Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -261,5 +261,6 @@
"IllumioSaaSDataConnector",
"CTERA",
"Workday",
"SamsungDCDefinition"
"SamsungDCDefinition",
"CommvaultSecurityIQ_CL"
]
Original file line number Diff line number Diff line change
@@ -1,10 +1,13 @@
id: 317e757e-c320-448e-8837-fc61a70fe609
name: CommvaultSecurityIQ Alert
name: Commvault Cloud Alert
description: |
'This query identifies CommvaultSecurityIQ Alerts.'
'This query identifies Alerts from Commvault Cloud.'
severity: Medium
status: Available
requiredDataConnectors: []
requiredDataConnectors:
- connectorId: CommvaultSecurityIQ_CL
datatypes:
- CommvaultSecurityIQ_CL
queryFrequency: 5m
queryPeriod: 5m
triggerOperator: gt
Expand All @@ -25,5 +28,5 @@ query: |
CommvaultSecurityIQ_CL
| take 1000
entityMappings: null
version: 1.0.0
version: 1.0.2
kind: Scheduled
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,10 @@ description: |
'This query identifies clients or servers whose data has been compromised.'
severity: Medium
status: Available
requiredDataConnectors: []
requiredDataConnectors:
- connectorId: CommvaultSecurityIQ_CL
datatypes:
- CommvaultSecurityIQ_CL
queryFrequency: 5m
queryPeriod: 5m
triggerOperator: gt
Expand All @@ -27,5 +30,5 @@ query: |
| extend extracted_word = extract("Client\\s(.*?)\\sCompromised", 1, Description)
| project TimeGenerated, Title, Description, Status
entityMappings: null
version: 1.0.0
version: 1.0.1
kind: Scheduled
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,10 @@ description: |
'This query identifies indications of a potential security breach or unauthorized access to the systems and data of the Identity Provider.'
severity: Medium
status: Available
requiredDataConnectors: []
requiredDataConnectors:
- connectorId: CommvaultSecurityIQ_CL
datatypes:
- CommvaultSecurityIQ_CL
queryFrequency: 5m
queryPeriod: 5m
triggerOperator: gt
Expand All @@ -24,5 +27,5 @@ query: |
SecurityIncident
| where Title has "Cvlt Alert" and Description == "IDP Compromised" and Status has "New"
entityMappings: null
version: 1.0.0
version: 1.0.1
kind: Scheduled
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,10 @@ description: |
'This query identifies users whose user account or credentials have been compromised.'
severity: Medium
status: Available
requiredDataConnectors: []
requiredDataConnectors:
- connectorId: CommvaultSecurityIQ_CL
datatypes:
- CommvaultSecurityIQ_CL
queryFrequency: 5m
queryPeriod: 5m
triggerOperator: gt
Expand All @@ -26,5 +29,5 @@ query: |
| extend extracted_word = extract("User\\s(.*?)\\sCompromised", 1, Description)
| project TimeGenerated, Title, Description, Status
entityMappings: null
version: 1.0.0
version: 1.0.1
kind: Scheduled
Loading
Loading