Skip to content

Commit 44ffd97

Browse files
typo
Co-authored-by: Nasreddine Bencherchali <[email protected]>
1 parent 2933334 commit 44ffd97

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

detections/application/cisco_ai_defense_security_alerts.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ date: '2025-02-14'
55
author: Bhavin Patel, Splunk
66
status: experimental
77
type: Anomaly
8-
description: The search surfaces alerts from the Cisco AI Defense product for potential attacks agaisnt the AI models running in your environment. This analytic identifies security events within Cisco AI Defense by examining event messages, actions, and policy names. It focuses on connections and applications associated with specific guardrail entities and ruleset types. By aggregating and analyzing these elements, the search helps detect potential policy violations and security threats, enabling proactive defense measures and ensuring network integrity.
8+
description: The search surfaces alerts from the Cisco AI Defense product for potential attacks against the AI models running in your environment. This analytic identifies security events within Cisco AI Defense by examining event messages, actions, and policy names. It focuses on connections and applications associated with specific guardrail entities and ruleset types. By aggregating and analyzing these elements, the search helps detect potential policy violations and security threats, enabling proactive defense measures and ensuring network integrity.
99
data_source:
1010
- Cisco AI Defense Alerts
1111
search: |-

0 commit comments

Comments
 (0)