Skip to content

Commit 3c9145b

Browse files
author
Patrick Bareiss
committed
bug fixes
1 parent a33eccd commit 3c9145b

23 files changed

+25
-7
lines changed

detections/cloud/github_enterprise_delete_branch_ruleset.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ tags:
4848
asset_type: GitHub
4949
mitre_attack_id:
5050
- T1562.001
51+
- T1195
5152
product:
5253
- Splunk Enterprise
5354
- Splunk Enterprise Security

detections/cloud/github_enterprise_disable_2fa_requirement.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ tags:
4848
asset_type: GitHub
4949
mitre_attack_id:
5050
- T1562.001
51+
- T1195
5152
product:
5253
- Splunk Enterprise
5354
- Splunk Enterprise Security

detections/cloud/github_enterprise_disable_audit_log_event_stream.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ tags:
4848
asset_type: GitHub
4949
mitre_attack_id:
5050
- T1562.008
51+
- T1195
5152
product:
5253
- Splunk Enterprise
5354
- Splunk Enterprise Security

detections/cloud/github_enterprise_disable_classic_branch_protection_rule.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ tags:
4848
asset_type: GitHub
4949
mitre_attack_id:
5050
- T1562.001
51+
- T1195
5152
product:
5253
- Splunk Enterprise
5354
- Splunk Enterprise Security

detections/cloud/github_enterprise_disable_dependabot.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,7 @@ tags:
4646
asset_type: GitHub
4747
mitre_attack_id:
4848
- T1562.001
49+
- T1195
4950
product:
5051
- Splunk Enterprise
5152
- Splunk Enterprise Security

detections/cloud/github_enterprise_disable_ip_allow_list.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,7 @@ tags:
4747
asset_type: GitHub
4848
mitre_attack_id:
4949
- T1562.001
50+
- T1195
5051
product:
5152
- Splunk Enterprise
5253
- Splunk Enterprise Security

detections/cloud/github_enterprise_modify_audit_log_event_stream.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ tags:
4848
asset_type: GitHub
4949
mitre_attack_id:
5050
- T1562.008
51+
- T1195
5152
product:
5253
- Splunk Enterprise
5354
- Splunk Enterprise Security

detections/cloud/github_enterprise_pause_audit_log_event_stream.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ tags:
4848
asset_type: GitHub
4949
mitre_attack_id:
5050
- T1562.008
51+
- T1195
5152
product:
5253
- Splunk Enterprise
5354
- Splunk Enterprise Security

detections/cloud/github_enterprise_created_self_hosted_runner.yml renamed to detections/cloud/github_enterprise_register_self_hosted_runner.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
name: GitHub Enterprise Created Self Hosted Runner
1+
name: GitHub Enterprise Register Self Hosted Runner
22
id: b27685a2-8826-4123-ab78-2d9d0d419ed0
33
version: 1
44
date: '2025-01-20'
@@ -19,7 +19,7 @@ search: '`github_enterprise` action=enterprise.register_self_hosted_runner
1919
| stats count min(_time) as firstTime max(_time) as lastTime by actor, actor_id, actor_is_bot, actor_location.country_code, business, business_id, user_agent, action
2020
| eval user=actor
2121
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
22-
| `github_enterprise_created_self_hosted_runner_filter`'
22+
| `github_enterprise_register_self_hosted_runner_filter`'
2323
how_to_implement: You must ingest GitHub Enterprise logs using Audit log streaming as described in this documentation https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-streaming-to-splunk using a Splunk HTTP Event Collector.
2424
known_false_positives: unknown
2525
references:
@@ -47,6 +47,7 @@ tags:
4747
asset_type: GitHub
4848
mitre_attack_id:
4949
- T1562.001
50+
- T1195
5051
product:
5152
- Splunk Enterprise
5253
- Splunk Enterprise Security

detections/cloud/github_enterprise_remove_organization.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,7 @@ tags:
4646
asset_type: GitHub
4747
mitre_attack_id:
4848
- T1485
49+
- T1195
4950
product:
5051
- Splunk Enterprise
5152
- Splunk Enterprise Security

0 commit comments

Comments
 (0)