Skip to content

Commit be8fa99

Browse files
authored
Merge branch 'main' into replace-reinvent-banner
2 parents bc9c762 + 7ce1982 commit be8fa99

File tree

20 files changed

+364
-32
lines changed

20 files changed

+364
-32
lines changed

docs/manage/partitions/data-tiers/index.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -66,8 +66,8 @@ How you can search and use your ingested data varies by the Data Tier it resides
6666
| Logs to Metrics | ✓ | ✓ | ✓ |
6767
| Data Forwarding | ✓ | ✓ | |
6868
| Live Tail | ✓ | ✓ | ✓ |
69-
| Dashboards | &#10003; | Activation required<sup>*</sup> | |
70-
| Monitors | &#10003; | Activation required<sup>*</sup> | |
69+
| Dashboards | &#10003; | | Activation required<sup>*</sup> |
70+
| Monitors | &#10003; | | Activation required<sup>*</sup> |
7171
| Scheduled Searches | &#10003; | | |
7272
| Scheduled Views | &#10003; | | |
7373
| API Queries | &#10003; | &#10003; | &#10003; |

docs/platform-services/automation-service/app-central/integrations/crowdstrike-falcon.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
77

88
<img src={useBaseUrl('/img/platform-services/automation-service/app-central/logos/crowdstrike-falcon.png')} alt="crowdstrike-falcon" width="100"/>
99

10-
***Version: 1.19
11-
Updated: Nov 10, 2025***
10+
***Version: 1.20
11+
Updated: Dec 05, 2025***
1212

1313
The CrowdStrike Falcon integration allows you to pull and update Alerts/Incidents, and search Incidents/Devices/Alerts.
1414

@@ -32,6 +32,7 @@ The CrowdStrike Falcon integration allows you to pull and update Alerts/Incident
3232
* **Search into Incidents** *(Enrichment)* - Search for incidents by providing an FQL filter, sorting, and paging
3333
details.
3434
* **Update Alerts** *(Containment)* - Perform actions on Alerts identified by composite ID(s) in request.
35+
* **On Demand Device Scan** *(Containment)* - Initiate a scan on device by providing the device ID. This action will only work for Windows hosts.
3536

3637
## Category
3738

@@ -110,4 +111,6 @@ For information about CrowdStrike Falcon, see [CrowdStrike documentation](https:
110111
+ Search into Alerts
111112
+ Alerts CrowdStrike Falcon Daemon
112113
* Nov 10, 2025 (v1.19) - Updated Query Parameter
113-
+ Get User ID By Mail
114+
+ Get User ID By Mail
115+
* Dec 05, 2025 (v1.20) - Added new action
116+
+ On Demand Device Scan

docs/platform-services/automation-service/playbooks/create-playbooks.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,8 +118,13 @@ For examples of adding conditions to playbooks, see the [Cloud SIEM automation e
118118
1. Draw a line from a previous action node to the new condition node. This is required to allow the condition to evaluate the output values from the previous action.
119119
1. Now that you've linked the condition to an action, hover the mouse over the condition node and click the edit button on the node to configure the condition settings.<br/><img src={useBaseUrl('img/cse/automations-edit-condition-node.png')} style={{border:'1px solid gray'}} alt="Edit a condition node" width="150"/>
120120
1. The condition node configuration dialog displays again. Under **Condition1**, click **Select a value**.<br/><img src={useBaseUrl('img/cse/automations-add-a-condition-3.png')} style={{border:'1px solid gray'}} alt="Select values for the condition" width="500"/>
121-
1. Click **Get Value** and select from the drop-down menu whether the value will evaluate to **true (bool)**, **false (bool)**, or **empty**. You can also manually enter a value, such as a string or numeric literal.<br/><img src={useBaseUrl('img/cse/automations-add-condition-node-2.png')} style={{border:'1px solid gray'}} alt="Get values for the condition" width="500"/>
122-
1. Under **Get value from a previous action**, select the value to feed into the condition. The example shows **Get Devices** and **Playbook inputs** that came from the previous action. (The condition must be linked by a line to the previous action node to receive outputs from the action.) Click the options from the previous action and select which output type (for example, hashes, IP addresses, domains) to evaluate and add it to the condition.
121+
1. Click **Get Value** and select values from the drop-down menu to use for the condition:
122+
* **Internal values**. Whether the condition will evaluate to **true (bool)**, **false (bool)**, or **empty**.
123+
* **Artifact fields**. Fields obtained from [incident artifacts](/docs/cloud-soar/incidents-triage/#incident-generation).
124+
* **Incident fields**. Fields obtained from [incidents](/docs/cloud-soar/settings/#incidents).
125+
* **Triage**. Fields obtained from [triage](/docs/cloud-soar/incidents-triage/#triage-field-settings).
126+
* You can also manually enter a value, such as a string or numeric literal.<br/><img src={useBaseUrl('img/cse/automations-add-condition-node-2.png')} style={{border:'1px solid gray'}} alt="Get values for the condition" width="500"/>
127+
1. Under **Get value from a previous action**, select the value to feed into the condition. The example shows **IP Reputation V2** and **Playbook inputs** that came from the previous action. (The condition must be linked by a line to the previous action node to receive outputs from the action.) Click the options from the previous action and select which output type (for example, hashes, IP addresses, domains) to evaluate and add it to the condition.
123128
1. The selected output type will be displayed under **Condition 1**. Select which condition you would like for the output results to meet from the inequality operators below and click **Select a value** to define the condition.
124129
1. Now that **Condition 1** is defined, you can choose to filter your results further by selecting an **AND/OR** operator to define another condition.
125130
:::warning

docs/search/search-query-language/search-operators/macro.md

Lines changed: 22 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -39,18 +39,18 @@ To create a macro, follow the steps below:
3939
1. [**New UI**](/docs/get-started/sumo-logic-ui/). In the main Sumo Logic menu, select **Data Management**, and then under **Logs**, select **Macros**. You can also click the **Go To...** menu at the top of the screen and select **Macros**.<br/>[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data** > **Logs** > **Macros**.
4040
1. Click **+ Add Macro**.<br/><img src={useBaseUrl('img/search/searchquerylanguage/search-operators/macro-logs-page.png')} alt="macro-logs-page" style={{border: '1px solid gray'}} width="800" />
4141
1. Or, in the log search page, select the part of search query language that needs to be reused and click on **Create Macro**.<br/><img src={useBaseUrl('img/search/searchquerylanguage/search-operators/macro-search-page.png')} alt="macro-search-page" style={{border: '1px solid gray'}} width="800" />
42-
1. **Macro Details**. Enter the name for the macro. Description is optional.
43-
1. **Macro Definition**. Enter the definition for the macro. To add arguments use the `{{Arg}}` syntax or select a part of the definition and click on **Add Argument**.
44-
1. (Optional) **Arguments**. Enter the name and select the data type for the argument selected.
45-
1. (Optional) **Argument Validation**. Define the validation condition and enter the error message that needs to be shown when the validation expression returns false.
46-
1. **Usage**. Preview of how you use the macro in the log search.
47-
1. Click **Submit** to save the macro.
42+
1. In the **Create Macro** page, enter the following details: <br/><img src={useBaseUrl('img/search/searchquerylanguage/search-operators/create-macro.png')} alt="create-macro" style={{border: '1px solid gray'}} width="800" />
43+
1. **Macro Details**. Enter the name for the macro. Description is optional.
44+
1. **Macro Definition**. Enter the definition for the macro. To add arguments use the `{{Arg}}` syntax or select a part of the definition and click on **Add Argument**.
45+
1. (Optional) **Arguments**. Enter the name and select the data type for the argument selected.
46+
1. (Optional) **Argument Validation**. Define the validation condition and enter the error message that needs to be shown when the validation expression returns false.
47+
1. **Usage**. Preview of how you use the macro in the log search.
48+
1. Click **Submit** to save the macro.
4849

4950
### Limitations
5051

5152
- You can create a maximum of 50 macros.
5253
- You can add a maximum of 5 arguments.
53-
- You cannot edit or delete the macro. Submit a customer request to Sumo Logic if you still need to edit or delete a macro.
5454
- You are only allowed to use single expression.
5555
- You can only use the below listed argument validations:
5656
- `isValidIpV4`
@@ -110,3 +110,18 @@ To view any existing macro, follow the steps below:
110110
1. [**New UI**](/docs/get-started/sumo-logic-ui/). In the main Sumo Logic menu, select **Data Managemenu**, and then under **Logs**, select **Macros**. You can also click the **Go To...** menu at the top of the screen and select **Macros**.<br/>[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data** > **Logs** > **Macros**.
111111
1. In the **Macros** page, click on any of the macros that you want to view the macro details.<br/><img src={useBaseUrl('img/search/searchquerylanguage/search-operators/view-macro-logs-page.png')} alt="macro-logs-page" style={{border: '1px solid gray'}} width="800" />
112112
1. To use the selected macro in your log search query, copy the suggested **Usage** of the macro and include it in your query syntax. <br/><img src={useBaseUrl('img/search/searchquerylanguage/search-operators/view-macro-logs-details.png')} alt="view-macro-logs-details" style={{border: '1px solid gray'}} width="400" />
113+
114+
## Edit a macro operator
115+
116+
1. [**New UI**](/docs/get-started/sumo-logic-ui/). In the main Sumo Logic menu, select **Data Management**, and then under **Logs**, select **Macros**. You can also click the **Go To...** menu at the top of the screen and select **Macros**.<br/>[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data** > **Logs** > **Macros**.
117+
1. In the **Macros** page, click on any of the macros that you want to edit.<br/><img src={useBaseUrl('img/search/searchquerylanguage/search-operators/view-macro-logs-page.png')} alt="macro-logs-page" style={{border: '1px solid gray'}} width="800" />
118+
1. Click **Edit** button to open the pane for editing. <br/><img src={useBaseUrl('img/search/searchquerylanguage/search-operators/macro-edit-button.png')} alt="macro-delete-pop-up" style={{border: '1px solid gray'}} width="400" />
119+
1. In the **Edit [macroname] macro** pop-up, click on **Continue**. You can also check where your macros have been used to avoid broken queries by clicking on **check queries that reference this macro**. <br/><img src={useBaseUrl('img/search/searchquerylanguage/search-operators/macro-edit-pop-up.png')} alt="macro-delete-pop-up" style={{border: '1px solid gray'}} width="400" />
120+
1. In the macro editing pane, perform the required editing and click **Submit**.
121+
122+
## Delete a macro operator
123+
124+
1. [**New UI**](/docs/get-started/sumo-logic-ui/). In the main Sumo Logic menu, select **Data Management**, and then under **Logs**, select **Macros**. You can also click the **Go To...** menu at the top of the screen and select **Macros**.<br/>[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the main Sumo Logic menu, select **Manage Data** > **Logs** > **Macros**.
125+
1. In the **Macros** page, click on any of the macros that you want to delete.<br/><img src={useBaseUrl('img/search/searchquerylanguage/search-operators/view-macro-logs-page.png')} alt="macro-logs-page" style={{border: '1px solid gray'}} width="800" />
126+
1. Click **Delete** button to delete the macro. <br/><img src={useBaseUrl('img/search/searchquerylanguage/search-operators/macro-delete-button.png')} alt="macro-delete-button" style={{border: '1px solid gray'}} width="400" />
127+
1. In the **Delete [macroname] macro** pop-up, click on **Delete**. You can also check where your macros have been used to avoid broken queries by clicking on **check queries that reference this macro**. <br/><img src={useBaseUrl('img/search/searchquerylanguage/search-operators/macro-delete-pop-up.png')} alt="macro-delete-pop-up" style={{border: '1px solid gray'}} width="400" />

docs/security/threat-intelligence/about-threat-intelligence.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ The sources on the **Threat Intelligence** tab include:
5252

5353
Sumo Logic provides the following out-of-the-box default sources of threat indicators supplied by third party intel vendors and maintained by Sumo Logic. You cannot edit these sources:
5454
* **SumoLogic_ThreatIntel**. This source incorporates threat indicators supplied by [Intel 471](https://intel471.com/).
55-
* **_sumo_global_feed_cs**. This is a source of threat indicators supplied by [CrowdStrike](https://www.crowdstrike.com/en-us/).
55+
* **_sumo_global_feed_cs**. This is a source of threat indicators supplied by [CrowdStrike](https://www.crowdstrike.com/en-us/). For more information, see [Sumo Logic Global Feed from CrowdStrike](/docs/security/threat-intelligence/sumologic-global-feed-from-crowdstrike/).
5656

5757
### Ingest threat intelligence indicators
5858

docs/security/threat-intelligence/index.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,4 +48,10 @@ See the following articles to learn about Sumo Logic's threat intelligence capab
4848
<p>Learn about the mapping of threat intelligence schema from vendor sources to Sumo Logic schema.</p>
4949
</div>
5050
</div>
51+
<div className="box smallbox card">
52+
<div className="container">
53+
<a href={useBaseUrl('docs/security/threat-intelligence/sumologic-global-feed-from-crowdstrike/')}><img src={useBaseUrl('img/icons/security/cloud-siem.png')} alt="icon" width="40"/><h4>Global Feed from CrowdStrike</h4></a>
54+
<p>Learn about Sumo Logic's threat intelligence feed of indicators from CrowdStrike.</p>
55+
</div>
56+
</div>
5157
</div>

0 commit comments

Comments
 (0)