Skip to content

Commit 7740530

Browse files
authored
Merge pull request #11646 from Cv-securityIQ/BugFix
Changing analytics rule name and Auditing requests for tracking usage
2 parents ccfb84c + 3cb481f commit 7740530

File tree

14 files changed

+246
-174
lines changed

14 files changed

+246
-174
lines changed

.script/tests/detectionTemplateSchemaValidation/ValidConnectorIds.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -261,5 +261,6 @@
261261
"IllumioSaaSDataConnector",
262262
"CTERA",
263263
"Workday",
264-
"SamsungDCDefinition"
264+
"SamsungDCDefinition",
265+
"CommvaultSecurityIQ_CL"
265266
]

Solutions/Commvault Security IQ/Analytic Rules/CommvaultSecurityIQ_Alert.yaml

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,13 @@
11
id: 317e757e-c320-448e-8837-fc61a70fe609
2-
name: CommvaultSecurityIQ Alert
2+
name: Commvault Cloud Alert
33
description: |
4-
'This query identifies CommvaultSecurityIQ Alerts.'
4+
'This query identifies Alerts from Commvault Cloud.'
55
severity: Medium
66
status: Available
7-
requiredDataConnectors: []
7+
requiredDataConnectors:
8+
- connectorId: CommvaultSecurityIQ_CL
9+
datatypes:
10+
- CommvaultSecurityIQ_CL
811
queryFrequency: 5m
912
queryPeriod: 5m
1013
triggerOperator: gt
@@ -25,5 +28,5 @@ query: |
2528
CommvaultSecurityIQ_CL
2629
| take 1000
2730
entityMappings: null
28-
version: 1.0.0
31+
version: 1.0.2
2932
kind: Scheduled

Solutions/Commvault Security IQ/Analytic Rules/Data_Alert.yaml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,10 @@ description: |
44
'This query identifies clients or servers whose data has been compromised.'
55
severity: Medium
66
status: Available
7-
requiredDataConnectors: []
7+
requiredDataConnectors:
8+
- connectorId: CommvaultSecurityIQ_CL
9+
datatypes:
10+
- CommvaultSecurityIQ_CL
811
queryFrequency: 5m
912
queryPeriod: 5m
1013
triggerOperator: gt
@@ -27,5 +30,5 @@ query: |
2730
| extend extracted_word = extract("Client\\s(.*?)\\sCompromised", 1, Description)
2831
| project TimeGenerated, Title, Description, Status
2932
entityMappings: null
30-
version: 1.0.0
33+
version: 1.0.1
3134
kind: Scheduled

Solutions/Commvault Security IQ/Analytic Rules/IDP_Alert.yaml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,10 @@ description: |
44
'This query identifies indications of a potential security breach or unauthorized access to the systems and data of the Identity Provider.'
55
severity: Medium
66
status: Available
7-
requiredDataConnectors: []
7+
requiredDataConnectors:
8+
- connectorId: CommvaultSecurityIQ_CL
9+
datatypes:
10+
- CommvaultSecurityIQ_CL
811
queryFrequency: 5m
912
queryPeriod: 5m
1013
triggerOperator: gt
@@ -24,5 +27,5 @@ query: |
2427
SecurityIncident
2528
| where Title has "Cvlt Alert" and Description == "IDP Compromised" and Status has "New"
2629
entityMappings: null
27-
version: 1.0.0
30+
version: 1.0.1
2831
kind: Scheduled

Solutions/Commvault Security IQ/Analytic Rules/User_Alert.yaml

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,10 @@ description: |
44
'This query identifies users whose user account or credentials have been compromised.'
55
severity: Medium
66
status: Available
7-
requiredDataConnectors: []
7+
requiredDataConnectors:
8+
- connectorId: CommvaultSecurityIQ_CL
9+
datatypes:
10+
- CommvaultSecurityIQ_CL
811
queryFrequency: 5m
912
queryPeriod: 5m
1013
triggerOperator: gt
@@ -26,5 +29,5 @@ query: |
2629
| extend extracted_word = extract("User\\s(.*?)\\sCompromised", 1, Description)
2730
| project TimeGenerated, Title, Description, Status
2831
entityMappings: null
29-
version: 1.0.0
32+
version: 1.0.1
3033
kind: Scheduled

0 commit comments

Comments
 (0)