP server and Kandji EDR.</li>
<li class="">Other changes enumerated below.</li>
</ul>
<p>Please be advised that rule FIRST-S00031 (First Seen IP Address Associated with User for a Successful Azure AD Sign In Event) is not performing as intended and will be decommissioned in a forthcoming release. Please use FIRST-S00047 (First Seen ASN Associated with User for a Successful Azure AD Sign In Event) which provides an accurate and less sensitive detection point.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-4">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rules-4" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00922 AWS Bedrock Agent Created.<!-- -->
<ul>
<li class="">This rule detects when an AWS Bedrock Agent has been created in the environment.
Bedrock Agents can be configured with various parameters to build AI applications.</li>
</ul>
</li>
<li class="">[New] MATCH-S00924 AWS Bedrock Guardrail Deleted.<!-- -->
<ul>
<li class="">AWS Bedrock Guardrails provide users with the ability to configure options like filtering out harmful content or defining denied topics for models. Guardrails also allow the blocking of sensitive information such as PII. Ensure that this deletion was performed by an authorized user during an expected change.</li>
</ul>
</li>
<li class="">[New] MATCH-S00923 AWS Bedrock Model Invocation Denied for User.<!-- -->
<ul>
<li class="">A user has attempted to invoke a model via AWS Bedrock for which access was denied due to a permission issue. This event can be a normal occurrence for a user who has not been provisioned the proper IAM resources for AWS Bedrock.</li>
</ul>
</li>
<li class="">[New] MATCH-S00921 AWS Bedrock Model Invocation Logging Configuration Change Observed.<!-- -->
<ul>
<li class="">An AWS Bedrock Model invocation logging configuration change was observed. Ensure that this activity is expected and authorized.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00024 AWS DynamoDB Outlier in GetItem Events from User.<!-- -->
<ul>
<li class="">An outlier in GetItem events to a DynamoDB resource within an hour time period has been detected. Ensure that the user performing these actions has business justification for modifying DynamoDB tables and instances.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00025 AWS S3 Outlier in PutObject Denied Events<!-- -->
<ul>
<li class="">This rule utilizes an hourly baseline to detect an outlier in the number of denied PutObject access events to an S3 bucket. AWS Data events are necessary for this signal to function.</li>
</ul>
</li>
<li class="">[New] MATCH-S00390 Attempted Credential Dump From Registry Via Reg.Exe<!-- -->
<ul>
<li class="">Monitors for use of reg.exe with parameters indicating the attempted export of hashed credentials.
Audit Object Access (success and failure) must be enabled for this rule to function.</li>
</ul>
</li>
<li class="">[New] MATCH-S00896 Azure Authentication Policy Change<!-- -->
<ul>
<li class="">Various authentication related policy configurations exist within Azure. These are tenant-wide policy changes that affect aspects such as enabling of number matching, changing of which authentication methods users are allowed to use, or the exclusion of certain groups from various authentication methods.</li>
</ul>
</li>
<li class="">[New] MATCH-S00525 Credential Dumping Via Copy Command From Shadow Copy<!-- -->
<ul>
<li class="">This rule detects credential dumping using copy command from a shadow copy.</li>
</ul>
</li>
<li class="">[New] FIRST-S00084 First Seen AWS Bedrock API Call from User<!-- -->
<ul>
<li class="">This rule looks for a first seen AWS Bedrock API call from a user since the baseline period. Ensure the user in question is authorized to utilize AWS Bedrock services.</li>
</ul>
</li>
<li class="">[New] FIRST-S00062 First Seen IP Address Connecting to Active Directory Certificate Services Process<!-- -->
<ul>
<li class="">This alert looks at Windows Filtering Platform Events and flags when a first seen IP address connects to the certificate services process. This can be indictive of enumeration of certificate templates which can potentially lead to forged certificates and privilege escalation avenues.</li>
</ul>
</li>
<li class="">[New] FIRST-S00086 First Seen IP Address Performing Trufflehog AWS Credential Verification<!-- -->
<ul>
<li class="">Trufflehog is a tool that can be utilized to find and verify secrets. When Trufflehog locates AWS credentials, it attempts to validate them using the GetCallerIdentity API call. This signal looks for the default Trufflehog User Agent within CloudTrail telemetry, combined with the GetCallerIdentity API call occurring from an IP address not seen since the baseline period.</li>
</ul>
</li>
<li class="">[New] FIRST-S00081 First Seen Model ID in AWS Bedrock Put Entitlement by User<!-- -->
<ul>
<li class="">A first seen model id was observed in AWS Bedrock. The PutFoundationModelEntitlement API call grants permission to put entitlement to access a foundational model.</li>
</ul>
</li>
<li class="">[New] FIRST-S00088 First Seen NTLM Authentication to Host (User)<!-- -->
<ul>
<li class="">A user has performed NTLM authentication to a host on the network for the first time since the baseline period has been established.</li>
</ul>
</li>
<li class="">[New] FIRST-S00076 First Seen Net Command Use on Host</li>
<li class="">[New] FIRST-S00085 First Seen Role Creating AWS Bedrock Agent<!-- -->
<ul>
<li class="">An AWS Bedrock Agent has been created in the environment by a Role seen for the first time since the baseline period. If this role is not expected in the environment and was not originally assigned IAM rights to Bedrock, this activity could be indicative of privilege escalation.</li>
</ul>
</li>
<li class="">[New] FIRST-S00061 First Seen USB device in use on Windows host<!-- -->
<ul>
<li class="">This signal looks for a new removable USB device name being used by a host not seen since the baseline period. This activity by itself is not necessarily malicious, but can be indicative of potential lateral movement or initial access tactics.</li>
</ul>
</li>
<li class="">[New] FIRST-S00087 First Seen User Creating or Modifying EC2 Launch Template<!-- -->
<ul>
<li class="">AWS EC2 launch templates allows cloud administrators to specify instance configuration information in a templated format. Granting permissions to modify or create launch templates within EC2 in certain circumstances grants the user PassRole permissions, potentially opening privilege escalation avenues via IAM.</li>
</ul>
</li>
<li class="">[New] FIRST-S00082 First Seen User Enumerating AWS Bedrock Models<!-- -->
<ul>
<li class="">A first seen user was observed enumerating AWS Bedrock models via the ListFoundationModels API call. Ensure that the user performing the enumeration is authorized to work within AWS Bedrock.</li>
</ul>
</li>
<li class="">[New] FIRST-S00059 First Seen esentutl command From User<!-- -->
<ul>
<li class="">Threat actors may use the esentutl utility to create volume shadow copies and/or backups on a Windows operating system and retrieve the Active Directory database (NTDS.dit) file in order to extract credential material.</li>
</ul>
</li>
<li class="">[New] FIRST-S00058 First Seen vssadmin command From User<!-- -->
<ul>
<li class="">Threat actors may use the vssadmin utility to create volume shadow copies on a Windows operating system and retrieve the Active Directory database (NTDS.dit) file in order to extract credential material.</li>
</ul>
</li>
<li class="">[New] FIRST-S00060 First Seen wbadmin command From User<!-- -->
<ul>
<li class="">Threat actors may use the wbadmin utility to create volume shadow copies and/or backups on a Windows operating system and retrieve the Active Directory database (NTDS.dit) file in order to extract credential material.</li>
</ul>
</li>
<li class="">[New] MATCH-S00429 LSASS Memory Dumping<!-- -->
<ul>
<li class="">Detect creation of dump files containing the memory space of lsass.exe, which contains sensitive credentials. Identifies usage of Sysinternals procdump.exe to export the memory space of lsass.exe which contains sensitive credentials.</li>
</ul>
</li>
<li class="">[New] MATCH-S00161 Malicious PowerShell Get Commands<!-- -->
<ul>
<li class="">This rule detects commandlets from common PowerShell exploitation frameworks.</li>
</ul>
</li>
<li class="">[New] MATCH-S00895 NinjaCopy Usage Detected<!-- -->
<ul>
<li class="">NinjaCopy is a legacy PowerShell tool that can copy files from an NTFS volume in a manner that bypasses SACL auditing as well as DACL controls such as only allowing SYSTEM to open a file.</li>
</ul>
</li>
<li class="">[New] MATCH-S00906 Okta - Application Created<!-- -->
<ul>
<li class="">This rule looks for an Okta application being created. Ensure that this activity is expected and authorized. Only Okta administrators should be creating applications.</li>
</ul>
</li>
<li class="">[New] MATCH-S00903 Okta - Device Added To User<!-- -->
<ul>
<li class="">An Okta device was added to a user. This activity may occur as part of normal user operations such as lost device.</li>
</ul>
</li>
<li class="">[New] MATCH-S00904 Okta - Device Removed From User<!-- -->
<ul>
<li class="">An Okta device was removed from a user. It is recommended that the user performing the action be cross-referenced to a list of approved Okta administrators.</li>
</ul>
</li>
<li class="">[New] CHAIN-S00020 Okta - MFA Denied Followed by Successful Logon<!-- -->
<ul>
<li class="">This signal looks for a single user explicitly denying at least two (2) multi factor authentication prompts, followed by a successful Okta login via multi factor authentication within a twenty-five (25) minute window. This logic is designed to catch successful MFA fatigue type attacks.</li>
</ul>
</li>
<li class="">[New] MATCH-S00908 Okta - MFA Request Denied by User<!-- -->
<ul>
<li class="">This signal will trigger when a user denies an MFA request within the Okta authenticator application.</li>
</ul>
</li>
<li class="">[New] MATCH-S00907 Okta - Policy Rule Added<!-- -->
<ul>
<li class="">An Okta policy rule has been added through the Okta admin application.</li>
</ul>
</li>
<li class="">[New] MATCH-S00905 Okta - Programmatic Access to Users API Endpoint<!-- -->
<ul>
<li class="">This signal looks for programmatic (PowerShell, Golang, Python or Curl) access to the Okta “users” API endpoint. This endpoint provides functionality to perform various actions on Okta user accounts such as password resets and account unlocks.</li>
</ul>
</li>
<li class="">[New] AGGREGATION-S00008 Okta - Session Anomaly (Multiple ASNs)<!-- -->
<ul>
<li class="">This rule detects when a user has utilized multiple distinct ASNs when performing authentication through Okta. This activity could potentially indicate credential theft or a general session anomaly.</li>
</ul>
</li>
<li class="">[New] AGGREGATION-S00009 Okta - Session Anomaly (Multiple User Agents)<!-- -->
<ul>
<li class="">This rule detects when a user has utilized multiple distinct User Agents when performing authentication through Okta. This activity could potentially indicate credential theft or a general session anomaly.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00019 Outlier in AWS Bedrock API Calls from User<!-- -->
<ul>
<li class="">An outlier in the number of API calls made to AWS Bedrock from a user within an hour time period was observed. These events may be part of normal Bedrock operations or may be indicative of enumeration/discovery attempts.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00022 Outlier in AWS Bedrock Foundation Model Enumeration Calls from User<!-- -->
<ul>
<li class="">An outlier in the number of Foundation Model Enumeration API Calls from a user within an hour time period was observed. These events may be part of normal Bedrock operations or may be indicative of enumeration/discovery attempts.</li>
</ul>
</li>
<li class="">[New] MATCH-S00900 Overly-Permissive Active Directory Certificate Template Loaded<!-- -->
<ul>
<li class="">This alert looks at Active Directory Certificate Services Auditing Events to look for a certificate template issued that allows domain users full control over the certificate</li>
</ul>
</li>
<li class="">[New] CHAIN-S00019 Potential Active Directory Certificate Services Enrollment Agent Misconfiguration<!-- -->
<ul>
<li class="">This alert looks for two events in a particular order, the first event involves a certificate template being loaded with a certificate request agent application policy.</li>
</ul>
</li>
<li class="">[New] MATCH-S00898 Potentially Misconfigured Active Directory Certificate Template Loaded<!-- -->
<ul>
<li class="">This alert looks at Active Directory Certificate Services Auditing Events to look for a certificate template issued that allows all domain users the ability to enroll the template.</li>
</ul>
</li>
<li class="">[New] MATCH-S00901 Potentially Vulnerable Active Directory Certificate Services Template Loaded<!-- -->
<ul>
<li class="">This alert looks at Active Directory Certificate Services Auditing Events to look for a certificate template issued that allows the enrolee to supply a subject and allows all domain users to enroll.</li>
</ul>
</li>
<li class="">[New] MATCH-S00899 Suspicious Active Directory Certificate Modification<!-- -->
<ul>
<li class="">This alert looks for an Active Directory certificate being modified with the "Any Purpose" OID.</li>
</ul>
</li>
<li class="">[New] MATCH-S00902 Suspicious Active Directory Certificate Modification - Enrollment Agent<!-- -->
<ul>
<li class="">This alert looks for an Active Directory certificate being modified with an Enrollment Agent value that allows an Active Directory principal to enroll a certificate on behalf of another user.</li>
</ul>
</li>
<li class="">[New] MATCH-S00917 Suspicious PowerShell Application Window Discovery COM method<!-- -->
<ul>
<li class="">This PowerShell COM method allows for discovery of running application windows, along with the process path and window location coordinates.</li>
</ul>
</li>
<li class="">[New] MATCH-S00920 Suspicious PowerShell Window Discovery Cmdlet execution<!-- -->
<ul>
<li class="">Detects the use of PowerShell for Applicaiton Window Discovery to identify open application windows to gather information on running programs, collect potential data, and discover security tooling.</li>
</ul>
</li>
<li class="">[New] MATCH-S00918 Suspicious cat of PAM common-password policy<!-- -->
<ul>
<li class="">The Pluggable Authentication Module (PAM) in Linux allows system administrators to choose how applications authenticate users.</li>
</ul>
</li>
<li class="">[New] MATCH-S00925 Trufflehog AWS Credential Verification Detected<!-- -->
<ul>
<li class="">Trufflehog is a tool that can be utilized to find and verify secrets. When Trufflehog locates AWS credentials, it attempts to validate them using the GetCallerIdentity API call.</li>
</ul>
</li>
<li class="">[New] MATCH-S00583 WCE wceaux.dll Access<!-- -->
<ul>
<li class="">Obvserves for access of wceaux.dll, which may be indicative of credential access.</li>
</ul>
</li>
<li class="">[New] MATCH-S00159 Windows - Permissions Group Discovery<!-- -->
<ul>
<li class="">Microsoft’s Net.exe can be used for multiple Discovery tactics, including Password Policy, Permissions, Account and Domain Trust Discovery. This detection identifies the use net.exe related commands on a system related to these discovery tactics.</li>
</ul>
</li>
<li class="">[New] THRESHOLD-S00067 ZeroLogon Privilege Escalation Behavior<!-- -->
<ul>
<li class="">An attack against CVE-2020-1472 may create thousands of NetrServerReqChallenge and NetrServerAuthenticate3 requests in a short amount of time.</li>
</ul>
</li>
<li class="">[New] MATCH-S00919 chage command use on host<!-- -->
<ul>
<li class="">The chage command on Linux allows for the changing of user password expiry information. The chage command is restricted to the root user; however, non-root/unprivileged users may use the -l flag to determine when the user’s password or account is due to expire.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-4">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-4" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Apache HTTP Server - Access log</li>
<li class="">[New] Kandji EDR - catch all</li>
<li class="">[Updated] Cisco Meraki Firewall - Custom Parser</li>
<li class="">[Updated] Cisco Meraki Flows - Custom Parser</li>
<li class="">[Updated] GitHub Enterprise Audit  - Access Events</li>
<li class="">[Updated] GitHub Enterprise Audit  - Authentication Events</li>
<li class="">[Updated] GitHub Enterprise Audit  - Create Events</li>
<li class="">[Updated] GitHub Enterprise Audit  - Modify Events</li>
<li class="">[Updated] GitHub Enterprise Audit  - Remove Events</li>
<li class="">[Updated] GitHub Enterprise Audit  - Restore Events</li>
<li class="">[Updated] GitHub Enterprise Audit  - Transfer Events</li>
<li class="">[Updated] GitHub Enterprise Audit Catch All</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-4">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#parsers-4" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Apache/Apache HTTP Server</li>
<li class="">[New] /Parsers/System/Kandji/Kandji EDR</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco Meraki<!-- -->
<ul>
<li class="">Corrected parser to address incorrect mapping leading to alert errors.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Github/GitHub Enterprise Audit<!-- -->
<ul>
<li class="">Parser modification to the MAPPER<!-- -->:product<!-- --> from Github Enterpries to Github Enterprise Audit</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Kemp/Kemp LoadMaster Syslog<!-- -->
<ul>
<li class="">Corrected parser transform for the log-entry format of the Process_Syslog_Header</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Netskope/Netskope Security Cloud JSON<!-- -->
<ul>
<li class="">Corrected the JSON parser for MAPPER<!-- -->:event_id<!-- --> to facilitiate proper mapping processing</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="october-4-2024---content-release">October 4, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#october-4-2024---content-release" class="hash-link" aria-label="Direct link to October 4, 2024 - Content Release" title="Direct link to October 4, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">Detection rules centered around Amazon Bedrock activities.</li>
<li class="">Consolidation of AWS CloudTrail mappers to replicate current mapper behavior with fewer distinct mappers.</li>
<li class="">New support for GitHub Enterprise Audit (parsing and mapping).</li>
<li class="">New support for Honeywell Pro-Watch (parsing and mapping).</li>
<li class="">New support for Citrix Zendesk (parsing and mapping).</li>
<li class="">Further mapping updates to better employ <a class="" href="https://www.sumologic.com/help/docs/cse/schema/cse-normalized-classification/">Normalized Classification</a> fields across data sources.</li>
<li class="">Removal of some duplicate mapped fields.</li>
<li class="">Other changes enumerated below.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-5">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rules-5" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00921 AWS Bedrock Model Invocation Logging Configuration Change Observed<!-- -->
<ul>
<li class="">An AWS Bedrock Model invocation logging configuration change was observed. Ensure that this activity is expected and authorized. Take a look at the full event details, particularly the requestParameters.loggingConfig* fields in order to see what specific configuration values were changed. Telemetry and logging configuration changes should be a relatively rare occurrence in the environment.</li>
</ul>
</li>
<li class="">[New] MATCH-S00922 AWS Bedrock Agent Created<!-- -->
<ul>
<li class="">This rule detects when an AWS Bedrock Agent has been created in the environment. Bedrock Agents can be configured with various parameters to build AI applications. Take a look at the "responseElements.agent.agentName" field to see the name of the agent being created. Ensure that the user creating the agent is authorized to develop AI applications within the environment.</li>
</ul>
</li>
<li class="">[New] MATCH-S00924 AWS Bedrock Guardrail Deleted<!-- -->
<ul>
<li class="">AWS Bedrock Guardrails provide users with the ability to configure options like filtering out harmful content or defining denied topics for models. Guardrails also allow the blocking of sensitive information such as PII. Ensure that this deletion was performed by an authorized user during an expected change. Look at other activity from this user account, focusing on the Bedrock service and pivoting from there if the event is deemed suspicious.</li>
</ul>
</li>
<li class="">[New] MATCH-S00923 AWS Bedrock Model Invocation Denied for User<!-- -->
<ul>
<li class="">A user has attempted to invoke a model via AWS Bedrock for which access was denied due to a permission issue. This event can be a normal occurrence for a user who has not been provisioned the proper IAM resources for AWS Bedrock. However, it could also be a malicious attempt at running a particular model via AWS Bedrock. Take a look at the username, IP address, role type, role and model via the "requestParameters.modelId" field.</li>
</ul>
</li>
<li class="">[New] FIRST-S00081 First Seen Model ID in AWS Bedrock Put Entitlement by User<!-- -->
<ul>
<li class="">A first seen model id was observed in AWS Bedrock. The PutFoundationModelEntitlement API call grants permission to put entitlement to access a foundational model. Ensure this model is authorized to be utilized in the environment and that the user requesting access to the model is authorized to perform these actions.</li>
</ul>
</li>
<li class="">[New] FIRST-S00082 First Seen User Enumerating AWS Bedrock Models<!-- -->
<ul>
<li class="">A first seen user was observed enumerating AWS Bedrock models via the ListFoundationModels API call. Ensure that the user performing the enumeration is authorized to work within AWS Bedrock. The http_userAgent field will contain the user agent used to perform this enumeration and will help determine whether a browser or CLI tool was used to perform this type of enumeration. Consider excluding service accounts and authorized users from this rule via a rule tuning expression if excessive signal activity is observed.</li>
</ul>
</li>
<li class="">[New] FIRST-S00084 - First Seen AWS Bedrock API Call from User<!-- -->
<ul>
<li class="">This rule looks for a first seen AWS Bedrock API call from a user since the baseline period. Ensure the user in question is authorized to utilize AWS Bedrock services. Look at the "action" field to determine what API calls are being made and whether this activity is expected.</li>
</ul>
</li>
<li class="">[New] FIRST-S00085 First Seen Role Creating AWS Bedrock Agent<!-- -->
<ul>
<li class="">An AWS Bedrock Agent has been created in the environment by a Role seen for the first time since the baseline period. If this role is not expected in the environment and was not originally assigned IAM rights to Bedrock, this activity could be indicative of privilege escalation. Bedrock Agents can be configured with various parameters to build AI applications. Take a look at the "responseElements.agent.agentName" field to see the name of the agent being created. Ensure that the user creating the agent is authorized to develop AI applications within the environment.</li>
</ul>
</li>
<li class="">[New] FIRST-S00086 First Seen IP Address Performing Trufflehog AWS Credential Verification<!-- -->
<ul>
<li class="">Trufflehog is a tool that can be utilized to find and verify secrets. When Trufflehog locates AWS credentials, it attempts to validate them using the GetCallerIdentity API call. This signal looks for the default Trufflehog User Agent within CloudTrail telemetry, combined with the GetCallerIdentity API call occurring from an IP address not seen since the baseline period. This signal is designed to pair with “Trufflehog AWS Credential Verification Detected” to provide coverage for legitimate and internal Trufflehog scans. Within this telemetry, the user_username field will contain the value of the username associated with the secret or credential that Trufflehog is attempting to verify. Look at the events surrounding the source IP address of this event. Look for any potential areas that may have contained keys or secrets for the user_username value.</li>
</ul>
</li>
<li class="">[New] FIRST-S00087 First Seen User Creating or Modifying EC2 Launch Template<!-- -->
<ul>
<li class="">AWS EC2 launch templates allows cloud administrators to specify instance configuration information in a templated format. Granting permissions to modify or create launch templates within EC2 in certain circumstances grants the user PassRole permissions, potentially opening privilege escalation avenues via IAM. The following AWS documentation outlines this behavior: <a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/permissions-for-launch-templates.html" target="_blank" rel="noopener noreferrer" class="">https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/permissions-for-launch-templates.html</a>. Look at other events the user in question is performing in order to investigate this signal. Consider excluding authorized users via a match list if this signal is triggering too many false positives.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00019 Outlier in AWS Bedrock API Calls from User<!-- -->
<ul>
<li class="">An outlier in the number of API calls made to AWS Bedrock from a user within an hour time period was observed. These events may be part of normal Bedrock operations or may be indicative of enumeration/discovery attempts. Observe the username, role, user agent and source IP to confirm whether this activity is expected. If this signal is triggering frequently, consider excluding certain authorized users via tuning expression.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00022 Outlier in AWS Bedrock Foundation Model Enumeration Calls from User<!-- -->
<ul>
<li class="">An outlier in the number of Foundation Model Enumeration API Calls from a user within an hour time period was observed. These events may be part of normal Bedrock operations or may be indicative of enumeration/discovery attempts. Observe the username, role, user agent and source IP to confirm whether this activity is expected. If this signal is triggering frequently, consider excluding certain authorized users via tuning expression.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00024 - AWS DynamoDB Outlier in GetItem Events from User<!-- -->
<ul>
<li class="">An outlier in GetItem events to a DynamoDB resource within an hour time period has been detected. Ensure that the user performing these actions has business justification for modifying DynamoDB tables and instances. Consider excluding authorized users from this signal or tweaking the minimum count value if this signal is triggering too often. Data events from DynamoDB are required in order for this signal to function.</li>
</ul>
</li>
<li class="">[New] OUTLIER-S00025 - AWS S3 Outlier in PutObject Denied Events<!-- -->
<ul>
<li class="">This rule utilizes an hourly baseline to detect an outlier in the number of denied PutObject access events to an S3 bucket. AWS Data events are necessary for this signal to function. Denied PutObject access events can stem from IAM policies or bucket policies. Look at the user, role, IP address from the events to determine whether this activity is expected. In certain cases, access denied events to S3 can also result in unexpected AWS charges.</li>
</ul>
</li>
<li class="">[New] MATCH-S00925 Trufflehog AWS Credential Verification Detected<!-- -->
<ul>
<li class="">Trufflehog is a tool that can be utilized to find and verify secrets. When Trufflehog locates AWS credentials, it attempts to validate them using the GetCallerIdentity API call. This signal looks for the default Trufflehog User Agent within CloudTrail telemetry, combined with the GetCallerIdentity API call. Within this telemetry, the user_username field will contain the value of the username associated with the secret or credential that Trufflehog is attempting to verify. Look at the events surrounding the source IP address of this event. Look for any potential areas that may have contained keys or secrets for the user_username value.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-5">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-5" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-eventsource-support">New Event/Source Support<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#new-eventsource-support" class="hash-link" aria-label="Direct link to New Event/Source Support" title="Direct link to New Event/Source Support" translate="no">​</a></h5>
<ul>
<li class="">[New] Fortinet utm-ssl Logs</li>
<li class="">[New] GitHub Enterprise Audit  - Access Events</li>
<li class="">[New] GitHub Enterprise Audit  - Authentication Events</li>
<li class="">[New] GitHub Enterprise Audit  - Create Events</li>
<li class="">[New] GitHub Enterprise Audit  - Modify Events</li>
<li class="">[New] GitHub Enterprise Audit  - Remove Events</li>
<li class="">[New] GitHub Enterprise Audit  - Restore Events</li>
<li class="">[New] GitHub Enterprise Audit  - Transfer Events</li>
<li class="">[New] GitHub Enterprise Audit Catch All</li>
<li class="">[New] Honeywell Pro-Watch Catch All</li>
<li class="">[New] Zendesk Catch All</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="extended-normalized-classification-support">Extended Normalized Classification Support<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#extended-normalized-classification-support" class="hash-link" aria-label="Direct link to Extended Normalized Classification Support" title="Direct link to Extended Normalized Classification Support" translate="no">​</a></h5>
<ul>
<li class="">[Updated] Azure Event Hub - Windows Defender Logs</li>
<li class="">[Updated] Azure ManagedIdentitySignInLogs</li>
<li class="">[Updated] Azure NonInteractiveUserSignInLogs</li>
<li class="">[Updated] Azure ServicePrincipalSignInLogs</li>
<li class="">[Updated] Azure Write and Delete Logs</li>
<li class="">[Updated] AzureActivityLog 01</li>
<li class="">[Updated] Carbon Black Cloud - Observation event</li>
<li class="">[Updated] Carbon Black Cloud Script Load</li>
<li class="">[Updated] Cisco ASA 109005-8 JSON</li>
<li class="">[Updated] Cisco ASA 113005</li>
<li class="">[Updated] Cisco ASA 113005 JSON</li>
<li class="">[Updated] Cisco ASA 113012-17 JSON</li>
<li class="">[Updated] Cisco ASA 716039 JSON</li>
<li class="">[Updated] Cisco ASA 719022-3 JSON</li>
<li class="">[Updated] Cisco ASA 751011 JSON</li>
<li class="">[Updated] Citrix NetScaler - AAA-LOGIN_FAILED</li>
<li class="">[Updated] CrowdStrike FDR - CriticalFileAccessed</li>
<li class="">[Updated] CylancePROTECT Threats</li>
<li class="">[Updated] Fortinet Event Logs</li>
<li class="">[Updated] Fortinet Virus Logs</li>
<li class="">[Updated] Kaspersky Endpoint Security Catch All</li>
<li class="">[Updated] Lacework Alert</li>
<li class="">[Updated] Linux OS Syslog - Cron - Session Closed</li>
<li class="">[Updated] Linux OS Syslog - Cron - Session Opened</li>
<li class="">[Updated] Linux OS Syslog - Process sshd - SSH Auth Failure Invalid Password</li>
<li class="">[Updated] Linux OS Syslog - Process sshd - SSH Auth Failure Invalid User</li>
<li class="">[Updated] Linux OS Syslog - Process sshd - SSH Auth Failure No ID String</li>
<li class="">[Updated] Linux OS Syslog - Process sshd - SSH Public Key Not Allowed</li>
<li class="">[Updated] Linux OS Syslog - Process sudo - Superuser Do Command Execution</li>
<li class="">[Updated] Linux OS Syslog - Process systemd - Systemd Session Start</li>
<li class="">[Updated] McAfee WebGateway - CEF - User Login Failed</li>
<li class="">[Updated] Microsoft Defender for Cloud - Security Alerts</li>
<li class="">[Updated] Microsoft Office 365 Active Directory Authentication Events</li>
<li class="">[Updated] Microsoft Office 365 Threat Intelligence Atp Content Events</li>
<li class="">[Updated] OSSEC Alert</li>
<li class="">[Updated] OpenVPN Authentication Attempt</li>
<li class="">[Updated] OpenVPN Logon Attempt</li>
<li class="">[Updated] Osquery Process Auditing</li>
<li class="">[Updated] Palo Alto Traps - Custom Parser</li>
<li class="">[Updated] RSA SecurID SinglePoint Authentication</li>
<li class="">[Updated] Snowflake Login</li>
<li class="">[Updated] Symantec Agent Behavior Logs</li>
<li class="">[Updated] Symantec Agent Risk Logs</li>
<li class="">[Updated] Symantec Agent Risk SONAR Logs</li>
<li class="">[Updated] Symantec Agent Scan Logs</li>
<li class="">[Updated] Sysdig Kubernetes JSON</li>
<li class="">[Updated] Tanium IOC Event - CEF Custom Parser</li>
<li class="">[Updated] Windows - Security - 4625</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="added-cause-mapping-and-added-null-as-a-skipped-value">Added 'Cause' mapping and added 'null' as a skipped value<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#added-cause-mapping-and-added-null-as-a-skipped-value" class="hash-link" aria-label="Direct link to Added 'Cause' mapping and added 'null' as a skipped value" title="Direct link to Added 'Cause' mapping and added 'null' as a skipped value" translate="no">​</a></h5>
<ul>
<li class="">[Updated] Okta Authentication - auth_via_AD_agent</li>
<li class="">[Updated] Okta Authentication - auth_via_mfa</li>
<li class="">[Updated] Okta Authentication - auth_via_radius</li>
<li class="">[Updated] Okta Authentication - sso</li>
<li class="">[Updated] Okta Authentication Events</li>
<li class="">[Updated] Okta Catch All</li>
<li class="">[Updated] Okta Security Threat Events</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="consolidated-cloudtrail-mappings">Consolidated CloudTrail Mappings<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#consolidated-cloudtrail-mappings" class="hash-link" aria-label="Direct link to Consolidated CloudTrail Mappings" title="Direct link to Consolidated CloudTrail Mappings" translate="no">​</a></h5>
<ul>
<li class="">[Deleted] CloudTrail - cloudtrail.amazonaws.com - DeleteTrail</li>
<li class="">[Deleted] CloudTrail - cloudtrail.amazonaws.com - StartLogging</li>
<li class="">[Deleted] CloudTrail - cloudtrail.amazonaws.com - StopLogging</li>
<li class="">[Deleted] CloudTrail - cloudtrail.amazonaws.com - UpdateTrail</li>
<li class="">[Deleted] CloudTrail - ec2.amazonaws.com - AttachInternetGateway</li>
<li class="">[Deleted] CloudTrail - ec2.amazonaws.com - AuthorizeSecurityGroupIngress</li>
<li class="">[Deleted] CloudTrail - ec2.amazonaws.com - CreateCustomerGateway</li>
<li class="">[Deleted] CloudTrail - ec2.amazonaws.com - CreateInternetGateway</li>
<li class="">[Deleted] CloudTrail - ec2.amazonaws.com - CreateKeyPair</li>
<li class="">[Deleted] CloudTrail - ec2.amazonaws.com - CreateNetworkAclEntry</li>
<li class="">[Deleted] CloudTrail - ec2.amazonaws.com - DeleteCustomerGateway</li>
<li class="">[Deleted] CloudTrail - ec2.amazonaws.com - DeleteInternetGateway</li>
<li class="">[Deleted] CloudTrail - ec2.amazonaws.com - DeleteKeyPair</li>
<li class="">[Deleted] CloudTrail - ec2.amazonaws.com - DeleteNetworkAcl</li>
<li class="">[Deleted] CloudTrail - ec2.amazonaws.com - DeleteNetworkAclEntry</li>
<li class="">[Deleted] CloudTrail - ec2.amazonaws.com - DetachInternetGateway</li>
<li class="">[Deleted] CloudTrail - ec2.amazonaws.com - ImportKeyPair</li>
<li class="">[Deleted] CloudTrail - ec2.amazonaws.com - ReplaceNetworkAclAssociation</li>
<li class="">[Deleted] CloudTrail - ec2.amazonaws.com - ReplaceNetworkAclEntry</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - AttachGroupPolicy</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - AttachRolePolicy</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - AttachUserPolicy</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - CreateAccessKey</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - CreatePolicy</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - CreatePolicyVersion</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - CreateUser</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - DeletePolicy</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - DeleteRolePermissionsBoundary</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - DeleteRolePolicy</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - DeleteUser</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - DeleteUserPermissionsBoundary</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - DeleteUserPolicy</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - DetachGroupPolicy</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - DetachRolePolicy</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - DetachUserPolicy</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - PutGroupPolicy</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - PutRolePolicy</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - PutUserPolicy</li>
<li class="">[Deleted] CloudTrail - iam.amazonaws.com - UpdateAssumeRolePolicy</li>
<li class="">[Deleted] CloudTrail - kms.amazonaws.com - ScheduleKeyDeletion</li>
<li class="">[Deleted] CloudTrail - lambda.amazonaws.com - AddPermission</li>
<li class="">[Deleted] CloudTrail - lambda.amazonaws.com - CreateEventSourceMapping</li>
<li class="">[Deleted] CloudTrail - lambda.amazonaws.com - CreateFunction</li>
<li class="">[Deleted] CloudTrail - lambda.amazonaws.com - CreateFunctionUrlConfig</li>
<li class="">[Deleted] CloudTrail - lambda.amazonaws.com - DeleteFunction</li>
<li class="">[Deleted] CloudTrail - lambda.amazonaws.com - GetEventSourceMapping</li>
<li class="">[Deleted] CloudTrail - lambda.amazonaws.com - GetFunctionConfiguration</li>
<li class="">[Deleted] CloudTrail - lambda.amazonaws.com - GetFunctionUrlConfig</li>
<li class="">[Deleted] CloudTrail - lambda.amazonaws.com - PublishLayerVersion</li>
<li class="">[Deleted] CloudTrail - lambda.amazonaws.com - RemovePermission</li>
<li class="">[Deleted] CloudTrail - lambda.amazonaws.com - UpdateEventSourceMapping</li>
<li class="">[Deleted] CloudTrail - lambda.amazonaws.com - UpdateFunctionCode</li>
<li class="">[Deleted] CloudTrail - lambda.amazonaws.com - UpdateFunctionConfiguration</li>
<li class="">[Deleted] CloudTrail - lambda.amazonaws.com - UpdateFunctionUrlConfig</li>
<li class="">[Deleted] CloudTrail - logs.amazonaws.com - DeleteLogGroup</li>
<li class="">[Deleted] CloudTrail - logs.amazonaws.com - DeleteLogStream</li>
<li class="">[Deleted] CloudTrail - s3.amazonaws.com - DeleteBucketCors</li>
<li class="">[Deleted] CloudTrail - s3.amazonaws.com - DeleteBucketLifecycle</li>
<li class="">[Deleted] CloudTrail - s3.amazonaws.com - DeleteBucketPolicy</li>
<li class="">[Deleted] CloudTrail - s3.amazonaws.com - PutBucketAcl</li>
<li class="">[Deleted] CloudTrail - s3.amazonaws.com - PutBucketCors</li>
<li class="">[Deleted] CloudTrail - s3.amazonaws.com - PutBucketLifecycle</li>
<li class="">[Deleted] CloudTrail - s3.amazonaws.com - PutBucketPolicy</li>
<li class="">[Deleted] CloudTrail - s3.amazonaws.com - PutBucketReplication</li>
<li class="">[Deleted] CloudTrail - secretsmanager.amazonaws.com - RotationStarted</li>
<li class="">[Deleted] CloudTrail - signin.amazonaws.com - CheckMfa</li>
<li class="">[Deleted] CloudTrail - signin.amazonaws.com - ExitRole</li>
<li class="">[Deleted] CloudTrail - signin.amazonaws.com - RenewRole</li>
<li class="">[Deleted] CloudTrail - signin.amazonaws.com - SwitchRole</li>
<li class="">[Deleted] CloudTrail - sso.amazonaws.com - ListProfilesForApplication</li>
<li class="">[Updated] CloudTrail - cloudtrail.amazonaws.com - Trail Change|Logging</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - All Network Events</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - Policy Change</li>
<li class="">[Updated] CloudTrail - kms.amazonaws.com - DisableKey|ScheduleKeyDeletion</li>
<li class="">[Updated] CloudTrail - lambda.amazonaws.com - Audit Change</li>
<li class="">[Updated] CloudTrail - lambda.amazonaws.com - DeleteEventSourceMapping|DeleteFunction</li>
<li class="">[Updated] CloudTrail - lambda.amazonaws.com - GetPolicy|GetLayerVersionPolicy</li>
<li class="">[Updated] CloudTrail - lambda.amazonaws.com - Resource Access</li>
<li class="">[Updated] CloudTrail - logs.amazonaws.com - DeleteDestination|DeleteLogGroup|DeleteLogStream</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - Bucket Change</li>
<li class="">[Updated] CloudTrail - secretsmanager.amazonaws.com - RotationSucceeded|RotationStarted</li>
<li class="">[Updated] CloudTrail - signin.amazonaws.com - All AwsConsoleSignIn events</li>
<li class="">[Updated] CloudTrail - sso.amazonaws.com - Federate|ListProfilesForApplication</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-5">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#parsers-5" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Github/GitHub Enterprise Audit</li>
<li class="">[New] /Parsers/System/Honeywell/Honeywell Pro-Watch</li>
<li class="">[New] /Parsers/System/Zendesk/Zendesk</li>
<li class="">[Updated] /Parsers/System/AWS/AWS ALB<!-- -->
<ul>
<li class="">Extends AWS ALB parser to handle additional <code>conn_trace_id</code> field</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Citrix/Citrix Cloud C2C<!-- -->
<ul>
<li class="">Modifies time handling and drops logs without security value</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Dell/Dell SonicWall<!-- -->
<ul>
<li class="">Minor regex fix for port and protocol handling</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Palo Alto/PAN Firewall CSV<!-- -->
<ul>
<li class="">Additional TRAFFIC log format handling</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="september-19-2024---content-release">September 19, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#september-19-2024---content-release" class="hash-link" aria-label="Direct link to September 19, 2024 - Content Release" title="Direct link to September 19, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">Updates to 111 rules to improve the user experience by removing often lengthy command lines from rule summary expressions (retained in record and signal).</li>
<li class="">Deletion of a low efficacy rule.</li>
<li class="">Mapping updates to better employ <a class="" href="https://www.sumologic.com/help/docs/cse/schema/cse-normalized-classification/">normalized classification</a> fields across data sources.</li>
<li class="">Adds alternate case handling for Windows Security Event Log error codes.</li>
<li class="">Updates to LastPass parsing and mapping to support Reporting and Failed Logon events.</li>
<li class="">Adds support for Thinkst Canary JSON logging.</li>
<li class="">Adjusts time handling for Thinkst Canary Syslog.</li>
</ul>
<p>Other changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-6">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rules-6" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Deleted] LEGACY-S00180 DNS query for dynamic DNS provider</li>
<li class="">[Updated] MATCH-S00814 Abnormal Child Process - sdiagnhost.exe - CVE-2022-30190</li>
<li class="">[Updated] MATCH-S00660 Anomalous AWS User Executed a Command on ECS Container</li>
<li class="">[Updated] MATCH-S00388 COMPlus_ETWEnabled Command Line Arguments</li>
<li class="">[Updated] MATCH-S00727 CPL File Executed from Temp Directory</li>
<li class="">[Updated] MATCH-S00412 Command Line Execution with Suspicious URL and AppData Strings</li>
<li class="">[Updated] MATCH-S00658 Container Management Utility in Container</li>
<li class="">[Updated] MATCH-S00410 Copy from Admin Share</li>
<li class="">[Updated] MATCH-S00443 Create Windows Share</li>
<li class="">[Updated] MATCH-S00525 Credential Dumping Via Copy Command From Shadow Copy</li>
<li class="">[Updated] MATCH-S00526 Credential Dumping Via Symlink To Shadow Copy</li>
<li class="">[Updated] MATCH-S00348 Curl Start Combination</li>
<li class="">[Updated] MATCH-S00385 DTRACK Process Creation</li>
<li class="">[Updated] MATCH-S00441 Delete Windows Share</li>
<li class="">[Updated] MATCH-S00543 Detect Psexec With Accepteula Flag</li>
<li class="">[Updated] MATCH-S00319 Dridex Process Pattern</li>
<li class="">[Updated] MATCH-S00590 Elise Backdoor</li>
<li class="">[Updated] MATCH-S00392 File or Folder Permissions Modifications</li>
<li class="">[Updated] FIRST-S00028 First Seen Common Windows Recon Commands From User</li>
<li class="">[Updated] FIRST-S00059 First Seen esentutl command From User</li>
<li class="">[Updated] FIRST-S00041 First Seen networksetup Usage from User</li>
<li class="">[Updated] FIRST-S00058 First Seen vssadmin command From User</li>
<li class="">[Updated] FIRST-S00060 First Seen wbadmin command From User</li>
<li class="">[Updated] FIRST-S00008 First Seen whoami command From User</li>
<li class="">[Updated] MATCH-S00414 Grabbing Sensitive Hives via Reg Utility</li>
<li class="">[Updated] MATCH-S00325 Greenbug Campaign Indicators</li>
<li class="">[Updated] MATCH-S00367 Impacket Lateralization Detection</li>
<li class="">[Updated] MATCH-S00482 Impacket-Obfuscation SMBEXEC Utility</li>
<li class="">[Updated] MATCH-S00483 Impacket-Obfuscation WMIEXEC Utility</li>
<li class="">[Updated] MATCH-S00322 Judgement Panda Credential Access Activity</li>
<li class="">[Updated] MATCH-S00334 Judgement Panda Exfil Activity</li>
<li class="">[Updated] MATCH-S00651 Kubernetes CreateCronjob</li>
<li class="">[Updated] MATCH-S00652 Kubernetes DeleteCronjob</li>
<li class="">[Updated] MATCH-S00650 Kubernetes ListCronjobs</li>
<li class="">[Updated] MATCH-S00648 Kubernetes ListSecrets</li>
<li class="">[Updated] MATCH-S00647 Kubernetes Pod Deletion</li>
<li class="">[Updated] MATCH-S00649 Kubernetes Service Account Token File Accessed</li>
<li class="">[Updated] MATCH-S00461 LNKSmasher Utility Commands</li>
<li class="">[Updated] MATCH-S00746 Loadable Kernel Module Dependency Install</li>
<li class="">[Updated] MATCH-S00745 Loadable Kernel Module Enumeration</li>
<li class="">[Updated] MATCH-S00723 Loadable Kernel Module Modifications</li>
<li class="">[Updated] MATCH-S00352 MSHTA Suspicious Execution</li>
<li class="">[Updated] MATCH-S00534 MacOS - Re-Opened Applications</li>
<li class="">[Updated] MATCH-S00729 MacOS Gatekeeper Bypass</li>
<li class="">[Updated] MATCH-S00731 MacOS System Integrity Protection Disabled</li>
<li class="">[Updated] MATCH-S00161 Malicious PowerShell Get Commands</li>
<li class="">[Updated] MATCH-S00190 Malicious PowerShell Invoke Commands</li>
<li class="">[Updated] MATCH-S00198 Malicious PowerShell Keywords</li>
<li class="">[Updated] MATCH-S00331 MavInject Process Injection</li>
<li class="">[Updated] MATCH-S00466 MsiExec Web Install</li>
<li class="">[Updated] MATCH-S00288 NotPetya Ransomware Activity</li>
<li class="">[Updated] MATCH-S00698 PATH Set to Current Directory</li>
<li class="">[Updated] MATCH-S00659 Package Management Utility in Container</li>
<li class="">[Updated] MATCH-S00697 Pkexec Privilege Escalation - CVE-2021-4034</li>
<li class="">[Updated] MATCH-S00149 PowerShell File Download</li>
<li class="">[Updated] MATCH-S00449 Powershell Execution Policy Bypass</li>
<li class="">[Updated] MATCH-S00427 Process Dump via Rundll32 and Comsvcs.dll</li>
<li class="">[Updated] MATCH-S00439 Psr.exe Capture Screenshots</li>
<li class="">[Updated] MATCH-S00167 Recon Using Common Windows Commands</li>
<li class="">[Updated] MATCH-S00346 Ryuk Ransomware Endpoint Indicator</li>
<li class="">[Updated] MATCH-S00506 SC Exe Manipulating Windows Services</li>
<li class="">[Updated] MATCH-S00153 Scheduled Task Created via PowerShell</li>
<li class="">[Updated] MATCH-S00529 Schtasks Scheduling Job On Remote System</li>
<li class="">[Updated] MATCH-S00530 Schtasks Used For Forcing A Reboot</li>
<li class="">[Updated] MATCH-S00359 Suspicious Certutil Command</li>
<li class="">[Updated] MATCH-S00356 Suspicious Compression Tool Parameters</li>
<li class="">[Updated] MATCH-S00362 Suspicious Curl File Upload</li>
<li class="">[Updated] MATCH-S00476 Suspicious Execution of Search Indexer</li>
<li class="">[Updated] MATCH-S00464 Suspicious Non-Standard InstallUtil Execution</li>
<li class="">[Updated] MATCH-S00191 Suspicious PowerShell Keywords</li>
<li class="">[Updated] MATCH-S00431 Suspicious Use of Procdump</li>
<li class="">[Updated] MATCH-S00477 Suspicious Use of Workflow Compiler for Payload Execution</li>
<li class="">[Updated] MATCH-S00342 Suspicious use of Dev-Tools-Launcher</li>
<li class="">[Updated] MATCH-S00279 TAIDOOR RAT DLL Load</li>
<li class="">[Updated] MATCH-S00531 Unload Sysmon Filter Driver</li>
<li class="">[Updated] MATCH-S00762 Unusual Staging Directory - PolicyDefinitions</li>
<li class="">[Updated] MATCH-S00761 Volume Shadow Copy Service Stopped</li>
<li class="">[Updated] MATCH-S00147 WMI Managed Object Format (MOF) Process Execution</li>
<li class="">[Updated] MATCH-S00760 WMI Ping Sweep</li>
<li class="">[Updated] MATCH-S00146 WMI Process Call Create</li>
<li class="">[Updated] MATCH-S00151 WMI Process Get Brief</li>
<li class="">[Updated] MATCH-S00379 WMIExec VBS Script</li>
<li class="">[Updated] MATCH-S00400 Web Download via Office Binaries</li>
<li class="">[Updated] MATCH-S00539 Web Servers Executing Suspicious Processes</li>
<li class="">[Updated] MATCH-S00174 Web Services Executing Common Web Shell Commands</li>
<li class="">[Updated] MATCH-S00284 Windows - Delete Windows Backup Catalog</li>
<li class="">[Updated] MATCH-S00181 Windows - Domain Trust Discovery</li>
<li class="">[Updated] MATCH-S00168 Windows - Local System executing whoami.exe</li>
<li class="">[Updated] MATCH-S00162 Windows - Network trace capture using netsh.exe</li>
<li class="">[Updated] MATCH-S00159 Windows - Permissions Group Discovery</li>
<li class="">[Updated] MATCH-S00268 Windows - Possible Impersonation Token Creation Using Runas</li>
<li class="">[Updated] MATCH-S00276 Windows - Possible Squiblydoo Technique Observed</li>
<li class="">[Updated] MATCH-S00281 Windows - PowerShell Process Discovery</li>
<li class="">[Updated] MATCH-S00171 Windows - Powershell Scheduled Task Creation from PowerSploit or Empire</li>
<li class="">[Updated] MATCH-S00185 Windows - Remote System Discovery</li>
<li class="">[Updated] MATCH-S00272 Windows - Rogue Domain Controller - dcshadow</li>
<li class="">[Updated] MATCH-S00170 Windows - Scheduled Task Creation</li>
<li class="">[Updated] MATCH-S00192 Windows - System Network Configuration Discovery</li>
<li class="">[Updated] MATCH-S00194 Windows - System Time Discovery</li>
<li class="">[Updated] MATCH-S00172 Windows - WiFi Credential Harvesting with netsh</li>
<li class="">[Updated] MATCH-S00532 Windows Adfind Exe</li>
<li class="">[Updated] MATCH-S00552 Windows Connhost Started Forcefully</li>
<li class="">[Updated] MATCH-S00398 Windows Defender Download Activity</li>
<li class="">[Updated] MATCH-S00179 Windows Network Sniffing</li>
<li class="">[Updated] MATCH-S00157 Windows Process Name Impersonation</li>
<li class="">[Updated] MATCH-S00178 Windows Query Registry</li>
<li class="">[Updated] MATCH-S00533 Windows Security Account Manager Stopped</li>
<li class="">[Updated] LEGACY-S00171 Windows Service Executed from Nonstandard Execution Path</li>
<li class="">[Updated] MATCH-S00724 Windows Update Agent DLL Changed</li>
<li class="">[Updated] MATCH-S00382 Winnti Pipemon Characteristics</li>
<li class="">[Updated] MATCH-S00435 XSL Script Processing</li>
<li class="">[Updated] MATCH-S00726 macOS Kernel Extension Load</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-6">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-6" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] LastPass Failed Login Attempt</li>
<li class="">[New] LastPass Reporting</li>
<li class="">[Updated] Thinkst Canary Parser - Catch All<!-- -->
<ul>
<li class="">Removed time handling from mapper to favor parser time handling</li>
</ul>
</li>
<li class="">[Updated] 1Password Item Audit Actions</li>
<li class="">[Updated] 1Password Item Usage Actions</li>
<li class="">[Updated] AWS Config - Custom Parser</li>
<li class="">[Updated] AWS EKS - Custom Parser</li>
<li class="">[Updated] AWS Inspector - Custom Parser</li>
<li class="">[Updated] AWS Route 53 Logs</li>
<li class="">[Updated] AWS S3 Server Access Log - Custom Parser</li>
<li class="">[Updated] AWS Security Hub</li>
<li class="">[Updated] AWSGuardDuty - Audit Events</li>
<li class="">[Updated] AWSGuardDuty - AwsServiceEvent-AWS API Call via CloudTrail</li>
<li class="">[Updated] AWSGuardDuty - Reconnaissance and malicious activity detection</li>
<li class="">[Updated] AWSGuardDuty - Tor Client and Relay</li>
<li class="">[Updated] AWSGuardDuty - UnauthorizedAccess_EC2_TorIPCaller</li>
<li class="">[Updated] AWSGuardDuty_Catch_All</li>
<li class="">[Updated] Adaxes - Custom Parser</li>
<li class="">[Updated] ApplicationGatewayAccessLog</li>
<li class="">[Updated] ApplicationGatewayFirewallLog</li>
<li class="">[Updated] Aqua Runtime Policy Match</li>
<li class="">[Updated] Azure Appplication Service Console Logs</li>
<li class="">[Updated] Azure AuditEvent logs</li>
<li class="">[Updated] Azure Event Hub - Windows Defender Logs</li>
<li class="">[Updated] Azure Firewall Application Rule</li>
<li class="">[Updated] Azure Firewall DNS Proxy</li>
<li class="">[Updated] Azure Firewall Network Rule</li>
<li class="">[Updated] Azure NSG Flows</li>
<li class="">[Updated] Azure Policy Logs</li>
<li class="">[Updated] AzureActivityLog</li>
<li class="">[Updated] AzureActivityLog 01</li>
<li class="">[Updated] AzureActivityLog AuditLogs</li>
<li class="">[Updated] AzureDevOpsAuditing</li>
<li class="">[Updated] Cato Networks Audits</li>
<li class="">[Updated] CloudTrail - cloudtrail.amazonaws.com - CreateTrail</li>
<li class="">[Updated] Cyber Ark EPM AggregateEvent</li>
<li class="">[Updated] Druva Cyber Resilience - Catch All</li>
<li class="">[Updated] GCP App Engine Logs</li>
<li class="">[Updated] GCP Audit Logs</li>
<li class="">[Updated] GCP IDS</li>
<li class="">[Updated] GCP Parser - Load Balancer</li>
<li class="">[Updated] Google Security Command Center</li>
<li class="">[Updated] JumpCloud IdP - Catch All</li>
<li class="">[Updated] Kaltura Audits</li>
<li class="">[Updated] Microsoft Defender for Cloud - Security Alerts</li>
<li class="">[Updated] Microsoft Office 365 AzureActiveDirectory Events</li>
<li class="">[Updated] Microsoft Office 365 MicrosoftStream Events</li>
<li class="">[Updated] Microsoft Office 365 PowerApps Events</li>
<li class="">[Updated] Microsoft Office 365 Sway Events</li>
<li class="">[Updated] Microsoft Office 365 Teams Events</li>
<li class="">[Updated] Microsoft Office 365 Yammer Events</li>
<li class="">[Updated] MicrosoftGraphActivityLogs</li>
<li class="">[Updated] Office 365 - MicrosoftFlow</li>
<li class="">[Updated] Office 365 - Security Compliance Alerts</li>
<li class="">[Updated] Osquery Catchall</li>
<li class="">[Updated] Osquery FIM</li>
<li class="">[Updated] Osquery Process Auditing</li>
<li class="">[Updated] Osquery Socket Events</li>
<li class="">[Updated] Osquery Startup Items</li>
<li class="">[Updated] Palo Alto Config - Custom Parser</li>
<li class="">[Updated] Palo Alto Threat Spyware - Custom Parser</li>
<li class="">[Updated] RSA SecurID Runtime Authn Logout</li>
<li class="">[Updated] RSA SecurID Runtime Catchall</li>
<li class="">[Updated] UnauthorizedAccess_EC2_SSHBruteForce</li>
<li class="">[Updated] Windows - Security - 4625</li>
<li class="">[Updated] Windows - Security - 4634</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-6">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#parsers-6" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Thinkst Canary/Thinkst Canary JSON</li>
<li class="">[Updated] /Parsers/System/LastPass/LastPass</li>
<li class="">[Updated] /Parsers/System/Thinkst Canary/Thinkst Canary<!-- -->
<ul>
<li class="">Updated time handling to use <code>_messagetime</code> metadata</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="august-27-2024---content-release">August 27, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#august-27-2024---content-release" class="hash-link" aria-label="Direct link to August 27, 2024 - Content Release" title="Direct link to August 27, 2024 - Content Release" translate="no">​</a></h3>
<p>This release reverts a change to our AWS CloudTrail default (catch all) mapper for how <code>user_username</code> is mapped. This is being reverted due to reports of breaking rule tuning and missing user context for some <code>AssumedRole</code> events.</p>
<p>AWS <code>AssumedRole</code> events can contain service and user role assumptions. Oftentimes service role assumptions will contain a dynamic session identifier instead of a static user identifer which contains the originating identity. Prior to the change we are now reverting, this was causing certain services to generate user entities from these sessions, creating false positives. This behavior changed with the <a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#august-5-2024---content-release" class="">August 5th, 2024 content release</a> to handle role assumptions to instead map the role as user to prevent false positives from dynamic service sessions. While this decreased the number of false positives from dynamic service sessions, it also eliminated visibility into user role assumptions, creating potential for false negatives.</p>
<p>AWS best practices suggest defining <code>sourceIdentity</code> to allow for the originating user for a role assumption to be identifiable. This is the best path to avoid false positive generation, as our mapper will favor <code>sourceIdentity</code> if it is present in CloudTrail logs. If it is not present, then <code>userIdentity.arn</code> will be used and the <code>resource-id</code> will be mapped to <code>user_username</code>, creating potential for false positives from dynamic session identifiers. See <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp_control-access_monitor.html#id_credentials_temp_control-access_monitor-ct" target="_blank" rel="noopener noreferrer" class="">Viewing source identity in CloudTrail</a> in the AWS documentation for more information.</p>
<p>Alternatively, known service accounts which generate dynamic sessions identifers can be tuned out from signals using rule tuning expressions, Field Extraction Rules (FERs), or at the CloudTrail parser to reduce potential for false positive signals.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-7">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-7" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] CloudTrail Default Mapping</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="august-23-2024---content-release">August 23, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#august-23-2024---content-release" class="hash-link" aria-label="Direct link to August 23, 2024 - Content Release" title="Direct link to August 23, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">Updates to rules to improve the user experience</li>
<li class="">Specific updates are enumerated and summarized below</li>
</ul>
<div class="theme-admonition theme-admonition-note alert alert--secondary admonition_WoCw"><div class="admonitionHeading_TMsN"><span class="admonitionIcon_Ibzs"><svg viewBox="0 0 14 16"><path fill-rule="evenodd" d="M6.3 5.69a.942.942 0 0 1-.28-.7c0-.28.09-.52.28-.7.19-.18.42-.28.7-.28.28 0 .52.09.7.28.18.19.28.42.28.7 0 .28-.09.52-.28.7a1 1 0 0 1-.7.3c-.28 0-.52-.11-.7-.3zM8 7.99c-.02-.25-.11-.48-.31-.69-.2-.19-.42-.3-.69-.31H6c-.27.02-.48.13-.69.31-.2.2-.3.44-.31.69h1v3c.02.27.11.5.31.69.2.2.42.31.69.31h1c.27 0 .48-.11.69-.31.2-.19.3-.42.31-.69H8V7.98v.01zM7 2.3c-3.14 0-5.7 2.54-5.7 5.68 0 3.14 2.56 5.7 5.7 5.7s5.7-2.55 5.7-5.7c0-3.15-2.56-5.69-5.7-5.69v.01zM7 .98c3.86 0 7 3.14 7 7s-3.14 7-7 7-7-3.12-7-7 3.14-7 7-7z"></path></svg></span>note</div><div class="admonitionContent_vXIg"><p>Rule DNS query for dynamic DNS provider (LEGACY-S00180) is slated for removal the week of 2024-09-02. The rule is being removed from global content due to the untenable nature of maintaining the list of dynamic DNS providers within the rule expression. To retain this rule, it must be duplicated prior to the date of removal.</p></div></div>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-7">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rules-7" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00816 Interactive Logon to Domain Controller<!-- -->
<ul>
<li class="">Updated expression match list to use new <code>domain_controllers_hostnames</code> instead of <code>domain_controllers</code> which was generating false positives due to IP dependency.</li>
</ul>
</li>
<li class="">[Updated] LEGACY-S00105 Suspicious DC Logon<!-- -->
<ul>
<li class="">Updated expression match list to use new <code>domain_controllers_hostnames</code> instead of <code>domain_controllers</code> which was generating false positives due to IP dependency.</li>
</ul>
</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="srcdevice_hostname-and-srcdevice_ip-have-been-removed-from-signal-summaries-to-avoid-null-values-for-the-following-rules">srcDevice_hostname and srcDevice_ip have been removed from signal summaries to avoid <code>null</code> values for the following rules:<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#srcdevice_hostname-and-srcdevice_ip-have-been-removed-from-signal-summaries-to-avoid-null-values-for-the-following-rules" class="hash-link" aria-label="Direct link to srcdevice_hostname-and-srcdevice_ip-have-been-removed-from-signal-summaries-to-avoid-null-values-for-the-following-rules" title="Direct link to srcdevice_hostname-and-srcdevice_ip-have-been-removed-from-signal-summaries-to-avoid-null-values-for-the-following-rules" translate="no">​</a></h5>
<ul>
<li class="">[Updated] MATCH-S00874 AWS Lambda Function Recon</li>
<li class="">[Updated] MATCH-S00825 AWS Secrets Manager Enumeration</li>
<li class="">[Updated] MATCH-S00513 Critical Severity Intrusion Signature</li>
<li class="">[Updated] THRESHOLD-S00085 Excessive Outbound Firewall Blocks</li>
<li class="">[Updated] MATCH-S00666 High Severity Intrusion Signature</li>
<li class="">[Updated] MATCH-S00669 Informational Severity Intrusion Signature</li>
<li class="">[Updated] MATCH-S00668 Low Severity Intrusion Signature</li>
<li class="">[Updated] MATCH-S00667 Medium Severity Intrusion Signature</li>
<li class="">[Updated] THRESHOLD-S00095 Password Attack</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="removed-mitre-attck-subtechnique-t1003007-os-credential-dumping-proc-filesystem-for-the-following-rules">Removed MITRE ATT&amp;CK Subtechnique T1003.007 (OS Credential Dumping: Proc Filesystem) for the following rules:<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#removed-mitre-attck-subtechnique-t1003007-os-credential-dumping-proc-filesystem-for-the-following-rules" class="hash-link" aria-label="Direct link to Removed MITRE ATT&amp;CK Subtechnique T1003.007 (OS Credential Dumping: Proc Filesystem) for the following rules:" title="Direct link to Removed MITRE ATT&amp;CK Subtechnique T1003.007 (OS Credential Dumping: Proc Filesystem) for the following rules:" translate="no">​</a></h5>
<ul>
<li class="">[Updated] MATCH-S00429 LSASS Memory Dumping +</li>
<li class="">[Updated] MATCH-S00161 Malicious PowerShell Get Commands +</li>
<li class="">[Updated] MATCH-S00190 Malicious PowerShell Invoke Commands +</li>
<li class="">[Updated] MATCH-S00198 Malicious PowerShell Keywords +</li>
<li class="">[Updated] MATCH-S00191 Suspicious PowerShell Keywords +</li>
<li class="">[Updated] MATCH-S00431 Suspicious Use of Procdump +</li>
<li class="">[Updated] MATCH-S00583 WCE wceaux.dll Access +</li>
<li class="">[Updated] MATCH-S00274 Windows Credential Editor (WCE) Tool Use Detected +</li>
<li class="">[Updated] MATCH-S00291 Windows Credential Editor (WCE) in use +</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="added-exclusion-to-match-expression-for-onedrive-to-reduce-false-positives-and-removed-fields-producing-nulls-in-the-signal-summary-for-the-following-rules">Added exclusion to match expression for <code>OneDrive</code> to reduce false positives and removed fields producing nulls in the signal summary for the following rules:<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#added-exclusion-to-match-expression-for-onedrive-to-reduce-false-positives-and-removed-fields-producing-nulls-in-the-signal-summary-for-the-following-rules" class="hash-link" aria-label="Direct link to added-exclusion-to-match-expression-for-onedrive-to-reduce-false-positives-and-removed-fields-producing-nulls-in-the-signal-summary-for-the-following-rules" title="Direct link to added-exclusion-to-match-expression-for-onedrive-to-reduce-false-positives-and-removed-fields-producing-nulls-in-the-signal-summary-for-the-following-rules" translate="no">​</a></h5>
<ul>
<li class="">[Updated] THRESHOLD-S00111 Sharepoint - Excessive Documents Accessed by External IP</li>
<li class="">[Updated] THRESHOLD-S00101 Sharepoint - Excessive Documents Accessed by User</li>
<li class="">[Updated] THRESHOLD-S00100 Sharepoint - Excessive Documents Downloaded</li>
<li class="">[Updated] THRESHOLD-S00110 Sharepoint - External IP Downloaded Excessive Documents</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="august-16-2024---content-release">August 16, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#august-16-2024---content-release" class="hash-link" aria-label="Direct link to August 16, 2024 - Content Release" title="Direct link to August 16, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">Updates to Azure rules to reflect a name change in the Company Administrator role to Global Administrator.</li>
<li class="">New Linux OS Syslog mappers.</li>
<li class="">Addition of sessionId mapping to Okta mappers.</li>
</ul>
<p>Individual changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-8">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rules-8" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00231 Azure - Member Added to Global Administrator Role</li>
<li class="">[Updated] MATCH-S00233 Azure - Member Added to Global Administrator Role Non-PIM</li>
<li class="">[Updated] MATCH-S00229 Azure - Member Added to Non-Global Administrator Role</li>
<li class="">[Renamed] FIRST-S00088 First Seen User Performing NTLM Authentication to Host -&gt; First Seen NTLM Authentication to Host (User)</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-8">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-8" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Linux OS Syslog - Process sudo - Authentication Failure</li>
<li class="">[New] Linux OS Syslog - Systemd-user Session Open|Closed</li>
<li class="">[New] Linux OS Syslog - sshd - Postponed publickey</li>
<li class="">[New] Linux OS Syslog - sshd - User not allowed</li>
<li class="">[New] MicrosoftGraphActivityLogs</li>
<li class="">[Updated] AWS Redshift - Authentication Log<!-- -->
<ul>
<li class="">Added normalizedAction mapping for logon and a success boolean lookup on event_name</li>
</ul>
</li>
<li class="">[Updated] Aruba ClearPass Guest Access<!-- -->
<ul>
<li class="">Added normalizedAction mapping for logon and a success boolean lookup on error codes</li>
</ul>
</li>
<li class="">[Updated] Check Point Failed Log In<!-- -->
<ul>
<li class="">Updated record type to Authentication and adjusted normalizedAction mapping to logon</li>
</ul>
</li>
<li class="">[Updated] CloudTrail - signin.amazonaws.com - CheckMfa<!-- -->
<ul>
<li class="">Added logon normalizedAction and mapped success boolean to checkMfa</li>
</ul>
</li>
<li class="">[Updated] Infoblox NIOS - DNS<!-- -->
<ul>
<li class="">Updated mapping for dns_query to fix dns enrichments</li>
</ul>
</li>
<li class="">[Updated] JumpCloud IdP Authentication<!-- -->
<ul>
<li class="">Adds logon normalizedAction to mapper</li>
</ul>
</li>
<li class="">[Updated] Linux OS Syslog - Cron - Session Opened<!-- -->
<ul>
<li class="">Adds mappings for targetUser_username, targetUser_userId, user_userId</li>
</ul>
</li>
<li class="">[Updated] Linux OS Syslog - Process sshd - SSH Auth Failure Invalid Password<!-- -->
<ul>
<li class="">Adds "check pass" to event ID pattern</li>
</ul>
</li>
<li class="">[Updated] Linux OS Syslog - Process sshd - SSH Auth Failure Preauth<!-- -->
<ul>
<li class="">Added description mapping</li>
</ul>
</li>
<li class="">[Updated] Linux OS Syslog - Process sshd - SSH Session Closed|disconnect<!-- -->
<ul>
<li class="">Updated mapper name, and added "sshd-disconnect" to event ID pattern. Adds mappings for srcDevice_ip, description, action.</li>
</ul>
</li>
<li class="">[Updated] Linux OS Syslog - Process sshd - SSH Session Opened<!-- -->
<ul>
<li class="">Adds mapping for srcDevice_ip</li>
</ul>
</li>
<li class="">[Updated] Linux OS Syslog - Process sshd - SSH Session Starting<!-- -->
<ul>
<li class="">Adds mappings for srcDevice_ip, srcPort</li>
</ul>
</li>
<li class="">[Updated] Linux OS Syslog - Process sudo - Superuser Do Command Execution<!-- -->
<ul>
<li class="">Adds mapping for description</li>
</ul>
</li>
<li class="">[Updated] PingFederate - Authentication Event<!-- -->
<ul>
<li class="">Added logon normalizedAction to mapper</li>
</ul>
</li>
<li class="">[Updated] Pulse Secure Custom Parser - AUT24326<!-- -->
<ul>
<li class="">Added logon normalizedAction to mapper</li>
</ul>
</li>
<li class="">[Updated] Windows - Security - 4648<!-- -->
<ul>
<li class="">Adds logon normalizedAction mapping</li>
</ul>
</li>
<li class="">[Updated] Okta Authentication - auth_via_AD_agent</li>
<li class="">[Updated] Okta Authentication - auth_via_mfa</li>
<li class="">[Updated] Okta Authentication - auth_via_radius</li>
<li class="">[Updated] Okta Authentication - sso</li>
<li class="">[Updated] Okta Authentication Events</li>
<li class="">[Updated] Okta Catch All</li>
<li class="">[Updated] Okta Security Threat Events</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-7">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#parsers-7" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Linux/Linux OS Syslog<!-- -->
<ul>
<li class="">Adds new parsing patterns for cron, sshd, sudo, and systemd. Adjusts existing sshd parsing patterns.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="schema">Schema<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#schema" class="hash-link" aria-label="Direct link to Schema" title="Direct link to Schema" translate="no">​</a></h4>
<ul>
<li class="">[New] repository<!-- -->
<ul>
<li class="">The name or path of a centrally managed object storage location, such as a Git repository, a container repository, or similar concepts.</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="august-5-2024---content-release">August 5, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#august-5-2024---content-release" class="hash-link" aria-label="Direct link to August 5, 2024 - Content Release" title="Direct link to August 5, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes:</p>
<ul>
<li class="">A new Cloud SIEM First Seen rule</li>
<li class="">Consolidation of AWSGuardDuty log mappers</li>
<li class="">CrowdStrike FDR mapping modifications by adding <code>aid</code> as a value for <code>device_hostname</code> as primary or alternate</li>
<li class="">Mapping update to Windows PowerShell operational events to facilitate a JSON data set from the legacy Windows format</li>
<li class="">Several new log mappers, parsers, and multiple updated parsers</li>
</ul>
<p>Release specifics are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-9">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rules-9" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">NEW FIRST-S00062 First Seen IP Address Connecting to Active Directory Certificate Services Process<!-- -->
<ul>
<li class="">This alert looks at Windows Filtering Platform Events and flags when a first seen IP address connects to the certificate services process.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-9">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-9" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Deleted] AWS GuardDuty Alerts from Sumo CIP</li>
<li class="">[Deleted] AWSGuardDuty_Backdoor</li>
<li class="">[Deleted] AWSGuardDuty_Behavior</li>
<li class="">[Deleted] AWSGuardDuty_Catch_All</li>
<li class="">[Deleted] AWSGuardDuty_CryptoCurrency</li>
<li class="">[Deleted] AWSGuardDuty_Discovery</li>
<li class="">[Deleted] AWSGuardDuty_Exfiltration</li>
<li class="">[Deleted] AWSGuardDuty_PenTest</li>
<li class="">[Deleted] AWSGuardDuty_Persistence</li>
<li class="">[Deleted] AWSGuardDuty_Policy</li>
<li class="">[Deleted] AWSGuardDuty_ResourceConsumption</li>
<li class="">[Deleted] AWSGuardDuty_Stealth</li>
<li class="">[Deleted] AWSGuardDuty_Trojan</li>
<li class="">[Retired] AwsServiceEvent-AWS API Call via CloudTrail</li>
<li class="">[Deleted] Recon_EC2_PortProbeUnprotectedPort</li>
<li class="">[Deleted] Recon_EC2_Portscan</li>
<li class="">[Deleted] Recon_IAMUser</li>
<li class="">[Deleted] UnauthorizedAccess_EC2_SSHBruteForce</li>
<li class="">[Deleted] UnauthorizedAccess_EC2_TorClient</li>
<li class="">[Deleted] UnauthorizedAccess_EC2_TorIPCaller</li>
<li class="">[Deleted] UnauthorizedAccess_EC2_TorRelay</li>
<li class="">[Deleted] UnauthorizedAccess_IAMUser</li>
<li class="">[Updated] AWS GuardDuty Alerts from Sumo CIP</li>
<li class="">[New] AWS Redshift - ACTIVITY_LOG</li>
<li class="">[New] AWS Redshift - Authentication Log</li>
<li class="">[New] AWS Redshift - Connection Log</li>
<li class="">[New] AWS Redshift - USER_LOG</li>
<li class="">[New] AWSGuardDuty - Audit Events</li>
<li class="">[Updated] AWSGuardDuty - AwsServiceEvent-AWS API Call via CloudTrail</li>
<li class="">[New] AWSGuardDuty - Reconnaissance and malicious activity detection</li>
<li class="">[Updated] AWSGuardDuty - Tor Client and Relay</li>
<li class="">[Updated] AWSGuardDuty - UnauthorizedAccess_EC2_TorIPCaller</li>
<li class="">[Updated] AWSGuardDuty_Catch_All</li>
<li class="">[New] Forescout CounterACT - NAC Policy Log</li>
<li class="">[New] PingFederate - Authentication Event</li>
<li class="">[New] Symantec Endpoint Security - All</li>
<li class="">[Updated] UnauthorizedAccess_EC2_SSHBruteForce</li>
<li class="">[New] VMware NSX - Firewall</li>
<li class="">[Updated] CloudTrail Default Mapping<!-- -->
<ul>
<li class="">Added alternate values for <code>userIdentity.arn</code>, and <code>requestParameters.sourceIdentity</code> applied to <code>user_role</code>. Additional mappings for <code>bytesIn</code>, and <code>bytesOut</code>.</li>
</ul>
</li>
<li class="">[Updated] CrowdStrike FDR - Catch All</li>
<li class="">[Updated] CrowdStrike FDR - CriticalFileAccessed</li>
<li class="">[Updated] CrowdStrike FDR - NetworkConnectIP4</li>
<li class="">[Updated] CrowdStrike FDR - NetworkConnectIP6</li>
<li class="">[Updated] CrowdStrike FDR - ProcessRollup2</li>
<li class="">[Updated] CrowdStrike FDR - SuspiciousDnsRequest</li>
<li class="">[Updated] PingFederate Event<!-- -->
<ul>
<li class="">Narrowed the lookup scope where success is true.</li>
</ul>
</li>
<li class="">[Updated] Windows - Microsoft-Windows-PowerShell/Operational Events - 4103 through 4105<!-- -->
<ul>
<li class="">Updated keys for: <code>user_userId</code>, <code>user_username</code>, <code>commandLine</code>, <code>baseImage</code>, <code>file_path</code>, and <code>severity</code>.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-8">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#parsers-8" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/AWS/AWS Redshift</li>
<li class="">[Updated] /Parsers/System/Forescout/Forescout CounterACT<!-- -->
<ul>
<li class="">Updated the start time field.</li>
</ul>
</li>
<li class="">[New] /Parsers/System/Symantec/Symantec Endpoint Security</li>
<li class="">[New] /Parsers/System/VMware/VMware NSX</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco Meraki<!-- -->
<ul>
<li class="">Added support for URLS new format.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/PingIdentity/PingFederate<!-- -->
<ul>
<li class="">Added support of new log format.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Microsoft/Windows PowerShell-JSON<!-- -->
<ul>
<li class="">Dropped the redundant message field.</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="july-16-2024---content-release">July 16, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#july-16-2024---content-release" class="hash-link" aria-label="Direct link to July 16, 2024 - Content Release" title="Direct link to July 16, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes rule and parser bug fixes, and parsing and mapping support for new log sources. Changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-10">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rules-10" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00419 Multiple File Extensions<!-- -->
<ul>
<li class="">Fixed bug in summary expression causing baseImage to appear as null</li>
</ul>
</li>
<li class="">[Updated] MATCH-S00755 Outlook Form Creation<!-- -->
<ul>
<li class="">Fixed bug in rule expression where baseImage had incorrect case</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-10">Log mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-10" class="hash-link" aria-label="Direct link to Log mappers" title="Direct link to Log mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] CrowdStrike Spotlight - Vulnerability</li>
<li class="">[New] JumpCloud IdP - Catch All</li>
<li class="">[New] JumpCloud IdP Authentication</li>
<li class="">[New] Kaspersky Endpoint Security Catch All</li>
<li class="">[New] Linux OS Syslog - sshd - Command Execution</li>
<li class="">[New] Linux OS Syslog - sshd - connection</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-9">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#parsers-9" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/CrowdStrike/CrowdStrike Spotlight</li>
<li class="">[New] /Parsers/System/JumpCloud/JumpCloud IdP</li>
<li class="">[New] /Parsers/System/Kaspersky/Kaspersky Endpoint Security</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ISE<!-- -->
<ul>
<li class="">Bug fix for variation in syslog headers</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Linux/Linux OS Syslog<!-- -->
<ul>
<li class="">Added support for additional variations in SSHD and CRON logs</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="july-3-2024---content-release">July 3, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#july-3-2024---content-release" class="hash-link" aria-label="Direct link to July 3, 2024 - Content Release" title="Direct link to July 3, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes new and updated rules, log mappers, and parsers. Details are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-11">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rules-11" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00139 Abnormal Parent-Child Process Combination<!-- -->
<ul>
<li class="">Removed leading backslash from like matches</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-11">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-11" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] ApplicationGatewayAccessLog</li>
<li class="">[New] ApplicationGatewayFirewallLog</li>
<li class="">[New] Citrix NetScaler - TCP-CONN_TERMINATE</li>
<li class="">[New] Google G Suite - login - password_change/recovery_info_change</li>
<li class="">[New] Google G Suite - login-blocked_sender_change</li>
<li class="">[New] JFrog Artifactory - Access logs</li>
<li class="">[New] JFrog Artifactory - Login Access logs</li>
<li class="">[New] JFrog Artifactory - Request Logs</li>
<li class="">[New] Synergis Genetec - all</li>
<li class="">[Updated] AWS EKS - Custom Parser<!-- -->
<ul>
<li class="">Keys updated: <code>'srcDevice_ip'</code>, <code>'http_response_statusCode'</code>, <code>'http_url'</code>, <code>'http_userAgent'</code>, <code>'user_username'</code>, <code>'user_userId'</code>, <code>'action'</code>, <code>'device_k8s_namespace'</code></li>
</ul>
</li>
<li class="">[Updated] Abnormal Security Threats<!-- -->
<ul>
<li class="">Keys updated: <code>'threat_referenceUrl'</code>, <code>'email_subject'</code>, <code>'resource'</code>, <code>'email_sender'</code>, <code>'user_email'</code>, <code>'user_username'</code>, <code>'targetUser_email'</code>, <code>'action'</code>, <code>'threat_identifier'</code>, <code>'user_authDomain'</code>, <code>'srcDevice_ip'</code>, <code>'email_messageId'</code>, <code>'srcDevice_hostname'</code>, <code>'threat_name'</code>, <code>'threat_category'</code>, <code>'timestamp'</code></li>
</ul>
</li>
<li class="">[Updated] Cisco ASA 305011-12 JSON<!-- -->
<ul>
<li class="">Keys updated: <code>'user_authDomain'</code>, <code>'user_username'</code></li>
</ul>
</li>
<li class="">[Updated] GitHub JSON<!-- -->
<ul>
<li class="">Keys updated: <code>'user_username'</code>, <code>'user_role'</code>, <code>'user_userId'</code>, <code>'description'</code>, <code>'http_url'</code>, <code>'device_hostname'</code></li>
</ul>
</li>
<li class="">[Updated] SentinelOne Logs - Syslog Custom Parser<!-- -->
<ul>
<li class="">Keys updated: <code>'srcDevice_osName'</code></li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-10">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#parsers-10" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Atlassian/Atlassian Jira</li>
<li class="">[New] /Parsers/System/Genetec/Genetec Synergis</li>
<li class="">[New] /Parsers/System/Github/Github</li>
<li class="">[New] /Parsers/System/JFrog/JFrog Artifactory</li>
<li class="">[Updated] /Parsers/System/AWS/AWS EKS</li>
<li class="">[Updated] /Parsers/System/Abnormal Security/Abnormal Security</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ASA</li>
<li class="">[Updated] /Parsers/System/Citrix/Citrix NetScaler Syslog</li>
<li class="">[Updated] /Parsers/System/Cylance/Cylance Syslog</li>
<li class="">[Updated] /Parsers/System/Microsoft/Microsoft Azure JSON</li>
<li class="">[Updated] /Parsers/System/Orca Security/Orca Security</li>
<li class="">[Updated] /Parsers/System/SentinelOne/SentinelOne CEF</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-30-2024---content-release">May 30, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#may-30-2024---content-release" class="hash-link" aria-label="Direct link to May 30, 2024 - Content Release" title="Direct link to May 30, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes several new and multiple updated log mappers, plus several updated parsers. Details are enumerated below:</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-12">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-12" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Cisco Meraki Firewall - Custom Parser<!-- -->
<ul>
<li class="">Minor changes in cisco meraki mapper</li>
</ul>
</li>
<li class="">[New] Jamf Parser - Alert<!-- -->
<ul>
<li class="">Removed wrong field</li>
</ul>
</li>
<li class="">[New] Jamf Parser - Network<!-- -->
<ul>
<li class="">Removed wrong field</li>
</ul>
</li>
<li class="">[Updated] AWS GuardDuty Alerts from Sumo CIP<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] AWS S3 Server Access Log - Custom Parser<!-- -->
<ul>
<li class="">Map bytesIn/bytesOut in AWS CloudTrail Data Events</li>
<li class="">Keys updated: bytesIn, bytesOut</li>
</ul>
</li>
<li class="">[Updated] AWSGuardDuty_Backdoor<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] AWSGuardDuty_Behavior<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] AWSGuardDuty_Catch_All<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] AWSGuardDuty_CryptoCurrency<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] AWSGuardDuty_Discovery<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] AWSGuardDuty_Exfiltration<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] AWSGuardDuty_PenTest<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] AWSGuardDuty_Persistence<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] AWSGuardDuty_Policy<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] AWSGuardDuty_ResourceConsumption<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] AWSGuardDuty_Stealth<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] AWSGuardDuty_Trojan<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">Updated] AwsServiceEvent-AWS API Call via CloudTrail<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] BlueCat DHCP Parser - Catch All<!-- -->
<ul>
<li class="">Changed mac address field in mapper</li>
<li class="">Keys updated: device_mac, timestamp</li>
</ul>
</li>
<li class="">[Updated] Code42 Incydr FileEvents C2C<!-- -->
<ul>
<li class="">Mapper adjustments</li>
<li class="">Keys updated: event_id_pattern, user_username, file_path, severity, normalizedSeverity, threat_name</li>
</ul>
</li>
<li class="">[Updated] Recon_EC2_PortProbeUnprotectedPort<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] Recon_EC2_Portscan<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] Recon_IAMUser<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] UnauthorizedAccess_EC2_SSHBruteForce<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] UnauthorizedAccess_EC2_TorClient<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] UnauthorizedAccess_EC2_TorIPCaller<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] UnauthorizedAccess_EC2_TorRelay<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
<li class="">[Updated] UnauthorizedAccess_IAMUser<!-- -->
<ul>
<li class="">Added region field in all the events</li>
<li class="">Keys updated: cloud_region</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-11">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#parsers-11" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/BlueCat/BlueCat DHCP-DNS Syslog</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco Meraki</li>
<li class="">[Updated] /Parsers/System/Code42/Code42 Incydr</li>
<li class="">[Updated] /Parsers/System/Jamf/Jamf</li>
<li class="">[Updated] /Parsers/System/Microsoft/Shared/Syslog Headers Microsoft</li>
<li class="">[Updated] /Parsers/System/Microsoft/Shared/Windows Forwarding Headers</li>
<li class="">[Updated] /Parsers/System/Microsoft/Shared/Windows Text Transforms - Security</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-30-2024---application-update">May 30, 2024 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#may-30-2024---application-update" class="hash-link" aria-label="Direct link to May 30, 2024 - Application Update" title="Direct link to May 30, 2024 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#minor-changes-and-enhancements" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] To help facilitate investigations and audits, a list of the sourceMessageIds for each of the records that contributed to a Threshold, Chain, or Aggregation Signal are now included in that Signal's record in the <code>sec_signal</code> index, in the new <code>aggregatedMessageIds</code> field.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#bug-fixes" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">The Community view on the MITRE ATT&amp;CK® Threat Coverage Explorer was not filtering by default properly.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-23-2024---content-release">May 23, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#may-23-2024---content-release" class="hash-link" aria-label="Direct link to May 23, 2024 - Content Release" title="Direct link to May 23, 2024 - Content Release" translate="no">​</a></h3>
<p>This release includes new Cloud SIEM detection rules, and updates to existing rules to correct summary and description expressions. All changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-12">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rules-12" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] FIRST-S00061 First Seen USB device in use on Windows host<!-- -->
<ul>
<li class="">This signal looks for a new removable USB device name being used by a host not seen since the baseline period. This activity by itself is not necessarily malicious, but can be indicative of potential lateral movement or initial access tactics. If the device name is unexpected and not authorized to be used in the environment, investigate the alert further and look for file creation events to the drive in question. The <code>fields["EventData.DeviceDescription"]</code> field contains the device name.</li>
</ul>
</li>
<li class="">[New] FIRST-S00059 First Seen esentutl command From User<!-- -->
<ul>
<li class="">Threat actors may use the esentutl utility to create volume shadow copies and/or backups on a Windows operating system, and retrieve the Active Directory database (NTDS.dit) file in order to extract credential material. Esentutl can also be utilized to download files from a remote share or URL. This activity should be treated as high priority if not performed by an authorized systems administrator as part of normal and planned systems maintenance.</li>
</ul>
</li>
<li class="">[New] FIRST-S00058 First Seen vssadmin command From User<!-- -->
<ul>
<li class="">Threat actors may use the vssadmin utility to create volume shadow copies on a Windows operating system, and retrieve the Active Directory database (NTDS.dit) file in order to extract credential material. This activity should be treated as high priority if not performed by an authorized systems administrator as part of normal and planned systems maintenance. If this activity is performed as part of normal system maintenance, the rule can be tuned to exclude these groups of users.</li>
</ul>
</li>
<li class="">[New] FIRST-S00060 First Seen wbadmin command From User<!-- -->
<ul>
<li class="">Threat actors may use the wbadmin utility to create volume shadow copies and/or backups on a Windows operating system, and retrieve the Active Directory database (NTDS.dit) file in order to extract credential material. This activity should be treated as high priority if not performed by an authorized systems administrator as part of normal and planned systems maintenance.</li>
</ul>
</li>
<li class="">[New] MATCH-S00908 Okta - MFA Request Denied by User<!-- -->
<ul>
<li class="">This signal will trigger when a user denies an MFA request within the Okta authenticator application. Examine other authentication attempts for this particular user, and undertake confirmation efforts to ensure that this activity is expected and valid.</li>
</ul>
</li>
<li class="">[New] MATCH-S00907 Okta - Policy Rule Added<!-- -->
<ul>
<li class="">This rule looks for an Okta application being created. Ensure that this activity is expected and authorized. Only Okta administrators should be creating applications. Check the Okta administrator portal for more details regarding the application in question such as scopes and access levels. The field <code>fields["target.1.alternateId"]</code> contains the name of the application that was created</li>
</ul>
</li>
<li class="">[New] MATCH-S00905 Okta - Programmatic Access to Users API Endpoint<!-- -->
<ul>
<li class="">This signal looks for programmatic (PowerShell, Golang, Python or Curl) access to the Okta users API endpoint. This endpoint provides functionality to perform various actions on Okta user accounts such as password resets and account unlocks. A full list of functionality for this endpoint can be found in the Okta documentation <a href="https://developer.okta.com/docs/reference/api/users/" target="_blank" rel="noopener noreferrer" class="">here</a>. The <code>\u201cSuccess\u201d</code> field will indicate whether this API request was successful or not, and the <code>\u201cDescription\u201d</code> field will contain the event that was generated by the API request. Both failed and successful requests should be investigated. Ensure that this request was performed for legitimate purposes such as developer workflows or other automation mechanisms. Consider adding a match list exclusion with authorized accounts who perform requests to this Okta API endpoint via programmatic methods if this signal is triggering false positives.</li>
</ul>
</li>
<li class="">[New] MATCH-S00917 Suspicious PowerShell Application Window Discovery COM method<!-- -->
<ul>
<li class="">This PowerShell COM method allows for discovery of running application windows, along with the process path and window location coordinates. Investigation of the host is recommended to identify the behavior leading to and around the execution of this PowerShell process.</li>
</ul>
</li>
<li class="">[New] MATCH-S00920 Suspicious PowerShell Window Discovery Cmdlet execution<!-- -->
<ul>
<li class="">Detects the use of PowerShell for Application Window Discovery to identify open application windows to gather information on running programs, collect potential data, and discover security tooling. Investigation into the host and user to identify the process executing the PowerShell function. See <a href="https://www.ired.team/offensive-security/enumeration-and-discovery/t1010-application-window-discovery" target="_blank" rel="noopener noreferrer" class="">here</a> for reference.</li>
</ul>
</li>
<li class="">[New] MATCH-S00918 Suspicious cat of PAM common-password policy<!-- -->
<ul>
<li class="">The Pluggable Authentication Module (PAM) in Linux allows system administrators to choose how applications authenticate users. The common-password file defines behavior of password use in Linux subsystems. This detection looks for use of cat to display the contents of the common-password file, which should not be a common occurrence on systems. It is recommended to investigate the host upon which this detection occurs to understand the exposure of the password policies for the system.</li>
</ul>
</li>
<li class="">[New] MATCH-S00919 chage command use on host<!-- -->
<ul>
<li class="">The chage command on Linux allows for the changing of user password expiry information. The chage command is restricted to the root user; however, non-root/unprivileged users may use the <code>-l</code> flag to determine when the user's password or account is due to expire. It is recommended to investigate the system and account the command has been executed on, to assess the intent of this execution. Additionally, looking at the command line and parent process is helpful in identifying valid automated processes executing this command that would benefit from tuning out via Rule Tuning.</li>
</ul>
</li>
<li class="">[Updated] FIRST-S00023 First Seen AWS API Gateway Enumeration by User</li>
<li class="">[Updated] FIRST-S00036 First Seen AWS EKS API Call via CloudTrail from User</li>
<li class="">[Updated] FIRST-S00035 First Seen AWS EKS Secrets Enumeration from IP Address</li>
<li class="">[Updated] FIRST-S00032 First Seen Kubectl Command From User</li>
<li class="">[Updated] FIRST-S00022 First Seen S3 Bucket ACL Enumeration by User</li>
<li class="">[Updated] FIRST-S00034 First Seen Session Token Granted to User from New IP</li>
<li class="">[Updated] MATCH-S00906 Okta - Application Created</li>
<li class="">[Updated] AGGREGATION-S00008 Okta - Session Anomaly (Multiple ASNs)</li>
<li class="">[Updated] AGGREGATION-S00009 Okta - Session Anomaly (Multiple User Agents)</li>
<li class="">[Updated] MATCH-S00865 Potential Docker Escape via Command Line</li>
<li class="">[Updated] MATCH-S00817 Suspicious Azure Active Directory Device Code Authentication</li>
<li class="">[Updated] MATCH-S00883 macOS - Keychain Enumeration</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-15-2024---content-release">May 15, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#may-15-2024---content-release" class="hash-link" aria-label="Direct link to May 15, 2024 - Content Release" title="Direct link to May 15, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes an updated log mapper, and two updated parsers. Details are enumerated below.</p>
<p>Additionally, MATCH-S00408 has been decommissioned because it was not functioning as intended.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-13">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rules-13" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Deleted] MATCH-S00408 Fake Windows Processes</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-13">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-13" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] SentinelOne Logs - C2C threats</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-12">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#parsers-12" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Dell/Dell SonicWall</li>
<li class="">[Updated] /Parsers/System/Okta/Okta</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-15-2024---application-update">May 15, 2024 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#may-15-2024---application-update" class="hash-link" aria-label="Direct link to May 15, 2024 - Application Update" title="Direct link to May 15, 2024 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rule-based-signal-suppression">Rule-Based Signal Suppression<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rule-based-signal-suppression" class="hash-link" aria-label="Direct link to Rule-Based Signal Suppression" title="Direct link to Rule-Based Signal Suppression" translate="no">​</a></h4>
<p>We've added an advanced rule feature that allows users to override the global signal suppression period. This is most useful for individual rules that require much shorter (or no) suppression, such as rules that pass alerts through from external data sources such as endpoint detection systems.</p>
<p>This setting can be accessed from the rule details page:</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/csiem-rule-signal-suppression.jpg" alt="Rule-Level Signal Suppression Settings in Cloud SIEM">
<p>The setting is in the "Show Advanced" section. You can specify a suppression period for the rule between 0 and 168 hours (if you set it to 0, suppression is completely disabled for the rule).</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-1">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#minor-changes-and-enhancements-1" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">Users can now view the MITRE ATT&amp;CK® Threat Coverage Explorer with only the View Rules permission; previously users had to have the Manage Rules permission to access the Explorer.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-1">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#bug-fixes-1" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">Some system events that automatically occur after an Insight is created (such as enrichment, automation service calls, and so on) were not consistently executing.</li>
<li class="">Some system events that automatically occur just before rule processing (such as adding Geo IP and ASN data, checking match lists, and so on) were not consistently executing.</li>
<li class="">Users were unable to duplicate rules due to an internal error.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-2-2024---content-release">May 2, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#may-2-2024---content-release" class="hash-link" aria-label="Direct link to May 2, 2024 - Content Release" title="Direct link to May 2, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes seventeen new rules and two updated rules. Details are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-14">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rules-14" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[NEW] MATCH-S00896 Azure Authentication Policy Change</li>
<li class="">[NEW] MATCH-S00895 NinjaCopy Usage Detected</li>
<li class="">[NEW] MATCH-S00906 Okta - Application Created</li>
<li class="">[NEW] MATCH-S00903 Okta - Device Added To User</li>
<li class="">[NEW] MATCH-S00904 Okta - Device Removed From User</li>
<li class="">[NEW] CHAIN-S00020 Okta - MFA Denied Followed by Successful Logon</li>
<li class="">[NEW] AGGREGATION-S00008 Okta - Session Anomaly (Multiple ASNs)</li>
<li class="">[NEW] AGGREGATION-S00007 Okta - Session Anomaly (Multiple Operating Systems)</li>
<li class="">[NEW] AGGREGATION-S00009 Okta - Session Anomaly (Multiple User Agents)</li>
<li class="">[NEW] MATCH-S00900 Overly-Permissive Active Directory Certificate Template Loaded</li>
<li class="">[NEW] CHAIN-S00019 Potential Active Directory Certificate Services Enrollment Agent Misconfiguration</li>
<li class="">[NEW] MATCH-S00898 Potentially Misconfigured Active Directory Certificate Template Loaded</li>
<li class="">[NEW] MATCH-S00901 Potentially Vulnerable Active Directory Certificate Services Template Loaded</li>
<li class="">[NEW] MATCH-S00706 Registry Modification - Time Providers</li>
<li class="">[NEW] MATCH-S00690 Rundll32.exe Load from TEMP Directory with By Ordinal Load</li>
<li class="">[NEW] MATCH-S00899 Suspicious Active Directory Certificate Modification</li>
<li class="">[NEW] MATCH-S00902 Suspicious Active Directory Certificate Modification - Enrollment Agent</li>
<li class="">[Updated] MATCH-S00706 Registry Modification - Time Providers<!-- -->
<ul>
<li class="">Improved logic expression</li>
</ul>
</li>
<li class="">[Updated] MATCH-S00690 Rundll32.exe Load from TEMP Directory with By Ordinal Load<!-- -->
<ul>
<li class="">Clarified Summary</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-11-2024---application-update">April 11, 2024 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#april-11-2024---application-update" class="hash-link" aria-label="Direct link to April 11, 2024 - Application Update" title="Direct link to April 11, 2024 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="mitre-attck-coverage-enhancements">MITRE ATT&amp;CK® Coverage Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#mitre-attck-coverage-enhancements" class="hash-link" aria-label="Direct link to MITRE ATT&amp;CK® Coverage Enhancements" title="Direct link to MITRE ATT&amp;CK® Coverage Enhancements" translate="no">​</a></h4>
<p>We're excited to announce multiple enhancements to our MITRE ATT&amp;CK Threat Coverage Explorer.</p>
<ul>
<li class=""><strong>Rules Filtering</strong> - You can now easily filter the coverage visualization based on rules, including out-of-the-box and user-created rules, as well as enabled, disabled, production and prototype rules.</li>
<li class=""><strong>All Community Activity</strong> - This view now defaults to show only the vendor and product logs that are being sent to Cloud SIEM from your data sources. This gives you a better comparison between what your theoretical and historical coverage shows and what other customers of Cloud SIEM using those same log sources are seeing. You can still change the filter to display other (or all) log sources.</li>
<li class=""><strong>Customizable Colors</strong> - You can now customize the tile colors to your own scheme. <br><img src="https://www.sumologic.com/help/img/release-notes/cse/mitre-attack-explorer-custom-colors.jpg" alt="Custom MITRE ATT&amp;CK Explorer Color Palette"></li>
</ul>
<p>For full details, see the <a class="" href="https://www.sumologic.com/help/docs/cse/administration/mitre-coverage/">MITRE ATT&amp;CK Coverage documentation</a>.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-ui-themes-for-cloud-siem">New UI Themes for Cloud SIEM<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#new-ui-themes-for-cloud-siem" class="hash-link" aria-label="Direct link to New UI Themes for Cloud SIEM" title="Direct link to New UI Themes for Cloud SIEM" translate="no">​</a></h4>
<p>We are also excited to announce that Cloud SIEM now supports two different UI themes: the default "dark" theme, and a new "light" theme:</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/csiem-light-dark-theme.jpg" alt="Light and Dark theme examples in Cloud SIEM">
<p>The theme is set per user, and can be changed on the Sumo Logic user preferences page:</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/theme-setting.png" alt="Option to change UI theme">
<p>Note that the setting currently only affects Cloud SIEM and the Automation Service, but in the future this setting will also affect other pages in the Sumo Logic UI.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-2">Bug fixes<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#bug-fixes-2" class="hash-link" aria-label="Direct link to Bug fixes" title="Direct link to Bug fixes" translate="no">​</a></h4>
<ul>
<li class="">Terraform no longer times out while waiting for match lists to be updated.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-5-2024---content-release">April 5, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#april-5-2024---content-release" class="hash-link" aria-label="Direct link to April 5, 2024 - Content Release" title="Direct link to April 5, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes a corrective update to a match rule summary expression and a log mapping bug fix. Changes are enumerated below.</p>
<ul>
<li class="">Rules<!-- -->
<ul>
<li class="">[Updated] MATCH-S00137 Office Application or Browser Launching Shell<!-- -->
<ul>
<li class="">Fix typo in summary expression key</li>
<li class="">Keys updated: <code>summary_expression</code>, <code>normalized_summary</code></li>
</ul>
</li>
</ul>
</li>
<li class="">Log Mappers<!-- -->
<ul>
<li class="">[Updated] Microsoft Office 365 Active Directory Authentication Events<!-- -->
<ul>
<li class="">Office_365 Mapping Correction</li>
<li class="">Keys updated: <code>user_userId</code></li>
</ul>
</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="march-28-2024---content-release">March 28, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#march-28-2024---content-release" class="hash-link" aria-label="Direct link to March 28, 2024 - Content Release" title="Direct link to March 28, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes updated log mappers for Windows Sysmon as enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-14">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-14" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 1</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 10</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 11</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 12, 13, and 14</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 15</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 17</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 18</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 2</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 21</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 22</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 23</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 24</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 25</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 26</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 27</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 28</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 3</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 4</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 5</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 6</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 7</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 8</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 9</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="march-22-2024---application-update">March 22, 2024 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#march-22-2024---application-update" class="hash-link" aria-label="Direct link to March 22, 2024 - Application Update" title="Direct link to March 22, 2024 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-2">Minor changes and enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#minor-changes-and-enhancements-2" class="hash-link" aria-label="Direct link to Minor changes and enhancements" title="Direct link to Minor changes and enhancements" translate="no">​</a></h4>
<ul>
<li class="">Two enhancements have been implemented for the MITRE ATT&amp;CK® Threat Coverage Explorer:<!-- -->
<ul>
<li class="">The current tactic, technique and sub-technique metrics for the (default) Theoretical and Historical views are now written to the <code>sumologic_system_events</code> audit logs daily. This data can be used in dashboards to track coverage and events over time.</li>
<li class="">It is now possible, using the <code>/mitre-attack/json</code> endpoint, to extract the MITRE Explorer-formatted JSON via API. (This works the same as the <strong>Export</strong> button in the UI.)</li>
</ul>
</li>
<li class="">On the Insight details page, on the Entities tab, the default view is now the Graph view instead of the List view.</li>
<li class="">Threat reputation icons/labels are now visible in a number of additional places throughout the UI. These can be set via enrichment.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-3">Bug fixes<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#bug-fixes-3" class="hash-link" aria-label="Direct link to Bug fixes" title="Direct link to Bug fixes" translate="no">​</a></h4>
<ul>
<li class="">In some cases, events that are supposed to occur automatically after an Insight is opened were not executing, or were severely delayed.</li>
<li class="">If an Insight comment included a long URL, text wrapping was not behaving correctly and some text was being clipped from view. Also, newline characters were not always being honored properly in comments.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="march-21-2024---content-release">March 21, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#march-21-2024---content-release" class="hash-link" aria-label="Direct link to March 21, 2024 - Content Release" title="Direct link to March 21, 2024 - Content Release" translate="no">​</a></h3>
<p>This release includes new rule, mapping, parsing, and content updates. Changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-15">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rules-15" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00610 PSExec Named Pipe Created by Non-PsExec Process<!-- -->
<ul>
<li class="">Expression Key updated</li>
</ul>
</li>
<li class="">[Updated] MATCH-S00159 Windows - Permissions Group Discovery<!-- -->
<ul>
<li class="">Removed FirstSeen language in the match rule</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-15">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-15" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Cato Networks Security Events - Catch All</li>
<li class="">[New] Windows - Security - 5156</li>
<li class="">[Updated] 1Password Item Audit Actions<!-- -->
<ul>
<li class="">Updated event id pattern</li>
</ul>
</li>
<li class="">[Updated] 1Password Item Usage Actions<!-- -->
<ul>
<li class="">Updated event id pattern</li>
</ul>
</li>
<li class="">[Updated] Azure Application Service Console Logs<!-- -->
<ul>
<li class="">Azure Custom Parser Normalized Severity key update</li>
</ul>
</li>
<li class="">[Updated] Azure Event Hub - Windows Defender Logs - DeviceAlertEvents<!-- -->
<ul>
<li class="">Azure Custom Parser Normalized Severity key update</li>
</ul>
</li>
<li class="">[Updated] Azure Risky Users<!-- -->
<ul>
<li class="">Azure Custom Parser Normalized Severity key update</li>
</ul>
</li>
<li class="">[Updated] Azure User Risk Events<!-- -->
<ul>
<li class="">Azure Custom Parser Normalized Severity key update</li>
</ul>
</li>
<li class="">[Updated] Microsoft Defender for Cloud - Security Alerts<!-- -->
<ul>
<li class="">Azure Custom Parser Normalized Severity key update</li>
</ul>
</li>
<li class="">[Updated] Okta Authentication - sso<!-- -->
<ul>
<li class="">Application key updated</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="march-11-2024---content-release">March 11, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#march-11-2024---content-release" class="hash-link" aria-label="Direct link to March 11, 2024 - Content Release" title="Direct link to March 11, 2024 - Content Release" translate="no">​</a></h3>
<p>This release includes new rule, mapping, parsing, and content updates. Changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-16">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rules-16" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00521 Windows - Critical Service Disabled via Command Line<!-- -->
<ul>
<li class="">Updated rule expression to reduce false positivity.</li>
</ul>
</li>
<li class="">[Updated] FIRST-S00044 First Seen AppID Generating MailIItemsAccessed Event<!-- -->
<ul>
<li class="">Updated Severity from 4 to 1.</li>
</ul>
</li>
<li class="">[Updated] FIRST-S00031 First Seen IP Address Associated with User for a Successful Azure AD Sign In Event<!-- -->
<ul>
<li class="">Fixed description and summary transposition and lowered severity from 3 to 1.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-16">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-16" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<p>Added userAgent mapping to Okta.</p>
<ul>
<li class="">[New] Kaltura Audits</li>
<li class="">[Updated] Okta Authentication - auth_via_mfa</li>
<li class="">[Updated] Okta Authentication Events</li>
<li class="">[Updated] Okta Catch All</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-13">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#parsers-13" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Kaltura/Kaltura</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="february-23-2024---content-release">February 23, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#february-23-2024---content-release" class="hash-link" aria-label="Direct link to February 23, 2024 - Content Release" title="Direct link to February 23, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes modifications and additions to Citrix Cloud C2C to handle additional event types and bring existing event mapping into line with new events, support for Code42 Incydr via C2C, Abnormal Security via C2C, and JumpCloud Directory Insights via C2C.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-17">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-17" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Deleted] Citrix Cloud Client<!-- -->
<ul>
<li class="">This mapping is replaced by new mappers for Citrix Cloud below</li>
</ul>
</li>
<li class="">[New] Abnormal Security Threats</li>
<li class="">[New] Citrix Cloud Operation Logs</li>
<li class="">[New] Citrix Cloud System Logs</li>
<li class="">[New] Code42 Incydr Alerts C2C</li>
<li class="">[New] Code42 Incydr Audits C2C</li>
<li class="">[New] Code42 Incydr FileEvents C2C</li>
<li class="">[New] JumpCloud Directory Insights - Admin Logon</li>
<li class="">[New] JumpCloud Directory Insights - Catch All</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-14">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#parsers-14" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Abnormal Security/Abnormal Security</li>
<li class="">[New] /Parsers/System/Code42/Code42 Incydr</li>
<li class="">[New] /Parsers/System/JumpCloud/JumpCloud Directory Insights</li>
<li class="">[Updated] /Parsers/System/Citrix/Citrix Cloud C2C</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="february-19-2024---content-release">February 19, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#february-19-2024---content-release" class="hash-link" aria-label="Direct link to February 19, 2024 - Content Release" title="Direct link to February 19, 2024 - Content Release" translate="no">​</a></h3>
<p>This release includes new log mapping and parsing content for Druva Cyber Resilience:</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-18">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-18" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Druva Cyber Resilience - Admin Logon</li>
<li class="">[New] Druva Cyber Resilience - Catch All</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-15">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#parsers-15" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Druva/Druva Cyber Resilience</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-4">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#bug-fixes-4" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">Recently, two rules, FIRST-S00052 and FIRST-S00049, were released to customers erroneously. Soon after, these rules started generating false positive Signals and Insights. We have removed those rules from all customer environments so they can be tuned properly and re-released after comprehensive testing. The process error that led to the release has been identified and corrected. Sumo Logic apologizes for the inadvertent Signals and Insights this error generated. If needed, please contact Support for assistance in closing the Insights.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="february-19-2024---application-update">February 19, 2024 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#february-19-2024---application-update" class="hash-link" aria-label="Direct link to February 19, 2024 - Application Update" title="Direct link to February 19, 2024 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-3">Minor changes and enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#minor-changes-and-enhancements-3" class="hash-link" aria-label="Direct link to Minor changes and enhancements" title="Direct link to Minor changes and enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] Continuing our work to better align the Cloud SIEM UI pages with Log Analytics UI pages to improve usability and provide a consistent user experience, the color palette has been adjusted slightly, some page decoration has been removed or altered, and some controls have been updated.</li>
<li class="">[New] On the Entity list page, you can now filter by reputation indicator (i.e. Malicious, Suspicious or NotFlagged).</li>
<li class="">[New] Users can now navigate directly from the Entity Activity panel on the HUD to the Entity List page, with the proper filter pre-applied.</li>
<li class="">[Updated] The <code>Object Type</code> attribute has been added back to the Signal summary section, next to the timestamp, so that it is visible whether the Signal details are expanded or collapsed.</li>
<li class="">[New] A user-editable <strong>Description</strong> field has been added to Rule Tuning Expressions.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-5">Bug fixes<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#bug-fixes-5" class="hash-link" aria-label="Direct link to Bug fixes" title="Direct link to Bug fixes" translate="no">​</a></h4>
<ul>
<li class="">Sorting by value was not working properly on the Entities list page.</li>
<li class="">Sometimes, if the target value was left blank (default), domain normalization would append a colon to the resulting value.</li>
<li class="">Customers were experiencing rate limiting with VirusTotal due to a change to their API and constant retries due to resultant errors in Cloud SIEM. This has been resolved, as has an issue with enrichments for file hashes.</li>
<li class="">Some Entities were not showing as being included in Entity Groups properly (even though attributes had been set correctly).</li>
<li class="">The MITRE ATT&amp;CK<super>®</super> <code>stage</code> attribute was missing from some Signals in the audit logs.</li>
<li class="">Custom inventory sources were not included in the appropriate dropdown in Entity Group configuration.</li>
<li class="">On the Entity Details page, if the only Signals that existed were in Prototype mode, they would not be visible.</li>
<li class="">The reputation indicator on the Entity Details page was being rendered, then hidden.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="february-13-2024---content-release">February 13, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#february-13-2024---content-release" class="hash-link" aria-label="Direct link to February 13, 2024 - Content Release" title="Direct link to February 13, 2024 - Content Release" translate="no">​</a></h3>
<p>This release includes new parsing and mapping support for C2C sources and mapping changes enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-19">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-19" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Trellix mVision ePO Threats</li>
<li class="">[New] Zero Networks Segment Audit Activity</li>
<li class="">[New] Zero Networks Segment Network Activity</li>
<li class="">[Updated] AzureActivityLog 01<!-- -->
<ul>
<li class="">Remapped <code>Application</code> from <code>properties.clientAppUsed</code> to <code>properties.appDisplayName</code> for consistency</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-16">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#parsers-16" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Trellix/Trellix MVision EPO</li>
<li class="">[New] /Parsers/System/Zero Networks/Zero Networks Segment</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="february-2-2024---content-release">February 2, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#february-2-2024---content-release" class="hash-link" aria-label="Direct link to February 2, 2024 - Content Release" title="Direct link to February 2, 2024 - Content Release" translate="no">​</a></h3>
<p>This release includes minor mapping adjustments to Duo and MS Graph Identify Protection Risk logs. Specific changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-20">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-20" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Duo Security Admin API - Audit<!-- -->
<ul>
<li class="">Added mappings for source host and source IP</li>
</ul>
</li>
<li class="">[Updated] Duo Security Admin API - Authentication<!-- -->
<ul>
<li class="">Added mappings for source host and source IP</li>
</ul>
</li>
<li class="">[Updated] Duo Security Admin API - Non-User Audit Changes<!-- -->
<ul>
<li class="">Added mappings for source host and source IP</li>
</ul>
</li>
<li class="">[Updated] Duo Security Admin API - Targeted User Audit Changes<!-- -->
<ul>
<li class="">Added mappings for source host and source IP</li>
</ul>
</li>
<li class="">[Updated] Microsoft Graph Identity Protection API C2C - riskDetections<!-- -->
<ul>
<li class="">Added principal as primary <code>user_username</code> key</li>
</ul>
</li>
<li class="">[Updated] Microsoft Graph Identity Protection API C2C - riskyUsers<!-- -->
<ul>
<li class="">Added principal as primary <code>user_username</code> key</li>
</ul>
</li>
</ul>
<div class="theme-admonition theme-admonition-tip alert alert--success admonition_WoCw"><div class="admonitionHeading_TMsN"><span class="admonitionIcon_Ibzs"><svg viewBox="0 0 12 16"><path fill-rule="evenodd" d="M6.5 0C3.48 0 1 2.19 1 5c0 .92.55 2.25 1 3 1.34 2.25 1.78 2.78 2 4v1h5v-1c.22-1.22.66-1.75 2-4 .45-.75 1-2.08 1-3 0-2.81-2.48-5-5.5-5zm3.64 7.48c-.25.44-.47.8-.67 1.11-.86 1.41-1.25 2.06-1.45 3.23-.02.05-.02.11-.02.17H5c0-.06 0-.13-.02-.17-.2-1.17-.59-1.83-1.45-3.23-.2-.31-.42-.67-.67-1.11C2.44 6.78 2 5.65 2 5c0-2.2 2.02-4 4.5-4 1.22 0 2.36.42 3.22 1.19C10.55 2.94 11 3.94 11 5c0 .66-.44 1.78-.86 2.48zM4 14h5c-.23 1.14-1.3 2-2.5 2s-2.27-.86-2.5-2z"></path></svg></span>tip</div><div class="admonitionContent_vXIg"><p>For all the up-to-date Cloud SIEM content, see the <a href="https://github.com/SumoLogic/cloud-siem-content-catalog" target="_blank" rel="noopener noreferrer" class="">Cloud SIEM Content Catalog</a>.</p></div></div>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="january-30-2024---content-release">January 30, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#january-30-2024---content-release" class="hash-link" aria-label="Direct link to January 30, 2024 - Content Release" title="Direct link to January 30, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes updates to log mappers for Zeek fixing several bugs that were preventing fields from mapping properly.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-21">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-21" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Zeek DNS Activity</li>
<li class="">[Updated] Zeek HTTP Activity</li>
<li class="">[Updated] Zeek conn Activity</li>
</ul>
<div class="theme-admonition theme-admonition-tip alert alert--success admonition_WoCw"><div class="admonitionHeading_TMsN"><span class="admonitionIcon_Ibzs"><svg viewBox="0 0 12 16"><path fill-rule="evenodd" d="M6.5 0C3.48 0 1 2.19 1 5c0 .92.55 2.25 1 3 1.34 2.25 1.78 2.78 2 4v1h5v-1c.22-1.22.66-1.75 2-4 .45-.75 1-2.08 1-3 0-2.81-2.48-5-5.5-5zm3.64 7.48c-.25.44-.47.8-.67 1.11-.86 1.41-1.25 2.06-1.45 3.23-.02.05-.02.11-.02.17H5c0-.06 0-.13-.02-.17-.2-1.17-.59-1.83-1.45-3.23-.2-.31-.42-.67-.67-1.11C2.44 6.78 2 5.65 2 5c0-2.2 2.02-4 4.5-4 1.22 0 2.36.42 3.22 1.19C10.55 2.94 11 3.94 11 5c0 .66-.44 1.78-.86 2.48zM4 14h5c-.23 1.14-1.3 2-2.5 2s-2.27-.86-2.5-2z"></path></svg></span>tip</div><div class="admonitionContent_vXIg"><p>For all the up-to-date Cloud SIEM content, see the <a href="https://github.com/SumoLogic/cloud-siem-content-catalog" target="_blank" rel="noopener noreferrer" class="">Cloud SIEM Content Catalog</a>.</p></div></div>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="january-12-2024---content-release">January 12, 2024 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#january-12-2024---content-release" class="hash-link" aria-label="Direct link to January 12, 2024 - Content Release" title="Direct link to January 12, 2024 - Content Release" translate="no">​</a></h3>
<p>This content release includes updates to Cloud SIEM rules, new log mappers, new parsers, and the addition of normalization schema metadata. Specific updates are enumerated below. In addition, a number of rules were updated to include more accurate MITRE ATT&amp;K® tactic and technique tags.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-17">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#rules-17" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00213 AWS CloudTrail - Reconnaissance related event<!-- -->
<ul>
<li class="">Updated name expression to reduce insight false positivity</li>
</ul>
</li>
<li class="">[Updated] MATCH-S00686 Base64 Decode in Command Line</li>
<li class="">[Updated] MATCH-S00373 BlueMashroom DLL Load</li>
<li class="">[Updated] FIRST-S00024 First Seen AWS SSM RunShellScript SendCommand From User</li>
<li class="">[Updated] FIRST-S00021 First Seen Azure Virtual Machine Run Command Issued by User</li>
<li class="">[Updated] FIRST-S00013 First Seen Driver Load - Global</li>
<li class="">[Updated] FIRST-S00014 First Seen Driver Load - Host</li>
<li class="">[Updated] FIRST-S00030 First Seen Outbound Connection to External IP Address on Port 445 from IP Address</li>
<li class="">[Updated] MATCH-S00705 Registry Modification - Authentication Package</li>
<li class="">[Updated] MATCH-S00707 Registry Modification - Winlogon Helper DLL</li>
<li class="">[Updated] MATCH-S00840 Suspicious Lambda Function - IAM Policy Attached</li>
<li class="">[Updated] MATCH-S00279 TAIDOOR RAT DLL Load</li>
<li class="">[Updated] MATCH-S00379 WMIExec VBS Script</li>
<li class="">[Updated] MATCH-S00570 WMIPRVSE Spawning Process<!-- -->
<ul>
<li class="">Corrected expression to exclude OS SID from <code>user_userId</code>; prior expression was incorrectly referencing <code>SubjectLogonID</code></li>
</ul>
</li>
<li class="">[Updated] MATCH-S00724 Windows Update Agent DLL Changed</li>
<li class="">[Updated] MATCH-S00435 XSL Script Processing</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-22">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#log-mappers-22" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] 1Password Item Audit Actions</li>
<li class="">[New] 1Password Item Usage Actions</li>
<li class="">[New] Zeek DNS Activity</li>
<li class="">[New] Zeek HTTP Activity</li>
<li class="">[New] Zeek conn Activity</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-17">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#parsers-17" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/1Password/1Password</li>
<li class="">[New] /Parsers/System/1PasswordC2C/1PasswordC2C</li>
<li class="">[New] /Parsers/System/Zeek/Zeek</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="schema-1">Schema<a href="https://www.sumologic.com/help/release-notes-cse/2024/12/31/#schema-1" class="hash-link" aria-label="Direct link to Schema" title="Direct link to Schema" translate="no">​</a></h4>
<ul>
<li class="">[New] metadata_sourceBlockId<!-- -->
<ul>
<li class="">The _blockId of the original source log message (from Sumo Logic)</li>
</ul>
</li>
</ul>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[2023 Release Notes Archive - Cloud SIEM]]></title>
            <link>https://www.sumologic.com/help/release-notes-cse/2023/12/31/</link>
            <guid>https://www.sumologic.com/help/release-notes-cse/2023/12/31/</guid>
            <pubDate>Sun, 31 Dec 2023 00:00:00 GMT</pubDate>
            <description><![CDATA[This is an archive of 2023 Cloud SIEM release notes. To view the full archive, click here. Release notes are available on our website for a rolling multi-year period. For information about older releases, contact Support.]]></description>
            <content:encoded><![CDATA[<p>This is an archive of 2023 Cloud SIEM release notes. To view the full archive, <a class="" href="https://www.sumologic.com/help/release-notes-cse/archive/">click here</a>. Release notes are available on our website for a rolling multi-year period. For information about older releases, contact <a href="https://support.sumologic.com/support/s" target="_blank" rel="noopener noreferrer" class="">Support</a>.</p>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="december-14-2023---application-update">December 14, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#december-14-2023---application-update" class="hash-link" aria-label="Direct link to December 14, 2023 - Application Update" title="Direct link to December 14, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements">Minor changes and enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#minor-changes-and-enhancements" class="hash-link" aria-label="Direct link to Minor changes and enhancements" title="Direct link to Minor changes and enhancements" translate="no">​</a></h4>
<ul>
<li class="">
<p>[New] A new attribute section has been added to Signal and Insight details returned by the API endpoints <code>GET /signals/{id}</code> and <code>GET /insights/{id}</code>. The section will include the log search string (along with start and end times) that you can use to retrieve the queried records for a given Signal. The stanza looks like this:</p>
<div class="language-json codeBlockContainer_Ckt0 theme-code-block" style="--prism-color:#393A34;--prism-background-color:#f6f8fa"><div class="codeBlockContent_QJqH"><pre tabindex="0" class="prism-code language-json codeBlock_bY9V thin-scrollbar" style="color:#393A34;background-color:#f6f8fa"><code class="codeBlockLines_e6Vv"><span class="token-line" style="color:#393A34"><span class="token property" style="color:#36acaa">"recordSearchDetails"</span><span class="token operator" style="color:#393A34">:</span><span class="token plain"> </span><span class="token punctuation" style="color:#393A34">{</span><span class="token plain"></span><br></span><span class="token-line" style="color:#393A34"><span class="token plain">  </span><span class="token property" style="color:#36acaa">"query"</span><span class="token operator" style="color:#393A34">:</span><span class="token plain"> </span><span class="token string" style="color:#e3116c">"{string}"</span><span class="token punctuation" style="color:#393A34">,</span><span class="token plain"></span><br></span><span class="token-line" style="color:#393A34"><span class="token plain">  </span><span class="token property" style="color:#36acaa">"queryStartTime"</span><span class="token operator" style="color:#393A34">:</span><span class="token plain"> </span><span class="token string" style="color:#e3116c">"{timestamp}"</span><span class="token punctuation" style="color:#393A34">,</span><span class="token plain"></span><br></span><span class="token-line" style="color:#393A34"><span class="token plain">  </span><span class="token property" style="color:#36acaa">"queryEndTime"</span><span class="token operator" style="color:#393A34">:</span><span class="token plain"> </span><span class="token string" style="color:#e3116c">"{timestamp}"</span><span class="token plain"></span><br></span><span class="token-line" style="color:#393A34"><span class="token plain"></span><span class="token punctuation" style="color:#393A34">}</span><span class="token punctuation" style="color:#393A34">,</span><br></span></code></pre></div></div>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes">Bug fixes<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#bug-fixes" class="hash-link" aria-label="Direct link to Bug fixes" title="Direct link to Bug fixes" translate="no">​</a></h4>
<ul>
<li class="">Some users were seeing duplicate schema tags (with an extra "s" at the end) in the UI.</li>
<li class="">In some scenarios, the UI would react slowly when users attempted to enter comments for Insights.</li>
<li class="">The UI was not properly enforcing the 100 character limit for rule names (and instead displaying an unknown error if the user attempted to set a rule name that was too long).</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="december-6-2023---application-update">December 6, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#december-6-2023---application-update" class="hash-link" aria-label="Direct link to December 6, 2023 - Application Update" title="Direct link to December 6, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="automation-service-enhancements">Automation Service Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#automation-service-enhancements" class="hash-link" aria-label="Direct link to Automation Service Enhancements" title="Direct link to Automation Service Enhancements" translate="no">​</a></h4>
<p>The Automation Service has been updated to include several new enhancements:</p>
<ul>
<li class=""><strong>Containment</strong> action types are now supported. Typically, these actions will perform some sort of response or remediation action, such as resetting a user's password or blocking a domain on your firewall. Many integrations in App Central now include containment actions.</li>
<li class=""><strong>User Choice</strong> nodes (and manual steps) are now supported. When executing a playbook if a user choice node is encountered, the execution will pause until a user selects an option. For example, after enrichment, a user could be asked whether to proceed with a containment action or to perform additional enrichment first. When a playbook is paused at a user choice node, the status of that playbook will say <code>Waiting user interaction</code>.</li>
<li class="">In the initial release of the Automation Service, playbooks would not appear in the <strong>Create New Automation</strong> Cloud SIEM dialog unless they defined as type <code>CSE</code>. This restriction has been lifted; all playbooks will now appear in the dropdown.</li>
</ul>
<p>For full details, see the <a class="" href="https://www.sumologic.com/help/docs/platform-services/automation-service/">Automation Service documentation</a>.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-1">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#minor-changes-and-enhancements-1" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] Entity Groups now support second-level unnormalized attributes (<code>fields.&lt;attribute&gt;.&lt;attribute&gt;</code>).</li>
<li class="">[New] Log Mappings can now be enabled or disabled via API using the <code>PUT /log-mappings/{*id*}/enabled</code> endpoint.</li>
<li class="">[New] The <code>Record Count</code> field on Sumo Logic-provided Chain Rules can now be overridden (like other Rule fields).</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-1">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#bug-fixes-1" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">Users were unable to manually change the Criticality assigned to an Entity.</li>
<li class="">Users were getting a 500 error when attempting to duplicate a rule.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rule-expression-validation">Rule Expression Validation<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rule-expression-validation" class="hash-link" aria-label="Direct link to Rule Expression Validation" title="Direct link to Rule Expression Validation" translate="no">​</a></h4>
<p>When writing Rules and Rule Tuning Expressions, it's possible to write an expression that is syntactically correct (and passes validation) but that will still fail when executed. There are two specific cases we have identified:</p>
<ul>
<li class="">Using a non-normalized field that does not exist in the log records (schema fields will always exist)</li>
<li class="">Introducing a type mismatch (that is, matching a string to an integer value)</li>
</ul>
<p>If you test a Rule (from the Rules Details page), an error will be displayed in these cases, but the error is not obvious and not clear, and the normal editor validation does not catch these kinds of errors.</p>
<p>In addition, while the Cloud SIEM Rules engine does not generate runtime errors in these cases (there just isn't a match), the Log Search engine <em>does</em> generate errors and refuses to return any results in these cases.</p>
<p>A few weeks ago, we made a change to Signal and Insight detail pages, where for multi-signal Rules (such as Chain Rules), where we would attach a subset of rules on the details page and the user would have to go to the <strong>Queried Records</strong> tab to view any other potentially related records, we combined those views and began showing both the attached and queried records on the main page. Unfortunately, the way the new design worked, no records were displayed if the queried record log search failed.</p>
<p>As a result of these issues, we have made two changes:</p>
<ul>
<li class="">On the Rules Details page, if the test (a log search) returns an error, instead of saying "No Records Found," the screen will say, "Check the Rule/Tuning Expressions."</li>
<li class="">On the Signal and Insight Details pages, all attached record(s) will be displayed even if the log search query cannot be completed.</li>
</ul>
<p>Note that fixing the rule expression(s) will not fix any Signals or Insights that have already been generated; you will have to use the <code>View in Log Search</code> feature and manually fix the log search string to see the log records.</p>
<p>Other tips:</p>
<ul>
<li class="">A malformed tuning expression will affect any rule that it is associated with, whether provided by Sumo Logic or custom-written.</li>
<li class="">We highly recommend using only schema fields in your rule and tuning expressions.<!-- -->
<ul>
<li class="">Sumo Logic's parsers and mappers are updated weekly, so please contact Support if you need to add a mapping from the raw log format to the normalized schema.</li>
<li class="">Sumo Logic's schema is extensible, so please contact Support if there's a field you'd like to add.</li>
<li class="">Links from the legend for the new <strong>Insights by Status</strong> panel on the HUD were not enabled properly.</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="november-13-2023---content-release">November 13, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#november-13-2023---content-release" class="hash-link" aria-label="Direct link to November 13, 2023 - Content Release" title="Direct link to November 13, 2023 - Content Release" translate="no">​</a></h3>
<p>This release includes the changes and enhancement enumerated below:</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00894 HAR file creation observed on host<!-- -->
<ul>
<li class="">HAR files contain session telemetry and network traffic. These file types are typically generated using the "developer tools" options on modern browsers like Chrome, Edge, or Firefox. These files may contain various sensitive data such as session keys, tokens, or cookies which may be extracted by a threat actor in order to access systems which the keys, tokens, or cookies in the HAR files have access to. Ensure that this operation is expected and ensure to sanitize the HAR file of any sensitive credential material.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Microsoft Office 365 Exchange Mailbox Audit Events<!-- -->
<ul>
<li class="">Maps client field to resource.</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Microsoft/Office 365<!-- -->
<ul>
<li class="">Enhanced user agent parsing.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Microsoft/Windows-JSON-Open Telemetry<!-- -->
<ul>
<li class="">Adds support for forthcoming format change and fixes event ID formulation breaking mapping.</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="november-2-2023---content-release">November 2, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#november-2-2023---content-release" class="hash-link" aria-label="Direct link to November 2, 2023 - Content Release" title="Direct link to November 2, 2023 - Content Release" translate="no">​</a></h3>
<p>This content release includes new out-of-the-box parsing and mapping support for Claroty xDome in CEF. Additionally, parser templates were updated to remove extraneous commenting in uncommented parser templates.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-1">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-1" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] (Claroty xDome) Alert</li>
<li class="">[New] (Claroty xDome) Communications Events</li>
<li class="">[New] (Claroty xDome) Vulnerability</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-1">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-1" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Claroty/Claroty xDome CEF</li>
<li class="">[Updated] /Parsers/System/Parser Templates/CEF Template Commented</li>
<li class="">[Updated] /Parsers/System/Parser Templates/JSON Template</li>
<li class="">[Updated] /Parsers/System/Parser Templates/Key Value Pair Template</li>
<li class="">[Updated] /Parsers/System/Parser Templates/Unstructured Template Commented</li>
<li class="">[Updated] /Parsers/System/Parser Templates/Windows XML Template</li>
<li class="">[Updated] /Parsers/System/Parser Templates/XML Template</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="november-1-2023---application-update">November 1, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#november-1-2023---application-update" class="hash-link" aria-label="Direct link to November 1, 2023 - Application Update" title="Direct link to November 1, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="multi-record-signal-changes">Multi-Record Signal Changes<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#multi-record-signal-changes" class="hash-link" aria-label="Direct link to Multi-Record Signal Changes" title="Direct link to Multi-Record Signal Changes" translate="no">​</a></h4>
<p>To improve the usability of the Signals user interface, we've changed the way that records are displayed on Signals generated by multi-record (Threshold, Chain, and Aggregation) Rules. Instead of attaching a sample set of records to the Signal and then providing a Queried Record tab to manually search for additional records, all records that were part of the Signal will be displayed in the UI. (As a result, the Queried Records tab has been removed from the UI.)</p>
<p>Behind the scenes, we will attach the first record directly to the Signal (in the API and <code>sec_signal</code> index, this is listed in the <code>allRecords</code> section). In the UI, the other records will be gathered via an automatic background log search. (In the API and shortly in the <code>sec_signal</code> index, any involved Entities - up to a maximum of 100 - will be included in a new <code>involvedEntities</code> section.)</p>
<p>In addition, the number of attached records has been removed from the Signals list view, since it will now always be 1.</p>
<p>This change will also bring an enhancement for Outlier Rule Signals. Previously those Signals would only show a single record, but with this change they will also show all related records as well.</p>
<p>This change has no effect on the Rules themselves; they will continue to operate as before.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="automation-service-audit-logging">Automation Service Audit Logging<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#automation-service-audit-logging" class="hash-link" aria-label="Direct link to Automation Service Audit Logging" title="Direct link to Automation Service Audit Logging" translate="no">​</a></h4>
<p>The Automation Service has been updated to include support for Audit Logging. Events like updates to integrations and playbook execution will now be automatically logged to the standard Sumo Logic Audit Logging indices.</p>
<p>For full details, see the <a class="" href="https://www.sumologic.com/help/docs/platform-services/automation-service/automation-service-audit-logging/">Cloud SOAR documentation</a> (the Automation Service will log a subset of those events).</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-2">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#bug-fixes-2" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">In some cases, Insights would appear to be open after they had been closed/resolved.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="october-26-2023---content-release">October 26, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#october-26-2023---content-release" class="hash-link" aria-label="Direct link to October 26, 2023 - Content Release" title="Direct link to October 26, 2023 - Content Release" translate="no">​</a></h3>
<p>This content release includes templates for creating Cloud SIEM parsers. There are two versions of each, one with comments that explain the purpose of each parser component, and “clean” versions that you can use to start quickly creating custom parsers. Further documentation on using these parsers will be available on <a class="" href="https://www.sumologic.com/help/docs/cse/get-started-with-cloud-siem/cloud-siem-content-catalog/">Sumo Logic Docs</a> in the coming weeks. Other changes in this release are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-1">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-1" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] FIRST-S00047 First Seen ASN Associated with User for a Successful Azure AD Sign In Event<!-- -->
<ul>
<li class="">This rule will trigger when a new ASN value is associated with a successful Entra ID sign-in event for a particular username since the baseline period. This may be suspicious activity as a user's IP address may change periodically, but typically users authenticate from a set of ASNs (one ASN value for their home network, another ASN value for their mobile device). A sign in with a new ASN not seen since the baseline period could be indicative of credential theft. Look at other events occurring for the user in question for the same time period to ascertain whether access was malicious or benign.</li>
</ul>
</li>
<li class="">[New] FIRST-S00048 First Seen Azure Device Code Authentication from User<!-- -->
<ul>
<li class="">Azure Device Code authentication can be utilized in phishing attacks. This specific rule looks for a user performing device code authentication to an Azure resource for the first time since the baseline period. If this action is not expected, it could be a sign of malicious activity. Examine the event for odd user agent values and look at what other actions the affected account is performing within the Azure estate.</li>
</ul>
</li>
<li class="">[Updated] MATCH-S00891 Azure OAUTH Application Consent from User<!-- -->
<ul>
<li class="">Fixed mismatched description and summary fields</li>
</ul>
</li>
<li class="">[Updated] MATCH-S00832 Office 365 Inbox Rule Updated<!-- -->
<ul>
<li class="">Added fix to exclude blank or null rules</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-2">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-2" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Parser Templates/CEF Template</li>
<li class="">[New] /Parsers/System/Parser Templates/CEF Template Commented</li>
<li class="">[New] /Parsers/System/Parser Templates/CSV Template</li>
<li class="">[New] /Parsers/System/Parser Templates/CSV Template Commented</li>
<li class="">[New] /Parsers/System/Parser Templates/JSON Template</li>
<li class="">[New] /Parsers/System/Parser Templates/JSON Template Commented</li>
<li class="">[New] /Parsers/System/Parser Templates/Key Value Pair Template</li>
<li class="">[New] /Parsers/System/Parser Templates/Key Value Pair Template Commented</li>
<li class="">[New] /Parsers/System/Parser Templates/LEEF Template</li>
<li class="">[New] /Parsers/System/Parser Templates/LEEF Template Commented</li>
<li class="">[New] /Parsers/System/Parser Templates/Unstructured Template</li>
<li class="">[New] /Parsers/System/Parser Templates/Unstructured Template Commented</li>
<li class="">[New] /Parsers/System/Parser Templates/Windows XML Template</li>
<li class="">[New] /Parsers/System/Parser Templates/Windows XML Template Commented</li>
<li class="">[New] /Parsers/System/Parser Templates/XML Template</li>
<li class="">[New] /Parsers/System/Parser Templates/XML Template Commented</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="october-26-2023---application-update">October 26, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#october-26-2023---application-update" class="hash-link" aria-label="Direct link to October 26, 2023 - Application Update" title="Direct link to October 26, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="enhanced-support-for-custom-insight-statuses">Enhanced Support for Custom Insight Statuses<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#enhanced-support-for-custom-insight-statuses" class="hash-link" aria-label="Direct link to Enhanced Support for Custom Insight Statuses" title="Direct link to Enhanced Support for Custom Insight Statuses" translate="no">​</a></h4>
<p>Sumo Logic is pleased to announce two enhancements to Cloud SIEM related to custom Insight statuses.</p>
<p>First, the In Progress status can now be disabled (not deleted). Many customers create multiple statuses that all represent an "In Progress" state, so this option can help reduce confusion in those cases.</p>
<p>Second, while Cloud SIEM has long supported custom Insight statuses, Insights in any custom status have been reported together (as one group on the HUD or using the same color in other instances). To improve this experience, custom statuses can now be assigned a unique color:</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/custom-insight-status-colors.png" alt="Custom Insight Status Color Palette">
<p>This color will be used wherever an Insight is displayed with that status (such as in the Insight list and board views). For existing custom statuses, the color will remain white (as it has been) until the configuration is changed.</p>
<p>The HUD has been updated as well; for example, the Insights by Status widget has been updated to properly display each status instead of grouping custom statuses together:</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/custom-insight-status-widget.png" alt="Updated HUD Widget for Custom Insight Statuses">
<p>A corresponding attribute (<code>color</code>) has also been added to the custom status API.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-2">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#minor-changes-and-enhancements-2" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] Searches in Cloud SIEM (from the top menu bar) are now case-insensitive.</li>
<li class="">[New] Custom match list columns now support unnormalized attributes (like <code>fields.foo</code>)</li>
<li class="">[New] The records search page in Cloud SIEM now includes a link to view the equivalent search in the Log Analytics Platform log search page.</li>
<li class="">[Updated] When a comment is added to an Insight by an Action from the Automation Service, it will be attributed to a system user called "Automation Service".</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-3">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#bug-fixes-3" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">The Insight data forwarded to the Automation Service did not include the full set of attributes for attached Signals.</li>
<li class="">Some hostnames in CrowdStrike FDR inventory sources were not getting normalized properly.</li>
<li class="">Entity Groups were being applied to the wrong Entity types.</li>
<li class="">Duplicate audit log entries for Insights were being created. (Note that while this has been resolved, the duplicate entries have not been removed from customer audit logs.)</li>
<li class="">When entering closing an Insight, users can enter comments and the UI will suggest content based on comment history. These suggestions were broken and have been reset.</li>
<li class="">When configuring Entity Groups, the UI was not allowing users to specify unnormalized inventory attributes (like <code>fields.foo</code>).</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="october-18-2023---application-update">October 18, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#october-18-2023---application-update" class="hash-link" aria-label="Direct link to October 18, 2023 - Application Update" title="Direct link to October 18, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="legacy-signal-forwarding-deprecation">Legacy Signal Forwarding Deprecation<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#legacy-signal-forwarding-deprecation" class="hash-link" aria-label="Direct link to Legacy Signal Forwarding Deprecation" title="Direct link to Legacy Signal Forwarding Deprecation" translate="no">​</a></h4>
<p>Since July 2022, Signals generated by Cloud SIEM are automatically saved in a standardized <code>sec_signal</code> index. This special partition is similar to the existing <code>sec_record</code> indices in that, unlike data retained using the legacy Signal Forwarding feature, it is stored in a format that supports keyword search, nested attributes, and other standard log search features.</p>
<p>The new index is automatically generated and retained for a period of 2 years at no additional cost for all Cloud SIEM customers.</p>
<p>As a result, the optional legacy Signal Forwarding feature in Cloud SIEM will be deprecated on <strong>November 15, 2023</strong>. Existing data will not be deleted, but new Signals generated after that date will no longer be forwarded using that feature and the option will no longer be available. (Signals will continue to be forwarded automatically to <code>sec_signal</code>.) Customers leveraging data forwarded using the legacy feature to generate dashboards (or for other use cases) will need to modify those applications to use the new <code>sec_signal</code> index before then. Note that the content of the <code>sec_signal</code> index is not identical to the content in data forwarded using the legacy option.</p>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="october-11-2023---content-release">October 11, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#october-11-2023---content-release" class="hash-link" aria-label="Direct link to October 11, 2023 - Content Release" title="Direct link to October 11, 2023 - Content Release" translate="no">​</a></h3>
<p>This content release contains rules mostly pertaining to Microsoft Azure OAUTH Application Registration, NSG, and Key Vault services. Pertinent to CVE-2023-38545 and CVE-2023-38546, this release also includes a new rule (FIRST-S00040 described below) to aid in detecting unusual cURL tool usage by a user as it may pertain to exploitation of these vulnerabilities.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-2">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-2" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00891 Azure OAUTH Application Consent from User<!-- -->
<ul>
<li class="">A user has consented to application permissions.</li>
</ul>
</li>
<li class="">[New] CHAIN-S00017 Change of Azure MFA Method followed by Risky SignIn<!-- -->
<ul>
<li class="">This alert looks for an Azure MFA authentication method change, followed by a risky sign in detected by Azure within a six hour time period for the same user account.</li>
</ul>
</li>
<li class="">[New] FIRST-S00044 First Seen AppID Generating <code>MailIItemsAccessed Event</code> from User<!-- -->
<ul>
<li class="">This alert looks at a first seen application ID accessing an Office 365/Exchange mail box item. The <code>MailItemsAccessed</code> may not always be enabled within an Entra/Azure/Office 365 tenant and is dependent on Microsoft licensing requirements. See the following guide from CISA for additional information on this event type and investigation steps: <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-193a" target="_blank" rel="noopener noreferrer" class="">https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-193a</a>.</li>
</ul>
</li>
<li class="">[New] FIRST-S00046 First Seen Client Generating <code>MailIItemsAccessed</code> Event from User<!-- -->
<ul>
<li class="">This alert looks at a First Seen client accessing an Office 365/Exchange mail box item. The <code>MailItemsAccessed</code> may not always be enabled within an Entra/Azure/Office 365 tenant and is dependent on Microsoft licensing requirements. See the following guide from CISA for additional information on this event type and investigation steps: <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-193a" target="_blank" rel="noopener noreferrer" class="">https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-193a</a>.</li>
</ul>
</li>
<li class="">[New] FIRST-S00040 First Seen cURL execution from User<!-- -->
<ul>
<li class="">First Seen execution of cURL by a user from a device. The cURL tool is designed to retrieve files using various internet protocols in a programmatic manner; it is often abused by threat actors to download various files as part of broader executions. If this usage of cURL comes from an unexpected user, it is recommended that the command line value be reviewed and the URL which was used as part of cURL command be investigated.</li>
</ul>
</li>
<li class="">[New] MATCH-S00888 Microsoft Teams External Access Enabled<!-- -->
<ul>
<li class="">Microsoft Teams External Access has been enabled; this setting allows any users that are external to your Teams/Office organization to message users that are within your Teams/Office organization. If this setting change is unplanned or unexpected it is recommended that this activity be reviewed. Microsoft Teams provides administrators the ability to allow only specific external domains to message users within the organization. Look for Office 365 events with the <code>MessageSent</code> or <code>MemberAdded</code> event names in order to gain more detail as to what users were invited to which Teams channels, if any.</li>
</ul>
</li>
<li class="">[New] MATCH-S00889 Microsoft Teams Guest Access Enabled<!-- -->
<ul>
<li class="">Microsoft Teams Guest Access has been enabled globally; this setting allows any users that are external to your Teams/Office organization to be invited into your Teams/Office organization. If this setting change is unplanned or unexpected it is recommended that this activity be reviewed. MIcrosoft Teams provides administrators the ability to allow only specific guest actions to take place within the Teams/Office organization.</li>
</ul>
</li>
<li class="">[New] MATCH-S00890 Owner Added to Azure Service Principal<!-- -->
<ul>
<li class="">An owner was added to an Azure service principal. Threat actors may add owners to Azure service principals for privilege escalation or persistence avenues. Ensure this action is expected and approved.</li>
</ul>
</li>
<li class="">[New] MATCH-S00893 Secret Added to Azure Service Principal<!-- -->
<ul>
<li class="">Secrets can be added to Azure Service Principals as a persistence mechanism. The <code>properties.targetResources.1.modifiedProperties.1.newValue</code> field will have details regarding the secret or certificate added.</li>
</ul>
</li>
<li class="">[New] MATCH-S00892 Value Added to Azure NSG Group<!-- -->
<ul>
<li class="">This alert looks for a value being added to an Azure Network Security Group (NSG) successfully. Depending on the environment, other Azure services such as Azure Firewall may provide egress and ingress controls. Ensure this activity is authorized and expected. The raw data for the event contains the exact values being modified.</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="october-2-2023---application-update">October 2, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#october-2-2023---application-update" class="hash-link" aria-label="Direct link to October 2, 2023 - Application Update" title="Direct link to October 2, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="mitre-attck-threat-coverage-explorer">MITRE ATT&amp;CK® Threat Coverage Explorer<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#mitre-attck-threat-coverage-explorer" class="hash-link" aria-label="Direct link to MITRE ATT&amp;CK® Threat Coverage Explorer" title="Direct link to MITRE ATT&amp;CK® Threat Coverage Explorer" translate="no">​</a></h4>
<p>We are excited to announce a new feature in Cloud SIEM, the MITRE ATT&amp;CK® Threat Coverage Explorer. This interactive tool gives you the ability to see how Rules, Signals, and log sources map to adversary actions using the <a href="https://attack.mitre.org/" target="_blank" rel="noopener noreferrer" class="">MITRE ATT&amp;CK® Matrix for Enterprise</a>.</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/Mitre-Explorer.png" alt="MITRE ATT&amp;CK® Threat Coverage Explorer">
<p>The MITRE Explorer can be used to identify gaps in coverage and understand the impact of specific log sources and Rules to the overall threat coverage and value of Cloud SIEM.</p>
<p>The tool can be accessed in the Content Menu. It supports three different views:</p>
<ul>
<li class="">Recent Activity - Your environment's actual coverage (Rules that generated Signals) over the past six months</li>
<li class="">All Community Activity - All Cloud SIEM customers' anonymized and aggregated coverage over the past six months.</li>
<li class="">Theoretical Coverage - Potential coverage if all rules are enabled and all log sources are connected.</li>
</ul>
<p>The MITRE Explorer uses the built-in MITRE tactic, technique, and sub-technique tags to track coverage, so if custom Rules are tagged appropriately, they will also be included.</p>
<p>Clicking on a technique will open a detailed view which describes the technique (and any included sub-techniques) and lists the Rules and Signals that match.</p>
<p>The view is filterable by tactic, technique, and sub-technique, as well as log source and coverage level. There are multiple view options so the display can be customized, and the data can be exported in MITRE's JSON format so it can be combined with data from other tools to view your total coverage. There is also an API to retrieve coverage data and the JSON content.</p>
<p>For more details on how to use the MITRE Explorer, check out the <a class="" href="https://www.sumologic.com/help/docs/cse/administration/mitre-coverage/">online documentation</a>.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-3">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#minor-changes-and-enhancements-3" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] When viewing Insight details, users can now select multiple Signals and remove them from the Insight with a single click.</li>
<li class="">[New] When viewing Entity inventory data, unnormalized fields with millisecond-based timestamps are now automatically converted to human-readable format when possible.</li>
<li class="">[New] Tag schemas and context actions can now be managed via Terraform. See the API documentation for details.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-4">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#bug-fixes-4" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">The ability to add items to a Match List via Terraform was not working properly.</li>
<li class="">Timestamps on the Entity Timeline were using different time zones.</li>
<li class="">A UI error was preventing users from overriding some fields on First Seen and Outlier Rules.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="september-22-2023---content-release">September 22, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#september-22-2023---content-release" class="hash-link" aria-label="Direct link to September 22, 2023 - Content Release" title="Direct link to September 22, 2023 - Content Release" translate="no">​</a></h3>
<p>This content release includes new parsing, mapping, and passthrough rule support for Qualys Vulnerability Data as well as changes enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-3">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-3" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00887 Port Forwarding Enabled via Visual Studio Code<!-- -->
<ul>
<li class="">A local port has been forwarded and made available for external connectivity utilizing the Visual Studio Code port forwarding feature</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-2">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-2" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Qualys Vulnerability Data</li>
<li class="">[Updated] Windows - Security - 4886<!-- -->
<ul>
<li class="">Adds alternate fields for user_username and device_hostname</li>
</ul>
</li>
<li class="">[Updated] Windows - Security - 4887<!-- -->
<ul>
<li class="">Adds alternate fields for user_username and device_hostname</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-3">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-3" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Qualys/Qualys Vulnerability Data</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="september-21-2023---application-update">September 21, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#september-21-2023---application-update" class="hash-link" aria-label="Direct link to September 21, 2023 - Application Update" title="Direct link to September 21, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="entity-groups-inventory-enhancements">Entity Groups Inventory Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#entity-groups-inventory-enhancements" class="hash-link" aria-label="Direct link to Entity Groups Inventory Enhancements" title="Direct link to Entity Groups Inventory Enhancements" translate="no">​</a></h4>
<p>We are happy to announce some important enhancements to the <a class="" href="https://www.sumologic.com/help/docs/cse/records-signals-entities-insights/create-an-entity-group/">Entity Group</a> feature in Cloud SIEM.</p>
<p>With this release, Entity Groups can now use <em>any</em> attribute available in your inventory data - including non-normalized attributes. (Previously, only the <code>group</code> attribute was available.) Non-normalized attributes can be used by adding the <code>fields.</code> prefix.</p>
<p>In addition, the release introduces the ability to auto-set schema tag values on matching Entities based on the value of a given inventory attribute. In this example, any user Entity that has a value for <code>location</code> in inventory data will have that value set in a tag (such as <code>Location:Austin</code>).</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/enitty-group-inventory-enhancements.png" alt="Entity Group Details Panel">
<p>When using dynamic schema tags, you can still set static tags, criticality, and suppression state.</p>
<p>These two enhancements will reduce the number of Entity Groups needed to properly configure your Entities automatically and will automate a more complete and accurate set of Entity attributes, improving Rule and Analyst efficiency.</p>
<p>There much more information about Entity Groups and these enhancements in the <a class="" href="https://www.sumologic.com/help/docs/cse/records-signals-entities-insights/create-an-entity-group/">online documentation</a>.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-5">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#bug-fixes-5" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">Multiple entries were being added to the audit log when some Insights were created.</li>
<li class="">Some Insights were not getting enriched with VirusTotal using the direct integration.</li>
<li class="">Time-to-live was temporarily considered a mandatory attribute for match lists.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="september-11-2023---application-update">September 11, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#september-11-2023---application-update" class="hash-link" aria-label="Direct link to September 11, 2023 - Application Update" title="Direct link to September 11, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="automation-service">Automation Service<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#automation-service" class="hash-link" aria-label="Direct link to Automation Service" title="Direct link to Automation Service" translate="no">​</a></h4>
<p>Sumo Logic is excited to announce that the Automation Service for Cloud SIEM is now generally available for all Cloud SIEM customers. The Automation Service uses Cloud SOAR capabilities -- without needing Cloud SOAR itself -- to allow you to define and automate smart actions, including enrichments and notifications. These actions can be automatically triggered when certain events occur in Cloud SIEM, helping you to quickly investigate, understand, and react to potential security threats.</p>
<p>You can interact with the service through <em>automations</em>, which execute <em>playbooks</em>. Playbooks are composed of one or more <em>actions</em> with a workflow that could include parallel actions and logic steps. Actions are defined as part of <em>integrations</em> with specific internal and external applications. Sumo Logic provides hundreds of integrations, actions, and playbooks out of the box that you can use and customize. You can also create your own.</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/automation-service.png" alt="Automation Service">
<p>Automations are accessible through the <strong>Configuration</strong> menu, under <strong>Integrations</strong>. Automation results are accessible from Insight and Entity detail pages.</p>
<p>The Automation Service does not include the full capabilities of Cloud SOAR. For example, the Automation Service only supports enrichment, nofification, and custom action types, and Automation Service playbooks can only be triggered from Cloud SIEM. There is also a limit to the number of actions you can run per hour. However, if you do have Cloud SOAR, then once you have upgraded to the Fall 2023 release of Cloud SOAR (currently in Beta), Cloud SIEM will use it to run automations instead of the Automation Service, giving Cloud SIEM access to the full capabilities of Cloud SOAR.</p>
<p>Over time, the legacy Insight Actions and Cloud SIEM Enrichment Service features will be deprecated in favor of this new service. (The new service includes integrations and actions corresponding to the legacy Insight Actions and can run existing Enrichment Service PowerShell scripts. The online documentation has <a class="" href="https://www.sumologic.com/help/docs/cse/automation/automations-in-cloud-siem/#migrate-from-legacy-actions-and-enrichments-to-the-automation-service">more information about migrating</a>.) Note that the Automation Service is not yet available in the FedRAMP environment.</p>
<p>There is much more information about the Automation Service and how to use it in the <a class="" href="https://www.sumologic.com/help/docs/cse/automation/about-automation-service-and-cloud-siem/">online documentation</a>.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-4">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#minor-changes-and-enhancements-4" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] Tag schemas and context actions can now be managed via API (<code>/tag-schemas</code> and <code>/context-actions</code>). See the API documentation for details.</li>
<li class="">[Updated] Threat indicator icons will now appear where appropriate in the Active Entities panel on the HUD.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-6">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#bug-fixes-6" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">Some records were not being auto-enriched with Network Block data.</li>
<li class="">Some internal IP addresses were being marked as external.</li>
<li class="">The HUD was not updating Insight status counts in a timely fashion.</li>
<li class="">Window size was not saving correctly when defining a new Outlier rule.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="september-7-2023---content-release">September 7, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#september-7-2023---content-release" class="hash-link" aria-label="Direct link to September 7, 2023 - Content Release" title="Direct link to September 7, 2023 - Content Release" translate="no">​</a></h3>
<p>This release includes new detections for macOS systems and mapping support for Dataminr Alerts. It also includes fixes aimed to reduce false positivity and correct the transposition of description and summary on several rules. Other changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-4">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-4" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] CHAIN-S00016 macOS - Suspicious Osascript Execution and Network Activity</li>
<li class="">[New]* FIRST-S00039 First Seen mdfind Usage from User</li>
<li class="">[New]* FIRST-S00041 First Seen networksetup Usage from User</li>
<li class="">[New]* FIRST-S00042 First Seen Ioreg Usage from User</li>
<li class="">[New]* FIRST-S00043 First Seen pbpaste Usage from User</li>
<li class="">[New] MATCH-S00878 macOS - Suspicious Osascript Parent Execution</li>
<li class="">[New] MATCH-S00879 macOS - Suspicious Osascript Execution</li>
<li class="">[New] MATCH-S00880 macOS - Entitlement Enumeration via Xattr</li>
<li class="">[New]* MATCH-S00881 macOS - csrutil status Usage Detected</li>
<li class="">[New] MATCH-S00882 macOS - System Preference Enumeration via Security Binary</li>
<li class="">[New] MATCH-S00883 macOS - Keychain Enumeration</li>
<li class="">[New] MATCH-S00884 macOS - Suspicious Python PIP Execution</li>
<li class="">[New] MATCH-S00885 macOS - Screen Sharing Session Established</li>
<li class="">[New]* MATCH-S00886 Suspicious chmod Execution</li>
</ul>
<p><em>* These rules were originally released September 1, but have been updated in this release.</em></p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-3">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-3" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Dataminr Alerts</li>
<li class="">[Updated] Squid Proxy - Parser<!-- -->
<ul>
<li class="">Updated mapper to take advantage of additional parsed data (see parser updates)</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-4">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-4" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Squid/Squid Proxy Syslog<!-- -->
<ul>
<li class="">Updated parser to extract port and protocol information from URL when present</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="august-22-2023---content-release">August 22, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#august-22-2023---content-release" class="hash-link" aria-label="Direct link to August 22, 2023 - Content Release" title="Direct link to August 22, 2023 - Content Release" translate="no">​</a></h3>
<p>This release contains updates to MITRE tags used in several rules that have been deprecated, removed, or were otherwise invalid. Other changes are enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-5">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-5" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00886 Suspicious chmod Execution<!-- -->
<ul>
<li class="">This alert looks for a "chmod" execution on a file that is found on the <code>/tmp</code> directory of a Linux or macOS host. Threat actors may download and copy files to this directory and add execution bits or change permissions on these files.</li>
</ul>
</li>
<li class="">[Updated] MATCH-S00516 Antivirus Ransomware Detection</li>
<li class="">[Updated] MATCH-S00534 MacOS - Re-Opened Applications</li>
<li class="">[Updated] MATCH-S00149 PowerShell File Download</li>
<li class="">[Updated] MATCH-S00342 Suspicious use of Dev-Tools-Launcher</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-4">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-4" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Microsoft Defender for Cloud - Security Alerts<!-- -->
<ul>
<li class="">Adds support for Security Alerts via Azure Activity Log</li>
</ul>
</li>
<li class="">[Updated] Zscaler - Nanolog Streaming Service - JSON<!-- -->
<ul>
<li class="">Adds alternate values for NSS mappers to ensure proper normalization</li>
</ul>
</li>
<li class="">[Updated] Zscaler Firewall<!-- -->
<ul>
<li class="">Adds alternate values for ZScaler Firewall mappers to ensure proper normalization</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="august-22-2023---application-update">August 22, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#august-22-2023---application-update" class="hash-link" aria-label="Direct link to August 22, 2023 - Application Update" title="Direct link to August 22, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="deprecation-notice">Deprecation Notice<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#deprecation-notice" class="hash-link" aria-label="Direct link to Deprecation Notice" title="Direct link to Deprecation Notice" translate="no">​</a></h4>
<p>After careful evaluation, we have deprecated Grok patterns immediately for customers who've not used the feature in the last 30 days. Our more robust and configurable solution is already available for customers in the Sumo Logic parsers. More details on how parsing works in Sumo Logic can be found in the <a class="" href="https://www.sumologic.com/help/docs/cse/schema/parsing-language-reference-guide/">Parsing Language Reference Guide</a>.</p>
<p>For customers who are still using Grok, further communication along with a path to migrate to the Sumo Logic parsers will be provided in the coming weeks.</p>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="august-4-2023---content-release">August 4, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#august-4-2023---content-release" class="hash-link" aria-label="Direct link to August 4, 2023 - Content Release" title="Direct link to August 4, 2023 - Content Release" translate="no">​</a></h3>
<p>This release includes minor updates and a new log mapper for Microsoft Defender.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-6">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-6" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00231 Azure - Member Added to Company Administrator Role<!-- -->
<ul>
<li class="">Updated expression to account for parser and vendor schema changes</li>
</ul>
</li>
<li class="">[Updated] THRESHOLD-S00097 Impossible Travel - Successful<!-- -->
<ul>
<li class="">Removed vendor/product grouping</li>
</ul>
</li>
<li class="">[Updated] THRESHOLD-S00098 Impossible Travel - Unsuccessful<!-- -->
<ul>
<li class="">Removed vendor/product grouping</li>
</ul>
</li>
<li class="">[Updated] MATCH-S00167 Recon Using Common Windows Commands<!-- -->
<ul>
<li class="">Bug fix for Qualys path exclusion not working</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-5">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-5" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Microsoft Defender for Cloud - Security Alerts<!-- -->
<ul>
<li class="">Support for new log schema</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-5">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-5" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Microsoft/Microsoft Azure JSON<!-- -->
<ul>
<li class="">Added additional time format</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="august-3-2023---content-release">August 3, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#august-3-2023---content-release" class="hash-link" aria-label="Direct link to August 3, 2023 - Content Release" title="Direct link to August 3, 2023 - Content Release" translate="no">​</a></h3>
<p>This release includes updated MITRE ATT&amp;CK™ technique tags on several rules and added support for Microsoft Graph Security Alert API 1.0 via C2C.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-7">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-7" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Deleted] OUTLIER-S00012 Spike in AWS New Service Creation or Port Connection from Source Address<!-- -->
<ul>
<li class="">As advised in the advanced notice on July 14th, 2023 - this Outlier rule was deleted due to performance and efficacy findings.</li>
</ul>
</li>
<li class="">[Updated] MATCH-S00679 AWS Route 53 Domain Registered</li>
<li class="">[Updated] FIRST-S00038 First Seen Wget Usage from User</li>
<li class="">[Updated] MATCH-S00830 Office 365 Forwarding Rule Created</li>
<li class="">[Updated] LEGACY-S00064 Potentially vulnerable software detected</li>
<li class="">[Updated] LEGACY-S00086 SSL Certificate Not Valid Yet</li>
<li class="">[Updated] LEGACY-S00087 SSL Heartbleed Attack</li>
<li class="">[Updated] LEGACY-S00089 SSL Heartbleed Many Requests</li>
<li class="">[Updated] LEGACY-S00090 SSL Heartbleed Odd Length</li>
<li class="">[Updated] LEGACY-S00091 SSL Invalid Server Cert</li>
<li class="">[Updated] LEGACY-S00096 Shellshock</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-6">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-6" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Microsoft Graph Security Alert API C2C</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-6">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-6" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Microsoft/Graph Security Alert API</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="july-21-2023---content-release">July 21, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#july-21-2023---content-release" class="hash-link" aria-label="Direct link to July 21, 2023 - Content Release" title="Direct link to July 21, 2023 - Content Release" translate="no">​</a></h3>
<p>This release includes:</p>
<ul>
<li class="">Removal of unused legacy parsers and directly associated mappers and rule content.</li>
<li class="">Support for Windows Event Log JSON ingested via Open Telemetry collector. XML and JSON via OTel are now fully supported in Cloud SIEM.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-8">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-8" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] FIRST-S00038 First Seen Wget Usage from User<!-- -->
<ul>
<li class="">Observes for execution of Wget from a user for the first time since the baseline period (14 days).</li>
</ul>
</li>
<li class="">[Updated] LEGACY-S00009 Bluecoat Proxy - Suspicious or Malicious Categories<!-- -->
<ul>
<li class="">Fix to account for minor difference from legacy parser to current parser.</li>
</ul>
</li>
<li class="">[Updated] FIRST-S00016 First Seen Non-Network/Non-System Logon from User<!-- -->
<ul>
<li class="">Excludes LogonTypes for System Startup, Batch, and Service to reduce volume of records matching.</li>
</ul>
</li>
<li class="">[Deleted] MATCH-S00073 Palo Alto - Traps Templated Events</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-7">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-7" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] AWS Security Hub<!-- -->
<ul>
<li class="">Lowered normalizedSeverity to reduce false positivity of passthrough signals.</li>
</ul>
</li>
<li class="">[Updated] CrowdStrike Falcon Identity Protection (CNC)<!-- -->
<ul>
<li class="">Adjusted IdentityProtectionEvent normalizedSeverity to use INFO, LOW, MEDIUM, and HIGH instead of numeric values to improve consistency.</li>
</ul>
</li>
<li class="">[Updated] Windows - Security - 4627<!-- -->
<ul>
<li class="">Added mapping for logonType '0' representing a system startup.</li>
</ul>
</li>
<li class="">[Deleted] AD Audit DNS</li>
<li class="">[Deleted] AD Audit Comp</li>
<li class="">[Deleted] AD Audit LDAP</li>
<li class="">[Deleted] AD Audit Local Logon</li>
<li class="">[Deleted] AD Audit Server</li>
<li class="">[Deleted] AD Audit User</li>
<li class="">[Deleted] Blue Coat Proxy 1</li>
<li class="">[Deleted] Blue Coat Proxy 3</li>
<li class="">[Deleted] Cisco Firepower Malware Event 430005</li>
<li class="">[Deleted] Cisco Ironport WSA NOHD 02</li>
<li class="">[Deleted] Citrix Xenserver Auth Message</li>
<li class="">[Deleted] Cylance_Audit_1</li>
<li class="">[Deleted] Cylance_Audit_2</li>
<li class="">[Deleted] Ironport Cisco</li>
<li class="">[Deleted] LINUX Root Login</li>
<li class="">[Deleted] LINUX Root Login with Username</li>
<li class="">[Deleted] LINUX User Authenticated</li>
<li class="">[Deleted] LINUX User Authenticated no Username</li>
<li class="">[Deleted] LINUX User Session Open/Close</li>
<li class="">[Deleted] Palo Alto Traps Misc</li>
<li class="">[Deleted] Symantec SEP Compressed File</li>
<li class="">[Deleted] Symantec SEP MEM System</li>
<li class="">[Deleted] Symantec SEP Potential Risk Found 04</li>
<li class="">[Deleted] Symantec SEP Security Risk Found 2</li>
<li class="">[Deleted] Symantec SEP Sonar Detection Variation 2</li>
<li class="">[Deleted] Symantec SEP Virus Found</li>
<li class="">[Deleted] Tanium S05 Logs</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-7">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-7" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Microsoft/Windows-JSON-Open Telemetry</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="legacy-parsers">Legacy Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#legacy-parsers" class="hash-link" aria-label="Direct link to Legacy Parsers" title="Direct link to Legacy Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Deleted] ADAUDIT_COMP</li>
<li class="">[Deleted] ADAUDIT_DNS</li>
<li class="">[Deleted] ADAUDIT_LDAP</li>
<li class="">[Deleted] ADAUDIT_LOCAL_LOGON</li>
<li class="">[Deleted] ADAUDIT_SERVER</li>
<li class="">[Deleted] ADAUDIT_USER</li>
<li class="">[Deleted] BLUECOAT_PROXY_1</li>
<li class="">[Deleted] BLUECOAT_PROXY_3</li>
<li class="">[Deleted] CYLANCE_AUDIT1</li>
<li class="">[Deleted] CYLANCE_AUDIT2</li>
<li class="">[Deleted] Firepower_Malware_Event_430005</li>
<li class="">[Deleted] IRON_PORT_CISCO</li>
<li class="">[Deleted] IRON_PORT_WSA_NOHD_02</li>
<li class="">[Deleted] LINUX_AUTH</li>
<li class="">[Deleted] LINUX_ROOT_GENERIC</li>
<li class="">[Deleted] LINUX_ROOT_LOGIN</li>
<li class="">[Deleted] LINUX_ROOT_NO_USER</li>
<li class="">[Deleted] LINUX_ROOT_USER</li>
<li class="">[Deleted] PAN_TRAPS_MISC</li>
<li class="">[Deleted] SYMANTEC_SEP_CF</li>
<li class="">[Deleted] SYMANTEC_SEP_MEMS</li>
<li class="">[Deleted] SYMANTEC_SEP_PRF_04</li>
<li class="">[Deleted] SYMANTEC_SEP_SDN_02</li>
<li class="">[Deleted] SYMANTEC_SEP_SRF_2</li>
<li class="">[Deleted] SYMANTEC_SEP_VF_01</li>
<li class="">[Deleted] TANIUM_S05_TYPE_LOGS</li>
<li class="">[Deleted] VDM_LOG_SECURE</li>
<li class="">[Deleted] citrix_xenserver_auth_message</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="july-21-2023---application-update">July 21, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#july-21-2023---application-update" class="hash-link" aria-label="Direct link to July 21, 2023 - Application Update" title="Direct link to July 21, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-5">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#minor-changes-and-enhancements-5" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[Update] The Cloud SIEM UI has been updated with refreshed fonts and colors to better align with the core Sumo Logic pages. This is the first change in a greater series of updates designed to present a more unified user experience across Sumo Logic feature sets.</li>
<li class="">[New] The <strong>Signal Severity Total</strong>, an indication of the activity for an Entity, has been added to the Entity list and details views. The Signal Severity Total is calculated by adding up the severity value for each of the Signals generated against a given Entity during the current detection window (by default 14 days), not including duplicate or suppressed Signals.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-7">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#bug-fixes-7" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">With the recent changes to log mapping, some users were seeing an error when attempting to use custom input vendors and/or products.</li>
<li class="">Entity lookup normalization was taking place after Entity Groups were processed; normalization now happens first.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="july-14-2023---content-release">July 14, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#july-14-2023---content-release" class="hash-link" aria-label="Direct link to July 14, 2023 - Content Release" title="Direct link to July 14, 2023 - Content Release" translate="no">​</a></h3>
<p>Starting with this release, the rule type for First Seen rules is now "Anomaly", and Outlier Rules have been promoted from prototype mode.</p>
<p><strong>NOTE:</strong> Due to performance and efficacy findings, OUTLIER-S00012 will be deleted on July 28th. If you wish to retain this rule, it must be duplicated in the Cloud SIEM Rules UI.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-9">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-9" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] OUTLIER-S00001 Spike in login failures from a user<!-- -->
<ul>
<li class="">Removed incorrect match list from expression.</li>
<li class="">Will remain in prototype an additional week due to changes made to the rule expression.</li>
</ul>
</li>
<li class="">[Updated] OUTLIER-S00002 Spike in Successful Distinct Share Access</li>
<li class="">[Updated] OUTLIER-S00003 Spike in Failed Share Access by User</li>
<li class="">[Updated] OUTLIER-S00004 Spike in Azure Firewall Deny Events from Source IP</li>
<li class="">[Updated] OUTLIER-S00005 Spike in AWS API Call from User</li>
<li class="">[Updated] OUTLIER-S00006 Spike in Data Transferred Outbound by User</li>
<li class="">[Updated] OUTLIER-S00007 Spike in Windows Administrative Privileges Granted for User</li>
<li class="">[Updated] OUTLIER-S00008 Spike in Failed Azure Sign In Attempts Due to Bad Password from IP Address</li>
<li class="">[Updated] OUTLIER-S00009 Spike in PowerShell Command Line Length From Host</li>
<li class="">[Updated] OUTLIER-S00010 Spike in URL Length from IP Address</li>
<li class="">[Updated] OUTLIER-S00011 Spike in AWS AccessDenied Events by assumedrole</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="schema">Schema<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#schema" class="hash-link" aria-label="Direct link to Schema" title="Direct link to Schema" translate="no">​</a></h4>
<ul>
<li class="">[New] http_referer_queryParameters<!-- -->
<ul>
<li class="">New queryParameters enrichment/mappable field</li>
</ul>
</li>
<li class="">[New] http_url_queryParameters<!-- -->
<ul>
<li class="">New queryParameters enrichment/mappable field</li>
</ul>
</li>
<li class="">[New] objectClassification<!-- -->
<ul>
<li class="">Allows objectClassification to be used in Cloud SIEM rule expressions.</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="july-13-2023---application-update">July 13, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#july-13-2023---application-update" class="hash-link" aria-label="Direct link to July 13, 2023 - Application Update" title="Direct link to July 13, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-rbac-capabilities">New RBAC Capabilities<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#new-rbac-capabilities" class="hash-link" aria-label="Direct link to New RBAC Capabilities" title="Direct link to New RBAC Capabilities" translate="no">​</a></h4>
<p>Reminder: Earlier this week, we introduced new RBAC capabilities for Cloud SIEM: <em>View Entities</em> and <em>Manage Entities</em>. Users with the built-in administrator role received these capabilities automatically, but <strong>admins must manually add these capabilities</strong> to other roles as appropriate. If a user does not have either role, they will not be able to see Entity details or interact with or manage Entities in any way.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-6">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#minor-changes-and-enhancements-6" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[Update] The Entity Timeline feature is now available for all Entity types, including custom types.</li>
<li class="">[New] When viewing an Entity's detail page, both Entity Groups that apply to that Entity and membership in a suppression list will now be listed.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-8">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#bug-fixes-8" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">Some customers were seeing non-blocking errors loading Insight detail pages, and links to Cloud SOAR, when they should not have.</li>
<li class="">The number of records ingested into Cloud SIEM was not being reported consistently on the HUD.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="july-11-2023---content-release">July 11, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#july-11-2023---content-release" class="hash-link" aria-label="Direct link to July 11, 2023 - Content Release" title="Direct link to July 11, 2023 - Content Release" translate="no">​</a></h3>
<p>This content release includes parsing and mapping updates to Fortinet to account for variations in URL information present in the log sometimes leading to malformed URLs being normalized, adjustments to Jamf mappings to account for case variations in certain fields, as well as changes enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-10">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-10" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] OUTLIER-S00010 Spike in URL Length from IP Address<!-- -->
<ul>
<li class="">Narrowed rule expression to NetworkHTTP and NetworkProxy records</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-8">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-8" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Fortinet App Control Logs</li>
<li class="">[Updated] Fortinet DLP Logs</li>
<li class="">[Updated] Fortinet Event Logs</li>
<li class="">[Updated] Fortinet IPS Logs</li>
<li class="">[Updated] Fortinet Traffic Logs</li>
<li class="">[Updated] Fortinet Virus Logs</li>
<li class="">[Updated] Fortinet Webfilter Logs</li>
<li class="">[Updated] Jamf Audit User - Audit</li>
<li class="">[Updated] Jamf Audit User - Authentication</li>
<li class="">[Updated] Jamf Audit User - Endpoint</li>
<li class="">[Updated] Jamf Audit User - Network</li>
<li class="">[Updated] SentinelOne Logs - C2C threats<!-- -->
<ul>
<li class="">Adds alternate value for normalizedSeverity lookup</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-8">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-8" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Cisco/Cisco Meraki<!-- -->
<ul>
<li class="">Support for more variation in content filtering block logs and additional drops for events of limited to no security value.</li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="june-29-2023---content-release">June 29, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#june-29-2023---content-release" class="hash-link" aria-label="Direct link to June 29, 2023 - Content Release" title="Direct link to June 29, 2023 - Content Release" translate="no">​</a></h3>
<p>This release includes parsing and mapping updates to Fortinet to account for variations in URL information present in the log sometimes leading to malformed URLs being normalized, adjustments to Jamf mappings to account for case variations in certain fields, as well as changes enumerated below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-11">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-11" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] OUTLIER-S00010 Spike in URL Length from IP Address<!-- -->
<ul>
<li class="">Narrowed rule expression to NetworkHTTP and NetworkProxy records</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-9">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-9" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Fortinet App Control Logs</li>
<li class="">[Updated] Fortinet DLP Logs</li>
<li class="">[Updated] Fortinet Event Logs</li>
<li class="">[Updated] Fortinet IPS Logs</li>
<li class="">[Updated] Fortinet Traffic Logs</li>
<li class="">[Updated] Fortinet Virus Logs</li>
<li class="">[Updated] Fortinet Webfilter Logs</li>
<li class="">[Updated] Jamf Audit User - Audit</li>
<li class="">[Updated] Jamf Audit User - Authentication</li>
<li class="">[Updated] Jamf Audit User - Endpoint</li>
<li class="">[Updated] Jamf Audit User - Network</li>
<li class="">[Updated] SentinelOne Logs - C2C threats<!-- -->
<ul>
<li class="">Adds alternate value for normalizedSeverity lookup</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-9">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-9" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Cisco/Cisco Meraki<!-- -->
<ul>
<li class="">Support for more variation in content filtering block logs and additional drops for events of limited to no security value.</li>
</ul>
</li>
<li class="">[Updated] /Parsers/System/Fortinet/Fortigate/Fortigate-Syslog</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="june-29-2023---application-update">June 29, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#june-29-2023---application-update" class="hash-link" aria-label="Direct link to June 29, 2023 - Application Update" title="Direct link to June 29, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-rbac-capabilities-1">New RBAC Capabilities<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#new-rbac-capabilities-1" class="hash-link" aria-label="Direct link to New RBAC Capabilities" title="Direct link to New RBAC Capabilities" translate="no">​</a></h4>
<p>Starting <strong>Thursday, July 6</strong>, we're introducing new RBAC capabilities for Cloud SIEM: <em>View Entities</em> and <em>Manage Entities</em>. Users with the built-in administrator role will receive these capabilities automatically, but <strong>admins must manually add these capabilities</strong> to other roles as appropriate. If a user does not have either role, they will not be able to see Entity details or interact with/manage Entities in any way.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-7">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#minor-changes-and-enhancements-7" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] Nodes can now be moved around individually on the Insight Related Entities Graph.</li>
<li class="">[Update] To align more closely with accepted industry definitions, we are changing the <em>Dwell Time</em> label on Insight metrics in the UI to <em>Detection Time</em>. Note that only the label is changing, not now the metric is calculated (i.e., the period of time between when the first record in an Insight was observed and when the Insight was created).</li>
<li class="">[Update] Match list update containing more than 1000 entries are now supported by our Terraform provider.</li>
<li class="">[Update] When a custom product or vendor is selected in log mapping, the string entered by the user is now indexed instead of the word "Custom", so that the custom entry can be searchable/filterable. This only applies to mappings configured going forward.</li>
<li class="">[New] Custom tag schemas can now be retrieved via API (<code>GET /tag-schemas</code>).</li>
<li class="">[New] When viewing Rule Tuning Expressions, if one applies to all rules, it will now say <code>All</code> instead of giving a numerical count.</li>
<li class="">[Update] The Cloud SIEM UI color palette has been updated to more closely align with the standard Sumo Logic "dark mode" color palette.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-9">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#bug-fixes-9" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">Insight sub-resolutions were not being passed to XSOAR correctly in some circumstances.</li>
<li class="">Some users were unable to override fields on some Sumo-provided rules.</li>
<li class="">When extracting fields in rule expressions, double quotes were not working (<code>{{fields["&lt;field_name&gt;"]}}</code>).</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="june-22-2023---content-release">June 22, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#june-22-2023---content-release" class="hash-link" aria-label="Direct link to June 22, 2023 - Content Release" title="Direct link to June 22, 2023 - Content Release" translate="no">​</a></h3>
<p>This release includes additional parser and mappers for Aruba ClearPass Syslog events, minor bug fixes to several First Seen type rules, and other specifically enumerated changes below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-12">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-12" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00814 Abnormal Child Process - sdiagnhost.exe - CVE-2022-30190<!-- -->
<ul>
<li class="">Adds requirement that <code>commandLine</code> is present for a match</li>
</ul>
</li>
<li class="">[Updated] FIRST-S00016 First Seen Non-Network Logon from User</li>
<li class="">[Updated] FIRST-S00008 First Seen whoami command From User</li>
<li class="">[Updated] MATCH-S00815 Threat Intel - Successful Authentication from Threat IP<!-- -->
<ul>
<li class="">Adds <code>dstDevice_ip </code> to entity selection</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-10">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-10" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Aruba ClearPass Guest Access</li>
<li class="">[New] Aruba ClearPass WiFi Access Tracker</li>
<li class="">[New] Aruba ClearPass Wifi Failed Tracker</li>
<li class="">[Updated] Aruba ClearPass Syslog</li>
<li class="">[Updated] Tenable.io Authentication<!-- -->
<ul>
<li class="">Adds alternative key matches for <code>vuln_cve</code> and <code>description</code> fields</li>
</ul>
</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-10">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-10" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/HP/Aruba ClearPass - Syslog</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="june-20-2023---application-update">June 20, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#june-20-2023---application-update" class="hash-link" aria-label="Direct link to June 20, 2023 - Application Update" title="Direct link to June 20, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="outlier-rules">Outlier Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#outlier-rules" class="hash-link" aria-label="Direct link to Outlier Rules" title="Direct link to Outlier Rules" translate="no">​</a></h4>
<p>Sumo Logic is pleased to announce a new rule type for Cloud SIEM: Outlier Rules. This new rule type further enhances Cloud SIEM’s User and Entity Behavioral Analytics (UEBA) capabilities. With these rules, Cloud SIEM can detect events that deviate from the usual behavior of an Entity, such as a spike in login failures from a user, without having to define a static threshold. Once the rule is set, Cloud SIEM automatically builds a normal behavior baseline for each Entity based on the rule expression. It creates a signal only when a deviation from normal behavior is detected (in this case, too many login failures compared to their normal baseline behavior). Other examples include detecting a spike in Windows administrative privileges granted and a spike in AWS calls from a user.</p>
<p>Outlier Rules are defined like any other rule type through the Content menu in Cloud SIEM.</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/outlier-signal.png" alt="Example Signal from Outlier Rule">
<p>Outlier Rules operate based on a baseline. During this period - typically between 7 and 30 days - the system will learn what normal behavior looks like. After the baseline is established, Cloud SIEM will begin generating Signals when unusual behavior is detected compared to that baseline. (Note that the longer the baseline, the more accurate the model will be.)</p>
<p>Cloud SIEM will include a set of Outlier Rules out of the box. These rules can be tuned and customized like any other rule type, and custom Outlier Rules can also be created.</p>
<p>For more information about how to use Outlier Rules, see the online <a class="" href="https://www.sumologic.com/help/docs/cse/rules/write-outlier-rule/">documentation</a>. You can also see an introduction to the feature by navigating to the Rules page in Cloud SIEM.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-8">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#minor-changes-and-enhancements-8" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] Users can now customize the global Signal Suppression period. During this period, which is set to 72 hours by default, duplicate signals (with identical names and Entities) are suppressed (for example, they do not “count” towards Insights). With this new feature, this period can be lowered globally (for all rules) to as low as 24 hours. (Note that lowering this value can lead to a higher number of potentially duplicate Insights.) The setting is accessible via the <strong>Workflow</strong> &gt; <strong>Detection</strong> option in the Configuration menu.</li>
<li class="">[Updated] Cloud SIEM application status will now be published on the main Sumo Logic status page, <a href="https://status.sumologic.com/" target="_blank" rel="noopener noreferrer" class="">https://status.sumologic.com/</a>. (Previously it was published on <a href="https://cse-status.sumologic.com/" target="_blank" rel="noopener noreferrer" class="">https://cse-status.sumologic.com/</a>.) Existing email subscriptions and status notifications will be moved to the new page automatically.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="june-12-2023---application-update">June 12, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#june-12-2023---application-update" class="hash-link" aria-label="Direct link to June 12, 2023 - Application Update" title="Direct link to June 12, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-9">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#minor-changes-and-enhancements-9" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] The Entity Timeline now supports all Entity types (including custom types).</li>
<li class="">[New] The <code>GetSignals</code> API call now includes an attribute with a timestamp when each Signal was <code>created</code>.</li>
<li class="">[Updated] The log mapping UI has been updated so that if a standard vendor and product is selected, those values will be auto-filled on the record configuration, avoiding an issue where customers were accidentally creating 'custom' values.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-10">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#bug-fixes-10" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">An error would occur when sorting entity groups by entity type.</li>
<li class="">The control used to select schema tags for Entities was not working properly.</li>
<li class="">The "View in Log Search / Normalized Data" button was opening a log search window with an incorrect time frame.</li>
<li class="">Global search was not displaying previous searches, and was not returning some Entities.</li>
<li class="">The rule tuning expression editor would not scroll for very long expressions.</li>
<li class="">Importing a rule via the UI was not working in some scenarios.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="june-2-2023---content-release">June 2, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#june-2-2023---content-release" class="hash-link" aria-label="Direct link to June 2, 2023 - Content Release" title="Direct link to June 2, 2023 - Content Release" translate="no">​</a></h3>
<p>Within this release, we made modifications to the Threat Intel MATCH-S00815 Rule to include the user_username associated with the 'src_Device_ip' to capture the account the threat IP authenticated with and to correlate on actions by the account. We also made a modification to the Azure Sign in Log mapper so that 'properties.userAgent' is mapped to the entity field 'http_userAgent'.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-13">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-13" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00815 Threat Intel - Successful Authentication from Threat IP</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-11">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-11" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] AzureActivityLog 01</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-26-2023---content-release">May 26, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#may-26-2023---content-release" class="hash-link" aria-label="Direct link to May 26, 2023 - Content Release" title="Direct link to May 26, 2023 - Content Release" translate="no">​</a></h3>
<p>This release changes Crowdstrike mapper record types from 'Endpoint' to 'Audit' logs to align with Crowdstrike documentation, fixes to Fortinet severity scoring, SentinelOne IP mappings, additional values for Windows mappers for Snare, Snare parser updates for Windows Event 4947, updates to TrendMicro Deep Security CEF parser to allow for additional timestamp formats, and a minor rule update.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-14">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-14" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] AGGREGATION-S00005 Suspicious System Enumeration Occurring in Quick Succession, Rule no longer in prototype</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-12">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-12" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] CrowdStrike Audit Logs</li>
<li class="">[Updated] CrowdStrike Falcon Host API DetectionSummaryEvent</li>
<li class="">[Updated] CrowdStrike Falcon Host API IdpDetectionSummaryEvent (CNC)</li>
<li class="">[Updated] CrowdStrike Falcon Identity Protection (CNC)</li>
<li class="">[Updated] CrowdStrike Remote Response Session (CNC)</li>
<li class="">[Updated] CrowdStrike UserActivity Logs</li>
<li class="">[Updated] Fortinet DLP Logs</li>
<li class="">[Updated] Fortinet IPS Logs</li>
<li class="">[Updated] SentinelOne Logs - C2C agents</li>
<li class="">[Updated] SentinelOne Logs - C2C threats</li>
<li class="">[Updated] Windows - Security - 4947</li>
<li class="">[Updated] Windows - Security - 4948</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-11">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-11" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Trend Micro/Trend Micro Deep Security - CEF</li>
<li class="">[Updated] /Parsers/System/Microsoft/Shared/Windows Text Transforms - Security</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-12-2023---content-release">May 12, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#may-12-2023---content-release" class="hash-link" aria-label="Direct link to May 12, 2023 - Content Release" title="Direct link to May 12, 2023 - Content Release" translate="no">​</a></h3>
<p>Across the latest content release, the Threat Labs team has made a series of new AWS specific detections and a set of improvements both to the mappers and parser to include proper inbound / outbound network connection directional flow, and port assignments for AWS GuardDuty. Additional context and minor corrections/improvements can found within the list below.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-15">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-15" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00874 AWS Lambda Function Recon</li>
<li class="">[New] MATCH-S00875 AWS VPC FLow Log Deletion</li>
<li class="">[New] MATCH-S00876 Potential AWS Security Credential Access via curl</li>
<li class="">[Updated] MATCH-S00226 Azure - Add Member to Group, TLAB-542 Update Azure Group Add rule and mapper addition, Keys updated: <code>summary_expression</code>, <code>normalized_summary</code></li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-13">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-13" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] AWS GuardDuty Alerts from Sumo CIP</li>
<li class="">[Updated] AWSGuardDuty_Backdoor</li>
<li class="">[Updated] AWSGuardDuty_Behavior</li>
<li class="">[Updated] AWSGuardDuty_Catch_All</li>
<li class="">[Updated] AWSGuardDuty_CryptoCurrency</li>
<li class="">[Updated] AWSGuardDuty_Discovery</li>
<li class="">[Updated] AWSGuardDuty_Exfiltration</li>
<li class="">[Updated] AWSGuardDuty_PenTest</li>
<li class="">[Updated] AWSGuardDuty_Trojan</li>
<li class="">[Updated] AzureActivityLog AuditLogs</li>
<li class="">[Updated] Recon_EC2_PortProbeUnprotectedPort</li>
<li class="">[Updated] Recon_EC2_Portscan</li>
<li class="">[Updated] Recon_IAMUser</li>
<li class="">[Updated] UnauthorizedAccess_EC2_SSHBruteForce</li>
<li class="">[Updated] UnauthorizedAccess_EC2_TorClient</li>
<li class="">[Updated] UnauthorizedAccess_EC2_TorIPCaller</li>
<li class="">[Updated] UnauthorizedAccess_EC2_TorRelay</li>
<li class="">[Updated] UnauthorizedAccess_IAMUser</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-12">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-12" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/AWS/AWS S3 Server Access Logs, AWS S3 Server Access Logs Parser Fix Related to New Fields and Wrapper</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ASA, Modifies ASA header parser to account for additional delimiter variant</li>
<li class="">[Updated] /Parsers/System/AWS/GuardDuty</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-5-2023---content-release">May 5, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#may-5-2023---content-release" class="hash-link" aria-label="Direct link to May 5, 2023 - Content Release" title="Direct link to May 5, 2023 - Content Release" translate="no">​</a></h3>
<p>The latest iteration of our content release include Office 365 changes that address Mapping, Parsing and Rule changes that better take into account fields that were previously encapsulated within the Parameters field. Additionally, we performed improvements to the Zscaler Nanolog mapping and parsing to more accurately present port data even when extracted from URLs.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-16">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-16" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00830 Office 365 Forwarding Rule Created</li>
<li class="">[Updated] MATCH-S00831 Office 365 Unified Audit Logging Disabled</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-14">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-14" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Microsoft Office 365 Exchange Mailbox Audit Events: Keys updated: 'targetUser_username'</li>
<li class="">[Updated] Office 365 - Exchange Admin Events: Keys updated: 'user_username', 'targetUser_username'</li>
<li class="">[Updated] Zscaler - Nanolog Streaming Service - JSON: Keys updated: 'dstPort'</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-13">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-13" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Cisco/Cisco Firepower Syslog: REGEX modifications to parse the Firepower Event ID</li>
<li class="">[Updated] /Parsers/System/Microsoft/Office 365</li>
<li class="">[Updated] /Parsers/System/Zscaler/Zscaler Nanolog Streaming Service/Zscaler Nanolog Streaming Service-CEF</li>
<li class="">[Updated] /Parsers/System/Zscaler/Zscaler Nanolog Streaming Service/Zscaler Nanolog Streaming Service-JSON</li>
<li class="">[Updated] /Parsers/System/Zscaler/Zscaler Nanolog Streaming Service/Zscaler Nanolog Streaming Service-LEEF</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-3-2023---application-update">May 3, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#may-3-2023---application-update" class="hash-link" aria-label="Direct link to May 3, 2023 - Application Update" title="Direct link to May 3, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="cloud-siem-insight-trainer">Cloud SIEM Insight Trainer<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#cloud-siem-insight-trainer" class="hash-link" aria-label="Direct link to Cloud SIEM Insight Trainer" title="Direct link to Cloud SIEM Insight Trainer" translate="no">​</a></h4>
<p>We are excited to announce the release of Cloud SIEM Insight Trainer, a dashboard packaged with the Cloud SIEM Application.</p>
<p>Many security teams spend time every week tuning their SIEM to improve detections and focus SOC analyst attention on the most serious threats. Insight Trainer utilizes machine learning to provide Rule tuning recommendations and severity adjustments to significantly reduce the burden of manual tuning. Insight Trainer learns Rule severity adjustments from your Insights' history that reduces false positive, and optionally, "No Action" Insights.</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/insight-trainer.png" alt="Cloud SIEM Insight Trainer">
<p>Some of the highlights of Insight Trainer include:</p>
<ul>
<li class=""><strong>Customer-Specific Tuning Recommendations</strong> - Insight Trainer makes recommendations specific to each customer based on their unique set of Rules, Insight history, and analyst Insight resolutions.</li>
<li class=""><strong>Improved SOC Efficiency</strong> - Insight Trainer automates the manual process of identifying Rules that are candidates for tuning or severity adjustment and provides impact analysis of the changes.</li>
<li class=""><strong>Machine Learning/AI-Driven Analytics</strong> - Insight Trainer leverages machine learning and AI to deliver outcome-based recommendations geared towards the reduction of false positive and non-actionable Insights without compromising the actual detection value or true positive Insights in Cloud SIEM.</li>
<li class=""><strong>Easy Adoption</strong> - The dashboard is available as an update to our already existing Enterprise Audit Cloud SIEM application and can be set up to run with no additional configuration or data science knowledge.</li>
</ul>
<p>Periodic application of the recommended changes will improve the quality of Insights generated by Cloud SIEM. For more information about the Insight Trainer, see our detailed <a class="" href="https://www.sumologic.com/help/docs/cse/rules/insight-trainer/">online documentation</a>.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-11">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#bug-fixes-11" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">On the Insight Related Entities list, some of the Signal counts were incorrect.</li>
<li class="">Whitespace, including new lines, were being stripped from some Enrichments formatted in JSON.</li>
<li class="">Indicators not using the proper case were being accepted but displaying as "NotFlagged" in the UI.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-28-2023---content-release">April 28, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#april-28-2023---content-release" class="hash-link" aria-label="Direct link to April 28, 2023 - Content Release" title="Direct link to April 28, 2023 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-17">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-17" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<p>Updates several Azure based rules to account for modifications made to normalization mappers.</p>
<ul>
<li class="">[New] MATCH-S00873 AWS EKS Cluster Configuration Updated: AWS EKS clusters contain various configuration options, including for which IP addresses can access the cluster API. Ensure that this change is authorized and expected.</li>
<li class="">[New] MATCH-S00872 AWS EKS Failed Curl Authentication Attempt: Failed instances of curl usage within a containerized environment should occur rarely. Investigate the source IP address used to ensure that it is legitimate.</li>
<li class="">[New] MATCH-S00871 AWS EKS Pod Shared Object Modification or Creation: A Kubernetes pod was either created, updated or patched with a shared process namespace.</li>
<li class="">[New] MATCH-S00870 AWS EKS Secrets Created: Kubernetes secrets may be created for legitimate purposes. Ensure that the secret created is from an IAM account that is expected to manage Kubernetes workloads on EKS.</li>
<li class="">[New] MATCH-S00869 AWS EKS Secrets Deleted: Kubernetes secrets may be deleted for legitimate purposes. Ensure that the secret created is from an IAM account that is expected to manage Kubernetes workloads on EKS.</li>
<li class="">[New] FIRST-S00036 First Seen AWS EKS API Call via CloudTrail from User: The user <code>user_username</code> has performed an operation on an EKS cluster for the first time since the baseline period.</li>
<li class="">[New] FIRST-S00037 First Seen AWS EKS Admission Controller Created by IP Address: First Seen Admission Controllers (submit a new MutatingWebhookConfiguration or ValidatingWebhookConfiguration object via the Kubernetes API, or update an existing one.)</li>
<li class="">[New] FIRST-S00035 First Seen AWS EKS Secrets Enumeration from IP Address: <code>srcDevice_ip</code> has enumerated secrets on an AWS EKS cluster for the first time since the baseline period.</li>
<li class="">[New] FIRST-S00034 First Seen Session Token Granted to User from New IP: An AWS Session token was issued for the first time since the baseline period to <code>user_username</code> using the IP address of <code>srcDevice_ip</code>.</li>
<li class="">[New] FIRST-S00033 First Seen Terminal-Attached Pod Deployed to EKS: A pod was deployed with an attached terminal (stdin=true,stdout=true,tty=true) for the first time since the baseline period.</li>
<li class="">[New] THRESHOLD-S00114 HTTP Response Error Spike to AWS EKS: HTTP web services provide response codes to client requests. The response code numbers in the 400s are used to indicate a client related error and response code numbers in the 500s represent server related errors. This rule looks for a AWS EKS cluster receiving a large frequency of web errors within a short period of time. It is unusual for a web client to cause this many errors in a short period of time. Common occurrences for this behavior is scanning/probing activity or scripted web clients which are now encountering errors due to a misconfiguration or recent change. This rule alerts when a host on the monitored network triggers the threshold.</li>
<li class="">[New] MATCH-S00868 New Binding Role Created on AWS EKS: A role binding grants a resource superuser or administrative access to a Kubernetes cluster. Ensure this action is expected and performed by known Kubernetes administrators.</li>
<li class="">[New] MATCH-S00867 New Cluster Admin Binding Role Created on AWS EKS: A cluster-admin role binding grants a resource superuser or administrative access to a Kubernetes cluster. Ensure this action is expected and performed by known Kubernetes administrators.</li>
<li class="">[New] MATCH-S00866 Privileged Pod Created on AWS EKS: Privileged containers have all capabilities of the host machine. These privileged containers may perform actions directly on the host that they are running on. Ensure that this event is expected and occurs from a user account or IP address that normally works with privileged containers within the cluster. Customers are encouraged to set up an exclusion list for <code>spec.securitycontext.capabilities</code> for pods that are frequently going to be managed with privileged escalation.</li>
<li class="">[Updated] MATCH-S00864 Azure Firewall Rule Modified</li>
<li class="">[Updated] MATCH-S00839 Azure Virtual Machine RunCommand Issued</li>
<li class="">[Updated] FIRST-S00021 First Seen Azure Virtual Machine Run Command Issued by User</li>
<li class="">[Updated] FIRST-S00032 First Seen Kubectl Command From User: Expanded record types considered to include Endpoint.</li>
<li class="">[Updated] CHAIN-S00012 Potential Azure Persistence via Automation Accounts</li>
<li class="">[Updated] MATCH-S00167 Recon Using Common Windows Commands: Narrowed rule criteria to Windows executables to prevent erroneous matches from *nix based systems</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-15">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-15" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Administrator Audit Trail: Modified CyberArk EPM mappers to include alternate field values.</li>
<li class="">[New] Administrator Logon</li>
<li class="">[New] Darktrace Parser - Anomalous Connection: Modifies Darktrace mappers to include alternate field values and supports additional events.</li>
<li class="">[New] Darktrace Parser - Brute Force Attempt</li>
<li class="">[New] DocuSign Monitor - Alert</li>
<li class="">[New] DocuSign Monitor - Catch All: Adds support for DocuSign Monitor events via C2C.</li>
<li class="">[New] Druva inSync - Catch All: Adds support for Druva events via C2C.</li>
<li class="">[New] Jamf Audit User - Authentication</li>
<li class="">[New] Jamf Audit User - Endpoint</li>
<li class="">[New] Jamf Audit User - Network</li>
<li class="">[New] Workday - Sign On: Expands mapping support for Workday logs ingested via C2C.</li>
<li class="">[Updated] Azure Administrative logs</li>
<li class="">[Updated] Cisco Meraki IDS Alert - C2C: Corrects typo in mapper for some IP/port fields</li>
<li class="">[Updated] Darktrace Parser - Catch All:</li>
<li class="">[Updated] Darktrace Parser - New Device</li>
<li class="">[Updated] Darktrace Parser Events</li>
<li class="">[Updated] Jamf Audit User - Audit</li>
<li class="">[Updated] Sysdig Benchmark JSON: Corrects bug in severity mapping for Sysdig mappers.</li>
<li class="">[Updated] Sysdig Policy Detection JSON: Corrects bug in severity mapping for Sysdig mappers.</li>
<li class="">[Updated] Sysdig Scanning JSON: Corrects bug in severity mapping for Sysdig mappers.</li>
<li class="">[Updated] Workday - Catch All: Expands mapping support for Workday logs ingested via C2C.</li>
<li class="">[Updated] Zscaler - Nanolog Streaming Service - JSON: Corrects NSS record type to NetworkProxy instead of NetworkFlow</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-14">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-14" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<p>Adds support for DocuSign Monitor and  Druva inSync Cloud, and additional support for Meraki, CyberArk, and Workday events.</p>
<ul>
<li class="">[New] /Parsers/System/DocuSign/DocuSign Monitor</li>
<li class="">[New] /Parsers/System/Druva/Druva inSync Cloud</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco Meraki: Strip off extraneous … from URLs</li>
<li class="">[Updated] /Parsers/System/Cyber-Ark/CyberArk EPM JSON: Corrected time parsing</li>
<li class="">[Updated] /Parsers/System/Darktrace/Darktrace JSON</li>
<li class="">[Updated] /Parsers/System/Duo Security/Duo Multi-Factor Authentication: Duo Parser Fix for Setting Event ID Correctly</li>
<li class="">[Updated] /Parsers/System/Palo Alto/PAN Firewall CEF: Adds support for Network events ingested via a log forwarder or Cortex Data Lake.</li>
<li class="">[Updated] /Parsers/System/Workday/Workday</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-21-2023---application-update">April 21, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#april-21-2023---application-update" class="hash-link" aria-label="Direct link to April 21, 2023 - Application Update" title="Direct link to April 21, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="automation-service-1">Automation Service<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#automation-service-1" class="hash-link" aria-label="Direct link to Automation Service" title="Direct link to Automation Service" translate="no">​</a></h4>
<p>Sumo Logic is excited to announce a new feature that integrates functionality previously available only in our Cloud SOAR solution directly into Cloud SIEM. This new feature, the Automation Service, allows you to define and automate smart actions, including enrichments and notifications, enabling your security analysts to address potential security threats faster and more accurately.</p>
<p>You can interact with the service through <strong>automations</strong>, which execute playbooks. <strong>Playbooks</strong> are composed of one or more actions with a workflow that can include parallel actions and logic steps. <strong>Actions</strong> are defined as part of <strong>integrations</strong>.</p>
<p>The Automation Service includes over 350 integrations out of the box, each including several predefined actions:</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/automation-service-integrations.png" alt="Automation Service Integrations">
<p>Many playbooks are also included, providing instant value with practically no effort - simply connect the integration to the appropriate endpoint and enable the corresponding automation in Cloud SIEM. Playbooks can be automatically triggered when Insights are created or closed, or triggered manually.</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/automation-service-playbook1.png" alt="Automation Service Playbook Example">
<p>You can also customize these objects or create entirely new ones. While the out of the box actions primarily execute directly from the Sumo Logic cloud, custom actions run through a proxy called a <strong>Bridge</strong> which runs on a system managed by you.</p>
<p>Automations (and other objects) are accessible through the <strong>Configuration</strong> menu, under <strong>Integrations</strong>:</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/automation-service-menu.png" alt="Automation Service Menu">
<p>Automation results are accessible from Insight and Entity detail pages.</p>
<p><strong>The Insight Enrichment Server and the Actions functionality in Cloud SIEM, which is replaced by the Automation Service, will be deprecated on November 30, 2023.</strong> Until then, they will continue to be fully supported and operational. To aid in migration, all current Enrichment Server examples and Actions have equivalent actions and playbooks in the Automation Service. In addition, through the Bridge, customers can execute any existing PowerShell script currently connected to the Insight Enrichment Server.</p>
<div class="theme-admonition theme-admonition-note alert alert--secondary admonition_WoCw"><div class="admonitionHeading_TMsN"><span class="admonitionIcon_Ibzs"><svg viewBox="0 0 14 16"><path fill-rule="evenodd" d="M6.3 5.69a.942.942 0 0 1-.28-.7c0-.28.09-.52.28-.7.19-.18.42-.28.7-.28.28 0 .52.09.7.28.18.19.28.42.28.7 0 .28-.09.52-.28.7a1 1 0 0 1-.7.3c-.28 0-.52-.11-.7-.3zM8 7.99c-.02-.25-.11-.48-.31-.69-.2-.19-.42-.3-.69-.31H6c-.27.02-.48.13-.69.31-.2.2-.3.44-.31.69h1v3c.02.27.11.5.31.69.2.2.42.31.69.31h1c.27 0 .48-.11.69-.31.2-.19.3-.42.31-.69H8V7.98v.01zM7 2.3c-3.14 0-5.7 2.54-5.7 5.68 0 3.14 2.56 5.7 5.7 5.7s5.7-2.55 5.7-5.7c0-3.15-2.56-5.69-5.7-5.69v.01zM7 .98c3.86 0 7 3.14 7 7s-3.14 7-7 7-7-3.12-7-7 3.14-7 7-7z"></path></svg></span>note</div><div class="admonitionContent_vXIg"><p>The Automation Service currently has <strong>Limited Availability</strong>. This means that it is fully functional and supported in production environments, but not automatically deployed to every customer. If you would like it deployed to your environment, please contact Sumo Logic and we will enable it for you.</p></div></div>
<p>There is much more information about the Automation Service and how to use it in the <a class="" href="https://www.sumologic.com/help/docs/cse/automation/about-automation-service-and-cloud-siem/">online documentation</a>.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="threat-indicators">Threat Indicators<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#threat-indicators" class="hash-link" aria-label="Direct link to Threat Indicators" title="Direct link to Threat Indicators" translate="no">​</a></h4>
<p>The way enrichments are displayed in Cloud SIEM is also being enhanced to provide important information to security analysts when they need it, without having to look it up.</p>
<p>First, the Enrichment tabs have been reorganized by Entity (instead of by Enrichment) and additional filter controls have been added:</p>
<img src="https://www.sumologic.com/help/img/cse/enrichments.png" alt="Enrichments Tab">
<p>In addition, Entity enrichments will now persist outside of Insights. So, for example, if an Entity is enriched as part of an Insight, those enrichment details will be visible from that Entity’s details page.</p>
<p>This persistence can be controlled by setting an expiration date as part of the enrichment. In addition, URLs can be attached to enrichments (so that users can click on the link to see more detailed information about the enrichment by, for example, going to the VirusTotal web page for that indicator).</p>
<p>Finally, enrichments can now set reputation indicators. These indicators will be visible anywhere in the UI that the Entity is displayed. Where there is sufficient room, a color-coded text label will be displayed (as in the example above); in other situations, an icon will be displayed instead.</p>
<p>The reputation is not set automatically; the enrichment must pass a reputation to Cloud SIEM. More information about this, and the other new features, is available in <a class="" href="https://www.sumologic.com/help/docs/cse/integrations/enrichments-and-indicators/">online documentation</a>.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-10">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#minor-changes-and-enhancements-10" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[Updated] The Entity Relationship Graph view on Insights has exited open Beta and is now fully supported.</li>
<li class="">[New] When using custom columns with Match Lists, CIDR block matches are now supported with IP address-related fields.</li>
<li class="">[New] When referring to Match Lists, specific columns can now be specified in rule conditions for all Match List types. (Previously this functionality was only available for Threat Intelligence lists.)</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-20-2023---content-release">April 20, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#april-20-2023---content-release" class="hash-link" aria-label="Direct link to April 20, 2023 - Content Release" title="Direct link to April 20, 2023 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="summary">Summary<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#summary" class="hash-link" aria-label="Direct link to Summary" title="Direct link to Summary" translate="no">​</a></h4>
<p>Within our latest content release we are introducing a new set of rules related to our 5th Threat Research Campaign structured around Docker, Azure, and Linux. We also made Mapper additions to support Cisco Meraki events ingested via C2C, Cyber Ark Mapper improvements, and new Jamf Audit User Event and Jamf Protect Mappers.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-18">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-18" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00864 Azure Firewall Rule Modified
Description: The Azure Firewall may provide egress and ingress controls for a variety of Azure services; unexpected or unplanned firewall modifications should be investigated.</li>
<li class="">[New] AGGREGATION-S00006 Docker Enumeration Detected on Host
Description: Threat actors will aim to enumerate various permissions and settings on hosts with Docker installed; this enumeration can potentially lead to exploitation avenues.</li>
<li class="">[New] FIRST-S00031 First Seen IP Address Associated with User for a Successful Azure AD Sign In Event
Description: User has successfully signed into an Azure resource with a first seen IP address since the baseline period.</li>
<li class="">[New] FIRST-S00032 First Seen Kubectl Command From User
Description: User has issued a Kubectl command which was first seen since the baseline period on hostname.</li>
<li class="">[New] THRESHOLD-S00112 Multiple Azure Firewall Deny Events for IP
Description: An Azure firewall has denied a large number of request from an IP address within a short time window.</li>
<li class="">[New] THRESHOLD-S00113 Multiple Azure Firewall Deny Events for URL
Description: An Azure firewall has denied a large number of requests to a URL within a short time window.</li>
<li class="">[New] MATCH-S00865 Potential Docker Escape via Command Line
Description: This rule looks for whether the raw Docker socket was used for container creation as well as a bind mount of /hostfs which could facilitate a container escape and allow command execution on the Docker host.</li>
<li class="">[New] CHAIN-S00014 Potential Docker container escape via Cgroups.
Description: A Docker container running with the privileged flag may be exploited by threat actors, potentially resulting in an escape from the Docker container to the host that it is running on. This can result in various privilege escalation opportunities.</li>
<li class="">[New] CHAIN-S00015 Suspicious Linux Execution Chain
Description: This alert looks for a number of search expressions that result in a suspicious Linux execution chain. Specifically, a file that is created in a users' home directory or in /tmp, followed by a chmod and file execution, as well as the process making a network connection.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-16">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-16" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Cisco Meraki File Scanned - C2C</li>
<li class="">[New] Cisco Meraki IDS Alert - C2C</li>
<li class="">[New] Cisco Meraki Organization Configuration Change - C2C</li>
<li class="">[New] Cisco Meraki Wireless Air Marshall - C2C</li>
<li class="">[New] Jamf Audit User - Events</li>
<li class="">[New] Jamf Protect Analytics - Events</li>
<li class="">[Updated] Cisco Meraki 8021x</li>
<li class="">[Updated] Cisco Meraki Catch All - Custom Parser</li>
<li class="">[Updated] Cisco Meraki Client Association</li>
<li class="">[Updated] Cisco Meraki Content Filtering Block - Custom Parser</li>
<li class="">[Updated] Cisco Meraki Flow Start_End - Custom Parser</li>
<li class="">[Updated] Cisco Meraki Flows - Custom Parser</li>
<li class="">[Updated] Cisco Meraki IDS - Custom Parser</li>
<li class="">[Updated] Cisco Meraki Security Filtering Disposition Change - Custom Parser</li>
<li class="">[Updated] Cisco Meraki Security Filtering File Scanned - Custom Parser</li>
<li class="">[Updated] Cisco Meraki URLS - Custom Parser</li>
<li class="">[Updated] Cisco Meraki WPA - Custom Parser</li>
<li class="">[Updated] Cyber Ark 01</li>
<li class="">[Updated] Cyber Ark EPM AggregateEvent</li>
<li class="">[Updated] Cyber Ark EPM AuditAdmin</li>
<li class="">[Updated] Cyber Ark EPM GetComputer</li>
<li class="">[Updated] Cyber Ark EPM Policy</li>
<li class="">[Updated] Cyber Ark EPM RawDetails</li>
<li class="">[Updated] Cyber Ark EPM RawEvents</li>
<li class="">[Updated] Cyber Ark Vault JSON</li>
<li class="">[Updated] Jamf Parser - Catch All</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-15">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-15" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Cisco/Cisco Meraki C2C</li>
<li class="">[New] /Parsers/System/Sophos/Sophos Central C2C JSON</li>
<li class="">[Updated] /Parsers/System/Jamf/Jamf</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-13-2023---content-release">April 13, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#april-13-2023---content-release" class="hash-link" aria-label="Direct link to April 13, 2023 - Content Release" title="Direct link to April 13, 2023 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="summary-1">Summary<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#summary-1" class="hash-link" aria-label="Direct link to Summary" title="Direct link to Summary" translate="no">​</a></h4>
<ul>
<li class="">Updated GuardDuty mappers to use detail.type instead of overly verbose detail.description.</li>
<li class="">Added parsing and mapping support for Citrix Cloud C2C.</li>
<li class="">Secondary update corrections around Matchlist fix for column specifc filters.</li>
<li class="">New Sophos C2C mapper expansion around Event and Alert normalization.</li>
<li class="">Net-new OOBB content for Zoom; eight-Match rules, six Mappers, one Parser.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-19">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-19" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00856 Zoom - Account Created</li>
<li class="">[New] MATCH-S00857 Zoom - Account Deleted</li>
<li class="">[New] MATCH-S00858 Zoom - Group Admin Added</li>
<li class="">[New] MATCH-S00859 Zoom - Group Admin Deleted</li>
<li class="">[New] MATCH-S00860 Zoom - Group Changes</li>
<li class="">[New] MATCH-S00861 Zoom - Information Barrier Policy Changes</li>
<li class="">[New] MATCH-S00862 Zoom - Meeting Risk Alert</li>
<li class="">[New] MATCH-S00863 Zoom - Recording Modification</li>
<li class="">[Updated] THRESHOLD-S00096 Brute Force Attempt</li>
<li class="">[Updated] MATCH-S00565 Direct Outbound DNS Traffic</li>
<li class="">[Updated] THRESHOLD-S00103 Domain Brute Force Attempt</li>
<li class="">[Updated] THRESHOLD-S00102 Domain Password Attack</li>
<li class="">[Updated] THRESHOLD-S00095 Password Attack</li>
<li class="">[Updated] CHAIN-S00008 Successful Brute Force</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-17">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-17" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Citrix Cloud Client Created or Deleted</li>
<li class="">[New] Sophos - C2C Alerts</li>
<li class="">[New] Sophos - C2C Event Threat Detections</li>
<li class="">[New] Zoom - Account Creations or Deletions</li>
<li class="">[New] Zoom - Catch All</li>
<li class="">[New] Zoom - Group Modifications</li>
<li class="">[New] Zoom - Information Barrier Policy Modifications</li>
<li class="">[New] Zoom - Meeting Risk Alert</li>
<li class="">[New] Zoom - Recording Deleted or Trashed</li>
<li class="">[Updated] AWSGuardDuty_PenTest</li>
<li class="">[Updated] AWSGuardDuty_Stealth</li>
<li class="">[Updated] Recon_EC2_PortProbeUnprotectedPort</li>
<li class="">[Updated] Recon_IAMUser</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-16">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-16" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Citrix/Citrix Cloud C2C</li>
<li class="">[New] /Parsers/System/Zoom/Zoom</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-13-2023---application-update">April 13, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#april-13-2023---application-update" class="hash-link" aria-label="Direct link to April 13, 2023 - Application Update" title="Direct link to April 13, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-11">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#minor-changes-and-enhancements-11" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] When logs fail to parse or map, a detailed error message will be logged in the <code>sec_record_failure</code> index, in the <code>fields.reason</code> attribute.</li>
<li class="">[New] Where possible, private domains are now <a class="" href="https://www.sumologic.com/help/docs/cse/schema/record-processing-pipeline/#enrich-records-with-ip-address-url-and-domain-info">automatically enriched</a> by Cloud SIEM during record processing.</li>
<li class="">[Updated] Insight comments can now contain up to 1024 characters (up from 256).</li>
<li class="">[New] On the list of Rule Tuning Expressions, each Tuning Expression now lists the number of Rules to which it is currently applied.</li>
<li class="">[New] For First Seen Rules, the UI will display the baseline model status (i.e., building, with amount of progress, or complete). (Note it will only display the status on Rules that were created or updated after this feature became available.)</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-12">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#bug-fixes-12" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">In some cases, inventory data from an AWS EC2 source was not being displayed in Cloud SIEM properly.</li>
<li class="">For Yara-based signals with file attachments, users were unable to download the file.</li>
<li class="">Occasionally, some related Entities were not visible in the Insight Related Entities graph but were included correctly on the list.</li>
<li class="">Entity suppression state was being reported incorrectly on several screens.</li>
<li class="">The <code>Manage Entity Groups</code> permission was required to view Entity Groups. Now only <code>View Entity Groups</code> is required.</li>
<li class="">Links to the Cloud SIEM API no longer require a trailing slash.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-7-2023---content-release">April 7, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#april-7-2023---content-release" class="hash-link" aria-label="Direct link to April 7, 2023 - Content Release" title="Direct link to April 7, 2023 - Content Release" translate="no">​</a></h3>
<p>This release includes bug fixes for several rules using match lists using the "column" field in the rule expression.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-20">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-20" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] FIRST-S00030 First Seen Outbound Connection to External IP Address on Port 445 from IP Address; External connections over the internet to port 445 could be indictative of hash leak attempts, including exploitation attempts for vulnerabilities such as CVE-2023-2397. This alert looks at a source IP address making a connection to a new external destination IP address since the baseline period.</li>
<li class="">[Updated] FIRST-S00029 First Seen Successful Authentication From Unexpected Country; Added additional logic to help reduce false positives</li>
<li class="">[Updated] THRESHOLD-S00096 Brute Force Attempt</li>
<li class="">[Updated] MATCH-S00565 Direct Outbound DNS Traffic</li>
<li class="">[Updated] THRESHOLD-S00103 Domain Brute Force Attempt</li>
<li class="">[Updated] THRESHOLD-S00102 Domain Password Attack</li>
<li class="">[Updated] THRESHOLD-S00095 Password Attack</li>
<li class="">[Updated] CHAIN-S00008 Successful Brute Force</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-18">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-18" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] OpenVPN Logon Attempt</li>
<li class="">[New] OpenVPN Network Event</li>
<li class="">[New] Snowflake Catch All</li>
<li class="">[New] Snowflake Login</li>
<li class="">[New] Windows Defender ATP Alert</li>
<li class="">[Updated] Netskope - Audit Authentication Events - Logoff; Made eventID match more permissive</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-17">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-17" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Snowflake/Snowflake</li>
<li class="">[New] /Parsers/System/Microsoft/Windows Defender ATP Alert JSON</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ASA; Build/Teardown parsing bug fix</li>
<li class="">[Updated] /Parsers/System/OpenVPN/OpenVPN Syslog; Added support for additional format</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="march-24-2023---content-release">March 24, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#march-24-2023---content-release" class="hash-link" aria-label="Direct link to March 24, 2023 - Content Release" title="Direct link to March 24, 2023 - Content Release" translate="no">​</a></h3>
<p>Overall improvements to OOTB First Seen rules include minor baseline tweaks and severity adjustments for the following rules.
For corrections involving logic adjustment, additional context is included within the individual rule. This update also adds Alternative Values for ProofPoint TAP Mappers.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-21">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-21" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] FIRST-S00002 First Seen AWS API Call from User; General logic improvement to filter on valid Identity type</li>
<li class="">[Updated] FIRST-S00023 First Seen AWS API Gateway Enumeration by User; General logic improvement to filter on valid application</li>
<li class="">[Updated] FIRST-S00024 First Seen AWS SSM RunShellScript SendCommand From User</li>
<li class="">[Updated] FIRST-S00026 First Seen Anonymous Logon Change Activity to Domain Controller</li>
<li class="">[Updated] FIRST-S00007 First Seen DynamoDB Enumeration from User</li>
<li class="">[Updated] FIRST-S00004 First Seen Local Group Addition by User</li>
<li class="">[Updated] FIRST-S00009 First Seen RDP Logon From User</li>
<li class="">[Updated] FIRST-S00022 First Seen S3 Bucket ACL Enumeration by User</li>
<li class="">[Updated] FIRST-S00025 First Seen SMB Allowed Traffic From IP</li>
<li class="">[Updated] FIRST-S00029 First Seen Successful Authentication From Unexpected Country</li>
<li class="">[Updated] FIRST-S00011 First Seen Sysmon IMPHASH - Global; Reconfigured to be disabled by default</li>
<li class="">[Updated] FIRST-S00012 First Seen Sysmon IMPHASH - Host; Reconfigured to be disabled by default</li>
<li class="">[Updated] FIRST-S00005 First Seen User Creation From User</li>
<li class="">[Updated] FIRST-S00008 First Seen whoami command From User</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-19">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-19" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Proofpoint Targeted Attack Protection C2C - Click Blocked</li>
<li class="">[Updated] Proofpoint Targeted Attack Protection C2C - Click Permitted</li>
<li class="">[Updated] Proofpoint Targeted Attack Protection C2C - Message Blocked</li>
<li class="">[Updated] Proofpoint Targeted Attack Protection C2C - Message Delivered</li>
<li class="">[Updated] Proofpoint Targeted Attack Protection C2C - Message Permitted</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="march-16-2023---application-update">March 16, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#march-16-2023---application-update" class="hash-link" aria-label="Direct link to March 16, 2023 - Application Update" title="Direct link to March 16, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-12">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#minor-changes-and-enhancements-12" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] The Entity Timeline can now be filtered by record type:</li>
</ul>
<img src="https://www.sumologic.com/help/img/release-notes/cse/timeline-filter.jpg" alt="Entity Timeline Filter">
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-13">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#bug-fixes-13" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">When an Entity normalization lookup table was deleted and then re-created in the Sumo platform, the configuration in Cloud SIEM was not automatically updated, causing the normalization to fail.</li>
<li class="">Match lists with custom columns were not working properly during record processing.</li>
<li class="">The Network Blocks section was missing from the Entity details panel.</li>
<li class="">Links for schema tags were not displaying in the UI properly.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="march-15-2023---content-release">March 15, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#march-15-2023---content-release" class="hash-link" aria-label="Direct link to March 15, 2023 - Content Release" title="Direct link to March 15, 2023 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-22">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-22" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] CHAIN-S00013 GCP IDS Detection Followed by API Call; Detects a GCP IDS hit followed by an API call, indicating the source IP was able to gain access to GCP.</li>
<li class="">[Updated] THRESHOLD-S00087 Slack - Possible Session Hijacking; Adjusts "Slack - Possible Session Hijacking" to use 'sessionId' schema field.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-20">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-20" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] GCP IDS; Mapper for GCP IDS events</li>
<li class="">[New] Netskope - Catch All; Added 'Catch All' Mapper to account for unavailability of event identifier in all messages.</li>
<li class="">[New] Slack Login; Added mapping specific to logon success/failure events</li>
<li class="">[Updated] Slack Catch All; Adjusts mapper use new sessionIdschema field in place of sourceUid</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-18">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-18" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Cisco/Cisco Firepower Syslog; Adjusts Cisco Firepower parser for some FTD events and corrected routing for Snort like and ASA messages which pass through the Firepower parser.</li>
<li class="">[Updated] /Parsers/System/Google/GCP; Adds additional time format handling</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="schema-1">Schema<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#schema-1" class="hash-link" aria-label="Direct link to Schema" title="Direct link to Schema" translate="no">​</a></h4>
<ul>
<li class="">[New] sessionId; An ephemeral and at least semi-unique identifier of a connection between two systems (e.g., HTTP session, user logon session, TCP session identifiers)</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="march-10-2023---content-release">March 10, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#march-10-2023---content-release" class="hash-link" aria-label="Direct link to March 10, 2023 - Content Release" title="Direct link to March 10, 2023 - Content Release" translate="no">​</a></h3>
<p>This release contains a new set of mappers related to AWS CloudTrail Lambda functions, permissions, and sources and how changes related to them can align across our schema. In addition to that we have a correction to the parsing rerouted path 'System' in the parser path for Snort-like formatted messages.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-21">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-21" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] CloudTrail - lambda.amazonaws.com - AddLayerVersionPermission</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - AddPermission</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - CreateEventSourceMapping</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - CreateFunction</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - CreateFunctionUrlConfig</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - DeleteEventSourceMapping</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - DeleteFunction</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - DeleteFunctionUrlConfig</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - GetEventSourceMapping</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - GetFunction</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - GetFunctionConfiguration</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - GetFunctionUrlConfig</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - GetLayerVersionPolicy</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - GetPolicy</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - ListEventSourceMappings</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - ListFunctionUrlConfigs</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - ListFunctions</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - PublishLayerVersion</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - RemovePermission</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - UpdateEventSourceMapping</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - UpdateFunctionCode</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - UpdateFunctionConfiguration</li>
<li class="">[New] CloudTrail - lambda.amazonaws.com - UpdateFunctionUrlConfig</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-19">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-19" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Suricata/Suricata Syslog</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="march-7-2023-application-update">March 7, 2023 Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#march-7-2023-application-update" class="hash-link" aria-label="Direct link to March 7, 2023 Application Update" title="Direct link to March 7, 2023 Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="entity-relationship-graph">Entity Relationship Graph<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#entity-relationship-graph" class="hash-link" aria-label="Direct link to Entity Relationship Graph" title="Direct link to Entity Relationship Graph" translate="no">​</a></h4>
<p>We are excited to announce the new Entity Relationship Graph. With this feature, you can now see a graphical visualization of all related Entities in an Insight, as well as additional relationships beyond the Insight. This enables you to more quickly understand relationships among Entities and the larger context behind a potential security threat.</p>
<div class="theme-admonition theme-admonition-note alert alert--secondary admonition_WoCw"><div class="admonitionHeading_TMsN"><span class="admonitionIcon_Ibzs"><svg viewBox="0 0 14 16"><path fill-rule="evenodd" d="M6.3 5.69a.942.942 0 0 1-.28-.7c0-.28.09-.52.28-.7.19-.18.42-.28.7-.28.28 0 .52.09.7.28.18.19.28.42.28.7 0 .28-.09.52-.28.7a1 1 0 0 1-.7.3c-.28 0-.52-.11-.7-.3zM8 7.99c-.02-.25-.11-.48-.31-.69-.2-.19-.42-.3-.69-.31H6c-.27.02-.48.13-.69.31-.2.2-.3.44-.31.69h1v3c.02.27.11.5.31.69.2.2.42.31.69.31h1c.27 0 .48-.11.69-.31.2-.19.3-.42.31-.69H8V7.98v.01zM7 2.3c-3.14 0-5.7 2.54-5.7 5.68 0 3.14 2.56 5.7 5.7 5.7s5.7-2.55 5.7-5.7c0-3.15-2.56-5.69-5.7-5.69v.01zM7 .98c3.86 0 7 3.14 7 7s-3.14 7-7 7-7-3.12-7-7 3.14-7 7-7z"></path></svg></span>note</div><div class="admonitionContent_vXIg"><p>This feature is available to all customers but is currently in <strong>Beta</strong>. If you encounter any issues with this feature, report them to Sumo Logic Support. We appreciate your feedback.</p></div></div>
<p>The Entity Relationship Graph (and the Related Entities list) displays all Entities involved in the Insight (those referred to in a record in a Signal in the Insight) as well as additional Entity relationships (for example, if Cloud SIEM detects an IP address may also have had a specific hostname at the time the Insight was generated).</p>
<p>However, unlike the Related Entities list, the graph can visualize additional Entity relationships that existed outside of the Insight during a specified time frame.</p>
<p>Both the list and this new graph are available on the <strong>Entities</strong> tab of the Insight details page:</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/entity-rel-graph.jpg" alt="The Entity Relationship Graph UI">
<p>You can toggle between the list view and the graph view using the control in the upper-right corner of the main panel.</p>
<p>Each node in the graph represents a single Entity. The graph also displays the relationship types and any Indicators. Hovering over an Entity will highlight it and all of its relationships to other Entities, and when an Entity is selected, details about the Entity are displayed on the right.</p>
<p>The graph also includes a number of controls for zoom, full screen mode, filtering by Entity type, and adjusting the time frame for relationship detection.</p>
<p>For more information about how to use the Entity Relationship Graph, see the <a class="" href="https://www.sumologic.com/help/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/#about-the-entities-tab-graph-view">online documentation</a>. You will also see an introduction to the feature the first time you visit an Insight details page.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-13">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#minor-changes-and-enhancements-13" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] First Seen Rules now support the use of non-normalized record fields.</li>
<li class="">[New] When a file is attached to a Signal, it is now available via API (previously it would only be available if part of a Yara Signal or Threat Intel match). The endpoint is <code>/api/v1/extracted-file?filename=</code></li>
<li class="">[Update] The default time frame on the Entity Timeline is now 3 days instead of 24 hours.</li>
<li class="">[Update] The http v2 Insight Action payload now includes a numeric severity value (1-4) in addition to the human-readable severity name (LOW, MEDIUM, HIGH, CRITICAL).</li>
<li class="">[Update] On the new Active Entities panel on the HUD, if the Entity is a Username, you can now navigate directly to that Entity’s Timeline by hovering over the Entity name and clicking the link.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-14">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#bug-fixes-14" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">In some cases, Cloud SIEM was unable to properly extract the user name from an AWS ARN.</li>
<li class="">A recent change caused checkboxes to malfunction in Firefox.</li>
<li class="">On the Entity Timeline record details, the timestamp wasn’t displaying properly.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="march-2-2023---content-release">March 2, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#march-2-2023---content-release" class="hash-link" aria-label="Direct link to March 2, 2023 - Content Release" title="Direct link to March 2, 2023 - Content Release" translate="no">​</a></h3>
<p>This release contains changes to how the Palo Alto Firewall CSV parser handles timestamps. Time parsing now relies on <code>_messagetime</code> metadata generated at collection time. This allows individual sources to set timezone information if it is not available in the raw message and as a result, reflect more accurate timestamps for records being created.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-23">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-23" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00844 LastPass - Account Created</li>
<li class="">[New] MATCH-S00854 LastPass - Failed Login</li>
<li class="">[New] MATCH-S00846 LastPass - Folder Permissions Updated</li>
<li class="">[New] MATCH-S00855 LastPass - Login</li>
<li class="">[New] MATCH-S00847 LastPass - Master Password Changed</li>
<li class="">[New] MATCH-S00848 LastPass - Password Changed</li>
<li class="">[New] MATCH-S00849 LastPass - Personal Share</li>
<li class="">[New] MATCH-S00850 LastPass - Policy Added</li>
<li class="">[New] MATCH-S00851 LastPass - Policy Deleted</li>
<li class="">[New] MATCH-S00852 LastPass - Shared Folder Created</li>
<li class="">[New] MATCH-S00853 LastPass - Super Admin Password Reset</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-22">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-22" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] LastPass - Account Created</li>
<li class="">[New] LastPass - Failed Login</li>
<li class="">[New] LastPass - Folder Permissions Updated</li>
<li class="">[New] LastPass - Login</li>
<li class="">[New] LastPass - Master Password Changed</li>
<li class="">[New] LastPass - Password Changed</li>
<li class="">[New] LastPass - Personal Share</li>
<li class="">[New] LastPass - Policy Modifications</li>
<li class="">[New] LastPass - Shared Folder Created</li>
<li class="">[New] LastPass - Super Admin Password Reset</li>
<li class="">[New] LastPass Catch All</li>
<li class="">[New] Sysdig Audit Trail JSON</li>
<li class="">[New] Sysdig Benchmark JSON</li>
<li class="">[New] Sysdig Command JSON</li>
<li class="">[New] Sysdig Connection JSON</li>
<li class="">[New] Sysdig File Access JSON</li>
<li class="">[New] Sysdig Kubernetes JSON</li>
<li class="">[New] Sysdig Policy Detection JSON</li>
<li class="">[New] Sysdig Scanning JSON</li>
<li class="">[Updated] Azure Firewall Network Rule</li>
<li class="">[Updated] Mimecast Email logs</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-20">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-20" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/LastPass/LastPass</li>
<li class="">[New] /Parsers/System/Sysdig/Sysdig JSON</li>
<li class="">[Updated] /Parsers/System/Microsoft/Microsoft Azure JSON</li>
<li class="">[Updated] /Parsers/System/Palo Alto/PAN Firewall CSV</li>
<li class="">[Updated] /Parsers/System/Microsoft/Shared/Windows Forwarding Headers</li>
<li class="">[Updated] /Parsers/System/Microsoft/Shared/Windows Text Transforms - Security</li>
<li class="">[Updated] /Parsers/System/Microsoft/Windows-Syslog Snare</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="february-24-2023---content-release">February 24, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#february-24-2023---content-release" class="hash-link" aria-label="Direct link to February 24, 2023 - Content Release" title="Direct link to February 24, 2023 - Content Release" translate="no">​</a></h3>
<p>This release includes small modifications to First Seen rule type baseline and retention periods, and switches rule status from Prototype state, allowing more of these rules to contribute to Cloud SIEM Insights. The Microsoft Office 365 Audit parser now formulates key value pairs from the 'OperationProperties' array included in some messages.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-24">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-24" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] FIRST-S00002 First Seen AWS API Call from User</li>
<li class="">[Updated] FIRST-S00023 First Seen AWS API Gateway Enumeration by User</li>
<li class="">[Updated] FIRST-S00024 First Seen AWS SSM RunShellScript SendCommand From User</li>
<li class="">[Updated] FIRST-S00003 First Seen AWS Secrets Manager API Call from User</li>
<li class="">[Updated] FIRST-S00001 First Seen Administrative Privileges Granted for User</li>
<li class="">[Updated] FIRST-S00026 First Seen Anonymous Logon Change Activity to Domain Controller</li>
<li class="">[Updated] FIRST-S00019 First Seen Azure Member Addition to Group from User</li>
<li class="">[Updated] FIRST-S00020 First Seen Azure OAUTH Application Consent from User</li>
<li class="">[Updated] FIRST-S00021 First Seen Azure Virtual Machine Run Command Issued by User</li>
<li class="">[Updated] FIRST-S00028 First Seen Common Windows Recon Commands From User</li>
<li class="">[Updated] FIRST-S00013 First Seen Driver Load - Global</li>
<li class="">[Updated] FIRST-S00014 First Seen Driver Load - Host</li>
<li class="">[Updated] FIRST-S00007 First Seen DynamoDB Enumeration from User</li>
<li class="">[Updated] FIRST-S00027 First Seen InstallUtil Allow List Bypass From User</li>
<li class="">[Updated] FIRST-S00017 First Seen Kerberoasting Attempt from User - Global</li>
<li class="">[Updated] FIRST-S00018 First Seen Kerberoasting Attempt from User - Host</li>
<li class="">[Updated] FIRST-S00004 First Seen Local Group Addition by User</li>
<li class="">[Updated] FIRST-S00015 First Seen Macro Execution from User</li>
<li class="">[Updated] FIRST-S00016 First Seen Non-Network Logon from User</li>
<li class="">[Updated] FIRST-S00010 First Seen PowerShell Execution from Computer</li>
<li class="">[Updated] FIRST-S00009 First Seen RDP Logon From User</li>
<li class="">[Updated] FIRST-S00025 First Seen SMB Allowed Traffic From IP</li>
<li class="">[Updated] FIRST-S00029 First Seen Successful Authentication From Unexpected Country</li>
<li class="">[Updated] FIRST-S00011 First Seen Sysmon IMPHASH - Global</li>
<li class="">[Updated] FIRST-S00012 First Seen Sysmon IMPHASH - Host</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-21">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-21" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Microsoft/Office 365</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="february-22-2023---content-release">February 22, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#february-22-2023---content-release" class="hash-link" aria-label="Direct link to February 22, 2023 - Content Release" title="Direct link to February 22, 2023 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-25">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-25" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] FIRST-S00001 First Seen Administrative Privileges Granted for User</li>
<li class="">[New] FIRST-S00003 First Seen AWS Secrets Manager API Call from User</li>
<li class="">[New] FIRST-S00004 First Seen Local Group Addition by User</li>
<li class="">[New] FIRST-S00005 First Seen User Creation From User</li>
<li class="">[New] FIRST-S00006 First Seen Weak Kerberos Encryption from User</li>
<li class="">[New] FIRST-S00007 First Seen DynamoDB Enumeration from User</li>
<li class="">[New] FIRST-S00008 First Seen whoami command From User</li>
<li class="">[New] FIRST-S00009 First Seen RDP From User</li>
<li class="">[New] FIRST-S00010 First Seen PowerShell Execution from Computer</li>
<li class="">[New] FIRST-S00011 First Seen Sysmon IMPHASH - Global</li>
<li class="">[New] FIRST-S00012 First Seen Sysmon IMPHASH - Host</li>
<li class="">[New] FIRST-S00013 First Seen Driver Load - Global</li>
<li class="">[New] FIRST-S00014 First Seen Driver Load - Host</li>
<li class="">[New] FIRST-S00015 First Seen Macro Execution from User</li>
<li class="">[New] FIRST-S00016 First Seen Non-Network Logon from User</li>
<li class="">[New] FIRST-S00017 First Seen Kerberoasting Attempt from User - Global</li>
<li class="">[New] FIRST-S00018 First Seen Kerberoasting Attempt from User - Host</li>
<li class="">[New] FIRST-S00019 First Seen Azure Member Addition to Group from User</li>
<li class="">[New] FIRST-S00020 First Seen Azure OAUTH Application Consent from User</li>
<li class="">[New] FIRST-S00021 First Seen Azure Virtual Machine Run Command Issued by User</li>
<li class="">[New] FIRST-S00022 First Seen S3 Bucket ACL Enumeration by User</li>
<li class="">[New] FIRST-S00023 First Seen AWS API Gateway Enumeration By User</li>
<li class="">[New] FIRST-S00024 First Seen AWS SSM RunShellScript SendCommand From User</li>
<li class="">[New] FIRST-S00025 First Seen SMB Allowed Traffic From IP</li>
<li class="">[New] FIRST-S00026 First Seen Anonymous Logon Change Activity to Domain Controller</li>
<li class="">[New] FIRST-S00027 First Seen InstallUtil Allow List Bypass From User</li>
<li class="">[New] FIRST-S00028 First Seen Common Windows Recon Commands From User</li>
<li class="">[Updated] MATCH-S00534 MacOS - Re-Opened Applications</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-23">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-23" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] CloudTrail - ecs.amazonaws.com - AwsApiCall-ExecuteCommand</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="february-22-2023-application-update">February 22, 2023 Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#february-22-2023-application-update" class="hash-link" aria-label="Direct link to February 22, 2023 Application Update" title="Direct link to February 22, 2023 Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="first-seen-rules">First Seen Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#first-seen-rules" class="hash-link" aria-label="Direct link to First Seen Rules" title="Direct link to First Seen Rules" translate="no">​</a></h4>
<p>Sumo Logic is pleased to announce new features in Cloud SIEM that deliver enhanced <strong>User and Entity Behavioral Analytics (UEBA)</strong> capabilities. These new UEBA capabilities enable additional methods to detect and investigate anomalous or unexpected behavior that may signify a security threat.</p>
<p>The first feature is called a <strong>First Seen Rule</strong>. With this new rule type, Cloud SIEM can detect events such as “the first time a user logs in from a new location” without having to define a rule expression that is unique to each user in your environment (and the location(s) from which he/she usually logs in). Other examples include detecting the unusual granting of administrative privileges, Windows recon command, AWS Secrets Manager API calls, API gateway enumeration, and more.</p>
<p>First Seen Rules are defined like any other rule type, through the Content menu in Cloud SIEM.</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/first-seen-rule.png" alt="A First Seen Rule definition">
<p>First Seen Rules operate based on a <strong>baseline</strong>. During this period of time - typically between 7 and 30 days - the system will learn what normal and expected behavior looks like. After the baseline is established, Cloud SIEM will begin generating Signals when unusual behavior is detected compared to that baseline. Baselines can be per-entity or global. (Note that the longer the baseline, the more accurate the model will be.)</p>
<p>Cloud SIEM will include a set of more than twenty First Seen Rules out of the box. These rules can be tuned and customized like any other rule type, and custom First Seen Rules can also be created.</p>
<p>For more information about how to use First Seen Rules, see the online <a class="" href="https://www.sumologic.com/help/docs/cse/rules/write-first-seen-rule/">documentation</a>. You can also see an introduction to the feature by navigating to a new First Seen Rule in the Cloud SIEM UI.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="entity-timeline">Entity Timeline<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#entity-timeline" class="hash-link" aria-label="Direct link to Entity Timeline" title="Direct link to Entity Timeline" translate="no">​</a></h4>
<p>Another new feature that will help analysts investigate unusual activity with user accounts is the Entity Timeline:</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/entity-timeline.png" alt="The Entity Timeline">
<p>This feature visualizes all activity for a user – including all normalized records – in an easy-to-read timeline, eliminating the need to perform manual record searches.</p>
<p>Related actions are grouped together and Signals and Insights generated on that user are also displayed in the timeline with the relevant record(s). Actions can be clicked on to see a more detailed set of information, and full details can be easily opened in a new tab.</p>
<p>The feature can be found on the new <strong>Timeline</strong> tab on each Username Entity’s Detail page with quick links from Signal and Insight detail pages (located with the Entity summaries). It is only available for the <strong>Username</strong> Entity type at this time.</p>
<p>For more information about how to use the Entity Timeline, see the online <a class="" href="https://www.sumologic.com/help/docs/cse/records-signals-entities-insights/view-manage-entities/#about-the-entity-timeline-tab">documentation</a>.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-14">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#minor-changes-and-enhancements-14" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Entities listed in the Signals index (<code>sec_signal</code>) now include <code>criticality</code> and <code>suppressed</code> attributes (which reflect the state of those Entities when the Signal was generated).</li>
<li class="">[New] The Cloud SIEM API now supports searching the Threat Intelligence data by <code>sourceName</code>.</li>
<li class="">[Updated] The Threat Intelligence API <code>GetThreatIntelIndicators</code> endpoint now supports data sets of more than 10,000 indicators.</li>
<li class="">[Updated] The Insights API now supports searching (filtering) by confidence score.</li>
<li class="">[Updated] Cloud SIEM now supports up to 1000 inventory-based Entity Groups (the previous limit was 50).</li>
<li class="">[Updated] When viewing an Insight, a label is displayed that indicates the source. When an Insight is generated by a Custom Insight, it will now say <strong>Custom Insight (Rule)</strong> (instead of <strong>Rule</strong>) and <strong>Custom Insight (Signal)</strong> (instead of <strong>Signal</strong>) to reduce confusion with Insights generated by the Insight Algorithm through standard Rules and Signals.</li>
<li class="">[New] Entity Groups can now be managed in bulk by uploading CSV files from the Entity Groups list page.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-15">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#bug-fixes-15" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">The consolidated Insight ‘board’ view was not displaying properly in some instances.</li>
<li class="">An improper error message was displayed when attempting to create a rule with the same name as one that already existed.</li>
<li class="">The Insight Updates section on the HUD was displaying incorrectly if there were no recent updates.</li>
<li class="">The Insight creation source label was not positioned properly when scrolling an Insight Details page.</li>
<li class="">Entity notes could not be deleted.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="february-17-2023---content-release">February 17, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#february-17-2023---content-release" class="hash-link" aria-label="Direct link to February 17, 2023 - Content Release" title="Direct link to February 17, 2023 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-26">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-26" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00842 Suspicious Azure CLI Keys Access on Linux Host</li>
<li class="">[New] MATCH-S00843 Suspicious GCP CLI Keys Access on Linux Host</li>
</ul>
<p>Note that the following updates do not change detection capabilities and are only updates to descriptions and other metadata.</p>
<ul>
<li class="">[Updated] MATCH-S00308 AWS CloudTrail - OpsWorks Describe Permissions Event</li>
<li class="">[Updated] MATCH-S00210 AWS CloudTrail - SQS List Queues Event</li>
<li class="">[Updated] MATCH-S00238 AWS CloudTrail - sensitive activity in KMS</li>
<li class="">[Updated] MATCH-S00594 Alibaba ActionTrail KMS Activity</li>
<li class="">[Updated] MATCH-S00417 Attrib.exe use to Hide Files and Folders</li>
<li class="">[Updated] MATCH-S00786 Azure - SQL Database Export</li>
<li class="">[Updated] MATCH-S00304 External Device Installation Denied</li>
<li class="">[Updated] FIRST-S00022 First Seen S3 Bucket ACL Enumeration by User</li>
<li class="">[Updated] MATCH-S00614 GCP Audit KMS Activity</li>
<li class="">[Updated] MATCH-S00466 MsiExec Web Install</li>
<li class="">[Updated] MATCH-S00288 NotPetya Ransomware Activity</li>
<li class="">[Updated] MATCH-S00634 Okta Admin App Access Attempt Failed</li>
<li class="">[Updated] MATCH-S00633 Okta Admin App Accessed</li>
<li class="">[Updated] MATCH-S00756 Outlook Homepage Modification</li>
<li class="">[Updated] MATCH-S00465 PXELoot Utility</li>
<li class="">[Updated] MATCH-S00200 Potential Pass the Hash Activity</li>
<li class="">[Updated] MATCH-S00546 Potential Reconnaissance Obfuscation</li>
<li class="">[Updated] MATCH-S00265 QuarksPwDump Dump File Observed</li>
<li class="">[Updated] MATCH-S00747 Registry Modification - Active Setup</li>
<li class="">[Updated] MATCH-S00754 Registry Modification - Microsoft Office Test Function Registry Entry</li>
<li class="">[Updated] MATCH-S00422 Spaces Before File Extension</li>
<li class="">[Updated] MATCH-S00196 Successful Overpass the Hash Attempt</li>
<li class="">[Updated] MATCH-S00293 Suspicious External Device Installation</li>
<li class="">[Updated] MATCH-S00342 Suspicious use of Dev-Tools-Launcher</li>
<li class="">[Updated] MATCH-S00279 TAIDOOR RAT DLL Load</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-24">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-24" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Deleted] Sysdig Monitor C2C</li>
<li class="">[New] CloudTrail - s3.amazonaws.com - GetBucketAcl</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - CreateBucket</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - DeleteBucketCors</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - DeleteBucketLifecycle</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - DeleteBucketPolicy</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketAcl</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketCors</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketLifecycle</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketPolicy</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketReplication</li>
<li class="">[Updated] Fortinet App Control Logs</li>
<li class="">[Updated] Fortinet DLP Logs</li>
<li class="">[Updated] Fortinet DNS Logs</li>
<li class="">[Updated] Fortinet Event Logs</li>
<li class="">[Updated] Fortinet IPS Logs</li>
<li class="">[Updated] Fortinet Traffic Logs</li>
<li class="">[Updated] Fortinet VOIP Logs</li>
<li class="">[Updated] Fortinet Virus Logs</li>
<li class="">[Updated] Fortinet Webfilter Logs</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-22">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-22" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Deleted] /Parsers/System/Sysdig/Sysdig Monitor C2C</li>
<li class="">[Updated] /Parsers/System/Fortinet/Fortigate/Fortigate-Syslog</li>
<li class="">[Updated] /Parsers/System/Pulse Secure/Pulse Secure Appliance</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="february-13-2023---application-update">February 13, 2023 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#february-13-2023---application-update" class="hash-link" aria-label="Direct link to February 13, 2023 - Application Update" title="Direct link to February 13, 2023 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="active-entities-panel">Active Entities Panel<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#active-entities-panel" class="hash-link" aria-label="Direct link to Active Entities Panel" title="Direct link to Active Entities Panel" translate="no">​</a></h4>
<p>To assist analysts detect potential security issues as early as possible, a new panel has been added to the Heads Up Display (HUD):</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/Active-Entities-Panel-CSE-HUD.png" alt="Screenshot of the new Active Entities panel in Cloud SIEM">
<p>This panel lists the top five most active entities, ranked by <strong>Signal Severity Total</strong>. This metric, which was introduced with the Related Entities enhancement last year, is the total sum of the severities of all unique Signals the Entity appears in during the current Insight detection window (typically, the past 14 days).</p>
<p>The count of Active Signals (Signals within the detection window that have not been included in an Insight) is also listed.</p>
<p>When hovering over the Entity value, the Entity’s type will be displayed. The Entity value is a link to that Entity’s details page.</p>
<p>Analysts can use this tool to investigate what appears to be risky activity and potentially  proactively security issues before they are raised to the level of an Insight.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-15">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#minor-changes-and-enhancements-15" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] When looking at Signals in the new <code>sec_signal</code> index, attributes and values in array fields are now properly supported by auto-parsing, syntax like <code>count by</code>, and features like <em><em>right-click</em> &gt; filter selected value</em>*.</li>
<li class="">[New] An attribute <code>attackStage</code> has been added to the new <code>sec_signal</code> index. This attribute summarizes the Mitre attack stage represented by the rule which triggered the signal. The value is defined the same way as the <code>attack_stage</code> attribute included in the older Signal forwarding feature.</li>
<li class="">[Updated] The <code>subResolution</code> attribute is now included in the Insight payload for <strong>http v2</strong> actions.</li>
<li class="">[Updated] The way Release Notes are listed in the Cloud SIEM UI is changing. There is no longer a “bell” item on the top menu; it has been replaced with a link to the Release Notes page in the Help menu. In addition, Release Notes are now directly visible in the UI when they are published.</li>
<li class="">[New] When executing a context action on a Signal, fields will now be passed to the context action if they are available based on the record(s) in context.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="bug-fixes-16">Bug Fixes<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#bug-fixes-16" class="hash-link" aria-label="Direct link to Bug Fixes" title="Direct link to Bug Fixes" translate="no">​</a></h4>
<ul>
<li class="">The “Radar” graph of records, Signals and Insights on the HUD has been updated so that the discontinuity at the top of the Signals section of the graph has been removed.</li>
<li class="">When viewing the raw log message corresponding to a normalized record, the wrong message was displayed.</li>
<li class="">The Network Block(s) associated with an Entity were not listed on the Entity details page.</li>
<li class="">When testing Rule expressions, sometimes the selected Tuning expression was not included.</li>
<li class="">Changes to entity tags or Criticality were not being listed on the History section of the Entity.</li>
<li class="">Entity Criticality was sometimes not displaying properly on the Insight details page.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="february-8-2023---content-release">February 8, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#february-8-2023---content-release" class="hash-link" aria-label="Direct link to February 8, 2023 - Content Release" title="Direct link to February 8, 2023 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-27">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-27" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00838 Azure Active Directory Authentication Method Changed</li>
<li class="">[New] MATCH-S00836 Azure Conditional Access Policy Disabled</li>
<li class="">[New] MATCH-S00839 Azure Virtual Machine RunCommand Issued</li>
<li class="">[New] MATCH-S00837 Kubernetes Secrets Enumeration via Kubectl</li>
<li class="">[New] MATCH-S00835 Possible Dynamic URL Domain</li>
<li class="">[New] CHAIN-S00012 Potential Azure Persistence via Automation Accounts</li>
<li class="">[New] MATCH-S00841 Suspicious AWS CLI Keys Access on Linux Host</li>
<li class="">[New] MATCH-S00840 Suspicious Lambda Function - IAM Policy Attached</li>
<li class="">[Updated] THRESHOLD-S00074 Excessive Firewall Denies</li>
<li class="">[Updated] LEGACY-S00008 Possible Dynamic DNS Domain</li>
<li class="">[Updated] LEGACY-S00108 Threat Intel - Matched File Hash</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-25">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-25" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Airtable Audit C2C</li>
<li class="">[New] Cisco Meraki Catch All - Custom Parser</li>
<li class="">[Updated] Linux OS Syslog - Process fw - iptables Events</li>
<li class="">[Updated] Proofpoint Targeted Attack Protection C2C - Message Blocked</li>
<li class="">[Updated] Proofpoint Targeted Attack Protection C2C - Message Delivered</li>
<li class="">[Updated] Proofpoint Targeted Attack Protection C2C - Message Permitted</li>
<li class="">[Updated] Windows - Security - 4624</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-23">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-23" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Airtable/Airtable Audit C2C</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ASA</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco Meraki</li>
<li class="">[Updated] /Parsers/System/Google/G Suite Audit</li>
<li class="">[Updated] /Parsers/System/Linux/Linux OS Syslog</li>
<li class="">[Updated] /Parsers/System/Linux/Shared/Linux Shared Syslog Headers</li>
<li class="">[Updated] /Parsers/System/Okta/Okta</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="january-20-2023---content-release">January 20, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#january-20-2023---content-release" class="hash-link" aria-label="Direct link to January 20, 2023 - Content Release" title="Direct link to January 20, 2023 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-28">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-28" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] THRESHOLD-S00111 Sharepoint - Excessive Documents Accessed by External IP</li>
<li class="">[New] THRESHOLD-S00110 Sharepoint - External IP Downloaded Excessive Documents</li>
<li class="">[Updated] THRESHOLD-S00101 Sharepoint - Excessive Documents Accessed by User</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="january-19-2023-application-update">January 19, 2023 Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#january-19-2023-application-update" class="hash-link" aria-label="Direct link to January 19, 2023 Application Update" title="Direct link to January 19, 2023 Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-16">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#minor-changes-and-enhancements-16" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[Updated] On the HUD, the Insight Activity widget has been updated. When selecting the Insight to display, the HUD will now choose based on this order of preference: In “New”, Unassigned, Highest GIS Confidence Score, Highest Severity, Newest. In addition, the design has been updated to improve readability.</li>
<li class="">[New] Users who wish to substitute custom Insight status(es) for the built-in “In Progress” status can now do so. After creating and organizing the custom statu(es), the user can now disable the “In Progress” status. (It cannot be deleted.) Note that it can be disabled only if there are no Insights currently set to “In Progress.”</li>
<li class="">Changes to Entity tags and criticality now appear in the Entity’s change history list.</li>
<li class="">The Sumo Terraform provider now includes support for custom columns in match lists.</li>
<li class="">Kubernetes (k8s) attribute fields are now normalized to include the namespace. The normalized fields are: <code>normalizedPodName</code>, <code>normalizedDeploymentName</code>, and <code>normalizedReplicaSetName</code>.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="resolved-issues">Resolved Issues<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#resolved-issues" class="hash-link" aria-label="Direct link to Resolved Issues" title="Direct link to Resolved Issues" translate="no">​</a></h4>
<ul>
<li class="">Some Insights could not be closed via the UI (though they could via API).</li>
<li class="">In the consolidated (parent/child) Insight view, in “Board” mode, scrolling was not working properly. In addition, links to other orgs had an error in the URL (a duplicate “/sec”).</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="january-13-2023---content-release">January 13, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#january-13-2023---content-release" class="hash-link" aria-label="Direct link to January 13, 2023 - Content Release" title="Direct link to January 13, 2023 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-29">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-29" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00825 AWS Secrets Manager Enumeration</li>
<li class="">[New] MATCH-S00827 Exposed AWS SNS Topic Created</li>
<li class="">[New] MATCH-S00823 Exposed AWS SQS Queue Created</li>
<li class="">[New] MATCH-S00828 Office 365 Exchange Transport Rule Created</li>
<li class="">[New] MATCH-S00829 Office 365 Exchange Transport Rule Enabled</li>
<li class="">[New] MATCH-S00830 Office 365 Forwarding Rule Created</li>
<li class="">[New] MATCH-S00833 Office 365 Inbox Rule Created</li>
<li class="">[New] MATCH-S00832 Office 365 Inbox Rule Updated</li>
<li class="">[New] MATCH-S00831 Office 365 Unified Audit Logging Disabled</li>
<li class="">[New] MATCH-S00824 Potential XMRig Execution with Traffic</li>
<li class="">[New] MATCH-S00826 SSH Keys Added to EC2 Instance</li>
<li class="">[New] MATCH-S00834 Sensitive Registry Key (WDigest) Edit</li>
<li class="">[Updated] MATCH-S00480 Solarwinds Suspicious Child Processes</li>
<li class="">[Updated] MATCH-S00504 User Added to Local Administrators</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-26">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-26" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Windows - Microsoft-Windows-Sysmon/Operational - 22</li>
<li class="">[New] Windows - Microsoft-Windows-Sysmon/Operational - 23</li>
<li class="">[New] Windows - Microsoft-Windows-Sysmon/Operational - 24</li>
<li class="">[New] Windows - Microsoft-Windows-Sysmon/Operational - 25</li>
<li class="">[New] Windows - Microsoft-Windows-Sysmon/Operational - 26</li>
<li class="">[New] Windows - Microsoft-Windows-Sysmon/Operational - 27</li>
<li class="">[New] Windows - Microsoft-Windows-Sysmon/Operational - 28</li>
<li class="">[Updated] Cloudflare - Logpush</li>
<li class="">[Updated] Microsoft Office 365 AzureActiveDirectory Events</li>
<li class="">[Updated] Microsoft Office 365 Exchange Mailbox Audit Events</li>
<li class="">[Updated] Microsoft Office 365 Exchange Mailbox Authentication Events</li>
<li class="">[Updated] Microsoft Office 365 ExchangeItem Events</li>
<li class="">[Updated] Microsoft Office 365 ExchangeItemGroup Events</li>
<li class="">[Updated] Microsoft Office 365 RecordType 105</li>
<li class="">[Updated] Microsoft Office 365 RecordType 37</li>
<li class="">[Updated] Microsoft Office 365 RecordType 57</li>
<li class="">[Updated] Office 365 - Exchange Admin Events</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-24">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-24" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Microsoft/Windows-Syslog WinCollect</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="schema-2">Schema<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#schema-2" class="hash-link" aria-label="Direct link to Schema" title="Direct link to Schema" translate="no">​</a></h4>
<ul>
<li class="">[Updated] device_k8s_normalizedDeploymentName</li>
<li class="">[Updated] device_k8s_normalizedPodName</li>
<li class="">[Updated] device_k8s_normalizedReplicaSetName</li>
<li class="">[Updated] dstDevice_k8s_normalizedDeploymentName</li>
<li class="">[Updated] dstDevice_k8s_normalizedPodName</li>
<li class="">[Updated] dstDevice_k8s_normalizedReplicaSetName</li>
<li class="">[Updated] srcDevice_k8s_normalizedDeploymentName</li>
<li class="">[Updated] srcDevice_k8s_normalizedPodName</li>
<li class="">[Updated] srcDevice_k8s_normalizedReplicaSetName</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="january-5-2023---content-release">January 5, 2023 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#january-5-2023---content-release" class="hash-link" aria-label="Direct link to January 5, 2023 - Content Release" title="Direct link to January 5, 2023 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-30">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#rules-30" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00556 Outbound Data Transfer Protocol Over Non-standard Port</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-27">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#log-mappers-27" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Google G Suite - login-email_forwarding_change</li>
<li class="">[New] Laurel Linux Audit - Catch All</li>
<li class="">[New] Laurel Linux Audit - System Call</li>
<li class="">[New] Laurel Linux Audit - User Logon</li>
<li class="">[Updated] Lacework Alert</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-25">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#parsers-25" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/AWS/AWS Security Hub</li>
<li class="">[New] /Parsers/System/Laurel/Laurel Linux Audit</li>
<li class="">[New] /Parsers/System/Signal Science/Signal Science WAF</li>
<li class="">[New] /Parsers/System/Workday/Workday</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="schema-3">Schema<a href="https://www.sumologic.com/help/release-notes-cse/2023/12/31/#schema-3" class="hash-link" aria-label="Direct link to Schema" title="Direct link to Schema" translate="no">​</a></h4>
<ul>
<li class="">[Updated] device_k8s_deployment</li>
<li class="">[Updated] device_k8s_pod</li>
<li class="">[Updated] device_k8s_replicaSet</li>
<li class="">[Updated] dstDevice_k8s_deployment</li>
<li class="">[Updated] dstDevice_k8s_pod</li>
<li class="">[Updated] dstDevice_k8s_replicaSet</li>
<li class="">[Updated] srcDevice_k8s_deployment</li>
<li class="">[Updated] srcDevice_k8s_pod</li>
<li class="">[Updated] srcDevice_k8s_replicaSet</li>
</ul>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[2022 Release Notes Archive - Cloud SIEM]]></title>
            <link>https://www.sumologic.com/help/release-notes-cse/2022/12/31/</link>
            <guid>https://www.sumologic.com/help/release-notes-cse/2022/12/31/</guid>
            <pubDate>Sat, 31 Dec 2022 00:00:00 GMT</pubDate>
            <description><![CDATA[This is an archive of 2022 Cloud SIEM release notes. To view the full archive, click here. Release notes are available on our website for a rolling multi-year period. For information about older releases, contact Support.]]></description>
            <content:encoded><![CDATA[<p>This is an archive of 2022 Cloud SIEM release notes. To view the full archive, <a class="" href="https://www.sumologic.com/help/release-notes-cse/archive/">click here</a>. Release notes are available on our website for a rolling multi-year period. For information about older releases, contact <a href="https://support.sumologic.com/support/s" target="_blank" rel="noopener noreferrer" class="">Support</a>.</p>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="december-21-2022---content-release">December 21, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#december-21-2022---content-release" class="hash-link" aria-label="Direct link to December 21, 2022 - Content Release" title="Direct link to December 21, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00547 Script Execution Via WMI</li>
<li class="">[Updated] MATCH-S00684 Wget Passed to Script Execution Command</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Azure Firewall Application Rule</li>
<li class="">[New] Azure Firewall DNS Proxy</li>
<li class="">[New] Azure Firewall Network Rule</li>
<li class="">[New] Microsoft O365 Exchange Message Trace C2C</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Microsoft/O365 Exchange Message Trace C2C</li>
<li class="">[New] /Parsers/System/Microsoft/Windows XML from Azure</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco Firepower Syslog</li>
<li class="">[Updated] /Parsers/System/Microsoft/Microsoft Azure JSON</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="schema">Schema<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#schema" class="hash-link" aria-label="Direct link to Schema" title="Direct link to Schema" translate="no">​</a></h4>
<ul>
<li class="">[New] email_recipient</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="december-14-2022---content-release">December 14, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#december-14-2022---content-release" class="hash-link" aria-label="Direct link to December 14, 2022 - Content Release" title="Direct link to December 14, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-1">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-1" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Cisco ASA 710002-3 JSON</li>
<li class="">[Updated] Windows - Microsoft-Windows-PowerShell/Operational - 4104</li>
<li class="">[Updated] Windows - Microsoft-Windows-PowerShell/Operational - 4105</li>
<li class="">[Updated] Windows - Security - 4732</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-1">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-1" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Snort/Snort</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ASA</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco Firepower Syslog</li>
<li class="">[Updated] /Parsers/System/Okta/Okta</li>
<li class="">[Updated] /Parsers/System/Suricata/Suricata Syslog</li>
<li class="">[Updated] /Parsers/System/Zscaler/Zscaler Private Access/Zscaler Private Access-JSON</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="december-13-2022-application-update">December 13, 2022 Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#december-13-2022-application-update" class="hash-link" aria-label="Direct link to December 13, 2022 Application Update" title="Direct link to December 13, 2022 Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="new-entity-types">New Entity Types<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#new-entity-types" class="hash-link" aria-label="Direct link to New Entity Types" title="Direct link to New Entity Types" translate="no">​</a></h4>
<p>Eight new predefined Entity types have been added to Cloud SIEM. This will enable customers to more accurately associate Signals and Insights with security threats. They are listed below long with the related normalized record schema attributes (which can be specified in Rule definitions):</p>
<table><thead><tr><th style="text-align:left">Entity Type</th><th style="text-align:left">Schema Attributes</th></tr></thead><tbody><tr><td style="text-align:left">Command</td><td style="text-align:left"><code>commandLine</code></td></tr><tr><td style="text-align:left">Domain</td><td style="text-align:left"><code>http_referer_fqdn</code>, <code>http_url_fqdn</code></td></tr><tr><td style="text-align:left">Email</td><td style="text-align:left"><code>targetUser_email</code>, <code>user_email</code></td></tr><tr><td style="text-align:left">File</td><td style="text-align:left"><code>file_path</code>, <code>file_basename</code></td></tr><tr><td style="text-align:left">Hash</td><td style="text-align:left"><code>file_hash_imphash</code>, <code>file_hash_md5</code>, <code>file_hash_pehash</code>, <code>file_hash_sha1</code>, <code>file_hash_sha256</code>, <code>file_hash_ssdeep</code></td></tr><tr><td style="text-align:left">Process</td><td style="text-align:left"><code>baseImage</code>, <code>parentBaseImage</code></td></tr><tr><td style="text-align:left">URL</td><td style="text-align:left"><code>http_url</code></td></tr><tr><td style="text-align:left">User Agent</td><td style="text-align:left"><code>http_userAgent</code></td></tr></tbody></table>
<p>If you already had a custom Entity type with the same or similar name, it will not be affected and will not be automatically migrated to the corresponding standard Entity type.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="entity-notes">Entity Notes<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#entity-notes" class="hash-link" aria-label="Direct link to Entity Notes" title="Direct link to Entity Notes" translate="no">​</a></h4>
<p>Similar to the functionality on Insights, users can now attach notes to Entities:</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/Entity-Notes.png" alt="Screenshot of Entity Notes user interface">
<p>These notes are retained permanently on the associated Entity and are visible to all users who can view the Entity.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="custom-time-windows-for-rules">Custom Time Windows for Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#custom-time-windows-for-rules" class="hash-link" aria-label="Direct link to Custom Time Windows for Rules" title="Direct link to Custom Time Windows for Rules" translate="no">​</a></h4>
<p>Threshold, Aggregation and Chain Rules now support custom time windows. Previously, when writing a Rule, a time window had to be chosen from a list of predefined options. With this new enhancement, users can define any time window defined in minutes, hours, or days, with a minimum of 1 minute and a maximum of 5 days (120 hours):</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/Custom-Window-Size-For-Rules.png" alt="Screenshot of Custom Time Window for Rules user interface">
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="inventory-favorite-fields">Inventory Favorite Fields<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#inventory-favorite-fields" class="hash-link" aria-label="Direct link to Inventory Favorite Fields" title="Direct link to Inventory Favorite Fields" translate="no">​</a></h4>
<p>Where inventory data is shown for an Entity, such as the Entity details page or the Insight details page, users can now “favorite” the inventory fields that should be shown in the summary list.</p>
<p>To do this, simply expand the <strong>Full Details</strong> view, hover to the left of the field, and click the star icon that appears. To remove the favorite selection, simply unclick the star icon. The field selections are applied across all users and retained across sessions. (This behavior is the same as for favorite fields on Records.)</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/Inventory-Favorite-Fields.png" alt="Screenshot of Inventory Favorite Fields user interface">
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#minor-changes-and-enhancements" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[Updated] The previously announced migration of our out-of-the-box rules from standard match lists to Entity tags has been postponed. New dates for this migration will be announced in the near future.</li>
<li class="">[New] Service providers using the Consolidated Insight List can now see Insights from client organizations across deployments.</li>
<li class="">[Updated] The usability of filters for list views when searching for an object that includes a specific tag schema has been enhanced.</li>
<li class="">[Removed] The link to download the Insight Enrichment Service has been removed from the <strong>Enrichment</strong> page. The link is specified in the <a class="" href="https://www.sumologic.com/help/docs/cse/integrations/insight-enrichment-server/">installation instructions</a> online.</li>
<li class="">[New] Users can now filter Records by Sensor Zone.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="resolved-issues">Resolved Issues<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#resolved-issues" class="hash-link" aria-label="Direct link to Resolved Issues" title="Direct link to Resolved Issues" translate="no">​</a></h4>
<ul>
<li class="">Importing data from CSV files via the UI was not working properly.</li>
<li class="">The <code>http_url</code> field was not being concatenated properly in some mapper scenarios.</li>
<li class="">Entity domain normalization was not working properly.</li>
<li class="">The <strong>Copy Expression</strong> feature in the UI did not copy Boolean values to the clipboard properly.</li>
<li class="">The Rule Tuning Expression list page was not auto-refreshing correctly.</li>
<li class="">Users were unable to filter the Signals list based on severity.</li>
<li class="">IP addresses in the 198.18.0.0/15 and 169.254.0.0/15 ranges were not being marked as private subnets per RFC1918.</li>
<li class="">Users without the proper permissions were able to add comments and Signals to Insights.</li>
<li class="">Regular expressions ending with an asterisk <code>*</code> were not working properly in search/list filters.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="december-8-2022---content-release">December 8, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#december-8-2022---content-release" class="hash-link" aria-label="Direct link to December 8, 2022 - Content Release" title="Direct link to December 8, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-1">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-1" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00159 Windows - Permissions Group Discovery</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-2">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-2" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Azure Administrative logs</li>
<li class="">[Updated] Azure NSG Flows</li>
<li class="">[Updated] Squid Proxy - Parser</li>
<li class="">[Updated] Windows - Security - 4624</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-2">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-2" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ASA</li>
<li class="">[Updated] /Parsers/System/Microsoft/Microsoft Azure JSON</li>
<li class="">[Updated] /Parsers/System/Palo Alto/PAN Firewall CSV</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="december-1-2022---content-release">December 1, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#december-1-2022---content-release" class="hash-link" aria-label="Direct link to December 1, 2022 - Content Release" title="Direct link to December 1, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-3">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-3" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Azure Risky Users</li>
<li class="">[New] Azure User Risk Events</li>
<li class="">[New] CrowdStrike Falcon CustomerIOCEvent (CNC)</li>
<li class="">[New] CrowdStrike Falcon Host API IdpDetectionSummaryEvent (CNC)</li>
<li class="">[New] CrowdStrike Falcon Identity Protection (CNC)</li>
<li class="">[New] Microsoft Office 365 RecordType 105</li>
<li class="">[New] Microsoft Office 365 RecordType 37</li>
<li class="">[New] Microsoft Office 365 RecordType 57</li>
<li class="">[New] Windows - Security - Default</li>
<li class="">[Updated] Azure Event Hub - Windows Defender Logs</li>
<li class="">[Updated] Cisco ASA 106100 JSON</li>
<li class="">[Updated] Microsoft Office 365 Events</li>
<li class="">[Updated] Windows - Security - 4740</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-3">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-3" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Microsoft/Microsoft Azure Nested JSON</li>
<li class="">[New] /Parsers/System/Microsoft/Windows-JSON</li>
<li class="">[Updated] /Parsers/System/Microsoft/Microsoft Azure JSON</li>
<li class="">[Updated] /Parsers/System/Palo Alto/PAN Firewall CSV</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="november-22-2022---content-release">November 22, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#november-22-2022---content-release" class="hash-link" aria-label="Direct link to November 22, 2022 - Content Release" title="Direct link to November 22, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-2">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-2" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00570 WMIPRVSE Spawning Process</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-4">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-4" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Gigamon Threat Insight - Catch All</li>
<li class="">[Updated] Gigamon Threat Insight - Suricata</li>
<li class="">[Updated] Microsoft Office 365 Threat Intelligence Url Events</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-4">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-4" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Gigamon/GigamonTI</li>
<li class="">[Updated] /Parsers/System/Lacework/Lacework JSON</li>
<li class="">[Updated] /Parsers/System/Palo Alto/PAN Firewall CSV</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="schema-1">Schema<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#schema-1" class="hash-link" aria-label="Direct link to Schema" title="Direct link to Schema" translate="no">​</a></h4>
<ul>
<li class="">[Updated] baseImage</li>
<li class="">[Updated] commandLine</li>
<li class="">[Updated] file_basename</li>
<li class="">[Updated] file_hash_imphash</li>
<li class="">[Updated] file_hash_md5</li>
<li class="">[Updated] file_hash_pehash</li>
<li class="">[Updated] file_hash_sha1</li>
<li class="">[Updated] file_hash_sha256</li>
<li class="">[Updated] file_hash_ssdeep</li>
<li class="">[Updated] file_path</li>
<li class="">[Updated] http_referer_fqdn</li>
<li class="">[Updated] http_url</li>
<li class="">[Updated] http_url_fqdn</li>
<li class="">[Updated] http_userAgent</li>
<li class="">[Updated] parentBaseImage</li>
<li class="">[Updated] targetUser_email</li>
<li class="">[Updated] user_email</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="november-17-2022---content-release">November 17, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#november-17-2022---content-release" class="hash-link" aria-label="Direct link to November 17, 2022 - Content Release" title="Direct link to November 17, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-5">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-5" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 1</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 15</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 6</li>
<li class="">[Updated] Windows - Microsoft-Windows-Sysmon/Operational - 7</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-5">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-5" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Microsoft/Sysmon-JSON</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="november-15-2022---content-release">November 15, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#november-15-2022---content-release" class="hash-link" aria-label="Direct link to November 15, 2022 - Content Release" title="Direct link to November 15, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-3">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-3" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00822 Potential Microsoft Office In-Memory Token Theft</li>
<li class="">[Updated] MATCH-S00556 Outbound Data Transfer Protocol Over Non-standard Port</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-6">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-6" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Cisco Meraki 8021x</li>
<li class="">[New] Cisco Meraki Client Association</li>
<li class="">[Updated] Microsoft Office 365 Threat Intelligence Url Events</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-6">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-6" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Cisco/Cisco Meraki</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="november-11-2022---content-release">November 11, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#november-11-2022---content-release" class="hash-link" aria-label="Direct link to November 11, 2022 - Content Release" title="Direct link to November 11, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-4">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-4" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00582 Malicious Service Installs</li>
<li class="">[Updated] THRESHOLD-S00087 Slack - Possible Session Hijacking</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-7">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-7" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] BigQuery Gmail C2C - Catch All</li>
<li class="">[New] BigQuery Gmail C2C - Error in Delivery</li>
<li class="">[New] BigQuery Gmail C2C - Failed Delivery</li>
<li class="">[New] BigQuery Gmail C2C - Message was dropped by Gmail</li>
<li class="">[New] BigQuery Gmail C2C - Message was rejected by Google Groups</li>
<li class="">[Updated] AWSGuardDuty_Catch_All</li>
<li class="">[Updated] AWSGuardDuty_Discovery</li>
<li class="">[Updated] Azure Access Logs</li>
<li class="">[Updated] Azure Action Logs</li>
<li class="">[Updated] Azure Administrative logs</li>
<li class="">[Updated] Azure AuditEvent logs</li>
<li class="">[Updated] Azure ManagedIdentitySignInLogs</li>
<li class="">[Updated] Azure NonInteractiveUserSignInLogs</li>
<li class="">[Updated] Azure ServicePrincipalSignInLogs</li>
<li class="">[Updated] Azure Storage Analytics</li>
<li class="">[Updated] Azure Write and Delete Logs</li>
<li class="">[Updated] AzureActivityLog</li>
<li class="">[Updated] AzureActivityLog 01</li>
<li class="">[Updated] AzureActivityLog AuditLogs</li>
<li class="">[Updated] AzureDevOpsAuditing</li>
<li class="">[Updated] AzureDiagnosticLog</li>
<li class="">[Updated] Cisco ASA 113039 JSON</li>
<li class="">[Updated] Cisco Ironport MID - Custom Parser</li>
<li class="">[Updated] Cisco Ironport SFIMS - Custom Parser</li>
<li class="">[Updated] Cisco Ironport WSA - Custom Parser</li>
<li class="">[Updated] GCP App Engine Logs</li>
<li class="">[Updated] GCP Audit Logs</li>
<li class="">[Updated] GCP Firewall</li>
<li class="">[Updated] GCP Parser - Load Balancer</li>
<li class="">[Updated] GCP VPC Flows</li>
<li class="">[Updated] Kubernetes</li>
<li class="">[Updated] Office 365 - Exchange Admin Events</li>
<li class="">[Updated] Windows - Security - 4697</li>
<li class="">[Updated] Windows - Security - 4820</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-7">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-7" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Google/GCP BigQuery Gmail</li>
<li class="">[Updated] /Parsers/System/Citrix/Citrix NetScaler Syslog</li>
<li class="">[Updated] /Parsers/System/Dell/Dell SonicWall</li>
<li class="">[Updated] /Parsers/System/Infoblox/Infoblox</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="schema-2">Schema<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#schema-2" class="hash-link" aria-label="Direct link to Schema" title="Direct link to Schema" translate="no">​</a></h4>
<ul>
<li class="">[New] device_k8s_normalizedDeploymentName</li>
<li class="">[New] device_k8s_normalizedReplicaSetName</li>
<li class="">[New] dstDevice_k8s_normalizedDeploymentName</li>
<li class="">[New] dstDevice_k8s_normalizedReplicaSetName</li>
<li class="">[New] srcDevice_k8s_normalizedDeploymentName</li>
<li class="">[New] srcDevice_k8s_normalizedReplicaSetName</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="october-27-2022---content-release">October 27, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#october-27-2022---content-release" class="hash-link" aria-label="Direct link to October 27, 2022 - Content Release" title="Direct link to October 27, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-5">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-5" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] CHAIN-S00011 Potential InstallUtil Allow List Bypass</li>
<li class="">[Updated] MATCH-S00818 Azure PRT Token Issued via Non Interactive Login</li>
<li class="">[Updated] MATCH-S00464 Suspicious Non-Standard InstallUtil Execution</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-8">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-8" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] AWS - Application Load Balancer - ALB</li>
<li class="">[Updated] AWS - Application Load Balancer - JSON</li>
<li class="">[Updated] AWS API Gateway</li>
<li class="">[Updated] AWS CloudFront</li>
<li class="">[Updated] AWS EKS - Custom Parser</li>
<li class="">[Updated] AWS Elastic Load Balancer - Custom Parser</li>
<li class="">[Updated] AWS GuardDuty Alerts from Sumo CIP</li>
<li class="">[Updated] AWS Inspector - Custom Parser</li>
<li class="">[Updated] AWS Network Firewall Alerts</li>
<li class="">[Updated] AWS Network Firewall Flow</li>
<li class="">[Updated] AWS Network Firewall Netflow</li>
<li class="">[Updated] AWS Route 53 Logs</li>
<li class="">[Updated] AWS S3 Server Access Log - Custom Parser</li>
<li class="">[Updated] AWS Security Hub</li>
<li class="">[Updated] AWS Trusted Advisor</li>
<li class="">[Updated] AWS VPC Flow Logs - Default Format</li>
<li class="">[Updated] AWS VPC Flow Logs - JSON Format</li>
<li class="">[Updated] AWS WAF Allow Logs</li>
<li class="">[Updated] AWS WAF Block Logs</li>
<li class="">[Updated] AWSGuardDuty_Backdoor</li>
<li class="">[Updated] AWSGuardDuty_Behavior</li>
<li class="">[Updated] AWSGuardDuty_Catch_All</li>
<li class="">[Updated] AWSGuardDuty_CryptoCurrency</li>
<li class="">[Updated] AWSGuardDuty_Discovery</li>
<li class="">[Updated] AWSGuardDuty_Exfiltration</li>
<li class="">[Updated] AWSGuardDuty_PenTest</li>
<li class="">[Updated] AWSGuardDuty_Persistence</li>
<li class="">[Updated] AWSGuardDuty_Policy</li>
<li class="">[Updated] AWSGuardDuty_ResourceConsumption</li>
<li class="">[Updated] AWSGuardDuty_Stealth</li>
<li class="">[Updated] AWSGuardDuty_Trojan</li>
<li class="">[Updated] AwsServiceEvent-AWS API Call via CloudTrail</li>
<li class="">[Updated] CloudTrail - application-insights.amazonaws.com - ListApplications</li>
<li class="">[Updated] CloudTrail - cloudtrail.amazonaws.com - CreateTrail</li>
<li class="">[Updated] CloudTrail - cloudtrail.amazonaws.com - DeleteTrail</li>
<li class="">[Updated] CloudTrail - cloudtrail.amazonaws.com - StartLogging</li>
<li class="">[Updated] CloudTrail - cloudtrail.amazonaws.com - StopLogging</li>
<li class="">[Updated] CloudTrail - cloudtrail.amazonaws.com - UpdateTrail</li>
<li class="">[Updated] CloudTrail - cognito-idp.amazonaws.com - CreateUserPoolClient</li>
<li class="">[Updated] CloudTrail - controltower.amazonaws.com - CreateManagedAccount</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - AttachInternetGateway</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - AuthorizeSecurityGroupIngress</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - BidEvictedEvent</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - CreateCustomerGateway</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - CreateInternetGateway</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - CreateKeyPair</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - CreateNetworkAcl</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - CreateNetworkAclEntry</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - DeleteCustomerGateway</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - DeleteInternetGateway</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - DeleteKeyPair</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - DeleteNetworkAcl</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - DeleteNetworkAclEntry</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - DetachInternetGateway</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - ImportKeyPair</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - ReplaceNetworkAclAssociation</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - ReplaceNetworkAclEntry</li>
<li class="">[Updated] CloudTrail - ecr.amazonaws.com - PolicyExecutionEvent</li>
<li class="">[Updated] CloudTrail - elasticfilesystem.amazonaws.com - NewClientConnection</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - AttachGroupPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - AttachRolePolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - AttachUserPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - CreateAccessKey</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - CreatePolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - CreatePolicyVersion</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - CreateUser</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeleteGroupPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeletePolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeleteRolePermissionsBoundary</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeleteRolePolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeleteUser</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeleteUserPermissionsBoundary</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeleteUserPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DetachGroupPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DetachRolePolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DetachUserPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - PutGroupPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - PutRolePolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - PutUserPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - UpdateAssumeRolePolicy</li>
<li class="">[Updated] CloudTrail - kms.amazonaws.com - DisableKey</li>
<li class="">[Updated] CloudTrail - kms.amazonaws.com - RotateKey</li>
<li class="">[Updated] CloudTrail - kms.amazonaws.com - ScheduleKeyDeletion</li>
<li class="">[Updated] CloudTrail - logs.amazonaws.com - DeleteDestination</li>
<li class="">[Updated] CloudTrail - logs.amazonaws.com - DeleteLogGroup</li>
<li class="">[Updated] CloudTrail - logs.amazonaws.com - DeleteLogStream</li>
<li class="">[Updated] CloudTrail - organizations.amazonaws.com - CreateAccountResult</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - CreateBucket</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - DeleteBucketCors</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - DeleteBucketLifecycle</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - DeleteBucketPolicy</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketAcl</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketCors</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketLifecycle</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketPolicy</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketReplication</li>
<li class="">[Updated] CloudTrail - secretsmanager.amazonaws.com - RotationStarted</li>
<li class="">[Updated] CloudTrail - secretsmanager.amazonaws.com - RotationSucceeded</li>
<li class="">[Updated] CloudTrail - secretsmanager.amazonaws.com - SecretVersionDeletion</li>
<li class="">[Updated] CloudTrail - signin.amazonaws.com - CheckMfa</li>
<li class="">[Updated] CloudTrail - signin.amazonaws.com - ConsoleLogin</li>
<li class="">[Updated] CloudTrail - signin.amazonaws.com - ExitRole</li>
<li class="">[Updated] CloudTrail - signin.amazonaws.com - RenewRole</li>
<li class="">[Updated] CloudTrail - signin.amazonaws.com - SwitchRole</li>
<li class="">[Updated] CloudTrail - sso.amazonaws.com - Federate</li>
<li class="">[Updated] CloudTrail - sso.amazonaws.com - ListProfilesForApplication</li>
<li class="">[Updated] CloudTrail Default Mapping</li>
<li class="">[Updated] Falco Detection JSON</li>
<li class="">[Updated] Juniper SSG Series Firewall - Audit Messaging</li>
<li class="">[Updated] Juniper SSG Series Firewall - Traffic Messaging</li>
<li class="">[Updated] Microsoft IIS Parser - Catch All</li>
<li class="">[Updated] Recon_EC2_PortProbeUnprotectedPort</li>
<li class="">[Updated] Recon_EC2_Portscan</li>
<li class="">[Updated] Recon_IAMUser</li>
<li class="">[Updated] UnauthorizedAccess_EC2_SSHBruteForce</li>
<li class="">[Updated] UnauthorizedAccess_EC2_TorClient</li>
<li class="">[Updated] UnauthorizedAccess_EC2_TorIPCaller</li>
<li class="">[Updated] UnauthorizedAccess_EC2_TorRelay</li>
<li class="">[Updated] UnauthorizedAccess_IAMUser</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-8">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-8" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Renamed] /Parsers/System/Juniper/Juniper SSC Series Firewall Syslog -&gt; /Parsers/System/Juniper/Juniper SSG Series Firewall Syslog</li>
<li class="">[New] /Parsers/System/Netskope/Netskope Security Cloud JSON</li>
<li class="">[Updated] /Parsers/System/Falco/Falco JSON</li>
<li class="">[Updated] /Parsers/System/Microsoft/Microsoft IIS</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="october-20-2022---content-release">October 20, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#october-20-2022---content-release" class="hash-link" aria-label="Direct link to October 20, 2022 - Content Release" title="Direct link to October 20, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-6">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-6" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00640 Kubernetes Pod Created in Kube Namespace</li>
<li class="">[Updated] MATCH-S00642 Kubernetes Service Account Created in Kube Namespace</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-9">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-9" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Juniper SSC Series Firewall - Audit Messaging</li>
<li class="">[New] Juniper SSC Series Firewall - Traffic Messaging</li>
<li class="">[New] Linux-Sysmon/Operational - 1</li>
<li class="">[New] Linux-Sysmon/Operational - 10</li>
<li class="">[New] Linux-Sysmon/Operational - 11</li>
<li class="">[New] Linux-Sysmon/Operational - 15</li>
<li class="">[New] Linux-Sysmon/Operational - 16</li>
<li class="">[New] Linux-Sysmon/Operational - 17</li>
<li class="">[New] Linux-Sysmon/Operational - 18</li>
<li class="">[New] Linux-Sysmon/Operational - 2</li>
<li class="">[New] Linux-Sysmon/Operational - 23</li>
<li class="">[New] Linux-Sysmon/Operational - 3</li>
<li class="">[New] Linux-Sysmon/Operational - 4</li>
<li class="">[New] Linux-Sysmon/Operational - 5</li>
<li class="">[New] Linux-Sysmon/Operational - 6</li>
<li class="">[New] Linux-Sysmon/Operational - 7</li>
<li class="">[New] Linux-Sysmon/Operational - 8</li>
<li class="">[New] Linux-Sysmon/Operational - 9</li>
<li class="">[New] Microsoft Graph Security API C2C - Dynamic Vendor/Product - Azure Advanced Threat Protection</li>
<li class="">[New] Microsoft Graph Security API C2C - Dynamic Vendor/Product - Microsoft Defender for Cloud Apps</li>
<li class="">[Updated] Kubernetes</li>
<li class="">[Updated] Microsoft Office 365 Threat Intelligence Events</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-9">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-9" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Juniper/Juniper SSC Series Firewall Syslog</li>
<li class="">[New] /Parsers/System/Linux/Linux Sysmon XML</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="schema-3">Schema<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#schema-3" class="hash-link" aria-label="Direct link to Schema" title="Direct link to Schema" translate="no">​</a></h4>
<ul>
<li class="">[New] device_k8s_deployment</li>
<li class="">[New] device_k8s_namespace</li>
<li class="">[New] device_k8s_normalizedPodName</li>
<li class="">[New] device_k8s_pod</li>
<li class="">[New] device_k8s_replicaSet</li>
<li class="">[New] dstDevice_k8s_deployment</li>
<li class="">[New] dstDevice_k8s_namespace</li>
<li class="">[New] dstDevice_k8s_normalizedPodName</li>
<li class="">[New] dstDevice_k8s_pod</li>
<li class="">[New] dstDevice_k8s_replicaSet</li>
<li class="">[New] srcDevice_k8s_deployment</li>
<li class="">[New] srcDevice_k8s_namespace</li>
<li class="">[New] srcDevice_k8s_normalizedPodName</li>
<li class="">[New] srcDevice_k8s_pod</li>
<li class="">[New] srcDevice_k8s_replicaSet</li>
<li class="">[Updated] device_container_runtime</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="october-20-2022---application-update">October 20, 2022 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#october-20-2022---application-update" class="hash-link" aria-label="Direct link to October 20, 2022 - Application Update" title="Direct link to October 20, 2022 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="support-for-custom-inventory-sources">Support for Custom Inventory Sources<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#support-for-custom-inventory-sources" class="hash-link" aria-label="Direct link to Support for Custom Inventory Sources" title="Direct link to Support for Custom Inventory Sources" translate="no">​</a></h4>
<p>Cloud SIEM now supports custom sources of inventory data. Now, if you want to ingest inventory data from a source that Sumo Logic does not provide a pre-built connnector for, you can use this new feature. See the new document <a class="" href="https://www.sumologic.com/help/docs/cse/administration/custom-inventory-sources/">Configure a Custom Inventory Source</a> for details.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="standard-match-lists">Standard Match Lists<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#standard-match-lists" class="hash-link" aria-label="Direct link to Standard Match Lists" title="Direct link to Standard Match Lists" translate="no">​</a></h4>
<p>As a reminder, the migration for our out-of-the-box rules content from standard match lists to tags for Entities has begun. The system is now automatically setting the appropriate tags for any Entities appearing in any of the standard match lists called out in the <a class="" href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#october-13-2022---application-update">previous announcement</a>. This will continue until January 20, 2023, when the migration will be complete.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-1">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#minor-changes-and-enhancements-1" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] API endpoints have been creeated enabling users to upload attribute changes (such as tags or criticality) for multiple Entities in a single call, rather than having to do so one at a time. The new endpoints are <code>/entities/bulk-add-tags</code>, <code>/entities/bulk-update-tags</code>, <code>/entities/bulk-remove-tags</code>, <code>/entities/bulk-update-suppressed</code>, and <code>/entities/bulk-update-criticality</code>. Note that these API endpoints have a limit of 1000 entries per call. More details are available via the <strong>API Documentation</strong> link in Cloud SIEM.</li>
<li class="">[Updated] Previously, a new feature was added to the Enrichments tab that enabled you to hide any attribute-value pair with an "empty" value for clarity. This included values like "0" or "N/A". However, some of those values are often useful to the analyst (for example, <code>number_of_threat_reports="0"</code>). Starting with this release, this feature will only hide attributes with truly empty values (i.e., <code>attribute=""</code>).</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="resolved-issues-1">Resolved Issues<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#resolved-issues-1" class="hash-link" aria-label="Direct link to Resolved Issues" title="Direct link to Resolved Issues" translate="no">​</a></h4>
<ul>
<li class="">The CSV file upload method for updating Entity attributes did not support sensor zones or normalized entity names properly.</li>
<li class="">Cloud SIEM has switched providers of lists of public dynamic DNS domains, which has resolved an issue with rules utilizing these lists.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="october-13-2022---application-update">October 13, 2022 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#october-13-2022---application-update" class="hash-link" aria-label="Direct link to October 13, 2022 - Application Update" title="Direct link to October 13, 2022 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="announcement-standard-match-lists-migration-to-entity-tags">Announcement: Standard Match Lists Migration to Entity Tags<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#announcement-standard-match-lists-migration-to-entity-tags" class="hash-link" aria-label="Direct link to Announcement: Standard Match Lists Migration to Entity Tags" title="Direct link to Announcement: Standard Match Lists Migration to Entity Tags" translate="no">​</a></h4>
<p>Currently, Cloud SIEM defines a set of standard Match Lists as a way to allow users to specify lists of Entities and other indicators that should affect whether or not Rules create Signals. However, starting next week, the Rules included with Cloud SIEM will begin transitioning to leverage Entity tags for this purpose instead. Tags on Entities are more flexible and can also provide context to analysts during the investigation phase.</p>
<p>Next week, a new set of standard tag schemas will be introduced in Cloud SIEM. These tag schemas will correspond to the existing standard Match Lists:</p>
<table><tbody><tr><th>Key</th><th>Allowed Values</th><th>Equivalent Match List</th></tr><tr><td rowspan="8">_deviceGroup</td><td>admin</td><td>admin_ips</td></tr><tr><td>awsAdmin</td><td>AWS_admin_ips</td></tr><tr><td>business</td><td>business_ips</td></tr><tr><td>gcpAdmin</td><td>GCP_admin_ips</td></tr><tr><td>googleWorkspaceAdmin</td><td>Google_Workspace_admin_ips</td></tr><tr><td>salesforceAdmin</td><td>salesforce_admin_ips</td></tr><tr><td>sandbox</td><td>sandbox_ips</td></tr><tr><td>scanTarget</td><td>scanner_targets</td></tr><tr><td rowspan="6">_deviceService</td><td>dns</td><td>dns_servers<br>dns_servers_dst<br>dns_servers_src</td></tr><tr><td>ftp</td><td>ftp_servers</td></tr><tr><td>smtp</td><td>smtp_servers</td></tr><tr><td>sql</td><td>sql_servers</td></tr><tr><td>ssh</td><td>ssh_servers</td></tr><tr><td>telnet</td><td>telnet_servers</td></tr><tr><td rowspan="8">_deviceType</td><td>authServer</td><td>auth_servers<br>auth_servers_dst<br>auth_servers_src</td></tr><tr><td>lanScanner</td><td>lan_scanner_exception_ips</td></tr><tr><td>nms</td><td>nms_ips</td></tr><tr><td>paloAltoSinkhole</td><td>palo_alto_sinkhole_ips</td></tr><tr><td>proxyServer</td><td>proxy_servers<br>proxy_servers_dst<br>proxy_servers_src</td></tr><tr><td>vpnServer</td><td>vpn_servers</td></tr><tr><td>vulnerabilityScanner</td><td>vuln_scanners</td></tr><tr><td>webServer</td><td>http_servers</td></tr><tr><td rowspan="3">_networkType</td><td>guest</td><td>guest_networks</td></tr><tr><td>nat</td><td>nat_ips</td></tr><tr><td>vpn</td><td>vpn_networks</td></tr><tr><td rowspan="6">_userGroup</td><td>awsAdmin</td><td>AWS_admin_users</td></tr><tr><td>dsReplication</td><td>ds_replication_authorized_users</td></tr><tr><td>gcpAdmin</td><td>GCP_admin_users</td></tr><tr><td>googleWorkspaceAdmin</td><td>Google_Workspace_admin_users</td></tr><tr><td>kerberosDowngrade</td><td>downgrade_krb5_etype_authorized_users</td></tr><tr><td>salesforceAdmin</td><td>salesforce_admin_users</td></tr></tbody></table>
<p>(There are five standard match lists <em>not</em> affected by this change, as they do not contain Entities. These include: business_asns, business_domains, business_hostnames, threat, and verified_uri_paths.)</p>
<p><strong>Beginning Thursday, October 20</strong>, the contents of the standard match lists listed above will automatically be copied to tags set on the individual entities. So, for example, if an Entity <code>1.2.3.4</code> is in match list <code>sql_servers</code>, a tag <code>_deviceService:sql</code> will be set on it. Cloud SIEM will continue to automatically create these tags from the standard match lists for a period of 3 months, <strong>until January 20, 2023</strong>. During this period, pre-defined rules will be updated to reference these tags instead of the standard match lists, so by the end of this period all rules will be updated and Cloud SIEM will no longer automatically create these tags.</p>
<p><strong>Please update any process you use to maintain the members of standard match lists by January 20, 2023 to maintain standard Entity tags instead (or in addition).</strong> We highly recommend you take advantage of Entity Groups to set Entity tags rather than individually setting tags. Entity Groups enable the automatic application of attributes like tags based on the Entity's value, IP address range, or inventory group.</p>
<p>Note that you cannot extend the standard tag schemas (for example, you cannot add a value <code>azureAdmin</code> to <code>_userGroup</code>). (The underscore prefix in the schema name means it's a system-defined schema.) Instead, create a different tag schema (such as <code>customUserGroup</code>) with such extended values.</p>
<p>You can refer to Entity tags in Rule expressions. For example, if you've attached the tag <code>_deviceService:sql</code> to an Entity, this statement will return "true" if that Entity is listed in a Record's <code>srcDevice_ip</code> field:</p>
<div class="language-text codeBlockContainer_Ckt0 theme-code-block" style="--prism-color:#393A34;--prism-background-color:#f6f8fa"><div class="codeBlockContent_QJqH"><pre tabindex="0" class="prism-code language-text codeBlock_bY9V thin-scrollbar" style="color:#393A34;background-color:#f6f8fa"><code class="codeBlockLines_e6Vv"><span class="token-line" style="color:#393A34"><span class="token plain">array_contains(fieldTags["srcDevice_ip"], "_deviceService:sql")</span><br></span></code></pre></div></div>
<p>Additional information about the standard tag schema, match lists, Entity groups, and using these features with Rules is available in the <a class="" href="https://www.sumologic.com/help/docs/cse/">Cloud SIEM Documentation</a>.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-2">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#minor-changes-and-enhancements-2" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] Users can now filter object lists based on tag schema. The list results will include all objects that have a tag that are part of that schema. For example, if you search for <code>_networkType</code> (from the note above) the list results will include any object that has a tag of <code>_networkType:guest</code>, <code>_networkType:nat</code>, and/or <code>_networkType:vpn</code>.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="resolved-issues-2">Resolved Issues<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#resolved-issues-2" class="hash-link" aria-label="Direct link to Resolved Issues" title="Direct link to Resolved Issues" translate="no">​</a></h4>
<ul>
<li class="">Entity relationships were not taking sensor zones into account properly.</li>
<li class="">Entity details pages were only briefly displaying the proper Criticality.</li>
<li class="">The Entities Count links on the Entity Criticality list pages were pointing at the wrong URLs.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="october-12-2022---introducing-sumo-logic-open-source-docs">October 12, 2022 - Introducing Sumo Logic Open Source Docs<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#october-12-2022---introducing-sumo-logic-open-source-docs" class="hash-link" aria-label="Direct link to October 12, 2022 - Introducing Sumo Logic Open Source Docs" title="Direct link to October 12, 2022 - Introducing Sumo Logic Open Source Docs" translate="no">​</a></h3>
<p>Welcome to the Sumo Logic Cloud SIEM Release Notes on our new docs site! We're now open source and encourage you to contribute. We welcome all contributions, from minor typo fixes to brand new docs. Your expertise and sharing can help fellow users learn and expand their knowledge of Sumo Logic.</p>
<p>Here you'll find information about new and enhanced features, updated content (like rules, log mappers and parsers), bug fixes, and other important announcements for Cloud SIEM.</p>
<p>To view Release Notes from previous years, check the <a class="" href="https://www.sumologic.com/help/release-notes-cse/archive/">archive</a>.</p>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="october-6-2022---application-update">October 6, 2022 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#october-6-2022---application-update" class="hash-link" aria-label="Direct link to October 6, 2022 - Application Update" title="Direct link to October 6, 2022 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="application-update-minor-changes-and-enhancements">Application Update: Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#application-update-minor-changes-and-enhancements" class="hash-link" aria-label="Direct link to Application Update: Minor Changes and Enhancements" title="Direct link to Application Update: Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Dynamic severity in rules has been enhanced. Users can now specify ranges of values to match to a specific severity. There are now multiple options, and these options can be combined (the first rule that matches is used; if none match then the default is used):<!-- -->
<ul>
<li class=""><strong>Equal to</strong> Exact string or mathematical match ("Equal to 4" will match "4" and 4.0 but not 4.01)</li>
<li class=""><strong>Greater than</strong> and <strong>Less than</strong> Mathematical only, not inclusive ("Less than 5" will match 4.9 but not 5)</li>
<li class=""><strong>Between</strong> Mathematical only, inclusive ("Between 5 and 10" will match 5 or 7 but not 10.1)</li>
<li class=""><strong>Not in the record</strong> Will match when the <em>attribute</em> is not listed in the record. (if there is no "bro_irc_value" attribute then this rule will match; if "bro_irc_value" exists but is empty/null, this does <em>not</em> match)</li>
</ul>
</li>
<li class="">[New] Users can now filter the Signals list based on the type of Rule that generated the Signal (Match, Chain, Aggregation, etc.)</li>
<li class="">[New] Users can now perform negative keyword searches ("not<!-- -->:aws<!-- -->" would return all objects that do <em>not</em> include the keyword "aws")</li>
<li class="">[New] Entity domain normalization can now be managed via Terraform</li>
<li class="">[New] Users can now configure the Email Action to send emails in plain text in addition to the previously supported multipart HTML5/text format</li>
<li class="">[New] Changes to the Insight Threshold are now noted in the Audit Log</li>
<li class="">[Deleted] As previously announced, the IBM Resilient and Sensor actions have been removed from Cloud SIEM</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="resolved-issues-3">Resolved Issues<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#resolved-issues-3" class="hash-link" aria-label="Direct link to Resolved Issues" title="Direct link to Resolved Issues" translate="no">​</a></h4>
<ul>
<li class="">Match list items were not matching properly in some instances, such as after deletion</li>
<li class="">Keyword searches did not properly support values (such as hostnames) with embedded dashes</li>
<li class="">Changes to prototype state were not visible in the rule history</li>
<li class="">In some cases, the system was parsing domain names/TLDs incorrectly</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="content-release">Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#content-release" class="hash-link" aria-label="Direct link to Content Release" title="Direct link to Content Release" translate="no">​</a></h4>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-10">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-10" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h5>
<ul>
<li class="">[New] Azure Application Service Console Logs</li>
<li class="">[New] Google G Suite Alert Center - Sensitive Admin Action</li>
<li class="">[Updated] Azure Event Hub - Windows Defender Logs - DeviceAlertEvents</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-10">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-10" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h5>
<ul>
<li class="">[Updated] /Parsers/System/Google/G Suite Alert Center</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="legacy-parsers">Legacy Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#legacy-parsers" class="hash-link" aria-label="Direct link to Legacy Parsers" title="Direct link to Legacy Parsers" translate="no">​</a></h5>
<ul>
<li class="">[Updated] CISCO_MERAKI_SECURITY_FILTERING_FILE_SCANNED</li>
<li class="">[Updated] CISCO_MERAKI_URLS</li>
<li class="">[Updated] Twistlock_Logs</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="september-29-2022---content-release">September 29, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#september-29-2022---content-release" class="hash-link" aria-label="Direct link to September 29, 2022 - Content Release" title="Direct link to September 29, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-7">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-7" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Deleted] MATCH-S00070 Checkpoint Firewall</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-11">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-11" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Cyber Ark EPM AggregateEvent</li>
<li class="">[New] Cyber Ark EPM AuditAdmin</li>
<li class="">[New] Cyber Ark EPM GetComputer</li>
<li class="">[New] Cyber Ark EPM Policy</li>
<li class="">[New] Cyber Ark EPM RawDetails</li>
<li class="">[New] Cyber Ark EPM RawEvents</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-11">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-11" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Cyber-Ark/CyberArk EPM JSON</li>
<li class="">[Updated] /Parsers/System/Auth0/Auth0</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="september-19-2022---content-release">September 19, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#september-19-2022---content-release" class="hash-link" aria-label="Direct link to September 19, 2022 - Content Release" title="Direct link to September 19, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-8">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-8" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Deleted] CHAIN-S00009 Proofpoint TAP Click Permitted Followed by Successful Request</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-12">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-12" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Wiz Catch All</li>
<li class="">[Updated] Orca Security Parser - Catch All</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="schema-4">Schema<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#schema-4" class="hash-link" aria-label="Direct link to Schema" title="Direct link to Schema" translate="no">​</a></h4>
<ul>
<li class="">[New] cloud_provider</li>
<li class="">[New] cloud_region</li>
<li class="">[New] cloud_service</li>
<li class="">[New] cloud_zone</li>
<li class="">[New] device_container_id</li>
<li class="">[New] device_container_name</li>
<li class="">[New] device_container_runtime</li>
<li class="">[New] device_image</li>
<li class="">[New] device_type</li>
<li class="">[New] dstDevice_container_id</li>
<li class="">[New] dstDevice_container_name</li>
<li class="">[New] dstDevice_container_runtime</li>
<li class="">[New] dstDevice_image</li>
<li class="">[New] dstDevice_type</li>
<li class="">[New] resourceType</li>
<li class="">[New] srcDevice_container_id</li>
<li class="">[New] srcDevice_container_name</li>
<li class="">[New] srcDevice_container_runtime</li>
<li class="">[New] srcDevice_image</li>
<li class="">[New] srcDevice_type</li>
<li class="">[Updated] dstDevice_uniqueId</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="september-12-2022---application-update">September 12, 2022 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#september-12-2022---application-update" class="hash-link" aria-label="Direct link to September 12, 2022 - Application Update" title="Direct link to September 12, 2022 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="insight-enrichment-server-for-fed-deployment">Insight Enrichment Server for Fed deployment<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#insight-enrichment-server-for-fed-deployment" class="hash-link" aria-label="Direct link to Insight Enrichment Server for Fed deployment" title="Direct link to Insight Enrichment Server for Fed deployment" translate="no">​</a></h4>
<p>[Update] We’ve released a new version of the <a class="" href="https://www.sumologic.com/help/docs/cse/integrations/insight-enrichment-server/">Insight Enrichment Server</a> that runs on the Sumo Logic FedRAMP-compliant deployment. This makes Cloud SIEM on FedRAMP functionally equivalent to commercial deployments of Cloud SIEM.</p>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="september-9-2022---application-update">September 9, 2022 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#september-9-2022---application-update" class="hash-link" aria-label="Direct link to September 9, 2022 - Application Update" title="Direct link to September 9, 2022 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-3">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#minor-changes-and-enhancements-3" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] An API endpoint has been added which enables user to delete multiple entries in a match list in one operation: <code>POST: /match-list-items/bulk-delete</code></li>
<li class="">[Updated] When inventory data for hosts includes both private and public IP addresses, that data will be attached to both Entities. Previously it was only attached to one of the IP address Entities.</li>
<li class="">[Updated] Previously we announced that the severity attribute for Insights in the Audit Logs would be switching from numbers (1-4) to text (LOW, MEDIUM, HIGH, etc). Instead, we have retained the existing numerical attribute and added a new attribute <code>severityName</code> containing the human-readable text.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="resolved-issues-4">Resolved Issues<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#resolved-issues-4" class="hash-link" aria-label="Direct link to Resolved Issues" title="Direct link to Resolved Issues" translate="no">​</a></h4>
<ul>
<li class="">In some Audit Log messages related to Insight comments, the <code>insight_readable_id</code> was not set correctly.</li>
<li class="">In some cases, manually adding or removing tags in an Insight was not being recorded in the Audit Logs properly.</li>
<li class="">For some customers, the bar chart on the Records list page was not rendering properly.</li>
<li class="">Time/date stamps were not being displayed consistently across the UI.</li>
<li class="">Some pages were returning intermittent 404 or internal errors.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="september-8-2022---content-release">September 8, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#september-8-2022---content-release" class="hash-link" aria-label="Direct link to September 8, 2022 - Content Release" title="Direct link to September 8, 2022 - Content Release" translate="no">​</a></h3>
<p>In one week (2022-09-15), we will be removing CHAIN-S00009 - 'Proofpoint TAP Click Permitted Followed by Successful Request' rule to consolidate Proofpoint TAP rules while providing equivalent detection value.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-9">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-9" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00819 Chromium Process Started With Debugging Port</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-13">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-13" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Aruba ClearPass Syslog</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-12">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-12" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/HP/Aruba ClearPass - Syslog</li>
<li class="">[Updated] /Parsers/System/Microsoft/Microsoft Azure JSON</li>
<li class="">[Updated] /Parsers/System/Microsoft/Microsoft IIS</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="september-1-2022---application-update">September 1, 2022 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#september-1-2022---application-update" class="hash-link" aria-label="Direct link to September 1, 2022 - Application Update" title="Direct link to September 1, 2022 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="announcements">Announcements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#announcements" class="hash-link" aria-label="Direct link to Announcements" title="Direct link to Announcements" translate="no">​</a></h4>
<ul>
<li class="">Starting October 1, 2022, _suppressed _Signals will be retained in Cloud SIEM for 30 days (previously, they were retained for 90 days). All Signals are automatically stored in the Sumo sec_signals index for 2 years, so users searching for suppressed Signals more than 30 days old should search in that index instead of in the Cloud SIEM UI.<!-- -->
<ul>
<li class="">Note also that in the past, Signals attached to Insights were searchable from the Cloud SIEM Signals list page indefinitely. Starting on October 1, they will only be searchable for 365 days. (They will still be visible from the Insight details page beyond that period.)</li>
</ul>
</li>
<li class="">As previously announced, the Sensor and IBM Resilient actions are no longer supported. They will be removed from Cloud SIEM by the end of this month.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-4">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#minor-changes-and-enhancements-4" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] In the Audit Log, when an Insight is created, the sum of the included Signals' severity is now included with the insight in the <code>risk_score</code> field (i.e. if there were three Signals each with a severity of 4, the sum of 12 will be included).</li>
<li class="">[Updated] The "Copy Expression" mouse action for record fields can now be activated using Shift+Click. The Click action now brings up a "Copy Value" action instead.</li>
<li class="">[New] Users can now delete Match Lists from the list view (i.e. users no longer have to go into the details).</li>
<li class="">[New] On the Criticality list page, the number of Entity Groups associated with each Criticality is now listed on the cards.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="resolved-issues-5">Resolved Issues<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#resolved-issues-5" class="hash-link" aria-label="Direct link to Resolved Issues" title="Direct link to Resolved Issues" translate="no">​</a></h4>
<ul>
<li class="">In some cases where the Signals were relatively old, the Signals that contributed to an Insight were no longer visible in the Insight in the UI.</li>
<li class="">Time stamps were missing from Records in some views.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="content-release-1">Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#content-release-1" class="hash-link" aria-label="Direct link to Content Release" title="Direct link to Content Release" translate="no">​</a></h4>
<p>In 2 weeks (2022-09-15) we will be removing CHAIN-S00009 - 'Proofpoint TAP Click Permitted Followed by Successful Request' rule to consolidate Proofpoint TAP rules while providing equivalent detection value.</p>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-10">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-10" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h5>
<ul>
<li class="">[New] MATCH-S00818 Azure PRT Token Issued via Non Interactive Login</li>
<li class="">[New] MATCH-S00821 Chromium Browser History Access by Non-Browser Process</li>
<li class="">[New] MATCH-S00819 Chromium Process Started With Debugging Port</li>
<li class="">[New] MATCH-S00820 Cloud Credential File Accessed</li>
<li class="">[New] MATCH-S00817 Suspicious Azure Active Directory Device Code Authentication</li>
<li class="">[Updated] MATCH-S00235 Azure - Create User</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-14">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-14" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h5>
<ul>
<li class="">[New] Mimecast AV Event</li>
<li class="">[New] Mimecast Impersonation Event</li>
<li class="">[New] Mimecast Spam Event</li>
<li class="">[Updated] AzureActivityLog AuditLogs</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="august-25-2022---application-update">August 25, 2022 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#august-25-2022---application-update" class="hash-link" aria-label="Direct link to August 25, 2022 - Application Update" title="Direct link to August 25, 2022 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="application-update">Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#application-update" class="hash-link" aria-label="Direct link to Application Update" title="Direct link to Application Update" translate="no">​</a></h4>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="cloud-siem-app-is-now-available">Cloud SIEM App is now available<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#cloud-siem-app-is-now-available" class="hash-link" aria-label="Direct link to Cloud SIEM App is now available" title="Direct link to Cloud SIEM App is now available" translate="no">​</a></h5>
<p>The Cloud SIEM app gives you visibility into what’s going on in Cloud SIEM. The app dashboards present high-level and detailed views into the Records that were created, the Signals that have fired, and the Insights generated by Cloud SIEM. You can also get insight in Cloud SIEM rules, including rule management activity, and which rules have fired.</p>
<p>This app is available to all licensed Cloud SIEM customers in the Sumo Logic App Catalog. For more information, see <a class="" href="https://www.sumologic.com/help/docs/integrations/sumo-apps/cse/">Cloud SIEM App</a>.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="content-release-2">Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#content-release-2" class="hash-link" aria-label="Direct link to Content Release" title="Direct link to Content Release" translate="no">​</a></h4>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-11">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-11" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h5>
<ul>
<li class="">[Updated] MATCH-S00632 Okta Administrator Access Granted</li>
<li class="">[Updated] MATCH-S00683 Overly Permissive Chmod Command</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-15">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-15" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h5>
<ul>
<li class="">[New] Check Point Avanan</li>
<li class="">[New] Cisco ISE Authentication Failure</li>
<li class="">[New] Cisco ISE Authentication Success</li>
<li class="">[New] Cisco ISE Catch All</li>
<li class="">[New] FireEye Web MPS Event</li>
<li class="">[Updated] Microsoft Office 365 Threat Intelligence Events</li>
<li class="">[Updated] Windows Microsoft-Windows-Sysmon/Operational 3</li>
<li class="">[Updated] Windows Security 4688</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-13">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-13" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h5>
<ul>
<li class="">[New] /Parsers/System/Check Point/Check Point Avanan JSON</li>
<li class="">[New] /Parsers/System/Cisco/Cisco ISE</li>
<li class="">[New] /Parsers/System/FireEye/FireEye Web MPS JSON</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="august-18-2022---application-update">August 18, 2022 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#august-18-2022---application-update" class="hash-link" aria-label="Direct link to August 18, 2022 - Application Update" title="Direct link to August 18, 2022 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="resolved-issues-6">Resolved Issues<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#resolved-issues-6" class="hash-link" aria-label="Direct link to Resolved Issues" title="Direct link to Resolved Issues" translate="no">​</a></h4>
<ul>
<li class="">Several issues were resolved related to the bulk upload of Entity attributes, including errors with CSV file parsing, editing uploaded attributes in the UI, and a lack of audit logging.</li>
<li class="">On the Entity details page, the criticality was not being displayed properly.
Labels were not being created properly based on Network Blocks for a small number of customers.</li>
<li class=""><strong>InsightCommentCreated</strong> audit events did not include the <code>readableId</code> attribute.</li>
<li class="">For some record types, the <code>Actions</code> field was not being displayed if selected as a favorite field.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="july-28-2022---application-update">July 28, 2022 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#july-28-2022---application-update" class="hash-link" aria-label="Direct link to July 28, 2022 - Application Update" title="Direct link to July 28, 2022 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="read-only-user-capabilities-for-cloud-siem">Read-Only User Capabilities for Cloud SIEM<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#read-only-user-capabilities-for-cloud-siem" class="hash-link" aria-label="Direct link to Read-Only User Capabilities for Cloud SIEM" title="Direct link to Read-Only User Capabilities for Cloud SIEM" translate="no">​</a></h4>
<p>New user capabilities (permissions) have been created enabling read-only access to content and configuration features in Cloud SIEM.</p>
<p>These can be used when <a class="" href="https://www.sumologic.com/help/docs/manage/users-roles/roles/create-manage-roles/">defining roles</a> in the Sumo Logic platform.</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/Read-Only-Roles.png" alt="read-only roles">
<p>(For those with Cloud SIEM instances in the <code>jask.ai</code> domain, these capabilities are accessed via the <strong>Configuration &gt; Roles</strong> page in Cloud SIEM.)</p>
<p>Users with these capabilities (without the corresponding <strong>Manage</strong> capabilities) will be able to view the corresponding pages but will not be able to make changes on those pages. (Previously, users without the <strong>Manage</strong> capabilities could not see the corresponding pages.)</p>
<p>These permissions also apply to Cloud SIEM APIs, so <strong>View</strong> (only) capabilities can now be assigned if desired.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-5">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#minor-changes-and-enhancements-5" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[Updated] When Threat Intelligence polling fails, the corresponding event will now include more information about the specific error that occurred.</li>
<li class="">[Updated] The API endpoints that return information about Signals (<code>GET /signals</code>, <code>GET /signals/&lt;id&gt;</code>, and  <code>GET /signals/all</code>) now include the summary field (previously only accessible via the UI).</li>
<li class="">[New] The Sumo Logic audit logs will now include events when a user adds or removes a Signal to/from an Insight, and when a user adds a comment to an Insight.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="resolved-issues-7">Resolved Issues<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#resolved-issues-7" class="hash-link" aria-label="Direct link to Resolved Issues" title="Direct link to Resolved Issues" translate="no">​</a></h4>
<ul>
<li class="">The <code>GET /rules</code> and <code>GET /rules/&lt;id&gt;</code> API endpoints did not require role capabilities for access; they now require either View Rules or Manage Rules.</li>
<li class="">Favorite Fields were not always being displayed on Signals generated by Threshold Rules.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="july-14-2022---application-update">July 14, 2022 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#july-14-2022---application-update" class="hash-link" aria-label="Direct link to July 14, 2022 - Application Update" title="Direct link to July 14, 2022 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-6">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#minor-changes-and-enhancements-6" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[Updated] The text size has been adjusted in some areas on the Rules details page to improve readability.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="resolved-issues-8">Resolved Issues<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#resolved-issues-8" class="hash-link" aria-label="Direct link to Resolved Issues" title="Direct link to Resolved Issues" translate="no">​</a></h4>
<ul>
<li class="">In some instances, after uploading Network Blocks via .csv file, they would fail to appear in the UI.</li>
</ul>
<h5 class="anchor anchorTargetStickyNavbar_Vzrq" id="announcement-update">Announcement Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#announcement-update" class="hash-link" aria-label="Direct link to Announcement Update" title="Direct link to Announcement Update" translate="no">​</a></h5>
<ul>
<li class="">The new Signal Index (recently announced) has been delayed, and will be available starting next week. As a result, the deprecation of the old Signal Forwarding feature will be delayed until September 22, 2022.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="july-21---application-update">July 21 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#july-21---application-update" class="hash-link" aria-label="Direct link to July 21 - Application Update" title="Direct link to July 21 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="entity-groups">Entity Groups<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#entity-groups" class="hash-link" aria-label="Direct link to Entity Groups" title="Direct link to Entity Groups" translate="no">​</a></h4>
<p>There are a number of ways that the use of Entity attributes - tags, criticality and suppression - provide value to users of Cloud SIEM: Investigations can be completed faster with more context, Insights can be better prioritized with the appropriate severity, and false positive signals from test instances can be prevented, for example. However, setting those attributes has been a manual process and keeping them in sync as new Entities are defined is difficult.</p>
<p>That's why we are pleased to announce a new feature called Entity Groups. By defining Entity Groups, attributes can be automatically applied (or removed) based on Entity value (name), IP address, or Inventory group membership. For example, all high-risk laptops will receive higher criticality -- even if such a laptop is added to your environment months later.</p>
<p>Entities can even be members of more than one Entity Group, so a high-risk laptop in the Austin office could both get a tag identifying its location and receive the higher criticality. And if you later reassigned it so that it was no longer in a high-risk group, the criticality would be automatically removed.</p>
<p>To create an Entity Group, a new configuration menu item has been added:</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/Entity-Groups-Menu.png" alt="entity groups menu">
<p>On the Entity Groups page, click the Create button:</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/Entity-Groups-List.png" alt="entity groups list">
<p>This will open the detail dialog:</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/Entity-Groups-Create.png" alt="create entity group">
<p>Here you can decide what attribute Group membership should be based on:</p>
<ul>
<li class="">Group membership in your Inventory system (such as Active Directory)</li>
<li class="">Entity value (name) - prefix or suffix (such as "aus-" or "-public")</li>
<li class="">IP address range (for IP Address entities) defined using the CIDR format</li>
</ul>
<p>Entity Groups also support <a class="" href="https://www.sumologic.com/help/docs/cse/administration/using-sensor-zones/">sensor zones</a>.</p>
<p>Then you can define what attribute(s) should be applied to member Entities - tags, criticality and/or suppression.</p>
<p>This release also includes API and Terraform support for Entity Groups.</p>
<p>More information about this exciting new feature and how to use it is in the documentation at Using Entity Groups.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="signal-index">Signal Index<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#signal-index" class="hash-link" aria-label="Direct link to Signal Index" title="Direct link to Signal Index" translate="no">​</a></h4>
<p>Starting today, Signals generated by Cloud SIEM will be automatically saved in a new sec_signal index. This special partition is similar to the existing sec_record_* indices in that, unlike data retained using the older Signal Forwarding feature, it will be saved in proper JSON supporting keyword search and nested attributes.</p>
<p>The new index is automatically generated and retained for a period of 2 years at no additional cost for all Cloud SIEM customers.</p>
<p>As a result, the optional Signal Forwarding feature will be deprecated on September 22, 2022. Existing data will not be deleted but new Signals generated after that date will no longer be forwarded and the option will no longer be available in Cloud SIEM.</p>
<p>Customers leveraging Signal Forwarding data to generate dashboards (or for other use cases) will need to modify those applications to use the new sec_signal index before September 22.</p>
<p>Note that because the new index is a special partition, a single query cannot be used to search both the sec_signal index and older forwarded Signal data simultaneously.</p>
<p>More information about using the special security indices is in the documentation at <a class="" href="https://www.sumologic.com/help/docs/cse/records-signals-entities-insights/search-cse-records-in-sumo/">Searching for Cloud SIEM Data in Sumo Logic</a>.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-7">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#minor-changes-and-enhancements-7" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[Updated] The page used to configure the detection window and Insight threshold has moved. Where previously it was accessed from a button on the Custom Insights list page, it is now accessed via a new Workflow &gt; Detection
option in the Configuration menu:</li>
</ul>
<img src="https://www.sumologic.com/help/img/release-notes/cse/Threshold-Menu.png" alt="threshold menu">
<p>Note the URL has also changed as a result; please update any bookmarks.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="resolved-issues-9">Resolved Issues<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#resolved-issues-9" class="hash-link" aria-label="Direct link to Resolved Issues" title="Direct link to Resolved Issues" translate="no">​</a></h4>
<p>When navigating to a Cloud SIEM page (with <code>sumologic.com</code> in the domain name), if the user had to login/authenticate first, they were not auto-forwarded to the appropriate Cloud SIEM page after doing so (but instead was taken to the Continuous Intelligence Platform home page). This has now been resolved and users will be auto-forwarded correctly.</p>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="july-21-2022---content-release">July 21, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#july-21-2022---content-release" class="hash-link" aria-label="Direct link to July 21, 2022 - Content Release" title="Direct link to July 21, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-12">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-12" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00587 Empire PowerShell Launch Parameters</li>
<li class="">[Updated] MATCH-S00161 Malicious PowerShell Get Commands</li>
<li class="">[Updated] MATCH-S00190 Malicious PowerShell Invoke Commands</li>
<li class="">[Updated] MATCH-S00191 Suspicious PowerShell Keywords</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-16">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-16" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] OSSEC Alert</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-14">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-14" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/OSSEC/OSSEC JSON</li>
<li class="">[Updated] /Parsers/System/Fortinet/Fortigate/Fortigate-Syslog</li>
<li class="">[Updated] /Parsers/System/Kubernetes/Kubernetes</li>
<li class="">[Updated] /Parsers/System/Palo Alto/PAN Firewall CSV</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="july-14-2022---application-update-1">July 14, 2022 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#july-14-2022---application-update-1" class="hash-link" aria-label="Direct link to July 14, 2022 - Application Update" title="Direct link to July 14, 2022 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-8">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#minor-changes-and-enhancements-8" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[Updated] The text size has been adjusted in some areas on the Rules details page to improve readability.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="resolved-issues-10">Resolved Issues<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#resolved-issues-10" class="hash-link" aria-label="Direct link to Resolved Issues" title="Direct link to Resolved Issues" translate="no">​</a></h4>
<ul>
<li class="">In some instances, after uploading Network Blocks via .csv file, they would fail to appear in the UI.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="announcement-update-1">Announcement Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#announcement-update-1" class="hash-link" aria-label="Direct link to Announcement Update" title="Direct link to Announcement Update" translate="no">​</a></h4>
<p>The new Signal Index (recently announced) has been delayed, and will be available starting next week. As a result, the deprecation of the old Signal Forwarding feature will be delayed until September 22, 2022.</p>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="july-14---content-release">July 14 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#july-14---content-release" class="hash-link" aria-label="Direct link to July 14 - Content Release" title="Direct link to July 14 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-17">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-17" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Carbon Black Cloud Alert - Tuned Activity</li>
<li class="">[Updated] Cisco ASA 106001 JSON</li>
<li class="">[Updated] Cisco ASA 106002 JSON</li>
<li class="">[Updated] Cisco ASA 106006 JSON</li>
<li class="">[Updated] Cisco ASA 106007 JSON</li>
<li class="">[Updated] Cisco ASA 106010 JSON</li>
<li class="">[Updated] Cisco ASA 106012 JSON</li>
<li class="">[Updated] Cisco ASA 106014 JSON</li>
<li class="">[Updated] Cisco ASA 106015 JSON</li>
<li class="">[Updated] Cisco ASA 106021 JSON</li>
<li class="">[Updated] Cisco ASA 106027 JSON</li>
<li class="">[Updated] Cisco ASA 106100 JSON</li>
<li class="">[Updated] Cisco ASA 106102-3 JSON</li>
<li class="">[Updated] Cisco ASA 109005-8 JSON</li>
<li class="">[Updated] Cisco ASA 110002 JSON</li>
<li class="">[Updated] Cisco ASA 113004 JSON</li>
<li class="">[Updated] Cisco ASA 113005 JSON</li>
<li class="">[Updated] Cisco ASA 113012-17 JSON</li>
<li class="">[Updated] Cisco ASA 209004 JSON</li>
<li class="">[Updated] Cisco ASA 302020-1 JSON</li>
<li class="">[Updated] Cisco ASA 303002 JSON</li>
<li class="">[Updated] Cisco ASA 304001 JSON</li>
<li class="">[Updated] Cisco ASA 304002 JSON</li>
<li class="">[Updated] Cisco ASA 305011-12 JSON</li>
<li class="">[Updated] Cisco ASA 313001 JSON</li>
<li class="">[Updated] Cisco ASA 313004 JSON</li>
<li class="">[Updated] Cisco ASA 313005 JSON</li>
<li class="">[Updated] Cisco ASA 314003 JSON</li>
<li class="">[Updated] Cisco ASA 322001 JSON</li>
<li class="">[Updated] Cisco ASA 338001-8+338201-4 JSON</li>
<li class="">[Updated] Cisco ASA 4000nn JSON</li>
<li class="">[Updated] Cisco ASA 406001 JSON</li>
<li class="">[Updated] Cisco ASA 406002 JSON</li>
<li class="">[Updated] Cisco ASA 419001 JSON</li>
<li class="">[Updated] Cisco ASA 419002 JSON</li>
<li class="">[Updated] Cisco ASA 500004 JSON</li>
<li class="">[Updated] Cisco ASA 602303-4 JSON</li>
<li class="">[Updated] Cisco ASA 605004-5 JSON</li>
<li class="">[Updated] Cisco ASA 710002-3 JSON</li>
<li class="">[Updated] Cisco ASA 710005 JSON</li>
<li class="">[Updated] Cisco ASA tcp_udp_sctp_teardowns JSON</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-15">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-15" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/VMware/Carbon Black Cloud</li>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ASA</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="july-8-2022---application-update">July 8, 2022 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#july-8-2022---application-update" class="hash-link" aria-label="Direct link to July 8, 2022 - Application Update" title="Direct link to July 8, 2022 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="announcement">Announcement<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#announcement" class="hash-link" aria-label="Direct link to Announcement" title="Direct link to Announcement" translate="no">​</a></h4>
<ul>
<li class="">The built-in <strong>HipChat Action</strong> will be <strong>deprecated on August 25, 2022</strong>.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-9">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#minor-changes-and-enhancements-9" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[Updated] An option has been added to the Enrichments tab which allows the user to hide any empty fields in the results.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="resolved-issues-11">Resolved Issues<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#resolved-issues-11" class="hash-link" aria-label="Direct link to Resolved Issues" title="Direct link to Resolved Issues" translate="no">​</a></h4>
<ul>
<li class="">In some cases, changes to Rule Tuning Expressions were not being written to the Audit Logs properly.</li>
<li class="">Mapper field format_parameters was not populating.</li>
<li class="">Some of the links on the Related Entities tab of the Insight detail pages were malformed.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="july-7-2022---content-release">July 7, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#july-7-2022---content-release" class="hash-link" aria-label="Direct link to July 7, 2022 - Content Release" title="Direct link to July 7, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-13">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-13" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00816 Interactive Logon to Domain Controller</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-18">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-18" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Palo Alto GlobalProtect - Custom Parser</li>
<li class="">Updated] Palo Alto GlobalProtect Auth - Custom Parser</li>
<li class="">[Updated] Windows - System - 7045</li>
<li class="">[Updated] Zscaler - Nanolog Streaming Service - JSON</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-16">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-16" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/F5/F5 Syslog</li>
<li class="">[Updated] /Parsers/System/Google/GCP</li>
<li class="">[Updated] MATCH-S00246 AWS CloudTrail - GetSecretValue from non Amazon IP</li>
<li class="">[Updated] THRESHOLD-S00096 Brute Force Attempt</li>
<li class="">[Updated] MATCH-S00565 Direct Outbound DNS Traffic</li>
<li class="">[Updated] THRESHOLD-S00103 Domain Brute Force Attempt</li>
<li class="">[Updated] THRESHOLD-S00102 Domain Password Attack</li>
<li class="">[Updated] THRESHOLD-S00099 Long URL Containing SQL Commands</li>
<li class="">[Updated] THRESHOLD-S00095 Password Attack</li>
<li class="">[Updated] CHAIN-S00008 Successful Brute Force</li>
<li class="">[Updated] MATCH-S00185 Windows - Remote System Discovery</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="july-5-2022---content-release">July 5, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#july-5-2022---content-release" class="hash-link" aria-label="Direct link to July 5, 2022 - Content Release" title="Direct link to July 5, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-14">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-14" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00246 AWS CloudTrail - GetSecretValue from non Amazon IP</li>
<li class="">[Updated] THRESHOLD-S00096 Brute Force Attempt</li>
<li class="">[Updated] MATCH-S00565 Direct Outbound DNS Traffic</li>
<li class="">[Updated] THRESHOLD-S00103 Domain Brute Force Attempt</li>
<li class="">[Updated] THRESHOLD-S00102 Domain Password Attack</li>
<li class="">[Updated] THRESHOLD-S00099 Long URL Containing SQL Commands</li>
<li class="">[Updated] THRESHOLD-S00095 Password Attack</li>
<li class="">[Updated] CHAIN-S00008 Successful Brute Force</li>
<li class="">[Updated] MATCH-S00185 Windows - Remote System Discovery</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-19">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-19" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] McAfee Endpoint Security Custom Parser</li>
<li class="">[Updated] Microsoft SQL Server Parser - Authentication</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-17">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-17" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Linux/Linux OS Syslog</li>
<li class="">[Updated] /Parsers/System/McAfee/McAfee EPO XML</li>
<li class="">[Updated] /Parsers/System/Microsoft/Microsoft SQL Server</li>
<li class="">[Updated] /Parsers/System/Palo Alto/PAN Firewall CSV</li>
<li class="">[Updated] /Parsers/System/Twistlock/Twistlock</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="june-24-2022---announcement">June 24, 2022 - Announcement<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#june-24-2022---announcement" class="hash-link" aria-label="Direct link to June 24, 2022 - Announcement" title="Direct link to June 24, 2022 - Announcement" translate="no">​</a></h3>
<p>Beginning July 15, 2022, Signals generated by Cloud SIEM will be automatically saved in a new <strong>sec_signals</strong> index. This index/special partition will be similar to the existing <strong>sec_record_</strong> indices in that, unlike data retained using the older Signal Forwarding feature, it will be saved in proper JSON supporting keyword search and nested attributes.</p>
<p>The new index will be automatically generated and retained for a period of 2 years at no additional cost for all Cloud SIEM customers.</p>
<p>As a result, the optional Signal Forwarding feature in Cloud SIEM will be deprecated on September 15, 2022. Existing data will not be deleted but new Signals generated after that date will no longer be forwarded and the option will no longer be available in Cloud SIEM.</p>
<p>Customers leveraging Signal Forwarding data to generate dashboards (or for other use cases) will need to modify those applications to use the new sec_signals index before September 15.</p>
<p>If you have any questions or concerns, please contact Sumo Logic customer support.</p>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="june-24-2022----application-update">June 24, 2022 -  Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#june-24-2022----application-update" class="hash-link" aria-label="Direct link to June 24, 2022 -  Application Update" title="Direct link to June 24, 2022 -  Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-10">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#minor-changes-and-enhancements-10" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] On the Insight details pages, if the user has selected the <strong>Show Related Signals</strong> option, the related Signals will appear on the Signals Timeline graph.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="resolved-issues-12">Resolved Issues<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#resolved-issues-12" class="hash-link" aria-label="Direct link to Resolved Issues" title="Direct link to Resolved Issues" translate="no">​</a></h4>
<ul>
<li class="">The <code>/sec/v1/insights/{}/tags</code> API endpoint was returning a 500/INTERNAL_SERVER_ERROR.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="june-21-2022---content-release">June 21, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#june-21-2022---content-release" class="hash-link" aria-label="Direct link to June 21, 2022 - Content Release" title="Direct link to June 21, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-20">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-20" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] McAfee Avecto Defendpoint</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-18">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-18" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ASA</li>
<li class="">[Updated] /Parsers/System/McAfee/McAfee EPO XML</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="june-15-2022---content-release">June 15, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#june-15-2022---content-release" class="hash-link" aria-label="Direct link to June 15, 2022 - Content Release" title="Direct link to June 15, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-15">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-15" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00400 Web Download via Office Binaries</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-21">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-21" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] GCP Parser - Load Balancer</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-19">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-19" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Google/GCP</li>
<li class="">[Updated] /Parsers/System/Orca Security/Orca Security</li>
<li class="">[Updated] /Parsers/System/Palo Alto/PAN Firewall CSV</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="june-13-2022-application-update">June 13, 2022 Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#june-13-2022-application-update" class="hash-link" aria-label="Direct link to June 13, 2022 Application Update" title="Direct link to June 13, 2022 Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-11">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#minor-changes-and-enhancements-11" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[Updated] List filters have been updated to better support custom Entity types; users no longer have to specify the Entity type in order to filter by Entity value (i.e. name). (Old bookmark will continue to work.)</li>
<li class="">[Updated] On the Insight Details pages, the sort order for Signals has been reverted to oldest first. As always, the user can change the sort order and in an upcoming release, the UI will be updated to retain the user's selected sort order across sessions.</li>
<li class="">[Deleted] The standalone <strong>Suppressed Entities</strong> list page has been removed from the UI as it was confusing to users. To retrieve a list of suppressed Entities, users should filter the Entities list page.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="resolved-issues-13">Resolved Issues<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#resolved-issues-13" class="hash-link" aria-label="Direct link to Resolved Issues" title="Direct link to Resolved Issues" translate="no">​</a></h4>
<ul>
<li class="">CSV upload for Network Blocks was not working unless the (optional) "label" field was provided.</li>
<li class="">Then filtering lists by date, the "include current" checkbox was not working consistently.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="june-9-2022---content-release">June 9, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#june-9-2022---content-release" class="hash-link" aria-label="Direct link to June 9, 2022 - Content Release" title="Direct link to June 9, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-16">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-16" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00815 Threat Intel - Successful Authentication from Threat IP</li>
<li class="">[Updated] MATCH-S00687 Linux Security Tool Usage</li>
<li class="">[Updated] MATCH-S00555 Threat Intel - Inbound Traffic Context</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-22">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-22" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Cyber Ark Vault JSON</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-20">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-20" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Cyber-Ark/Cyber-Ark Vault - CEF</li>
<li class="">[Updated] /Parsers/System/AWS/AWS ELB</li>
<li class="">[Updated] /Parsers/System/AWS/AWS WAF</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="june-7-2022---content-release">June 7, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#june-7-2022---content-release" class="hash-link" aria-label="Direct link to June 7, 2022 - Content Release" title="Direct link to June 7, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-17">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-17" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00814 Abnormal Child Process - sdiagnhost.exe - CVE-2022-30190</li>
<li class="">[Updated] MATCH-S00147 WMI Managed Object Format (MOF) Process Execution</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-23">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-23" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Bitdefender - avc</li>
<li class="">[New] Bitdefender - fw</li>
<li class="">[New] Bitdefender - hd</li>
<li class="">[New] Bitdefender - network-monitor</li>
<li class="">[New] Bitdefender - new-incident</li>
<li class="">[New] Linux OS Syslog - Cron - Generic</li>
<li class="">[New] Linux OS Syslog - sshd - session timeout</li>
<li class="">[Updated] Bitdefender Catch All</li>
<li class="">[Updated] SonicWall Firewall - Custom Parser</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-21">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-21" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Dell/Dell SonicWall</li>
<li class="">[Updated] /Parsers/System/Linux/Linux OS Syslog</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="june-3-2022---content-release">June 3, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#june-3-2022---content-release" class="hash-link" aria-label="Direct link to June 3, 2022 - Content Release" title="Direct link to June 3, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-18">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-18" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00814 Abnormal Child Process - sdiagnhost.exe - CVE-2022-30190</li>
<li class="">[New] MATCH-S00813 Microsoft Support Diagnostic Tool Invoking PowerShell - CVE-2022-30190</li>
<li class="">[New] MATCH-S00812 Microsoft Support Diagnostic Tool with BrowseForFile - CVE-2022-30190</li>
<li class="">[Updated] THRESHOLD-S00080 Internal Port Scan</li>
<li class="">[Updated] MATCH-S00811 MS Office Product Spawning Msdt.exe - CVE-2022-30190</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-24">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-24" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Google G Suite - logout</li>
<li class="">[New] McAfee Mvision ENS incidents - Parser</li>
<li class="">[New] McAfee Mvision ENS threats - Parser</li>
<li class="">[New] Okta Authentication - auth_via_AD_agent</li>
<li class="">[New] Okta Authentication - auth_via_mfa</li>
<li class="">[New] Okta Authentication - auth_via_radius</li>
<li class="">[New] Okta Authentication - sso</li>
<li class="">[Updated] Google G Suite - login.login</li>
<li class="">[Updated] Okta Authentication Events</li>
<li class="">[Updated] Salesforce LoginAs Mapping</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-22">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-22" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/McAfee/McAfee Mvision ENS</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="schema-5">Schema<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#schema-5" class="hash-link" aria-label="Direct link to Schema" title="Direct link to Schema" translate="no">​</a></h4>
<ul>
<li class="">[Updated] device_ip_asnNumber</li>
<li class="">[Updated] device_ip_asnOrg</li>
<li class="">[Updated] device_ip_city</li>
<li class="">[Updated] device_ip_countryCode</li>
<li class="">[Updated] device_ip_countryName</li>
<li class="">[Updated] device_ip_isp</li>
<li class="">[Updated] device_ip_latitude</li>
<li class="">[Updated] device_ip_longitude</li>
<li class="">[Updated] device_ip_region</li>
<li class="">[Updated] device_natIp_asnNumber</li>
<li class="">[Updated] device_natIp_asnOrg</li>
<li class="">[Updated] device_natIp_city</li>
<li class="">[Updated] device_natIp_countryCode</li>
<li class="">[Updated] device_natIp_countryName</li>
<li class="">[Updated] device_natIp_isp</li>
<li class="">[Updated] device_natIp_latitude</li>
<li class="">[Updated] device_natIp_longitude</li>
<li class="">[Updated] device_natIp_region</li>
<li class="">[Updated] dns_replyIp_asnNumber</li>
<li class="">[Updated] dns_replyIp_asnOrg</li>
<li class="">[Updated] dns_replyIp_city</li>
<li class="">[Updated] dns_replyIp_countryCode</li>
<li class="">[Updated] dns_replyIp_countryName</li>
<li class="">[Updated] dns_replyIp_isp</li>
<li class="">[Updated] dns_replyIp_latitude</li>
<li class="">[Updated] dns_replyIp_longitude</li>
<li class="">[Updated] dns_replyIp_region</li>
<li class="">[Updated] dstDevice_ip_asnNumber</li>
<li class="">[Updated] dstDevice_ip_asnOrg</li>
<li class="">[Updated] dstDevice_ip_city</li>
<li class="">[Updated] dstDevice_ip_countryCode</li>
<li class="">[Updated] dstDevice_ip_countryName</li>
<li class="">[Updated] dstDevice_ip_isp</li>
<li class="">[Updated] dstDevice_ip_latitude</li>
<li class="">[Updated] dstDevice_ip_longitude</li>
<li class="">[Updated] dstDevice_ip_region</li>
<li class="">[Updated] srcDevice_ip_asnNumber</li>
<li class="">[Updated] srcDevice_ip_asnOrg</li>
<li class="">[Updated] srcDevice_ip_city</li>
<li class="">[Updated] srcDevice_ip_countryCode</li>
<li class="">[Updated] srcDevice_ip_countryName</li>
<li class="">[Updated] srcDevice_ip_isp</li>
<li class="">[Updated] srcDevice_ip_latitude</li>
<li class="">[Updated] srcDevice_ip_longitude</li>
<li class="">[Updated] srcDevice_ip_region</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="june-1-2022---announcement">June 1, 2022 - Announcement<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#june-1-2022---announcement" class="hash-link" aria-label="Direct link to June 1, 2022 - Announcement" title="Direct link to June 1, 2022 - Announcement" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="geographical-data-for-ip-addresses">Geographical Data for IP Addresses<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#geographical-data-for-ip-addresses" class="hash-link" aria-label="Direct link to Geographical Data for IP Addresses" title="Direct link to Geographical Data for IP Addresses" translate="no">​</a></h4>
<ul>
<li class="">As previously announced, Cloud SIEM has switched to a new provider for geographical data for IP addresses. One consequence of this change is that the various <code>_isp</code> enrichment fields (listed below) are no longer being populated. However, that data is available in the equivalent <code>_asnOrg</code> fields (such as <code>device_ip_asnOrg</code>). If you have any rules that leverage the <code>_isp</code> fields, please switch to the <code>_asnOrg</code> fields as soon as possible.</li>
<li class="">Because these fields will no longer be populated, they will be removed on <strong>June 7, 2022</strong>:<!-- -->
<ul>
<li class=""><code>device_ip_isp</code></li>
<li class=""><code>device_natIp_isp</code></li>
<li class=""><code>device_replyIp_isp</code></li>
<li class=""><code>dstDevice_ip_isp</code></li>
<li class=""><code>dstDevice_natIp_isp</code></li>
<li class=""><code>srcDevice_ip_isp</code></li>
<li class=""><code>srcDevice_natIp_isp</code></li>
</ul>
</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-31-2022---content-release">May 31, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#may-31-2022---content-release" class="hash-link" aria-label="Direct link to May 31, 2022 - Content Release" title="Direct link to May 31, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-19">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-19" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00811 MS Office Product Spawning Msdt.exe - CVE-2022-30190</li>
<li class="">[Updated] MATCH-S00612 GCP Audit Secrets Manager Activity</li>
<li class="">[Updated] MATCH-S00766 Okta MFA Deactivated for User</li>
<li class="">[Updated] THRESHOLD-S00101 Sharepoint - Excessive Documents Accessed</li>
<li class="">[Updated] THRESHOLD-S00100 Sharepoint - Excessive Documents Downloaded</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-25">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-25" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Aruba ClearPass User Authentication Failed</li>
<li class="">[New] Aruba ClearPass User Authentication Successful</li>
<li class="">[New] Cisco Secure Email Parser - Catch All</li>
<li class="">[New] Exabeam Parser - Catch All</li>
<li class="">[New] Jamf Parser - Catch All</li>
<li class="">[New] Juniper SRX Series Firewall - Parser</li>
<li class="">[New] McAfee Network Security Parser - Catch All</li>
<li class="">[New] Microsoft Graph Security API C2C - Dynamic Vendor/Product - Microsoft 365 Defender</li>
<li class="">[New] Microsoft Graph Security API C2C - Dynamic Vendor/Product - Microsoft IPC</li>
<li class="">[New] Microsoft Graph Security API C2C - Dynamic Vendor/Product - Microsoft Office 365 Security and Compliance</li>
<li class="">[New] Orca Security Parser - Catch All</li>
<li class="">[New] Squid Proxy - Parser</li>
<li class="">[New] Thinkst Canary Parser - Catch All</li>
<li class="">[New] Zscaler Workload Segmentation Catch All - Parser</li>
<li class="">[Updated] CloudTrail - application-insights.amazonaws.com - ListApplications</li>
<li class="">[Updated] CloudTrail - cloudtrail.amazonaws.com - CreateTrail</li>
<li class="">[Updated] CloudTrail - cloudtrail.amazonaws.com - DeleteTrail</li>
<li class="">[Updated] CloudTrail - cloudtrail.amazonaws.com - StartLogging</li>
<li class="">[Updated] CloudTrail - cloudtrail.amazonaws.com - StopLogging</li>
<li class="">[Updated] CloudTrail - cloudtrail.amazonaws.com - UpdateTrail</li>
<li class="">[Updated] CloudTrail - cognito-idp.amazonaws.com - CreateUserPoolClient</li>
<li class="">[Updated] CloudTrail - controltower.amazonaws.com - CreateManagedAccount</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - AttachInternetGateway</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - AuthorizeSecurityGroupIngress</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - BidEvictedEvent</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - CreateCustomerGateway</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - CreateInternetGateway</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - CreateKeyPair</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - CreateNetworkAcl</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - CreateNetworkAclEntry</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - DeleteCustomerGateway</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - DeleteInternetGateway</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - DeleteKeyPair</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - DeleteNetworkAcl</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - DeleteNetworkAclEntry</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - DetachInternetGateway</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - ImportKeyPair</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - ReplaceNetworkAclAssociation</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - ReplaceNetworkAclEntry</li>
<li class="">[Updated] CloudTrail - ecr.amazonaws.com - PolicyExecutionEvent</li>
<li class="">[Updated] CloudTrail - elasticfilesystem.amazonaws.com - NewClientConnection</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - AttachGroupPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - AttachRolePolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - AttachUserPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - CreateAccessKey</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - CreatePolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - CreatePolicyVersion</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - CreateUser</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeleteGroupPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeletePolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeleteRolePermissionsBoundary</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeleteRolePolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeleteUser</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeleteUserPermissionsBoundary</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeleteUserPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DetachGroupPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DetachRolePolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DetachUserPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - PutGroupPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - PutRolePolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - PutUserPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - UpdateAssumeRolePolicy</li>
<li class="">[Updated] CloudTrail - kms.amazonaws.com - DisableKey</li>
<li class="">[Updated] CloudTrail - kms.amazonaws.com - RotateKey</li>
<li class="">[Updated] CloudTrail - kms.amazonaws.com - ScheduleKeyDeletion</li>
<li class="">[Updated] CloudTrail - logs.amazonaws.com - DeleteDestination</li>
<li class="">[Updated] CloudTrail - logs.amazonaws.com - DeleteLogGroup</li>
<li class="">[Updated] CloudTrail - logs.amazonaws.com - DeleteLogStream</li>
<li class="">[Updated] CloudTrail - organizations.amazonaws.com - CreateAccountResult</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - CreateBucket</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - DeleteBucketCors</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - DeleteBucketLifecycle</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - DeleteBucketPolicy</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketAcl</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketCors</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketLifecycle</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketPolicy</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketReplication</li>
<li class="">[Updated] CloudTrail - secretsmanager.amazonaws.com - RotationStarted</li>
<li class="">[Updated] CloudTrail - secretsmanager.amazonaws.com - RotationSucceeded</li>
<li class="">[Updated] CloudTrail - secretsmanager.amazonaws.com - SecretVersionDeletion</li>
<li class="">[Updated] CloudTrail - signin.amazonaws.com - CheckMfa</li>
<li class="">[Updated] CloudTrail - signin.amazonaws.com - ConsoleLogin</li>
<li class="">[Updated] CloudTrail - signin.amazonaws.com - ExitRole</li>
<li class="">[Updated] CloudTrail - signin.amazonaws.com - RenewRole</li>
<li class="">[Updated] CloudTrail - signin.amazonaws.com - SwitchRole</li>
<li class="">[Updated] CloudTrail - sso.amazonaws.com - Federate</li>
<li class="">[Updated] CloudTrail - sso.amazonaws.com - ListProfilesForApplication</li>
<li class="">[Updated] CloudTrail Default Mapping</li>
<li class="">[Updated] Cloudflare - Logpush</li>
<li class="">[Updated] Egnyte DLP Parser - Catch All</li>
<li class="">[Updated] Linux OS Syslog - Process kernel - Promiscuous Mode Change</li>
<li class="">[Updated] Okta Authentication Events</li>
<li class="">[Updated] Okta Catch All</li>
<li class="">[Updated] Okta Security Threat Events</li>
<li class="">[Updated] Windows - Security - 4688</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-23">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-23" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Cisco/Cisco Secure Email</li>
<li class="">[New] /Parsers/System/Exabeam/Exabeam Security Management Platform (SMP) Syslog</li>
<li class="">[New] /Parsers/System/Jamf/Jamf</li>
<li class="">[New] /Parsers/System/Juniper/Juniper SRX Series Firewall Syslog</li>
<li class="">[New] /Parsers/System/McAfee/McAfee Network Security</li>
<li class="">[New] /Parsers/System/Orca Security/Orca Security</li>
<li class="">[New] /Parsers/System/Squid/Squid Proxy Syslog</li>
<li class="">[New] /Parsers/System/Thinkst Canary/Thinkst Canary</li>
<li class="">[New] /Parsers/System/Zscaler/Zscaler Workload Segmentation/Zscaler Workload Segmentation JSON</li>
<li class="">[Updated] /Parsers/System/HP/Aruba ClearPass - Syslog</li>
<li class="">[Updated] /Parsers/System/CrowdStrike/CrowdStrike Falcon Endpoint - JSON</li>
<li class="">[Updated] /Parsers/System/Egnyte/Egnyte DLP</li>
<li class="">[Updated] /Parsers/System/F5/F5 Syslog</li>
<li class="">[Updated] /Parsers/System/Linux/Linux OS Syslog</li>
<li class="">[Updated] /Parsers/System/Palo Alto/PAN Firewall CSV</li>
<li class="">[Updated] /Parsers/System/Shared/Syslog Headers</li>
<li class="">[Updated] /Parsers/System/Twistlock/Twistlock</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-27-2022---application-update">May 27, 2022 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#may-27-2022---application-update" class="hash-link" aria-label="Direct link to May 27, 2022 - Application Update" title="Direct link to May 27, 2022 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="upcoming-changes">Upcoming Changes<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#upcoming-changes" class="hash-link" aria-label="Direct link to Upcoming Changes" title="Direct link to Upcoming Changes" translate="no">​</a></h4>
<ul>
<li class="">[Updated] Starting later next week, the <code>severity</code> attribute in audit log records for Insights (such as <code>InsightCreated</code>) will be changing. Instead of a number (represented as a string) from 1 to 4, the value will be a human-readable string matching the values in the UI (LOW, MEDIUM, HIGH, CRITICAL). Please update any dashboards or other consumers of this data.</li>
<li class="">[Deleted] Later next week, the <strong>Content</strong> &gt; <strong>Suppressed Entities</strong> page will be removed from the UI to simplify the application. Instead, users can use a filter on the <strong>Content</strong> &gt; <strong>Entities</strong> page to retrieve the list of suppressed Entities.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-12">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#minor-changes-and-enhancements-12" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[Updated] On the Insight Details pages, Signals are now sorted in order of the most recent Signal first by default. (As always, the user can change the sort order.)</li>
<li class="">[New] When creating a copy of a Rule, users are now given then option to apply the Rule Tuning Expression(s) that are applied on the original rule to the copy as well.</li>
<li class="">[New] In the Cloud SIEM UI, timestamps now explicitly include the time zone.</li>
<li class="">[New] Users can now specify a maximum look-back window (in days) for TAXII feeds.</li>
<li class="">[New] The current status (enabled/disabled) for each feed is now displayed on the Threat Intelligence list page.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="resolved-issues-14">Resolved Issues<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#resolved-issues-14" class="hash-link" aria-label="Direct link to Resolved Issues" title="Direct link to Resolved Issues" translate="no">​</a></h4>
<ul>
<li class="">If a user had defined a high number of favorite fields, the system would show the first 50.</li>
<li class="">When specifying tags, the auto-complete feature was not working properly in some instances.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-26-2022---content-release">May 26, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#may-26-2022---content-release" class="hash-link" aria-label="Direct link to May 26, 2022 - Content Release" title="Direct link to May 26, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-20">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-20" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00612 GCP Audit Secrets Manager Activity</li>
<li class="">[Updated] THRESHOLD-S00101 Sharepoint - Excessive Documents Accessed</li>
<li class="">[Updated] THRESHOLD-S00100 Sharepoint - Excessive Documents Downloaded</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-26">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-26" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Cisco Secure Email Parser - Catch All</li>
<li class="">[New] Exabeam Parser - Catch All</li>
<li class="">[New] Jamf Parser - Catch All</li>
<li class="">[New] Juniper SRX Series Firewall - Parser</li>
<li class="">[New] Microsoft Graph Security API C2C - Dynamic Vendor/Product - Microsoft 365 Defender</li>
<li class="">[New] Microsoft Graph Security API C2C - Dynamic Vendor/Product - Microsoft IPC</li>
<li class="">[New] Microsoft Graph Security API C2C - Dynamic Vendor/Product - Microsoft Office 365 Security and Compliance</li>
<li class="">[New] Squid Proxy - Parser</li>
<li class="">[New] Thinkst Canary Parser - Catch All</li>
<li class="">[New] Zscaler Workload Segmentation Catch All - Parser</li>
<li class="">[Updated] Egnyte DLP Parser - Catch All</li>
<li class="">[Updated] Linux OS Syslog - Process kernel - Promiscuous Mode Change</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-24">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-24" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Cisco/Cisco Secure Email</li>
<li class="">[New] /Parsers/System/Exabeam/Exabeam Security Management Platform (SMP) Syslog</li>
<li class="">[New] /Parsers/System/Jamf/Jamf</li>
<li class="">[New] /Parsers/System/Juniper/Juniper SRX Series Firewall Syslog</li>
<li class="">[New] /Parsers/System/Squid/Squid Proxy Syslog</li>
<li class="">[New] /Parsers/System/Thinkst Canary/Thinkst Canary</li>
<li class="">[New] /Parsers/System/Zscaler/Zscaler Workload Segmentation/Zscaler Workload Segmentation JSON</li>
<li class="">[Updated] /Parsers/System/CrowdStrike/CrowdStrike Falcon Endpoint - JSON</li>
<li class="">[Updated] /Parsers/System/Egnyte/Egnyte DLP</li>
<li class="">[Updated] /Parsers/System/Palo Alto/PAN Firewall CSV</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-17-2022---application-update">May 17, 2022 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#may-17-2022---application-update" class="hash-link" aria-label="Direct link to May 17, 2022 - Application Update" title="Direct link to May 17, 2022 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-13">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#minor-changes-and-enhancements-13" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[Updated] The <code>_sourceName</code> and <code>_sourceHost</code> values in records ingested by Cloud SIEM will now reflect the original values defined when ingested into the Sumo Logic platform.</li>
<li class="">[Updated] The "Board" list view for Insights has been updated to include the resolution:</li>
</ul>
<br>
<img src="https://www.sumologic.com/help/img/cse/Resolved-Board-view.png" alt="board-view">
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="resolved-issues-15">Resolved Issues<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#resolved-issues-15" class="hash-link" aria-label="Direct link to Resolved Issues" title="Direct link to Resolved Issues" translate="no">​</a></h4>
<ul>
<li class="">In the new Entities tab in Insights, duplicate Entities were sometimes listed if the raw and normalized names didn't match. Also, the cards will now respond better to very low screen/browser widths.</li>
<li class="">When viewing some verbose content (like Record properties), mousing over the content would cause it to reflow.</li>
<li class="">When creating match list items via Terraform, the process was occasionally timing out.</li>
<li class="">Email-based actions were not functioning properly on instances with domains ending in <code>jask.ai</code>.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-12-2022---content-release">May 12, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#may-12-2022---content-release" class="hash-link" aria-label="Direct link to May 12, 2022 - Content Release" title="Direct link to May 12, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-21">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-21" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] LEGACY-S00078 SQL Injection Victim</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-27">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-27" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Check Point Application Control</li>
<li class="">[New] Check Point SmartDefense</li>
<li class="">[New] Check Point URL Filtering</li>
<li class="">[Updated] Check Point Block</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-25">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-25" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Check Point/Check Point Firewall JSON</li>
<li class="">[Updated] /Parsers/System/Check Point/Check Point Firewall Syslog</li>
<li class="">[Updated] /Parsers/System/Microsoft/Office 365</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="may-10-2022---content-release">May 10, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#may-10-2022---content-release" class="hash-link" aria-label="Direct link to May 10, 2022 - Content Release" title="Direct link to May 10, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-22">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-22" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Deleted] MATCH-S00258 Authentication Brute Force Attempt</li>
<li class="">[Updated] MATCH-S00176 RDP Login from Localhost</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-28">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-28" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Deleted] Windows - Microsoft-Windows-PowerShell/Operational - 4103 - CIP</li>
<li class="">[Deleted] Windows - Microsoft-Windows-PowerShell/Operational - 4104 - CIP</li>
<li class="">[Deleted] Windows - Microsoft-Windows-Sysmon/Operational - 1 - CIP</li>
<li class="">[Deleted] Windows - Microsoft-Windows-Sysmon/Operational - 10 - CIP</li>
<li class="">[Deleted] Windows - Microsoft-Windows-Sysmon/Operational - 11 - CIP</li>
<li class="">[Deleted] Windows - Microsoft-Windows-Sysmon/Operational - 12, 13, and 14 - CIP</li>
<li class="">[Deleted] Windows - Microsoft-Windows-Sysmon/Operational - 15 - CIP</li>
<li class="">[Deleted] Windows - Microsoft-Windows-Sysmon/Operational - 2 - CIP</li>
<li class="">[Deleted] Windows - Microsoft-Windows-Sysmon/Operational - 3 - CIP</li>
<li class="">[Deleted] Windows - Microsoft-Windows-Sysmon/Operational - 4 - CIP</li>
<li class="">[Deleted] Windows - Microsoft-Windows-Sysmon/Operational - 5 - CIP</li>
<li class="">[Deleted] Windows - Microsoft-Windows-Sysmon/Operational - 6 - CIP</li>
<li class="">[Deleted] Windows - Microsoft-Windows-Sysmon/Operational - 8 - CIP</li>
<li class="">[Deleted] Windows - Security - 1100 - CIP</li>
<li class="">[Deleted] Windows - Security - 1102 - CIP</li>
<li class="">[Deleted] Windows - Security - 4624 - CIP</li>
<li class="">[Deleted] Windows - Security - 4625 - CIP</li>
<li class="">[Deleted] Windows - Security - 4634 - CIP</li>
<li class="">[Deleted] Windows - Security - 4648 - CIP</li>
<li class="">[Deleted] Windows - Security - 4649 - CIP</li>
<li class="">[Deleted] Windows - Security - 4656 - CIP</li>
<li class="">[Deleted] Windows - Security - 4658 - CIP</li>
<li class="">[Deleted] Windows - Security - 4661 - CIP</li>
<li class="">[Deleted] Windows - Security - 4662 - CIP</li>
<li class="">[Deleted] Windows - Security - 4663 - CIP</li>
<li class="">[Deleted] Windows - Security - 4672 - CIP</li>
<li class="">[Deleted] Windows - Security - 4674 - CIP</li>
<li class="">[Deleted] Windows - Security - 4688 - CIP</li>
<li class="">[Deleted] Windows - Security - 4689 - CIP</li>
<li class="">[Deleted] Windows - Security - 4697 - CIP</li>
<li class="">[Deleted] Windows - Security - 4698 - CIP</li>
<li class="">[Deleted] Windows - Security - 4702 - CIP</li>
<li class="">[Deleted] Windows - Security - 4704 - CIP</li>
<li class="">[Deleted] Windows - Security - 4720 - CIP</li>
<li class="">[Deleted] Windows - Security - 4726 - CIP</li>
<li class="">[Deleted] Windows - Security - 4728 - CIP</li>
<li class="">[Deleted] Windows - Security - 4732 - CIP</li>
<li class="">[Deleted] Windows - Security - 4740 - CIP</li>
<li class="">[Deleted] Windows - Security - 4742 - CIP</li>
<li class="">[Deleted] Windows - Security - 4754 - CIP</li>
<li class="">[Deleted] Windows - Security - 4755 - CIP</li>
<li class="">[Deleted] Windows - Security - 4756 - CIP</li>
<li class="">[Deleted] Windows - Security - 4768 - CIP</li>
<li class="">[Deleted] Windows - Security - 4769 - CIP</li>
<li class="">[Deleted] Windows - Security - 4770 - CIP</li>
<li class="">[Deleted] Windows - Security - 4771 - CIP</li>
<li class="">[Deleted] Windows - Security - 4776 - CIP</li>
<li class="">[Deleted] Windows - Security - 4778 - CIP</li>
<li class="">[Deleted] Windows - Security - 4779 - CIP</li>
<li class="">[Deleted] Windows - Security - 4780 - CIP</li>
<li class="">[Deleted] Windows - Security - 4793 - CIP</li>
<li class="">[Deleted] Windows - Security - 4798 - CIP</li>
<li class="">[Deleted] Windows - Security - 4799 - CIP</li>
<li class="">[Deleted] Windows - Security - 5038 - CIP</li>
<li class="">[Deleted] Windows - Security - 5058 - CIP</li>
<li class="">[Deleted] Windows - Security - 5059 - CIP</li>
<li class="">[Deleted] Windows - Security - 5061 - CIP</li>
<li class="">[Deleted] Windows - Security - 5140 - CIP</li>
<li class="">[Deleted] Windows - Security - 5379 - CIP</li>
<li class="">[Deleted] Windows - Security - 5805 - CIP</li>
<li class="">[Deleted] Windows - Security - 6272 - CIP</li>
<li class="">[Deleted] Windows - Security - 6273 - CIP</li>
<li class="">[Deleted] Windows - Security - 6275 - CIP</li>
<li class="">[Deleted] Windows - Security - 6278 - CIP</li>
<li class="">[Deleted] Windows - Security - 6416 - CIP</li>
<li class="">[Deleted] Windows - Security - 6423 - CIP</li>
<li class="">[Deleted] Windows - Security - 6424 - CIP</li>
<li class="">[Deleted] Windows - System - 5138 - CIP</li>
<li class="">[Deleted] Windows - System - 6005 - CIP</li>
<li class="">[Deleted] Windows - System - 6006 - CIP</li>
<li class="">[Deleted] Windows - System - 7045 - CIP</li>
<li class="">[New] BlueCat DNS Parser - Catch All</li>
<li class="">[Updated] AWS WAF Allow Logs</li>
<li class="">[Updated] AWS WAF Block Logs</li>
<li class="">[Updated] Firepower Catch All</li>
<li class="">[Updated] Linux OS Syslog - Process sshd - SSH Auth Failure</li>
<li class="">[Updated] Linux OS Syslog - Process sshd - SSH Auth Failure Invalid Password</li>
<li class="">[Updated] Linux OS Syslog - Process sshd - SSH Auth Failure Invalid User</li>
<li class="">[Updated] Linux OS Syslog - Process sshd - SSH Auth Failure No ID String</li>
<li class="">[Updated] Linux OS Syslog - Process sshd - SSH Auth Failure Preauth</li>
<li class="">[Updated] Linux OS Syslog - Process sshd - SSH Auth Success</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-26">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-26" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Deleted] /Parsers/System/BlueCat/BlueCat DHCP Syslog</li>
<li class="">[New] /Parsers/System/BlueCat/BlueCat DHCP-DNS Syslog</li>
<li class="">[New] /Parsers/System/Cisco/Cisco Firepower JSON</li>
<li class="">[Updated] /Parsers/System/AWS/AWS WAF</li>
<li class="">[Updated] /Parsers/System/Zscaler/Zscaler Nanolog Streaming Service/Zscaler Nanolog Streaming Service-JSON</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-29-2022---application-update">April 29, 2022 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#april-29-2022---application-update" class="hash-link" aria-label="Direct link to April 29, 2022 - Application Update" title="Direct link to April 29, 2022 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="related-entities">Related Entities<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#related-entities" class="hash-link" aria-label="Direct link to Related Entities" title="Direct link to Related Entities" translate="no">​</a></h4>
<p>[New] The Cloud SIEM team is excited to announce a newly enhanced feature: Related Entities. Although Insights and the Signals they contain are focused on a single Entity (a user, or host for example), there are often a number of additional Entities referenced in the Records/Signals contained in the Insight. In addition, Cloud SIEM can detect relationships between Entities (for example, determining that an IP address was associated with a given hostname during the Insight detection window).</p>
<p>To provide an easy way for analysts to explore all of these Related Entities, a new tab has been added to the Insight Details page:</p>
<p>The <strong>Entities</strong> tab contains a list of all of the Entities detected in the Insight’s Signals and Records. The Primary Entity is listed first, and then the other Related Entities are listed in descending order of appearance. Where Cloud SIEM has determined a relationship between entities, that is called out (for example, 192.168.1.101 may also be hostname ‘na’).</p>
<p>Details listed with each entity include tags, the number of Signals the Entity was seen in, the number of recent Insights and Signals that featured that Entity, and the total sum of the Severities for those Signals.</p>
<p>As each Entity is selected by the user, the right column changes to show more details, such as a link to the full Entity Details page, inventory and other metadata, a Signal timeline, and a list of the recent Signals and Insights (containing links to those individual details pages).</p>
<p>This new feature should help users understand the context of security events more quickly by providing this data at a glance, reducing the amount of time it would have previously taken to gather that same information.</p>
<p>More information can be found in the <a class="" href="https://www.sumologic.com/help/docs/cse/get-started-with-cloud-siem/about-cse-insight-ui/#entities-tab">online documentation</a>.</p>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-14">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#minor-changes-and-enhancements-14" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<p>[Update] For Signals generated by Threshold, Aggregation and Chain Rules, there is a feature called <a class="" href="https://www.sumologic.com/help/docs/cse/records-signals-entities-insights/view-records-signal/">Queried Records</a> that enables users to find additional records that also apply to the Signal beyond those that were needed to meet the conditions for the Rule.The page that lists these Queried Records now explicitly shows the search query and time window that is being checked. If a user clicks on the query, it will open a Log Search window with the query and time window pre-filled for deeper investigation.</p>
<img src="https://www.sumologic.com/help/img/release-notes/cse/Related_Entities.png" alt="related-entities">
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-29-2022---content-release">April 29, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#april-29-2022---content-release" class="hash-link" aria-label="Direct link to April 29, 2022 - Content Release" title="Direct link to April 29, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-23">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-23" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] THRESHOLD-S00051 AWS CloudTrail - IAM User Generating AccessDenied Errors Across Multiple Actions</li>
<li class="">[Updated] THRESHOLD-S00093 AWS Route 53 Reconnaissance</li>
<li class="">[Updated] THRESHOLD-S00092 AWS WAF Reconnaissance</li>
<li class="">[Updated] THRESHOLD-S00044 DNS DGA Lookup Behavior - NXDOMAIN Responses</li>
<li class="">[Updated] THRESHOLD-S00088 GCP Audit Reconnaissance Activity</li>
<li class="">[Updated] LEGACY-S00047 High risk file extension download without hostname and referrer</li>
<li class="">[Updated] CHAIN-S00004 Lateral Movement Using the Windows Hidden Admin Share</li>
<li class="">[Updated] MATCH-S00687 Linux Security Tool Usage</li>
<li class="">[Updated] THRESHOLD-S00048 Outbound Traffic to Countries Outside the United States</li>
<li class="">[Updated] THRESHOLD-S00040 Possible DNS over TLS (DoT) Activity</li>
<li class="">[Updated] THRESHOLD-S00031 RDP Brute Force Attempt</li>
<li class="">[Updated] THRESHOLD-S00034 SSH Authentication Failures</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-29">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-29" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] BlueCat DHCP Parser - Catch All</li>
<li class="">[New] Microsoft Exchange Catch All</li>
<li class="">[New] Microsoft Exchange HTTP Error</li>
<li class="">[New] Microsoft Exchange IIS</li>
<li class="">[New] Varonis DatAlert - Parser</li>
<li class="">[Updated] Varonis DatAdvantage - CEF</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-27">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-27" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/BlueCat/BlueCat DHCP Syslog</li>
<li class="">[New] /Parsers/System/Microsoft/Exchange</li>
<li class="">[New] /Parsers/System/Varonis/Varonis DatAlert Syslog</li>
<li class="">[Updated] /Parsers/System/F5/F5 Syslog</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-26-2022---content-release">April 26, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#april-26-2022---content-release" class="hash-link" aria-label="Direct link to April 26, 2022 - Content Release" title="Direct link to April 26, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-24">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-24" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00808 Azure - Container Instance Creation/Modification</li>
<li class="">[New] MATCH-S00809 Azure - Container Start</li>
<li class="">[New] MATCH-S00807 Azure - Image Created/Modified</li>
<li class="">[New] MATCH-S00810 Azure - Image Deleted</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-30">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-30" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Darktrace Parser Events</li>
<li class="">[Updated] Zscaler - Nanolog Streaming Service - JSON</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-28">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-28" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Darktrace/Darktrace Syslog</li>
<li class="">[New] /Parsers/System/Zscaler/Zscaler Nanolog Streaming Service/Zscaler Nanolog Streaming Service-JSON</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-20-2022---content-release">April 20, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#april-20-2022---content-release" class="hash-link" aria-label="Direct link to April 20, 2022 - Content Release" title="Direct link to April 20, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-25">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-25" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00798 Azure - Anonymous Blob Access</li>
<li class="">[New] MATCH-S00805 Azure - Bastion Host Created/Modified</li>
<li class="">[New] MATCH-S00806 Azure - Bastion Host Deleted</li>
<li class="">[New] MATCH-S00795 Azure - Diagnostic Setting Deleted</li>
<li class="">[New] MATCH-S00796 Azure - Diagnostic Setting Modified</li>
<li class="">[New] MATCH-S00797 Azure - Event Hub Deleted</li>
<li class="">[New] THRESHOLD-S00109 Azure - Excessive Key Vault Get Requests</li>
<li class="">[New] MATCH-S00788 Azure - Key Deletion</li>
<li class="">[New] MATCH-S00789 Azure - Key Purged</li>
<li class="">[New] MATCH-S00792 Azure - Key Vault Deleted</li>
<li class="">[New] MATCH-S00787 Azure - Protected Item Deletion Attempt</li>
<li class="">[New] MATCH-S00794 Azure - Secret Backup</li>
<li class="">[New] MATCH-S00791 Azure - Secret Deleted</li>
<li class="">[New] MATCH-S00790 Azure - Secret Purged</li>
<li class="">[New] MATCH-S00800 Azure - Storage Deletion</li>
<li class="">[New] MATCH-S00799 Azure - Storage Modification</li>
<li class="">[New] MATCH-S00803 Azure - Virtual Machine Creation/Modification</li>
<li class="">[New] MATCH-S00804 Azure - Virtual Machine Deleted</li>
<li class="">[New] MATCH-S00801 Azure - Virtual Machine Started</li>
<li class="">[New] MATCH-S00802 Azure - Virtual Machine Stopped</li>
<li class="">[Updated] MATCH-S00246 AWS CloudTrail - GetSecretValue from non Amazon IP</li>
<li class="">[Updated] MATCH-S00494 Backdoor.HTTP.BEACON.[Yelp Request]</li>
<li class="">[Updated] MATCH-S00492 Backdoor.HTTP.GORAT.[SID1]</li>
<li class="">[Updated] LEGACY-S00047 High risk file extension download without hostname and referrer</li>
<li class="">[Updated] MATCH-S00445 Known Ransomware File Extensions</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-31">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-31" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Dropbox - Authentication</li>
<li class="">[New] Dropbox - Catch All</li>
<li class="">[Updated] Azure AuditEvent logs</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-29">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-29" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/AWS/GuardDuty</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-19-2022---announcement">April 19, 2022 - Announcement<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#april-19-2022---announcement" class="hash-link" aria-label="Direct link to April 19, 2022 - Announcement" title="Direct link to April 19, 2022 - Announcement" translate="no">​</a></h3>
<p>We will be consolidating Authentication Brute Force Attempt <strong>MATCH-S00258</strong> on Tuesday May 10 into the normalized intrusion rule set. For more information on the normalized intrusion rule set, please visit the <a class="" href="https://www.sumologic.com/help/docs/cse/rules/normalized-threat-rules/">help page</a>.</p>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-18-2022---application-update">April 18, 2022 - Application Update<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#april-18-2022---application-update" class="hash-link" aria-label="Direct link to April 18, 2022 - Application Update" title="Direct link to April 18, 2022 - Application Update" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="minor-changes-and-enhancements-15">Minor Changes and Enhancements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#minor-changes-and-enhancements-15" class="hash-link" aria-label="Direct link to Minor Changes and Enhancements" title="Direct link to Minor Changes and Enhancements" translate="no">​</a></h4>
<ul>
<li class="">[New] API endpoints are now available to add or remove a given Signal to/from a given Insight, <code>PUT "/insights/&lt;insightId&gt;/signals"</code> and <code>DELETE "/insights/&lt;insightId&gt;/signals"</code> respectively. (For both endpoints, the request body is a list containing signal ID(s) to add or remove from the insight as the request body, the response is the updated Insight.)</li>
<li class="">[Update] The way Cloud SIEM displays group membership in Active Directory inventory objects is changing. Previously, it was displayed in LDAP form (i.e., <code>cn=groupname,dc=something,dc=domain,dc=com</code>); now it will just show the group name.</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="resolved-issues-16">Resolved Issues<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#resolved-issues-16" class="hash-link" aria-label="Direct link to Resolved Issues" title="Direct link to Resolved Issues" translate="no">​</a></h4>
<ul>
<li class="">Signal and Insight timestamps in the Cloud SIEM UI were not always displayed in the user’s preferred time zone.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-15-2022---announcements">April 15, 2022 - Announcements<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#april-15-2022---announcements" class="hash-link" aria-label="Direct link to April 15, 2022 - Announcements" title="Direct link to April 15, 2022 - Announcements" translate="no">​</a></h3>
<ul>
<li class="">Because it can now be connected via more standardized TAXII feeds, the integration between Cloud SIEM and <strong>Anomali ThreatStream</strong> has been <strong>deprecated</strong> as of <strong>April 15, 2022</strong>. If you are using this integration, be sure to convert to a TAXII feed. To set up a feed, first follow Anomali’s documentation for <a href="https://www.anomali.com/blog/generating-your-own-threat-intelligence-feeds-in-threatstream" target="_blank" rel="noopener noreferrer" class="">Setting up a TAXII feed for ThreatStream</a> then Sumo Logic’s documentation for <a class="" href="https://www.sumologic.com/help/docs/cse/integrations/integrate-cse-with-taxii-feed/">Integrating Cloud SIEM with a TAXII Feed</a>.</li>
<li class="">The Entity API has been updated to include a new field <code>IsSuppressed</code>. This field replaces <code>IsWhitelisted</code> which has been <strong>deprecated</strong> as of <strong>April 15, 2022</strong>. If you were previously using <code>IsWhitelisted</code> please ensure you have switched to the new field.</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-14-2022---content-release">April 14, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#april-14-2022---content-release" class="hash-link" aria-label="Direct link to April 14, 2022 - Content Release" title="Direct link to April 14, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-26">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-26" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00785 Azure - Blob Container Deletion</li>
<li class="">[New] MATCH-S00786 Azure - SQL Database Export</li>
<li class="">[Updated] MATCH-S00243 Azure - High Risk Sign-In (Aggregate)</li>
<li class="">[Updated] MATCH-S00245 Azure - High Risk Sign-In (Real Time)</li>
<li class="">[Updated] MATCH-S00224 Azure - Risky User State : User Confirmed Compromised</li>
<li class="">[Updated] MATCH-S00250 Azure - Suspicious User Risk State Associated with Login</li>
<li class="">[Updated] LEGACY-S00066 PowerShell Remote Administration</li>
<li class="">[Updated] LEGACY-S00105 Suspicious DC Logon</li>
<li class="">[Updated] THRESHOLD-S00075 Too Many Kerberos Encryption Downgrade SPNs (Kerberoasting)</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-32">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-32" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] CloudTrail - application-insights.amazonaws.com - ListApplications</li>
<li class="">[Updated] CloudTrail - cloudtrail.amazonaws.com - CreateTrail</li>
<li class="">[Updated] CloudTrail - cloudtrail.amazonaws.com - DeleteTrail</li>
<li class="">[Updated] CloudTrail - cloudtrail.amazonaws.com - StartLogging</li>
<li class="">[Updated] CloudTrail - cloudtrail.amazonaws.com - StopLogging</li>
<li class="">[Updated] CloudTrail - cloudtrail.amazonaws.com - UpdateTrail</li>
<li class="">[Updated] CloudTrail - cognito-idp.amazonaws.com - CreateUserPoolClient</li>
<li class="">[Updated] CloudTrail - controltower.amazonaws.com - CreateManagedAccount</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - AttachInternetGateway</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - AuthorizeSecurityGroupIngress</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - BidEvictedEvent</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - CreateCustomerGateway</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - CreateInternetGateway</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - CreateKeyPair</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - CreateNetworkAcl</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - CreateNetworkAclEntry</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - DeleteCustomerGateway</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - DeleteInternetGateway</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - DeleteKeyPair</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - DeleteNetworkAcl</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - DeleteNetworkAclEntry</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - DetachInternetGateway</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - ImportKeyPair</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - ReplaceNetworkAclAssociation</li>
<li class="">[Updated] CloudTrail - ec2.amazonaws.com - ReplaceNetworkAclEntry</li>
<li class="">[Updated] CloudTrail - ecr.amazonaws.com - PolicyExecutionEvent</li>
<li class="">[Updated] CloudTrail - elasticfilesystem.amazonaws.com - NewClientConnection</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - AttachGroupPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - AttachRolePolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - AttachUserPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - CreateAccessKey</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - CreatePolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - CreatePolicyVersion</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - CreateUser</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeleteGroupPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeletePolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeleteRolePermissionsBoundary</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeleteRolePolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeleteUser</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeleteUserPermissionsBoundary</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DeleteUserPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DetachGroupPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DetachRolePolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - DetachUserPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - PutGroupPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - PutRolePolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - PutUserPolicy</li>
<li class="">[Updated] CloudTrail - iam.amazonaws.com - UpdateAssumeRolePolicy</li>
<li class="">[Updated] CloudTrail - kms.amazonaws.com - DisableKey</li>
<li class="">[Updated] CloudTrail - kms.amazonaws.com - RotateKey</li>
<li class="">[Updated] CloudTrail - kms.amazonaws.com - ScheduleKeyDeletion</li>
<li class="">[Updated] CloudTrail - logs.amazonaws.com - DeleteDestination</li>
<li class="">[Updated] CloudTrail - logs.amazonaws.com - DeleteLogGroup</li>
<li class="">[Updated] CloudTrail - logs.amazonaws.com - DeleteLogStream</li>
<li class="">[Updated] CloudTrail - organizations.amazonaws.com - CreateAccountResult</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - CreateBucket</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - DeleteBucketCors</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - DeleteBucketLifecycle</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - DeleteBucketPolicy</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketAcl</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketCors</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketLifecycle</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketPolicy</li>
<li class="">[Updated] CloudTrail - s3.amazonaws.com - PutBucketReplication</li>
<li class="">[Updated] CloudTrail - secretsmanager.amazonaws.com - RotationStarted</li>
<li class="">[Updated] CloudTrail - secretsmanager.amazonaws.com - RotationSucceeded</li>
<li class="">[Updated] CloudTrail - secretsmanager.amazonaws.com - SecretVersionDeletion</li>
<li class="">[Updated] CloudTrail - signin.amazonaws.com - CheckMfa</li>
<li class="">[Updated] CloudTrail - signin.amazonaws.com - ConsoleLogin</li>
<li class="">[Updated] CloudTrail - signin.amazonaws.com - ExitRole</li>
<li class="">[Updated] CloudTrail - signin.amazonaws.com - RenewRole</li>
<li class="">[Updated] CloudTrail - signin.amazonaws.com - SwitchRole</li>
<li class="">[Updated] CloudTrail - sso.amazonaws.com - Federate</li>
<li class="">[Updated] CloudTrail - sso.amazonaws.com - ListProfilesForApplication</li>
<li class="">[Updated] CloudTrail Default Mapping</li>
<li class="">[Updated] Microsoft Graph AD Reporting API C2C - DirectoryAudits</li>
<li class="">[Updated] Microsoft Graph AD Reporting API C2C - Provisioning</li>
<li class="">[Updated] Microsoft Graph AD Reporting API C2C - Signin</li>
<li class="">[Updated] Trend Micro CEF logs</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-30">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-30" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/Trend Micro/Trend Micro Deep Security - CEF</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-12-2022---content-release">April 12, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#april-12-2022---content-release" class="hash-link" aria-label="Direct link to April 12, 2022 - Content Release" title="Direct link to April 12, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-27">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-27" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00784 Linux Host Entered Promiscuous Mode</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-33">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-33" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[Deleted] AWS VPC Flow Logs - Custom Format 1</li>
<li class="">[Deleted] Adaxes Execute Event</li>
<li class="">[Deleted] Adaxes Modify Event</li>
<li class="">[Deleted] Adaxes Run PowerShell Event</li>
<li class="">[Deleted] Aruba Error Logs</li>
<li class="">[Deleted] Aruba ICMP Logs</li>
<li class="">[Deleted] Aruba LDAP Server Logs</li>
<li class="">[Deleted] Aruba PoniUnwired HTTPD CGID Samples</li>
<li class="">[Deleted] Aruba PoniUnwired HTTPD Core Error Samples</li>
<li class="">[Deleted] Aruba PoniUnwired HTTPD Core Warn Samples</li>
<li class="">[Deleted] Aruba PoniUnwired HTTPD ssl error Samples</li>
<li class="">[Deleted] Aruba PoniUnwired Warn Samples</li>
<li class="">[Deleted] BIND DNS Query</li>
<li class="">[Deleted] BIND DNS Update Zone</li>
<li class="">[Deleted] BIND DNS Update Zone Failed</li>
<li class="">[Deleted] BIOC Credential Access logs</li>
<li class="">[Deleted] BIOC Dropper logs</li>
<li class="">[Deleted] BIOC Evasion Variation 2 logs</li>
<li class="">[Deleted] BIOC Evasion logs</li>
<li class="">[Deleted] BIOC Infiltration logs</li>
<li class="">[Deleted] BIOC Persistence and Execution logs</li>
<li class="">[Deleted] BIOC Privilege logs</li>
<li class="">[Deleted] BIOC Reconnaissance logs</li>
<li class="">[Deleted] BIOC Reconnaissance logs Variation 2</li>
<li class="">[Deleted] BIOC Tampering logs</li>
<li class="">[Deleted] BIOC create and write logs</li>
<li class="">[Deleted] Bandura Domain Logs</li>
<li class="">[Deleted] Bandura Packet Logs</li>
<li class="">[Deleted] Barracuda Proxy</li>
<li class="">[Deleted] Bind DHCP Full</li>
<li class="">[Deleted] Bind DHCP On</li>
<li class="">[Deleted] Bind DHCP Short</li>
<li class="">[Deleted] Bind DNS log 1</li>
<li class="">[Deleted] Bind DNS log 10</li>
<li class="">[Deleted] Bind DNS log 2</li>
<li class="">[Deleted] Bind DNS log 3</li>
<li class="">[Deleted] Bind DNS log 4</li>
<li class="">[Deleted] Bind DNS log 5</li>
<li class="">[Deleted] Bind DNS log 6</li>
<li class="">[Deleted] Bind DNS log 7</li>
<li class="">[Deleted] Bind DNS log 8</li>
<li class="">[Deleted] Bind DNS log 9</li>
<li class="">[Deleted] Bind9 DNS</li>
<li class="">[Deleted] Blue Coat Proxy 2</li>
<li class="">[Deleted] Blue Coat Proxy 4</li>
<li class="">[Deleted] Blue Coat Proxy 5</li>
<li class="">[Deleted] Blue Coat Proxy 6</li>
<li class="">[Deleted] Blue Coat Proxy 7</li>
<li class="">[Deleted] Blue Coat Proxy Logs</li>
<li class="">[Deleted] BlueCat DHCP Bootrequest</li>
<li class="">[Deleted] BlueCat DHCP Decline</li>
<li class="">[Deleted] BlueCat DHCP INFORM Logs</li>
<li class="">[Deleted] BlueCat DHCP Offer Logs</li>
<li class="">[Deleted] BlueCat DHCP Reuse Lease</li>
<li class="">[Deleted] BlueCat DHCP failover</li>
<li class="">[Deleted] BlueCat DNS</li>
<li class="">[Deleted] BlueCat DNS with Key</li>
<li class="">[Deleted] CB Protection</li>
<li class="">[Deleted] CB Protection Username</li>
<li class="">[Deleted] CB Response Server 1</li>
<li class="">[Deleted] CB Response Server 10</li>
<li class="">[Deleted] CB Response Server 11</li>
<li class="">[Deleted] CB Response Server 13</li>
<li class="">[Deleted] CB Response Server 14</li>
<li class="">[Deleted] CB Response Server 15</li>
<li class="">[Deleted] CB Response Server 17</li>
<li class="">[Deleted] CB Response Server 2</li>
<li class="">[Deleted] CB Response Server 20</li>
<li class="">[Deleted] CB Response Server 3</li>
<li class="">[Deleted] CB Response Server 4</li>
<li class="">[Deleted] CB Response Server 5</li>
<li class="">[Deleted] CB Response Server 6</li>
<li class="">[Deleted] CB Response Server 7</li>
<li class="">[Deleted] CB Response Server 9</li>
<li class="">[Deleted] CB Response Severity 1</li>
<li class="">[Deleted] CB Response Severity 2</li>
<li class="">[Deleted] CB Response Severity 3</li>
<li class="">[Deleted] CICSCOFW434002</li>
<li class="">[Deleted] Check Point ACCEPT Grok</li>
<li class="">[Deleted] Check Point DROP</li>
<li class="">[Deleted] Check Point VPN</li>
<li class="">[Deleted] Check Point encrypt/decrypt</li>
<li class="">[Deleted] Check Point key install</li>
<li class="">[Deleted] Cisco ACS FAILED-ATTEMPT</li>
<li class="">[Deleted] Cisco ACS FAILED-AUTHENTICATION</li>
<li class="">[Deleted] Cisco ACS Passed-Authentication</li>
<li class="">[Deleted] Cisco ACS Tacacs-Accounting</li>
<li class="">[Deleted] Cisco ASA 106002</li>
<li class="">[Deleted] Cisco ASA 106012</li>
<li class="">[Deleted] Cisco ASA 106013</li>
<li class="">[Deleted] Cisco ASA 106018</li>
<li class="">[Deleted] Cisco ASA 106022</li>
<li class="">[Deleted] Cisco ASA 113039</li>
<li class="">[Deleted] Cisco ASA 716037</li>
<li class="">[Deleted] Cisco ASA 716038</li>
<li class="">[Deleted] Cisco ASA 716039</li>
<li class="">[Deleted] Cisco ASA 722056</li>
<li class="">[Deleted] Cisco ASA 725012</li>
<li class="">[Deleted] Cisco ASA 725017</li>
<li class="">[Deleted] Cisco ASA 734003</li>
<li class="">[Deleted] Cisco ASA 746012</li>
<li class="">[Deleted] Cisco AnyConnect NAT RULES Logs</li>
<li class="">[Deleted] Cisco Authentication Message 01</li>
<li class="">[Deleted] Cisco Authentication Message 02</li>
<li class="">[Deleted] Cisco Authentication Message 03</li>
<li class="">[Deleted] Cisco Authentication Message 04</li>
<li class="">[Deleted] Cisco Authentication Message 05</li>
<li class="">[Deleted] Cisco Authentication Message 06</li>
<li class="">[Deleted] Cisco Authentication Message 07</li>
<li class="">[Deleted] Cisco Authentication Message 08</li>
<li class="">[Deleted] Cisco Authentication Message 09</li>
<li class="">[Deleted] Cisco Authentication Message 10</li>
<li class="">[Deleted] Cisco Authentication Message 11</li>
<li class="">[Deleted] Cisco Authentication Message 12</li>
<li class="">[Deleted] Cisco Authentication Message 13</li>
<li class="">[Deleted] Cisco Authentication Message 14</li>
<li class="">[Deleted] Cisco Authentication Message 15</li>
<li class="">[Deleted] Cisco IOS Message</li>
<li class="">[Deleted] Cisco IOS Queue Full</li>
<li class="">[Deleted] Cisco Ironport WSA</li>
<li class="">[Deleted] Cisco Ironport WSA NOHD</li>
<li class="">[Deleted] Cisco Ironport WSA NOHD 01</li>
<li class="">[Deleted] Cisco Ironport WSA NOHD 03</li>
<li class="">[Deleted] Cisco Meraki IDS-Alerts</li>
<li class="">[Deleted] Cisco Meraki Security Event</li>
<li class="">[Deleted] Cisco Meraki Security Filtering Disposition Change</li>
<li class="">[Deleted] Cisco Umbrella IP Logs Custom</li>
<li class="">[Deleted] Citrix NetScaler AAA Message</li>
<li class="">[Deleted] Citrix NetScaler API CMD EXECUTED</li>
<li class="">[Deleted] Citrix NetScaler Delinked Message</li>
<li class="">[Deleted] Citrix NetScaler Delinked Message 01</li>
<li class="">[Deleted] Citrix NetScaler TCP Connection Terminated</li>
<li class="">[Deleted] DNS_Additions</li>
<li class="">[Deleted] EPO_THREATS_AV</li>
<li class="">[Deleted] EXABEAM</li>
<li class="">[Deleted] F5 HTTPd Audit</li>
<li class="">[Deleted] F5 SSHD Samples</li>
<li class="">[Deleted] F5 SSL Request</li>
<li class="">[Deleted] Firepower Access Control</li>
<li class="">[Deleted] Firepower Access Control 2</li>
<li class="">[Deleted] Firepower Access Control 3</li>
<li class="">[Deleted] Firepower Access Control 4</li>
<li class="">[Deleted] Firepower Access Control 5</li>
<li class="">[Deleted] Firepower Alerts</li>
<li class="">[Deleted] Forcepoint NEW</li>
<li class="">[Deleted] Huawei SNMP LOGS</li>
<li class="">[Deleted] IBM WebSpheredatadevice error 1</li>
<li class="">[Deleted] IBM WebSpheredatadevice error 2</li>
<li class="">[Deleted] IBM WebSpheredatadevice error 3</li>
<li class="">[Deleted] IBM WebSpheredatadevice error 4</li>
<li class="">[Deleted] IBM WebSpheredatadevice error 5</li>
<li class="">[Deleted] INFOBLOX_DNS_QUERIES LOGS</li>
<li class="">[Deleted] INFOBLOX_DNS_QUERIES LOGS - NIOS</li>
<li class="">[Deleted] Infoblox DHCP Updater 1</li>
<li class="">[Deleted] Infoblox DHCP Updater 2</li>
<li class="">[Deleted] Infoblox DHCP Updater 3</li>
<li class="">[Deleted] Infoblox DHCP Updater 4</li>
<li class="">[Deleted] Infoblox DHCP Updater 5</li>
<li class="">[Deleted] Infoblox DHCPACK RENEW Samples</li>
<li class="">[Deleted] Infoblox DHCPACK v2 Samples</li>
<li class="">[Deleted] Infoblox DHCPDISCOVER Samples</li>
<li class="">[Deleted] Infoblox DHCPDISCOVER Samples 2</li>
<li class="">[Deleted] Infoblox DHCPDISCOVER Unknown network Sample</li>
<li class="">[Deleted] Infoblox DHCPEXPIRE Samples</li>
<li class="">[Deleted] Infoblox DHCPNAK Samples</li>
<li class="">[Deleted] Infoblox DHCPOFFER UID Samples</li>
<li class="">[Deleted] Infoblox DHCPRELEASE Samples</li>
<li class="">[Deleted] Infoblox DNS Request AXRF Ended</li>
<li class="">[Deleted] Infoblox DNS Request AXRF Started</li>
<li class="">[Deleted] Infoblox DNS Response</li>
<li class="">[Deleted] Infoblox DNS Zone Update 1</li>
<li class="">[Deleted] Infoblox DNS Zone Update 2</li>
<li class="">[Deleted] Infoblox DNS Zone Update 3</li>
<li class="">[Deleted] Infoblox DNS Zone Update 4</li>
<li class="">[Deleted] Infoblox DNS Zone Update 5</li>
<li class="">[Deleted] Infoblox DNS Zone Update 6</li>
<li class="">[Deleted] Infoblox Domain Notified</li>
<li class="">[Deleted] Invalid Login</li>
<li class="">[Deleted] IronPort Quarantined MID</li>
<li class="">[Deleted] IronPort Quarantined TO</li>
<li class="">[Deleted] Ironport DCID Message</li>
<li class="">[Deleted] Ironport DKIM</li>
<li class="">[Deleted] Ironport ICID Message</li>
<li class="">[Deleted] Ironport Info IC</li>
<li class="">[Deleted] Ironport Info IC and Msg</li>
<li class="">[Deleted] Ironport Info ISQ or RPC</li>
<li class="">[Deleted] Ironport Info Message</li>
<li class="">[Deleted] Ironport Info Mid Info</li>
<li class="">[Deleted] Ironport WSA SFIMS Protocol 1</li>
<li class="">[Deleted] Ironport WSA SFIMS Protocol 2</li>
<li class="">[Deleted] Ironport WSA SFIMS Protocol 3</li>
<li class="">[Deleted] Ironport WSA SFIMS Protocol 4</li>
<li class="">[Deleted] Ironport Warn Message</li>
<li class="">[Deleted] Ironport Warning Connection Error</li>
<li class="">[Deleted] Ironport Warning Full</li>
<li class="">[Deleted] Ironport Warning Invalid DNS FULL</li>
<li class="">[Deleted] Ironport Warning LIMIT</li>
<li class="">[Deleted] Juniper Flow Reassemble Logs</li>
<li class="">[Deleted] Juniper Session Error Logs</li>
<li class="">[Deleted] LINUX User Auth with Hostname</li>
<li class="">[Deleted] Linux Laravel Activity Logs</li>
<li class="">[Deleted] Linux Laravel Activity Logs 01</li>
<li class="">[Deleted] Linux Laravel Login Logs</li>
<li class="">[Deleted] LinuxServer Audit Logs 01</li>
<li class="">[Deleted] LinuxServer Audit Logs 02</li>
<li class="">[Deleted] LinuxServer Log 1</li>
<li class="">[Deleted] LinuxServer Log 11</li>
<li class="">[Deleted] LinuxServer Log 2</li>
<li class="">[Deleted] LinuxServer Log 3</li>
<li class="">[Deleted] LinuxServer Log 4</li>
<li class="">[Deleted] LinuxServer Log 5</li>
<li class="">[Deleted] LinuxServer Log 6</li>
<li class="">[Deleted] LinuxServer Log 7</li>
<li class="">[Deleted] Mcafee MVISION CASB Log</li>
<li class="">[Deleted] NSM_THREAT_IPS</li>
<li class="">[Deleted] Network Management Logs</li>
<li class="">[Deleted] Oauth Logs</li>
<li class="">[Deleted] Ossec Group Addition Logs</li>
<li class="">[Deleted] Ossec Insecure Connection Logs</li>
<li class="">[Deleted] Ossec Integrity checksum Logs</li>
<li class="">[Deleted] Ossec Root Login Refused Logs</li>
<li class="">[Deleted] Ossec ssh server Logs</li>
<li class="">[Deleted] Palo Alto Traps Analytics</li>
<li class="">[Deleted] Palo Alto Traps Analytics - Cloud</li>
<li class="">[Deleted] Palo Alto Traps Config - Cloud</li>
<li class="">[Deleted] Palo Alto Traps Event</li>
<li class="">[Deleted] Palo Alto Traps Events Updated</li>
<li class="">[Deleted] Palo Alto Traps Misc - Cloud</li>
<li class="">[Deleted] Palo Alto Traps System - Cloud</li>
<li class="">[Deleted] Pulse Secure Endpoint</li>
<li class="">[Deleted] Pulse Secure Logs</li>
<li class="">[Deleted] Renew Logs</li>
<li class="">[Deleted] Shibboleth DUO</li>
<li class="">[Deleted] Shibboleth HTTP Redirect EDU</li>
<li class="">[Deleted] Shibboleth HTTP Redirect Email</li>
<li class="">[Deleted] Shibboleth LDAP</li>
<li class="">[Deleted] Shibboleth LDAP Email</li>
<li class="">[Deleted] Snare AgentHeartBeat Logs</li>
<li class="">[Deleted] Snare Windows DHCP Logs</li>
<li class="">[Deleted] SonicWall Bad FTP Protocol</li>
<li class="">[Deleted] SonicWall Block Dropped Events</li>
<li class="">[Deleted] SonicWall Flood Attack</li>
<li class="">[Deleted] SonicWall IPS</li>
<li class="">[Deleted] SonicWall Port Scan</li>
<li class="">[Deleted] SonicWall URL Filter</li>
<li class="">[Deleted] Successful Login</li>
<li class="">[Deleted] Successful Logins</li>
<li class="">[Deleted] Successful SSH Login</li>
<li class="">[Deleted] Suricata HTTP Logs</li>
<li class="">[Deleted] Suricata LogStash</li>
<li class="">[Deleted] Suricata Logstash Custom</li>
<li class="">[Deleted] Suricata Threat Logs</li>
<li class="">[Deleted] Symantec SEP AntiVirus</li>
<li class="">[Deleted] Symantec SEP Potential Risk Found 01</li>
<li class="">[Deleted] Symantec SEP Potential Risk Found 2</li>
<li class="">[Deleted] Symantec SEP Potential Risk Found 3</li>
<li class="">[Deleted] Symantec SEP SONAR</li>
<li class="">[Deleted] Symantec SEP Security Risk Found</li>
<li class="">[Deleted] Symantec SEP Sonar Detection</li>
<li class="">[Deleted] Symantec SEP USB Drive</li>
<li class="">[Deleted] Tanium S24 Logs</li>
<li class="">[Deleted] VLT Vault Extra</li>
<li class="">[Deleted] VMware Logs 1</li>
<li class="">[Deleted] VMware Logs 2</li>
<li class="">[Deleted] VMware Logs 3</li>
<li class="">[Deleted] VMware Logs 4</li>
<li class="">[Deleted] VMware Logs 5</li>
<li class="">[Deleted] VMware Logs 6</li>
<li class="">[Deleted] VMware Logs 7</li>
<li class="">[Deleted] VMware Logs 8</li>
<li class="">[Deleted] VPN Messages</li>
<li class="">[Deleted] VPN Messages 2</li>
<li class="">[Deleted] VPN Messages 3</li>
<li class="">[Deleted] VPN Messages 4</li>
<li class="">[Deleted] VPN Messages 5</li>
<li class="">[Deleted] WatchGuard flow log</li>
<li class="">[Deleted] WatchGuard flow log 2</li>
<li class="">[Deleted] Windows DHCP</li>
<li class="">[Deleted] Windows Defender Unstructured</li>
<li class="">[Deleted] Windows QUICK FIX</li>
<li class="">[Deleted] Zscaler Firewall Grok</li>
<li class="">[Deleted] cisco17</li>
<li class="">[Deleted] cisco20</li>
<li class="">[Deleted] ePO Threat Event</li>
<li class="">[New] AWS EKS - Custom Parser</li>
<li class="">[New] Azure Storage Analytics</li>
<li class="">[New] Citrix NetScaler - SSL Handshake Success</li>
<li class="">[Updated] Azure Administrative logs</li>
<li class="">[Updated] Azure Write and Delete Logs</li>
<li class="">[Updated] Citrix NetScaler - AAA-LOGIN_FAILED</li>
<li class="">[Updated] Citrix NetScaler - Command Executed</li>
<li class="">[Updated] Citrix NetScaler - SSLVPN-HTTPREQUEST</li>
<li class="">[Updated] Citrix NetScaler - SSLVPN-ICA Events</li>
<li class="">[Updated] Citrix NetScaler - SSLVPN-LOGIN</li>
<li class="">[Updated] Citrix NetScaler - SSLVPN-LOGOUT</li>
<li class="">[Updated] Citrix NetScaler - SSLVPN-TCPCONNSTAT</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-31">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-31" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[New] /Parsers/System/AWS/AWS EKS</li>
<li class="">[New] /Parsers/System/Microsoft/Azure Storage Analytics</li>
<li class="">[Updated] /Parsers/System/Citrix/Citrix NetScaler Syslog</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="legacy-parsers-1">Legacy Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#legacy-parsers-1" class="hash-link" aria-label="Direct link to Legacy Parsers" title="Direct link to Legacy Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Deleted] 4624</li>
<li class="">[Deleted] ARUBA_PONIUNWIRED_HTTPD_CGID_SAMPLES</li>
<li class="">[Deleted] ARUBA_PONIUNWIRED_HTTPD_CORE_ERROR_SAMPLES</li>
<li class="">[Deleted] ARUBA_PONIUNWIRED_HTTPD_CORE_WARN_SAMPLES</li>
<li class="">[Deleted] ARUBA_PONIUNWIRED_HTTPD_SSL_ERROR_SAMPLES</li>
<li class="">[Deleted] ARUBA_PONIUNWIRED_WARN_SAMPLES</li>
<li class="">[Deleted] ASA_106002</li>
<li class="">[Deleted] ASA_106013</li>
<li class="">[Deleted] ASA_106018</li>
<li class="">[Deleted] ASA_106022</li>
<li class="">[Deleted] ASA_113039</li>
<li class="">[Deleted] ASA_5_746012</li>
<li class="">[Deleted] ASA_6_106012</li>
<li class="">[Deleted] ASA_716037</li>
<li class="">[Deleted] ASA_716038</li>
<li class="">[Deleted] ASA_716039</li>
<li class="">[Deleted] ASA_722056</li>
<li class="">[Deleted] ASA_7_725012</li>
<li class="">[Deleted] ASA_7_725017</li>
<li class="">[Deleted] ASA_7_734003</li>
<li class="">[Deleted] AWS_VPC_FLOW_CUSTOM_1</li>
<li class="">[Deleted] Adaxes_Execute_Event</li>
<li class="">[Deleted] Adaxes_Modify_Event</li>
<li class="">[Deleted] Adaxes_Run_PowerShell_Event</li>
<li class="">[Deleted] Aruba_Error_Logs</li>
<li class="">[Deleted] Aruba_ICMP_Logs</li>
<li class="">[Deleted] Aruba_LDAP_Server_Logs</li>
<li class="">[Deleted] BANDURA_DOMAIN_LOGS</li>
<li class="">[Deleted] BANDURA_PACKET_LOGS</li>
<li class="">[Deleted] BARRACUDA_PROXY</li>
<li class="">[Deleted] BIND9</li>
<li class="">[Deleted] BIND_DHCP_FOR_FULL</li>
<li class="">[Deleted] BIND_DHCP_FOR_SHORT</li>
<li class="">[Deleted] BIND_DHCP_ON</li>
<li class="">[Deleted] BIND_Query</li>
<li class="">[Deleted] BIND_Update_Zone</li>
<li class="">[Deleted] BIND_Update_Zone_Failure</li>
<li class="">[Deleted] BIOC_CREATE_AND_WRITE</li>
<li class="">[Deleted] BIOC_CREDENTIAL_ACCESS</li>
<li class="">[Deleted] BIOC_DROPPER</li>
<li class="">[Deleted] BIOC_EVASION</li>
<li class="">[Deleted] BIOC_EVASION_VARIATION_2</li>
<li class="">[Deleted] BIOC_INFILTRATION</li>
<li class="">[Deleted] BIOC_PERSISTENCE_EXECUTION</li>
<li class="">[Deleted] BIOC_PRIVILEGE</li>
<li class="">[Deleted] BIOC_RECONNAISSANCE</li>
<li class="">[Deleted] BIOC_RECONNAISSANCE_VARIATION_2</li>
<li class="">[Deleted] BIOC_TAMPERING</li>
<li class="">[Deleted] BLUECAT_DHCP_BOOTREQUEST</li>
<li class="">[Deleted] BLUECAT_DHCP_DECLINE</li>
<li class="">[Deleted] BLUECAT_DHCP_INFORM</li>
<li class="">[Deleted] BLUECAT_DHCP_OFFER</li>
<li class="">[Deleted] BLUECAT_DHCP_failover</li>
<li class="">[Deleted] BLUECAT_DHCP_reuse_lease</li>
<li class="">[Deleted] BLUECAT_DNS_NO_KEY</li>
<li class="">[Deleted] BLUECAT_DNS_WITH_KEY</li>
<li class="">[Deleted] BLUECOAT_PROXY</li>
<li class="">[Deleted] BLUECOAT_PROXY_2</li>
<li class="">[Deleted] BLUECOAT_PROXY_4</li>
<li class="">[Deleted] BLUECOAT_PROXY_5</li>
<li class="">[Deleted] BLUECOAT_PROXY_6</li>
<li class="">[Deleted] BLUECOAT_PROXY_7</li>
<li class="">[Deleted] Bind_DNS_log_1</li>
<li class="">[Deleted] Bind_DNS_log_10</li>
<li class="">[Deleted] Bind_DNS_log_2</li>
<li class="">[Deleted] Bind_DNS_log_3</li>
<li class="">[Deleted] Bind_DNS_log_4</li>
<li class="">[Deleted] Bind_DNS_log_5</li>
<li class="">[Deleted] Bind_DNS_log_6</li>
<li class="">[Deleted] Bind_DNS_log_7</li>
<li class="">[Deleted] Bind_DNS_log_8</li>
<li class="">[Deleted] Bind_DNS_log_9</li>
<li class="">[Deleted] CB_PROTECT</li>
<li class="">[Deleted] CB_PROTECT_USERNAME</li>
<li class="">[Deleted] CB_RESPONSE_SERVER_1</li>
<li class="">[Deleted] CB_RESPONSE_SERVER_10</li>
<li class="">[Deleted] CB_RESPONSE_SERVER_11</li>
<li class="">[Deleted] CB_RESPONSE_SERVER_13</li>
<li class="">[Deleted] CB_RESPONSE_SERVER_14</li>
<li class="">[Deleted] CB_RESPONSE_SERVER_15</li>
<li class="">[Deleted] CB_RESPONSE_SERVER_17</li>
<li class="">[Deleted] CB_RESPONSE_SERVER_2</li>
<li class="">[Deleted] CB_RESPONSE_SERVER_20</li>
<li class="">[Deleted] CB_RESPONSE_SERVER_3</li>
<li class="">[Deleted] CB_RESPONSE_SERVER_4</li>
<li class="">[Deleted] CB_RESPONSE_SERVER_5</li>
<li class="">[Deleted] CB_RESPONSE_SERVER_6</li>
<li class="">[Deleted] CB_RESPONSE_SERVER_7</li>
<li class="">[Deleted] CB_RESPONSE_SERVER_9</li>
<li class="">[Deleted] CB_RESPONSE_SEVERITY_1</li>
<li class="">[Deleted] CB_RESPONSE_SEVERITY_2</li>
<li class="">[Deleted] CB_RESPONSE_SEVERITY_3</li>
<li class="">[Deleted] CHECKPOINT_ACCEPT</li>
<li class="">[Deleted] CHECKPOINT_CRYPT</li>
<li class="">[Deleted] CHECKPOINT_DROP</li>
<li class="">[Deleted] CHECKPOINT_KEY_INSTALL</li>
<li class="">[Deleted] CHECKPOINT_VPN_ROUTE</li>
<li class="">[Deleted] CICSCOFW434002</li>
<li class="">[Deleted] CISCOFW321001</li>
<li class="">[Deleted] CISCOFW419001</li>
<li class="">[Deleted] CISCO_ACS_FAILED_ATTEMPT</li>
<li class="">[Deleted] CISCO_ACS_FAILED_AUTHENTICATION</li>
<li class="">[Deleted] CISCO_ACS_PASSED_AUTHENTICATION</li>
<li class="">[Deleted] CISCO_ACS_TACACS_ACCOUNTING</li>
<li class="">[Deleted] CISCO_MERAKI_IDS_ALERTS</li>
<li class="">[Deleted] CISCO_MERAKI_SECURITY_EVENT</li>
<li class="">[Deleted] CISCO_MERAKI_SECURITY_EVENT_SECURITY_FILTERING_DISPOSITION_CHANGE</li>
<li class="">[Deleted] CRM_VODLOG</li>
<li class="">[Deleted] Cisco_Umbrella_IP_Logs</li>
<li class="">[Deleted] Dns_Update</li>
<li class="">[Deleted] EPO_THREATS_AV</li>
<li class="">[Deleted] EPO_THREAT_EVENT</li>
<li class="">[Deleted] EXABEAM</li>
<li class="">[Deleted] F5_HTTPD_AUDIT</li>
<li class="">[Deleted] F5_SSHD_SAMPLES</li>
<li class="">[Deleted] F5_SSL_REQUEST</li>
<li class="">[Deleted] FLOW_REASSEMBLE</li>
<li class="">[Deleted] FORCEPOINT_NEW_AND_IMPROVED</li>
<li class="">[Deleted] Failed_Logon</li>
<li class="">[Deleted] Firepower_ALERT_IDS</li>
<li class="">[Deleted] Firepower_Access_Control</li>
<li class="">[Deleted] Firepower_Access_Control_2</li>
<li class="">[Deleted] Firepower_Access_Control_3</li>
<li class="">[Deleted] Firepower_Access_Control_4</li>
<li class="">[Deleted] Firepower_Access_Control_5</li>
<li class="">[Deleted] IBM_WebSpheredatadevice_error_1</li>
<li class="">[Deleted] IBM_WebSpheredatadevice_error_2</li>
<li class="">[Deleted] IBM_WebSpheredatadevice_error_3</li>
<li class="">[Deleted] IBM_WebSpheredatadevice_error_4</li>
<li class="">[Deleted] IBM_WebSpheredatadevice_error_5</li>
<li class="">[Deleted] INFLOBLOX_DNS_MESSAGE</li>
<li class="">[Deleted] INFOBLOX_DHCPACK_RENEW_SAMPLES</li>
<li class="">[Deleted] INFOBLOX_DHCPDISCOVER_SAMPLES</li>
<li class="">[Deleted] INFOBLOX_DHCPDISCOVER_SAMPLES_2</li>
<li class="">[Deleted] INFOBLOX_DHCPDISCOVER_UNKNOWN_NETWORK_SAMPLE</li>
<li class="">[Deleted] INFOBLOX_DHCPEXPIRE_SAMPLES</li>
<li class="">[Deleted] INFOBLOX_DHCPNAK_SAMPLES</li>
<li class="">[Deleted] INFOBLOX_DHCPOFFER_UID_SAMPLES</li>
<li class="">[Deleted] INFOBLOX_DHCPRELEASE_SAMPLES</li>
<li class="">[Deleted] INFOBLOX_DHCP_UPDATER_1</li>
<li class="">[Deleted] INFOBLOX_DHCP_UPDATER_2</li>
<li class="">[Deleted] INFOBLOX_DHCP_UPDATER_3</li>
<li class="">[Deleted] INFOBLOX_DHCP_UPDATER_4</li>
<li class="">[Deleted] INFOBLOX_DHCP_UPDATER_5</li>
<li class="">[Deleted] INFOBLOX_DHCP_V2_SAMPLES</li>
<li class="">[Deleted] INFOBLOX_DNS_QUERIES</li>
<li class="">[Deleted] INFOBLOX_DNS_REQUEST_AXFR_ENDED</li>
<li class="">[Deleted] INFOBLOX_DNS_REQUEST_AXFR_STARTED</li>
<li class="">[Deleted] INFOBLOX_DNS_RESPONSE</li>
<li class="">[Deleted] INFOBLOX_DNS_ZONE_UPDATE_1</li>
<li class="">[Deleted] INFOBLOX_DNS_ZONE_UPDATE_2</li>
<li class="">[Deleted] INFOBLOX_DNS_ZONE_UPDATE_3</li>
<li class="">[Deleted] INFOBLOX_DNS_ZONE_UPDATE_4</li>
<li class="">[Deleted] INFOBLOX_DNS_ZONE_UPDATE_5</li>
<li class="">[Deleted] INFOBLOX_DNS_ZONE_UPDATE_6</li>
<li class="">[Deleted] INFOBLOX_DOMAIN_NOTIFIED</li>
<li class="">[Deleted] IRONPORT_QUARANTINE_MID</li>
<li class="">[Deleted] IRONPORT_QUARANTINE_TO</li>
<li class="">[Deleted] IRON_PORT_CONNECTION</li>
<li class="">[Deleted] IRON_PORT_DCID_MSG</li>
<li class="">[Deleted] IRON_PORT_DKIM</li>
<li class="">[Deleted] IRON_PORT_ICID_MSG</li>
<li class="">[Deleted] IRON_PORT_INFO_ICID</li>
<li class="">[Deleted] IRON_PORT_INFO_MID</li>
<li class="">[Deleted] IRON_PORT_INFO_MID_ICID</li>
<li class="">[Deleted] IRON_PORT_INFO_MSG</li>
<li class="">[Deleted] IRON_PORT_ISQ_RPC</li>
<li class="">[Deleted] IRON_PORT_WARN_FULL</li>
<li class="">[Deleted] IRON_PORT_WARN_INVALID_DNS_FULL</li>
<li class="">[Deleted] IRON_PORT_WARN_LIMIT</li>
<li class="">[Deleted] IRON_PORT_WARN_MSG</li>
<li class="">[Deleted] IRON_PORT_WSA</li>
<li class="">[Deleted] IRON_PORT_WSA_NOHD</li>
<li class="">[Deleted] IRON_PORT_WSA_NOHD_01</li>
<li class="">[Deleted] IRON_PORT_WSA_NOHD_03</li>
<li class="">[Deleted] IRON_PORT_WSA_SFIMS_PROTOCOL_1</li>
<li class="">[Deleted] IRON_PORT_WSA_SFIMS_PROTOCOL_2</li>
<li class="">[Deleted] IRON_PORT_WSA_SFIMS_PROTOCOL_3</li>
<li class="">[Deleted] IRON_PORT_WSA_SFIMS_PROTOCOL_4</li>
<li class="">[Deleted] Internal_Auth_Logs</li>
<li class="">[Deleted] LINUXSERVER_AUDIT_LOGS_1</li>
<li class="">[Deleted] LINUXSERVER_AUDIT_LOGS_2</li>
<li class="">[Deleted] LINUXSERVER_LOG_1</li>
<li class="">[Deleted] LINUXSERVER_LOG_11</li>
<li class="">[Deleted] LINUXSERVER_LOG_2</li>
<li class="">[Deleted] LINUXSERVER_LOG_3</li>
<li class="">[Deleted] LINUXSERVER_LOG_4</li>
<li class="">[Deleted] LINUXSERVER_LOG_5</li>
<li class="">[Deleted] LINUXSERVER_LOG_6</li>
<li class="">[Deleted] LINUXSERVER_LOG_7</li>
<li class="">[Deleted] LINUX_USER_AND_HOSTNAME</li>
<li class="">[Deleted] Linux_Laravel_Logs1</li>
<li class="">[Deleted] Linux_Laravel_Logs2</li>
<li class="">[Deleted] Linux_Laravel_Logs3</li>
<li class="">[Deleted] MVISION_CASB</li>
<li class="">[Deleted] NAT_RULES_MATCH</li>
<li class="">[Deleted] NMS_LOGS</li>
<li class="">[Deleted] NSM_THREAT_IPS</li>
<li class="">[Deleted] OAUTH_LOG</li>
<li class="">[Deleted] Ossec_Logs_01</li>
<li class="">[Deleted] Ossec_Logs_02</li>
<li class="">[Deleted] Ossec_Logs_03</li>
<li class="">[Deleted] Ossec_Logs_04</li>
<li class="">[Deleted] Ossec_Logs_06</li>
<li class="">[Deleted] PALO_ALTO_TRAPS</li>
<li class="">[Deleted] PALO_TRAPS_EXTRA</li>
<li class="">[Deleted] PAN_TRAPS_ANALYTICS</li>
<li class="">[Deleted] PAN_TRAPS_ANALYTICS_CLOUD</li>
<li class="">[Deleted] PAN_TRAPS_CONFIG_CLOUD</li>
<li class="">[Deleted] PAN_TRAPS_MISC_CLOUD</li>
<li class="">[Deleted] PAN_TRAPS_SYSTEM_CLOUD</li>
<li class="">[Deleted] PULSESECURE_LOGS</li>
<li class="">[Deleted] PULSESECURE_LOGS2</li>
<li class="">[Deleted] Renew_Logs</li>
<li class="">[Deleted] SESSION_ERROR</li>
<li class="">[Deleted] SHIBBOLETH_DUO</li>
<li class="">[Deleted] SHIBBOLETH_HTTP_EDU</li>
<li class="">[Deleted] SHIBBOLETH_HTTP_MAIL</li>
<li class="">[Deleted] SHIBBOLETH_LDAP</li>
<li class="">[Deleted] SHIBBOLETH_LDAP_EMAIL</li>
<li class="">[Deleted] SNARE_AGENTHEARTBEAT_LOGS</li>
<li class="">[Deleted] SNARE_WINDOWS_DHCP_LOGS</li>
<li class="">[Deleted] SNMP_LOGS</li>
<li class="">[Deleted] SURICATA_HTTP_LOGS</li>
<li class="">[Deleted] SURICATA_LOGSTASH</li>
<li class="">[Deleted] SURICATA_LOGSTASH_CUSTOM</li>
<li class="">[Deleted] SURICATA_THREAT_LOGS</li>
<li class="">[Deleted] SYMANTEC_SEP_Anti_Virus</li>
<li class="">[Deleted] SYMANTEC_SEP_PRF_01</li>
<li class="">[Deleted] SYMANTEC_SEP_PRF_02</li>
<li class="">[Deleted] SYMANTEC_SEP_PRF_03</li>
<li class="">[Deleted] SYMANTEC_SEP_SDN</li>
<li class="">[Deleted] SYMANTEC_SEP_SONAR</li>
<li class="">[Deleted] SYMANTEC_SEP_SRF</li>
<li class="">[Deleted] SYMANTEC_SEP_USB_1</li>
<li class="">[Deleted] SonicWall_Bad_FTP_Protocol</li>
<li class="">[Deleted] SonicWall_Block_Dropped_Events</li>
<li class="">[Deleted] SonicWall_Flood_Attack</li>
<li class="">[Deleted] SonicWall_IPS</li>
<li class="">[Deleted] SonicWall_Port_Scan</li>
<li class="">[Deleted] SonicWall_URL_Filter</li>
<li class="">[Deleted] Successful_Logon</li>
<li class="">[Deleted] TANIUM_S24_TYPE_LOGS</li>
<li class="">[Deleted] VAR_LOG_SECURE_SUCCESSFUL_LOGIN</li>
<li class="">[Deleted] VDM_LOG_EXTRA</li>
<li class="">[Deleted] VDM_MESSAGES_CONNECT</li>
<li class="">[Deleted] VDM_MESSAGES_DIRECTORY</li>
<li class="">[Deleted] VDM_MESSAGES_FROM</li>
<li class="">[Deleted] VDM_MESSAGES_FTP</li>
<li class="">[Deleted] VDM_MESSAGES_WARN</li>
<li class="">[Deleted] VLT_VAULT_EXTRA</li>
<li class="">[Deleted] VPN_Message_2</li>
<li class="">[Deleted] VPN_Message_3</li>
<li class="">[Deleted] VPN_Message_4</li>
<li class="">[Deleted] VPN_Message_5</li>
<li class="">[Deleted] VPN_Messages</li>
<li class="">[Deleted] Vmware_Logs_1</li>
<li class="">[Deleted] Vmware_Logs_2</li>
<li class="">[Deleted] Vmware_Logs_3</li>
<li class="">[Deleted] Vmware_Logs_4</li>
<li class="">[Deleted] Vmware_Logs_5</li>
<li class="">[Deleted] Vmware_Logs_6</li>
<li class="">[Deleted] Vmware_Logs_7</li>
<li class="">[Deleted] Vmware_Logs_8</li>
<li class="">[Deleted] WATCHGUARD_FLOW_LOG</li>
<li class="">[Deleted] WATCHGUARD_FLOW_LOG_2</li>
<li class="">[Deleted] WINDOWS_DHCP_LOG</li>
<li class="">[Deleted] WINDOWS_QUICK_FIX</li>
<li class="">[Deleted] Zscaler_Firewall</li>
<li class="">[Deleted] cisco_authentication_01</li>
<li class="">[Deleted] cisco_authentication_02</li>
<li class="">[Deleted] cisco_authentication_03</li>
<li class="">[Deleted] cisco_authentication_04</li>
<li class="">[Deleted] cisco_authentication_05</li>
<li class="">[Deleted] cisco_authentication_06</li>
<li class="">[Deleted] cisco_authentication_07</li>
<li class="">[Deleted] cisco_authentication_08</li>
<li class="">[Deleted] cisco_authentication_09</li>
<li class="">[Deleted] cisco_authentication_10</li>
<li class="">[Deleted] cisco_authentication_11</li>
<li class="">[Deleted] cisco_authentication_12</li>
<li class="">[Deleted] cisco_authentication_13</li>
<li class="">[Deleted] cisco_authentication_14</li>
<li class="">[Deleted] cisco_authentication_15</li>
<li class="">[Deleted] cisco_ios_system_log_message</li>
<li class="">[Deleted] cisco_ios_system_log_message_queue_full</li>
<li class="">[Deleted] citrix_netscaler_AAA_Messsage</li>
<li class="">[Deleted] citrix_netscaler_API_CMD_EXECUTED</li>
<li class="">[Deleted] citrix_netscaler_TCP_connection_terminated</li>
<li class="">[Deleted] citrix_netscaler_delinked_message</li>
<li class="">[Deleted] citrix_netscaler_delinked_message_01</li>
<li class="">[Deleted] windows_defender</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="schema-6">Schema<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#schema-6" class="hash-link" aria-label="Direct link to Schema" title="Direct link to Schema" translate="no">​</a></h4>
<ul>
<li class="">[New] _cipSourceHost</li>
<li class="">[New] _cipSourceName</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-7-2022---announcement">April 7, 2022 - Announcement<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#april-7-2022---announcement" class="hash-link" aria-label="Direct link to April 7, 2022 - Announcement" title="Direct link to April 7, 2022 - Announcement" translate="no">​</a></h3>
<p>On April 21, 2022 we will be removing the following legacy log mappers related to the CIP Windows collector from the Cloud SIEM platform. These log mappers are in use with only a small portion of our customer base and we are working with our technical account teams to reach out directly to those impacted and migrate to our newer Sumo parsers.</p>
<p>No loss of out-of-the-box functionality will occur and no out-of-the-box rules are impacted as the Sumo parsers map all of the same information. Please be sure to check any custom rules that leverage Windows logging for compatibility with the new parsing and mapping, particularly where the "fields" field is referenced.</p>
<ul>
<li class="">Windows - Security - 1100 - CIP</li>
<li class="">Windows - Security - 1102 - CIP</li>
<li class="">Windows - Security - 4625 - CIP</li>
<li class="">Windows - Security - 4624 - CIP</li>
<li class="">Windows - Security - 4634 - CIP</li>
<li class="">Windows - Security - 4648 - CIP</li>
<li class="">Windows - Security - 4649 - CIP</li>
<li class="">Windows - Security - 4672 - CIP</li>
<li class="">Windows - Security - 4688 - CIP</li>
<li class="">Windows - Security - 4697 - CIP</li>
<li class="">Windows - Security - 4698 - CIP</li>
<li class="">Windows - Security - 4702 - CIP</li>
<li class="">Windows - Security - 4720 - CIP</li>
<li class="">Windows - Security - 4726 - CIP</li>
<li class="">Windows - Security - 4740 - CIP</li>
<li class="">Windows - Security - 4742 - CIP</li>
<li class="">Windows - Security - 5805 - CIP</li>
<li class="">Windows - Security - 4768 - CIP</li>
<li class="">Windows - Security - 4769 - CIP</li>
<li class="">Windows - Security - 4770 - CIP</li>
<li class="">Windows - Security - 4771 - CIP</li>
<li class="">Windows - Security - 4776 - CIP</li>
<li class="">Windows - Security - 4778 - CIP</li>
<li class="">Windows - Security - 4779 - CIP</li>
<li class="">Windows - Security - 5140 - CIP</li>
<li class="">Windows - Security - 4728 - CIP</li>
<li class="">Windows - Security - 4732 - CIP</li>
<li class="">Windows - Security - 4756 - CIP</li>
<li class="">Windows - Security - 4661 - CIP</li>
<li class="">Windows - Security - 4704 - CIP</li>
<li class="">Windows - Security - 4754 - CIP</li>
<li class="">Windows - Security - 4780 - CIP</li>
<li class="">Windows - Security - 4793 - CIP</li>
<li class="">Windows - Security - 5038 - CIP</li>
<li class="">Windows - Security - 6272 - CIP</li>
<li class="">Windows - Security - 6273 - CIP</li>
<li class="">Windows - Security - 6275 - CIP</li>
<li class="">Windows - Security - 6278 - CIP</li>
<li class="">Windows - Security - 4662 - CIP</li>
<li class="">Windows - Security - 4755 - CIP</li>
<li class="">Windows - Security - 4689 - CIP</li>
<li class="">Windows - Security - 4798 - CIP</li>
<li class="">Windows - Security - 6416 - CIP</li>
<li class="">Windows - Security - 6423 - CIP</li>
<li class="">Windows - Security - 6424 - CIP</li>
<li class="">Windows - Security - 4656 - CIP</li>
<li class="">Windows - Security - 4663 - CIP</li>
<li class="">Windows - Security - 4658 - CIP</li>
<li class="">Windows - Security - 4674 - CIP</li>
<li class="">Windows - Security - 4799 - CIP</li>
<li class="">Windows - Security - 5058 - CIP</li>
<li class="">Windows - Security - 5059 - CIP</li>
<li class="">Windows - Security - 5061 - CIP</li>
<li class="">Windows - Security - 5379 - CIP</li>
<li class="">Windows - System - 5138 - CIP</li>
<li class="">Windows - System - 6005 - CIP</li>
<li class="">Windows - System - 6006 - CIP</li>
<li class="">Windows - System - 7045 - CIP</li>
<li class="">Windows - Microsoft-Windows-PowerShell/Operational - 4103 - CIP</li>
<li class="">Windows - Microsoft-Windows-PowerShell/Operational - 4104 - CIP</li>
<li class="">Windows - Microsoft-Windows-Sysmon/Operational - 1 - CIP</li>
<li class="">Windows - Microsoft-Windows-Sysmon/Operational - 2 - CIP</li>
<li class="">Windows - Microsoft-Windows-Sysmon/Operational - 3 - CIP</li>
<li class="">Windows - Microsoft-Windows-Sysmon/Operational - 4 - CIP</li>
<li class="">Windows - Microsoft-Windows-Sysmon/Operational - 5 - CIP</li>
<li class="">Windows - Microsoft-Windows-Sysmon/Operational - 6 - CIP</li>
<li class="">Windows - Microsoft-Windows-Sysmon/Operational - 8 - CIP</li>
<li class="">Windows - Microsoft-Windows-Sysmon/Operational - 10 - CIP</li>
<li class="">Windows - Microsoft-Windows-Sysmon/Operational - 11 - CIP</li>
<li class="">Windows - Microsoft-Windows-Sysmon/Operational - 12, 13, and 14 - CIP</li>
<li class="">Windows - Microsoft-Windows-Sysmon/Operational - 15 - CIP</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-7-2022---content-release">April 7, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#april-7-2022---content-release" class="hash-link" aria-label="Direct link to April 7, 2022 - Content Release" title="Direct link to April 7, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-28">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-28" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[Updated] MATCH-S00599 Alibaba ActionTrail Root Login</li>
<li class="">[Updated] MATCH-S00476 Suspicious Execution of Search Indexer</li>
<li class="">[Updated] MATCH-S00570 WMIPRVSE Spawning Process</li>
<li class="">[Updated] MATCH-S00168 Windows - Local System executing whoami.exe</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-34">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-34" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Cisco ASA 313004 JSON</li>
<li class="">[New] Linux OS Syslog - Process kernel - Promiscuous Mode Change</li>
<li class="">[Updated] AzureActivityLog 01</li>
<li class="">[Updated] AzureActivityLog AuditLogs</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="parsers-32">Parsers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#parsers-32" class="hash-link" aria-label="Direct link to Parsers" title="Direct link to Parsers" translate="no">​</a></h4>
<ul>
<li class="">[Updated] /Parsers/System/Cisco/Cisco ASA</li>
<li class="">[Updated] /Parsers/System/Linux/Linux OS Syslog</li>
<li class="">[Updated] /Parsers/System/Microsoft/Microsoft Azure JSON</li>
<li class="">[Updated] /Parsers/System/SentinelOne/SentinelOne Syslog</li>
</ul>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-6-2022---announcement">April 6, 2022 - Announcement<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#april-6-2022---announcement" class="hash-link" aria-label="Direct link to April 6, 2022 - Announcement" title="Direct link to April 6, 2022 - Announcement" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="upcoming-removal-of-unused-content">Upcoming Removal of Unused Content<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#upcoming-removal-of-unused-content" class="hash-link" aria-label="Direct link to Upcoming Removal of Unused Content" title="Direct link to Upcoming Removal of Unused Content" translate="no">​</a></h4>
<p>On Tuesday, April 12th, <strong>unused</strong> legacy grok parsers and their corresponding log mappers will be removed from Cloud SIEM.</p>
<p>This update is part of a longer transition as we begin decommissioning legacy grok parsers in favor of our current parser set. Sumo Logic has confirmed customers are <strong>NOT</strong> actively using any of the legacy grok parsers or log mappers we plan to remove in this future update.</p>
<p>It's important to note that this future content update does <strong>NOT</strong> remove or change existing legacy grok parsers or associated log mappers still used by customers today. We do not expect this update to cause any operational changes.</p>
<hr>
<h3 class="anchor anchorTargetStickyNavbar_Vzrq" id="april-1-2022---content-release">April 1, 2022 - Content Release<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#april-1-2022---content-release" class="hash-link" aria-label="Direct link to April 1, 2022 - Content Release" title="Direct link to April 1, 2022 - Content Release" translate="no">​</a></h3>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="spring4shell-exploitation">Spring4Shell Exploitation<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#spring4shell-exploitation" class="hash-link" aria-label="Direct link to Spring4Shell Exploitation" title="Direct link to Spring4Shell Exploitation" translate="no">​</a></h4>
<p>A new Rule is being deployed designed to detect attempts to exploit Spring4Shell (MATCH-S00783). This Rule does not necessarily indicate whether the exploitation was successful, but Cloud SIEM already includes a number of Rules that provide extensive coverage of common post exploitation activities, notably:</p>
<ul>
<li class="">MATCH-S00348 Curl Start Combination</li>
<li class="">MATCH-S00362 Suspicious Curl File Upload</li>
<li class="">LEGACY-S00044 HTTP Shell Script Download Disguised as a Common Web File</li>
<li class="">MATCH-S00149 PowerShell File Download</li>
<li class="">MATCH-S00164 Suspicious Shells Spawned by Web Servers</li>
<li class="">MATCH-S00174 Web Services Executing Common Web Shell Commands</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="rules-29">Rules<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#rules-29" class="hash-link" aria-label="Direct link to Rules" title="Direct link to Rules" translate="no">​</a></h4>
<ul>
<li class="">[New] MATCH-S00783 Spring4Shell Exploitation - URL</li>
<li class="">[Updated] MATCH-S00555 Threat Intel - Inbound Traffic Context</li>
</ul>
<h4 class="anchor anchorTargetStickyNavbar_Vzrq" id="log-mappers-35">Log Mappers<a href="https://www.sumologic.com/help/release-notes-cse/2022/12/31/#log-mappers-35" class="hash-link" aria-label="Direct link to Log Mappers" title="Direct link to Log Mappers" translate="no">​</a></h4>
<ul>
<li class="">[New] Netskope - WebTx Events</li>
<li class="">[New] Tenable.io Authentication</li>
<li class="">[New] Tenable.io Catch All</li>
<li class="">[Updated] AWS CloudFront</li>
<li class="">[Updated] AWS WAF Block Logs</li>
<li class="">[Updated] Microsoft Office 365 Active Directory Authentication Events</li>
<li class="">[Updated] Tenable.io Vulnerability</li>
</ul>]]></content:encoded>
        </item>
    </channel>
</rss>