January 25, 2023
© 2023 SOC Prime Inc.
All rights reserved. This product and documentation related are protected by copyright and distributed under licenses restricting their use, copying, distribution, and decompilation. No part of this product or documentation related may be reproduced in any form or by any means without the prior written authorization of SOC Prime. While every precaution has been taken in the preparation of this book, SOC Prime assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.
Authentication with Microsoft and GitHub
As part of our effort to streamline logging in and signing up flows, we've added authentication with Microsoft and GitHub accounts.
To log in to an existing SOC Prime Platform account, use your Microsoft or GitHub account associated with the same email.
To create a new SOC Prime Platform account, use your Microsoft or GitHub account associated with the email you want to use for your SOC Prime Platform account.
Note that you can only use a work email.
Content Quality Improvements
Microsoft Sentinel
We've enhanced the accuracy of Microsoft Sentinel Rule and Query translations by adding a new mapping for Sigma rules that have the
awsproduct andcloudtrailservice defined in thelogsourcesection.
We've improved translation logic for exclusion conditions to ensure that the filters used in a Sigma rule are always rendered accurately in translation.
For example, the filters in the following piece of a Sigma rule:
filters:
- Image|endswith: 'Example.exe'
- CommandLine|contains: 'example'
condition: selection1 and selection2 and not filtersare now translated into:
…and not ((NewProcessName endswith @'Example.exe') or (CommandLine contains @'example'))
This improvement has also been implemented for Microsoft Defender for Endpoint.
Chronicle Security
We've ensured that backslashes in the translation are always escaped (for example, when used in file paths). Previously, escaping could be not applied in certain fields:
`.*\example\file\path\binary.exe.*` → `.*\\example\\file\\path\\binary.exe.*`
Splunk
We've improved the Splunk translations by adding escape characters before backslashes. For example:
TargetFilename="*\Example\file\name.aaa"→TargetFilename="*\\Example\\file\\name.aaa"
Snowflake
We've improved the syntax of translations into Snowflake Query format by making sure that parentheses are applied correctly where Sigma rules have complex conditions, such as selection1 and (selection2 or (selection3 and (selection4 or selection5))).
Sigma Parsing Improvement
We've improved the parsing of field names with dots, such as actor.user.email, used in aggregations in the condition component of a Sigma rule. This ensures the translations of such conditions into all platform formats have correct field names.
Cyber Threat Search Engine
We've implemented minor style and text improvements on the Cyber Threat Search Engine page.
Platform Guides
We've updated our Platform Guides with information on the new functionality of the SOC Prime Platform.
