Sumo Logic Cloud SIEM
Sumo Logic Cloud SIEM Pack.#
This Integration is part of theFreeing the analyst with autonomous decisions. This integration was integrated and tested with version 6.1.0 of SumoLogicSEC.
#
PrerequisitesOnly use this integration if your Cloud SIEM portal url ends with .sumologic.com
- this can be verified via the url in your browser when logged into Cloud SIEM.
You'll need an access key in order to complete the instance setup. Instructions on how to generate access keys can be found here.
#
Configure SumoLogicSEC on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for SumoLogicSEC.
Click Add instance to create and configure a new integration instance.
Parameter Description Required Sumo Logic API Endpoint https://api.<deployment>.sumologic.com/api/ True Sumo Logic Instance Endpoint For the incident field sumoURL link to work, e.g: https://<yoursubdomain>.<deployment>.sumologic.com False Fetch incidents False Incident type False Access ID True Access Key True Incidents Fetch Interval False Fetch Limit Fetch limit of Sumo Logic insights False Override default fetch query Default fetch query is status:in("new", "inprogress") False First fetch time False Pull associated Sumo Logic signals Whether to pull the Sumo Logic Signals associated with the Insights as Cortex XSOAR incidents False Incident Mirroring Direction Choose the direction to mirror the incident: Incoming (from Sumo Logic SIEM to Cortex XSOAR), Outgoing (from Cortex XSOAR to Sumo Logic SIEM), or Incoming and Outgoing (from/to Cortex XSOAR and Sumo Logic SIEM). False Close Mirrored Cortex XSOAR Incident (Incoming Mirroring) When selected, closing the Sumo Logic Insight with a "Closed" status will close the Cortex XSOAR incident. False Close Mirrored Sumo Logic Insight (Outgoing Mirroring) When selected, closing the Cortex XSOAR incident will close the Sumo Logic Insight in SIEM. False Override Record Summary Fields Record Summary Fields included when fetching Insights (override default) False Click Test to validate the URLs, token, and connection.
#
API documentation and query examplesFor commands with query parameter input the available fields and operators are documented in API docs. These docs are useful when executing queries using the following commands:
sumologic-sec-insight-search
sumologic-sec-signal-search
sumologic-sec-entity-search
To access the API documentation, select the link for your deployment from here. Add sec
to the end of the url to access Cloud SIEM API docs - e.g. https://api.us2.sumologic.com/docs/sec/
.
Example: Insight search query 'q' parameter:
The search query string in our custom DSL that is used to filter the results.
Operators:
exampleField:"bar"
: The value of the field is equal to "bar".exampleField:in("bar", "baz", "qux")
: The value of the field > is equal to either "bar", "baz", or "qux".exampleTextField:contains("foo bar")
: The value of the field > contains the phrase "foo bar".exampleNumField:>5
: The value of the field is greater than 5. There are similar<
,<=
, and>=
operators.exampleNumField:5..10
: The value of the field is between 5 and 10 (inclusive).exampleDateField:>2019-02-01T05:00:00+00:00
: The value of the date field is after 5 a.m. UTC time on February 2, 2019.exampleDateField:2019-02-01T05:00:00+00:00..2019-02-01T08:00:00+00:00
: The value of the date field is between 5 a.m. and 8 a.m. UTC time on February 2, 2019.Fields:
id
readableId
status
name
insightId
description
created
timestamp
closed
assignee
entity.ip
entity.hostname
entity.username
entity.type
enrichment
tag
severity
resolution
ruleId
records
#
Migrating from JASK content packThe table below shows differences between this integration and the legacy JASK integration:
JASK (legacy) | Sumo Logic Cloud SIEM | Notes |
---|---|---|
jask-get-insight-details | sumologic-sec-insight-get-details | |
jask-get-insight-comments | sumologic-sec-insight-get-comments | |
jask-get-signal-details | sumologic-sec-signal-get-details | |
jask-get-entity-details | sumologic-sec-entity-get-details | |
Depreacted | ||
Deprecated - use command sumologic-sec-entity-search with filter whitelisted:"true" | ||
jask-search-insights | sumologic-sec-insight-search | |
jask-search-entities | sumologic-sec-entity-search | |
jask-search-signals | sumologic-sec-signal-search |
#
New commands introduced in Sumo Logic Cloud SIEM packsumologic-sec-insight-set-status
sumologic-sec-match-list-get
sumologic-sec-match-list-update
sumologic-sec-threat-intel-search-indicators
sumologic-sec-threat-intel-get-sources
sumologic-sec-threat-intel-update-source
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
sumologic-sec-insight-get-detailsGet Insight details for a specific Insight ID.
#
Base Commandsumologic-sec-insight-get-details
#
InputArgument Name | Description | Required |
---|---|---|
insight_id | The insight to retrieve details for. | Required |
record_summary_fields | Record Summary Fields to include in the output (override default fields). | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
SumoLogicSec.Insight.Assignee | string | User or team assigned to the Insight |
SumoLogicSec.Insight.Closed | Date | Closed date |
SumoLogicSec.Insight.ClosedBy | String | Closed by user |
SumoLogicSec.Insight.Created | Date | Created date |
SumoLogicSec.Insight.Description | String | Description of the Insight |
SumoLogicSec.Insight.Entity | String | Entity name associated with the Insight |
SumoLogicSec.Insight.Id | String | The ID of the Insight |
SumoLogicSec.Insight.LastUpdated | Date | The time the Insight was last updated |
SumoLogicSec.Insight.LastUpdatedBy | string | The last user to update the Insight |
SumoLogicSec.Insight.Name | String | The name of the Insight |
SumoLogicSec.Insight.ReadableId | String | The ID of the Insight in readable form |
SumoLogicSec.InsightList.RecordSummaryFields | Array | Record Summary Fields associated with the Insight |
SumoLogicSec.Insight.Resolution | String | Resolution for closed Insight |
SumoLogicSec.Insight.Severity | String | The severity of the Insight |
SumoLogicSec.Insight.Signals.contentType | String | Type of content that triggered the Signal |
SumoLogicSec.Insight.Signals.description | String | Description of the Signal |
SumoLogicSec.Insight.Signals.id | String | The ID of the Signal |
SumoLogicSec.Insight.Signals.name | String | The name of the Signal |
SumoLogicSec.Insight.Signals.recordCount | Number | Number of records associated with the Signal |
SumoLogicSec.Insight.Signals.ruleId | String | Rule ID associated with the Signal |
SumoLogicSec.Insight.Signals.severity | Number | The severity of the Signal |
SumoLogicSec.Insight.Signals.stage | String | The stage of the Signal |
SumoLogicSec.Insight.Signals.timestamp | Date | Signal timestamp |
SumoLogicSec.Insight.Source | String | The source of the Insight |
SumoLogicSec.Insight.Status | String | The status of the Insight |
SumoLogicSec.Insight.TimeToDetection | Number | Insight time to detection |
SumoLogicSec.Insight.TimeToRemediation | Number | Insight time to remediation |
SumoLogicSec.Insight.TimeToResponse | Number | Insight time to response |
SumoLogicSec.Insight.Timestamp | Date | Insight timestamp |
#
Command Example!sumologic-sec-insight-get-details insight-id=INSIGHT-116
#
Human Readable OutputInsight Details: |Id|Readable Id|Name|Action|Status|Assignee|Description|Last Updated|Last Updated By|Severity|Closed|Closed By|Timestamp|Entity|Resolution| |---|---|---|---|---|---|---|---|---|---|---|---|---|---|---| | c6c97d84-983d-303e-a03b-86f53d657fc8 | INSIGHT-116 | Lateral Movement with Discovery and Credential Access | | Closed | | Initial Access, Lateral Movement, Discovery, Initial Access, Credential Access | 2021-05-10T23:48:10.016204 | | HIGH | 2021-05-10T23:48:09.961023 | obfuscated@email.com | 2021-02-18T22:04:08.330000 | 1.2.3.4 | No Action |
#
sumologic-sec-insight-get-commentsGet comments for a specific Insight ID. (Users can post and update comments on the Sumo Logic Cloud SIEM portal for any Insight ID.)
#
Base Commandsumologic-sec-insight-add-comment
#
InputArgument Name | Description | Required |
---|---|---|
insight_id | The insight ID for which to add a comment. | Required |
comment | The comment to be added. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
SumoLogicSec.InsightComments.Id | String | ID of comment |
SumoLogicSec.InsightComments.Body | String | Comment contents |
SumoLogicSec.InsightComments.Author | String | User that created the comment |
SumoLogicSec.InsightComments.Timestamp | Date | Comment created timestamp |
SumoLogicSec.InsightComments.InsightId | String | The ID of the Insight |
#
Command Example!sumologic-sec-insight-add-comment insight-id=INSIGHT-116 comment="This is an example comment"
#
Human Readable OutputInsight Comment: |Id|Insight Id|Author|Body|Last Updated|Timestamp| |---|---|---|---|---|---| | 2 | INSIGHT-116 | obfuscated@email.com | This is an example comment | | 2021-04-23T00:38:43.977543 |
#
sumologic-sec-insight-get-commentsGet comments for a specific Insight ID. (Users can post and update comments on the Sumo Logic Cloud SIEM portal for any Insight ID.)
#
Base Commandsumologic-sec-insight-get-comments
#
InputArgument Name | Description | Required |
---|---|---|
insight_id | The insight ID for which to retrieve comments. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
SumoLogicSec.InsightComments.Id | String | ID of comment |
SumoLogicSec.InsightComments.Body | String | Comment contents |
SumoLogicSec.InsightComments.Author | String | User that created the comment |
SumoLogicSec.InsightComments.Timestamp | Date | Comment created timestamp |
SumoLogicSec.InsightComments.InsightId | String | The ID of the Insight |
#
Command Example!sumologic-sec-insight-get-comments insight-id=INSIGHT-116
#
Human Readable OutputInsight Comments: |Id|Insight Id|Author|Body|Last Updated|Timestamp| |---|---|---|---|---|---| | 2 | INSIGHT-116 | obfuscated@email.com | This is an example comment | | 2021-04-23T00:38:43.977543 |
#
sumologic-sec-signal-get-detailsGet Signal details for a specific Signal ID. Signal details command references signals in Sumo Logic Cloud SIEM which are created when records exhibit suspicious properties and mate with patterns or other detection logic.
#
Base Commandsumologic-sec-signal-get-details
#
InputArgument Name | Description | Required |
---|---|---|
signal_id | The signal to retrieve details for. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
SumoLogicSec.Signal.ContentType | String | Type of content that triggered the Signal |
SumoLogicSec.Signal.Description | String | Description of the Signal |
SumoLogicSec.Signal.Entity | String | Entity name associated with the Signal |
SumoLogicSec.Signal.Id | String | The ID of the Signal |
SumoLogicSec.Signal.Name | String | The name of the Signal |
SumoLogicSec.Signal.RecordCount | Number | Number of records associated with the Signal |
SumoLogicSec.Signal.RuleId | String | Rule ID associated with the Signal |
SumoLogicSec.Signal.Severity | Number | The severity of the Signal |
SumoLogicSec.Signal.Stage | String | The stage of the Signal |
SumoLogicSec.Signal.Suppressed | Boolean | Whether or not the Signal was suppressed |
SumoLogicSec.Signal.Timestamp | Date | Signal timestamp |
#
Command Example!sumologic-sec-signal-get-details signal-id=e0e7096b-2f91-5b72-b1a2-db48ce882dfc
#
Human Readable OutputSignal Details: |Id|Name|Rule Id|Description|Severity|Content Type|Timestamp|Entity |---|---|---|---|---|---|---|---| | e0e7096b-2f91-5b72-b1a2-db48ce882dfc | Potential malicious JVM download | LEGACY-S00062 | A document was downloaded and opened followed by a file download using a Java user-agent. | 4 | RULE | 2021-02-18T22:04:08.230000 | 1.2.3.4
#
sumologic-sec-entity-get-detailsGet entity details for a specific entity ID
#
Base Commandsumologic-sec-entity-get-details
#
InputArgument Name | Description | Required |
---|---|---|
entity-id | The entity to retrieve details for. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
SumoLogicSec.Entity.ActivityScore | Number | Entity Activity Score |
SumoLogicSec.Entity.FirstSeen | Date | When the Entity was first seen |
SumoLogicSec.Entity.Hostname | String | Entity hostname |
SumoLogicSec.Entity.Id | String | Entity ID |
SumoLogicSec.Entity.IsWhitelisted | Boolean | Whether or not the Entity is on allow list |
SumoLogicSec.Entity.LastSeen | Date | When the Entity was last seen |
SumoLogicSec.Entity.Name | String | The Entity name |
SumoLogicSec.Entity.OperatingSystem | String | Entity Operating System (observed or from inventory) |
SumoLogicSec.Entity.InventoryData | Boolean | Whether or not this Entity was ingested from inventory e.g. Active Directory |
#
Command Example!sumologic-sec-entity-get-details entity-id=_hostname-win10--admin.obfuscated
#
Human Readable Output#
Entity Details:Id | Name | First Seen | Last Seen | Activity Score | Is Whitelisted | Operating System | Inventory Data |
---|---|---|---|---|---|---|---|
_hostname-win10--admin.obfuscated | win10-admin.obfuscated | 2021-04-21T14:43:38.526000 | 9 | false | Windows 10 Enterprise | true |
#
sumologic-sec-insight-searchSearch insights using available filters
#
Base Commandsumologic-sec-insight-search
#
InputArgument Name | Description | Required |
---|---|---|
query | Use a query string to search, see API documentation for more details. | Optional |
created | When the insight was created. Defaults to 'All time' if no time arguments are specified. Possible values are: All time, Last week, Last 48 hours, Last 24 hours. | Optional |
status | Comma separated list of values from the options: new,inprogress,closed. | Optional |
asignee | User assigned to Insights. | Optional |
offset | The number of items to skip before starting to collect the result set. Default is 0. | Optional |
limit | The maximum number of items to return. Default is 10. | Optional |
record_summary_fields | Record Summary Fields to include in the output (override default fields). | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
SumoLogicSec.InsightList.Assignee | String | User or team assigned to the Insight |
SumoLogicSec.InsightList.Closed | Date | Closed date |
SumoLogicSec.InsightList.ClosedBy | String | Closed by user |
SumoLogicSec.InsightList.Created | Date | Created date |
SumoLogicSec.InsightList.Description | String | Description of the Insight |
SumoLogicSec.InsightList.Entity | String | Entity name associated with the Insight |
SumoLogicSec.InsightList.Id | String | The ID of the Insight |
SumoLogicSec.InsightList.LastUpdated | Date | The time the Insight was last updated |
SumoLogicSec.InsightList.LastUpdatedBy | String | The last user to update the Insight |
SumoLogicSec.InsightList.Name | String | The name of the Insight |
SumoLogicSec.InsightList.ReadableId | String | The ID of the Insight in readable form |
SumoLogicSec.InsightList.RecordSummaryFields | Array | Record Summary Fields associated with the Insight |
SumoLogicSec.InsightList.Resolution | String | Resolution for closed Insight |
SumoLogicSec.InsightList.Severity | String | The severity of the Insight |
SumoLogicSec.InsightList.Signals.contentType | String | Type of content that triggered the Signal |
SumoLogicSec.InsightList.Signals.description | String | Description of the Signal |
SumoLogicSec.InsightList.Signals.id | String | The ID of the Signal |
SumoLogicSec.InsightList.Signals.name | String | The name of the Signal |
SumoLogicSec.InsightList.Signals.recordCount | Number | Number of records associated with the Signal |
SumoLogicSec.InsightList.Signals.ruleId | String | Rule ID associated with the Signal |
SumoLogicSec.InsightList.Signals.severity | Number | The severity of the Signal |
SumoLogicSec.InsightList.Signals.stage | String | The stage of the Signal |
SumoLogicSec.InsightList.Signals.timestamp | Date | Signal timestamp |
SumoLogicSec.InsightList.Source | String | The source of the Insight |
SumoLogicSec.InsightList.Status | String | The status of the Insight |
SumoLogicSec.InsightList.TimeToDetection | Number | Insight time to detection |
SumoLogicSec.InsightList.TimeToRemediation | Number | Insight time to remediation |
SumoLogicSec.InsightList.TimeToResponse | Number | Insight time to response |
SumoLogicSec.InsightList.Timestamp | Date | Insight timestamp |
#
Command Example!sumologic-sec-insight-search query="timestamp:>\"2021-02-01T05:00:00+00:00\" status:\"closed\" AND severity:>\"MEDIUM\"" limit=3
#
Human Readable OutputInsights: |Id|Readable Id|Name|Action|Status|Assignee|Description|Last Updated|Last Updated By|Severity|Closed|Closed By|Timestamp|Entity|Resolution| |---|---|---|---|---|---|---|---|---|---|---|---|---|---|---| | 00853cdd-763e-3e31-a2e4-f74277922f9f | INSIGHT-220 | Command and Control with Defense Evasion and Execution | | Closed | | Initial Access, Command and Control, Defense Evasion, Execution | 2021-03-23T20:06:51.565599 | | HIGH | 2021-03-23T20:06:51.511505 | obfuscated@email.com | 2021-02-22T16:27:51 | testcomputer.somedomain.net | No Action | | eefdff8d-7447-3b47-83e0-66a0b210d618 | INSIGHT-219 | Discovery with Credential Access and Execution | | Closed | | Initial Access, Credential Access, Initial Access, Execution, Discovery, Credential Access | 2021-03-23T21:21:55.029798 | | HIGH | 2021-03-23T21:21:54.914061 | obfuscated@email.com | 2021-02-22T16:24:07.959000 | 1.2.3.4 | No Action | | 8a77d12e-5905-3401-ae7c-2e17b1fd3060 | INSIGHT-221 | Privilege Escalation with Persistence and Execution | | Closed | obfuscated@email.com | Execution, Privilege Escalation, Persistence, Execution | 2021-05-12T21:47:08.297222 | | HIGH | 2021-05-12T21:47:08.132251 | obfuscated@email.com | 2021-02-22T16:24:07.959000 | 5.6.7.8 | No Action |
#
sumologic-sec-signal-searchSearch signals using available filters
#
Base Commandsumologic-sec-signal-search
#
InputArgument Name | Description | Required |
---|---|---|
query | Use a query string to search, see API documentation for more details. | Optional |
created | When the Signal was created. Defaults to 'All time' if no time arguments are specified. Possible values are: All time, Last week, Last 48 hours, Last 24 hours. Default is All time. | Optional |
contentType | Content type associated with the signals. Options: ANOMALY, DEFAULT, THREATINTEL, RULE. Possible values are: ANOMALY, DEFAULT, THREATINTEL, RULE. | Optional |
offset | The number of items to skip before starting to collect the result set. Default is 0. | Optional |
limit | The maximum number of items to return. Default is 10. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
SumoLogicSec.SignalList.ContentType | String | Type of content that triggered the Signal |
SumoLogicSec.SignalList.Description | String | Description of the Signal |
SumoLogicSec.SignalList.Entity | String | Entity name associated with the Signal |
SumoLogicSec.SignalList.Id | String | The ID of the Signal |
SumoLogicSec.SignalList.Name | String | The name of the Signal |
SumoLogicSec.SignalList.RecordCount | Number | Number of records associated with the Signal |
SumoLogicSec.SignalList.RuleId | String | Rule ID associated with the Signal |
SumoLogicSec.SignalList.Severity | Number | The severity of the Signal |
SumoLogicSec.SignalList.Stage | String | The stage of the Signal |
SumoLogicSec.SignalList.Suppressed | Boolean | Whether or not the Signal was suppressed |
SumoLogicSec.SignalList.Timestamp | Date | Signal timestamp |
#
Command Example!sumologic-sec-signal-search query="timestamp:NOW-7D.NOW name:contains(\"Internal\")"
#
Human Readable OutputSignals:
|Id|Name|Entity|Rule Id|Description|Severity|Stage|Timestamp|Content Type|Tags|
|---|---|---|---|---|---|---|---|---|---|
| b50fd570-341b-576d-85b5-8b5cd17c0aee | IP Address Scan - Internal | 1.2.3.4 | LEGACY-S00050 | A scan of IP addresses | 3 | Discovery | 2021-04-22T04:08:13.514000 | RULE | _mitreAttackTactic:TA0007,
_mitreAttackTactic:TA0043,
_mitreAttackTechnique:T1046,
_mitreAttackTechnique:T1595 |
#
sumologic-sec-entity-searchSearch entities using the available filters
#
Base Commandsumologic-sec-entity-search
#
InputArgument Name | Description | Required |
---|---|---|
query | Use a query string to search, see API documentation for more details. | Optional |
ip | IP Address to search for e.g. 1.2.3.4. | Optional |
hostname | Hostname to search for e.g. host.example.com. | Optional |
username | Username to search for e.g. admin. | Optional |
type | Entity type to search for. Options: username, hostname, ip, mac. Possible values are: username, hostname, ip, mac. | Optional |
whitelisted | Is the Entity whitelisted? true/false. Possible values are: true, false. | Optional |
tag | Tag contains value. | Optional |
offset | The number of items to skip before starting to collect the result set. Default is 0. | Optional |
limit | The maximum number of items to return. Default is 10. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
SumoLogicSec.EntityList.ActivityScore | Number | Entity Activity Score |
SumoLogicSec.EntityList.FirstSeen | Date | When the Entity was first seen |
SumoLogicSec.EntityList.Id | String | Entity ID |
SumoLogicSec.EntityList.IpHostname | String | Hostname associated with IP Entity |
SumoLogicSec.EntityList.IsWhitelisted | Boolean | Whether or not the Entity is on allow list |
SumoLogicSec.EntityList.LastSeen | Date | When the Entity was last seen |
SumoLogicSec.EntityList.Name | String | The Entity name |
SumoLogicSec.EntityList.OperatingSystem | String | Entity Operating System (observed or from inventory) |
SumoLogicSec.EntityList.InventoryData | Boolean | Whether or not this Entity was ingested from inventory e.g. Active Directory |
SumoLogicSec.EntityList.Hostname | String | Entity hostname |
SumoLogicSec.EntityList.Department | String | Username Entity department |
SumoLogicSec.EntityList.EmployeeId | String | Username Entity employee ID |
#
Command Example!sumologic-sec-entity-search query="type:\"ip\" activityScore:>=3"
#
Human Readable OutputEntities: |Id|Name|First Seen|Last Seen|Activity Score|Is Whitelisted|Operating System|Inventory Data| |---|---|---|---|---|---|---|---| | _ip-specops_analysis_lab-1.2.3.4 | 1.2.3.4 | | 2021-04-22T04:08:13.514000 | 3 | false | | false |
#
sumologic-sec-insight-set-statusChange status of Insight
#
Base Commandsumologic-sec-insight-set-status
#
InputArgument Name | Description | Required |
---|---|---|
insight_id | The insight to change status for. | Required |
status | The desired Insight status. Possible values are: new, inprogress, closed. Default is in-progress. | Optional |
resolution | Resolution for closing Insight. Valid values are: "Resolved", "False Positive", "No Action", "Duplicate". Possible values are: Resolved, False Positive, No Action, Duplicate. Default is Resolved. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
SumoLogicSec.Insight.Assignee | String | User or team assigned to the Insight |
SumoLogicSec.Insight.Closed | Date | Closed date |
SumoLogicSec.Insight.ClosedBy | String | Closed by user |
SumoLogicSec.Insight.Created | Date | Created date |
SumoLogicSec.Insight.Description | String | Description of the Insight |
SumoLogicSec.Insight.Entity | String | Entity name associated with the Insight |
SumoLogicSec.Insight.Id | String | The ID of the Insight |
SumoLogicSec.Insight.LastUpdated | Date | The time the Insight was last updated |
SumoLogicSec.Insight.LastUpdatedBy | String | The last user to update the Insight |
SumoLogicSec.Insight.Name | String | The name of the Insight |
SumoLogicSec.Insight.ReadableId | String | The ID of the Insight in readable form |
SumoLogicSec.Insight.Resolution | String | Resolution for closed Insight |
SumoLogicSec.Insight.Severity | String | The severity of the Insight |
SumoLogicSec.Insight.Signals.contentType | String | Type of content that triggered the Signal |
SumoLogicSec.Insight.Signals.description | String | Description of the Signal |
SumoLogicSec.Insight.Signals.id | String | The ID of the Signal |
SumoLogicSec.Insight.Signals.name | String | The name of the Signal |
SumoLogicSec.Insight.Signals.recordCount | Number | Number of records associated with the Signal |
SumoLogicSec.Insight.Signals.ruleId | String | Rule ID associated with the Signal |
SumoLogicSec.Insight.Signals.severity | Number | The severity of the Signal |
SumoLogicSec.Insight.Signals.stage | String | The stage of the Signal |
SumoLogicSec.Insight.Signals.timestamp | Date | Signal timestamp |
SumoLogicSec.Insight.Source | String | The source of the Insight |
SumoLogicSec.Insight.Status | String | The status of the Insight |
SumoLogicSec.Insight.TimeToDetection | Number | Insight time to detection |
SumoLogicSec.Insight.TimeToRemediation | Number | Insight time to remediation |
SumoLogicSec.Insight.TimeToResponse | Number | Insight time to response |
SumoLogicSec.Insight.Timestamp | Date | Insight timestamp |
#
Command Example!sumologic-sec-insight-set-status insight-id=INSIGHT-116 status=closed resolution="No Action"
#
Human Readable OutputInsight Details: |Id|Readable Id|Name|Action|Status|Assignee|Description|Last Updated|Last Updated By|Severity|Closed|Closed By|Timestamp|Entity|Resolution| |---|---|---|---|---|---|---|---|---|---|---|---|---|---|---| | c6c97d84-983d-303e-a03b-86f53d657fc8 | INSIGHT-116 | Lateral Movement with Discovery and Credential Access | | Closed | | Initial Access, Lateral Movement, Discovery, Initial Access, Credential Access | 2021-05-13T01:28:32.648352 | | HIGH | 2021-05-13T01:28:32.580039 | obfuscated@email.com | 2021-02-18T22:04:08.330000 | 1.2.3.4 | No Action |
#
sumologic-sec-match-list-getGet match lists
#
Base Commandsumologic-sec-match-list-get
#
InputArgument Name | Description | Required |
---|---|---|
offset | The number of items to skip before starting to collect the result set. Default is 0. | Optional |
limit | Number of match lists returned. Default is 10. | Optional |
sort | Sort expression. Default is name. | Optional |
sortDir | Sort direction. Possible values are: ASC, DESC. Default is ASC. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
SumoLogicSec.MatchLists.Created | String | When the Match List was created |
SumoLogicSec.MatchLists.CreatedBy | String | User that created the Match List |
SumoLogicSec.MatchLists.DefaultTtl | Number | Default TTL for entries in the Match List |
SumoLogicSec.MatchLists.Description | String | Description of the Match List |
SumoLogicSec.MatchLists.Id | String | ID of the Match List |
SumoLogicSec.MatchLists.LastUpdated | String | When the Match List was last updated |
SumoLogicSec.MatchLists.LastUpdatedBy | String | The last user to update the Match List |
SumoLogicSec.MatchLists.Name | String | Name of Match List |
SumoLogicSec.MatchLists.TargetColumn | String | Match List Target Column |
#
Command Example!sumologic-sec-match-list-get limit=3
#
Human Readable OutputMatch lists: |Id|Name|Target Column|Default Ttl| |---|---|---|---| | 173 | admin_ips | SrcIp | 0 | | 24 | auth_servers | Ip | | | 162 | auth_servers_dst | DstIp | |
#
sumologic-sec-match-list-updateAdd item to match list
#
Base Commandsumologic-sec-match-list-update
#
InputArgument Name | Description | Required |
---|---|---|
match_list_id | ID of match list. | Required |
active | Item active or disabled. | Required |
description | Description of match list item. | Required |
expiration | Expiration of match list item, e.g. "2021-03-25T23:52:23.508Z". | Required |
value | Value of match list item. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
SumoLogicSec.UpdateResult.Result | String | Result (Success or Failed) |
SumoLogicSec.UpdateResult.Server response | Boolean | Server response (True or False) |
#
Command Example!sumologic-sec-match-list-update match-list-id=166 description="My description" expiration=2021-04-25T22:36:10.925Z value="10.20.30.40" active=true
#
Human Readable OutputResult: |Result|Server Response| |---|---| | Success | true |
#
sumologic-sec-threat-intel-search-indicatorsSearch Threat Intel Indicators
#
Base Commandsumologic-sec-threat-intel-search-indicators
#
InputArgument Name | Description | Required |
---|---|---|
q | Use a query string to search, see API documentation for more details. | Optional |
value | The value to search for. | Required |
offset | The number of items to skip before starting to collect the result set. Default is 0. | Optional |
limit | The numbers of items to return. Default is 10. | Optional |
sourceIds | Comma separated list of threat intelligence source IDs to search, e.g. 1,2,3. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
SumoLogicSec.ThreatIntelIndicators.Active | Boolean | Whether or not the Threat Intel Indicator is Active |
SumoLogicSec.ThreatIntelIndicators.Expiration | Date | Date and time the Threat Intel Indicator is set to expire |
SumoLogicSec.ThreatIntelIndicators.Id | String | ID of Threat Intel Indicator |
SumoLogicSec.ThreatIntelIndicators.Meta.created.username | String | User that created the Threat Intel Indicator |
SumoLogicSec.ThreatIntelIndicators.Meta.created.when | Date | When the Threat Intel Indicator was created |
SumoLogicSec.ThreatIntelIndicators.Meta.description | String | Description of Threat Intel Indicator |
SumoLogicSec.ThreatIntelIndicators.Meta.updated | Date | When the Threat Intel Indicator was last updated |
SumoLogicSec.ThreatIntelIndicators.Value | String | Value of Threat Intel Indicator |
#
Command Example!sumologic-sec-threat-intel-search-indicators value=1.2.3.4 sourceIds=54
#
Human Readable OutputThreat Intel Indicators: |Id|Value|Active|Expiration| |---|---|---|---| | f396ae69aa223c049ff639b3649ba1dd6465ec74397c3126916786bbcd6d76017468726561745f49705f44656d6973746f5f54657374 | 1.2.3.4 | true | 2021-04-29T00:00:00 |
#
sumologic-sec-threat-intel-get-sourcesGet Threat Intel Sources
#
Base Commandsumologic-sec-threat-intel-get-sources
#
InputArgument Name | Description | Required |
---|---|---|
offset | The number of items to skip before starting to collect the result set. Default is 0. | Optional |
limit | The numbers of items to return. Default is 10. | Optional |
sort | Sort expression. Default is name. | Optional |
sortDir | Sort direction. Possible values are: ASC, DESC. Default is ASC. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
SumoLogicSec.ThreatIntelSources.Created | String | When the Threat Intel Source was created |
SumoLogicSec.ThreatIntelSources.CreatedBy | String | User that created the Threat Intel Source |
SumoLogicSec.ThreatIntelSources.Description | String | Description of Threat Intel Source |
SumoLogicSec.ThreatIntelSources.Id | String | ID of Threat Intel Source |
SumoLogicSec.ThreatIntelSources.LastUpdated | String | When the Threat Intel Source was last updated |
SumoLogicSec.ThreatIntelSources.LastUpdatedBy | String | User that last updated the Threat Intel Source |
SumoLogicSec.ThreatIntelSources.Name | String | Name of Threat Intel Source |
SumoLogicSec.ThreatIntelSources.SourceType | String | Source type of Threat Intel Source |
#
Command Example!sumologic-sec-threat-intel-get-sources limit=3
#
Human Readable OutputThreat intel sources: |Id|Name|Description|Source Type| |---|---|---|---| | 35 | abuse.ch | | CUSTOM | | 25 | Alienvault OTX | Alienvault | TAXII | | 24 | Anomali | | TAXII |
#
sumologic-sec-threat-intel-update-sourceAdd Threat Intel Indicator to Threat Intel Source
#
Base Commandsumologic-sec-threat-intel-update-source
#
InputArgument Name | Description | Required |
---|---|---|
threat-intel-source-id | ID of Threat Intel Source. | Required |
active | Indicator active or disabled. Default is true. | Required |
description | Description of indicator. | Required |
expiration | Expiration of match list item, e.g. "2021-03-25T23:52:23.508Z". | Required |
value | Indicator value. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
SumoLogicSec.UpdateResult.Result | String | Result (Success or Failed) |
SumoLogicSec.UpdateResult.Server response | Boolean | Server response (True or False) |
#
Command Example!sumologic-sec-threat-intel-update-source threat-intel-source-id=54 active=true value=1.2.3.4 description=test expiration=2021-04-29T00:00:00.000Z
#
Human Readable OutputResult: |Result|Server Response| |---|---| | Success | true |