Skip to content

Commit 2ba144b

Browse files
authored
Update cisco_secure_application_alerts.yml
1 parent 3bb8618 commit 2ba144b

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

detections/application/cisco_secure_application_alerts.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ search: |-
4444
)
4545
| `cisco_secure_application_alerts_filter`
4646
how_to_implement: In order to properly run this search, you need to ingest alerts data from AppD SecureApp, specifically ingesting data via HEC. You will also need to ensure that the data is going to sourcetype - `appdynamics_security`. You will need to install the Splunk Add-on for AppDynamics.
47-
known_false_positives: None known at this time but if there are false positives, please reach filter out these using the filter macro to reduce alert fatigue
47+
known_false_positives: None known false postive for this detection search. If the alerts are noisy, consider tuning this detection by using the _filter macro in this search and/or by updating the tool this alert originates from.
4848
references:
4949
- https://docs.appdynamics.com/appd/24.x/latest/en/application-security-monitoring/integrate-cisco-secure-application-with-splunk
5050
drilldown_searches:

0 commit comments

Comments
 (0)