Skip to content

Commit 56f8742

Browse files
committed
updating data source for google workspace
1 parent c5eb937 commit 56f8742

5 files changed

+19
-4
lines changed

data_sources/google_workspace.yml

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
name: Google Workspace
2+
id: f1a044e3-113a-4e4d-84f2-b153ade83087
3+
version: 1
4+
date: '2025-02-21'
5+
author: Bhavin Patel, Splunk
6+
description: Data source object for Google Workspace
7+
source: google_workspace
8+
sourcetype: gws:reports:login
9+
supported_TA:
10+
- name: Splunk Add-on for Google Workspace
11+
url: https://splunkbase.splunk.com/app/5556
12+
version: 3.0.2
13+
fields:
14+
- _time
15+
example_log: |-

detections/cloud/gcp_multiple_failed_mfa_requests_for_user.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ description: The following analytic detects multiple failed multi-factor authent
1414
allowing attackers to compromise accounts and potentially escalate privileges within
1515
the GCP environment.
1616
data_source:
17-
- Google Workspace login_failure
17+
- Google Workspace
1818
search: '`gws_reports_login` event.name=login_failure `gws_login_mfa_methods` | bucket
1919
span=5m _time | stats dc(_raw) AS mfa_prompts values(user) AS user by src_ip, login_challenge_method, _time
2020
| where mfa_prompts >= 10 | `gcp_multiple_failed_mfa_requests_for_user_filter`'

detections/cloud/gcp_multiple_users_failing_to_authenticate_from_ip.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ description: The following analytic detects a single source IP address failing t
1313
Platform. If confirmed malicious, this behavior could lead to unauthorized access
1414
to sensitive resources, data breaches, or further exploitation within the environment.
1515
data_source:
16-
- Google Workspace login_failure
16+
- Google Workspace
1717
search: '`gws_reports_login` event.type = login event.name = login_failure | bucket
1818
span=5m _time | stats count dc(user) AS unique_accounts values(user) as tried_accounts
1919
values(authentication_method) AS authentication_method earliest(_time) as firstTime

detections/cloud/gcp_successful_single_factor_authentication.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ description: The following analytic identifies a successful single-factor authen
1414
to data breaches, service disruptions, or further exploitation within the cloud
1515
environment.
1616
data_source:
17-
- Google Workspace login_success
17+
- Google Workspace
1818
search: '`gws_reports_login` event.name=login_success NOT `gws_login_mfa_methods`
1919
| stats count min(_time) as firstTime max(_time) as lastTime by user, src_ip, login_challenge_method,
2020
app, event.name, vendor_account, action |`security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`|

detections/cloud/gcp_unusual_number_of_failed_authentications_from_ip.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ description: The following analytic identifies a single source IP failing to aut
1414
this could lead to unauthorized access, data breaches, or further exploitation within
1515
the environment.
1616
data_source:
17-
- Google Workspace login_failure
17+
- Google Workspace
1818
search: '`gws_reports_login` event.type = login event.name = login_failure| bucket
1919
span=5m _time | stats dc(user_name) AS unique_accounts values(user_name) as tried_accounts
2020
values(authentication_method) AS authentication_method by _time, src | eventstats avg(unique_accounts)

0 commit comments

Comments
 (0)