Skip to content

Commit 00725c0

Browse files
authored
Merge branch 'develop' into remote_emp_fraud
2 parents 97ba77f + 0946ff7 commit 00725c0

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

contentctl.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -185,9 +185,9 @@ apps:
185185
- uid: 6207
186186
title: Splunk Add-on for Microsoft Security
187187
appid: Splunk_TA_MS_Security
188-
version: 2.5.1
188+
version: 2.5.2
189189
description: description of app
190-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-security_251.tgz
190+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-security_252.tgz
191191
- uid: 2734
192192
title: URL Toolbox
193193
appid: URL_TOOLBOX

data_sources/ms365_defender_incident_alerts.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ sourcetype: ms365:defender:incident:alerts
1616
supported_TA:
1717
- name: Splunk Add-on for Microsoft Security
1818
url: https://splunkbase.splunk.com/app/6207
19-
version: 2.5.1
19+
version: 2.5.2
2020
fields:
2121
- actorName
2222
- alertId

data_sources/ms_defender_atp_alerts.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ sourcetype: ms:defender:atp:alerts
1616
supported_TA:
1717
- name: Splunk Add-on for Microsoft Security
1818
url: https://splunkbase.splunk.com/app/6207
19-
version: 2.5.1
19+
version: 2.5.2
2020
fields:
2121
- column
2222
- accountName

0 commit comments

Comments
 (0)