Skip to content

Commit 60cdf57

Browse files
authored
Merge branch 'develop' into more_interlock_rat
2 parents fcb5e99 + e349a98 commit 60cdf57

File tree

58 files changed

+263
-377
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

58 files changed

+263
-377
lines changed

contentctl.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ app:
33
uid: 3449
44
title: ES Content Updates
55
appid: DA-ESS-ContentUpdate
6-
version: 5.11.0
6+
version: 5.12.0
77
description: Explore the Analytic Stories included with ES Content Updates.
88
prefix: ESCU
99
label: ESCU
@@ -71,9 +71,9 @@ apps:
7171
- uid: 5709
7272
title: Splunk Add-on for Sysmon
7373
appid: Splunk_TA_microsoft_sysmon
74-
version: 4.0.3
74+
version: 5.0.0
7575
description: description of app
76-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-sysmon_403.tgz
76+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-sysmon_500.tgz
7777
- uid: 833
7878
title: Splunk Add-on for Unix and Linux
7979
appid: Splunk_TA_nix
@@ -155,15 +155,15 @@ apps:
155155
- uid: 5556
156156
title: Splunk Add-on for Google Workspace
157157
appid: SPLUNK_ADD_ON_FOR_GOOGLE_WORKSPACE
158-
version: 3.0.4
158+
version: 3.1.0
159159
description: description of app
160-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-google-workspace_304.tgz
160+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-google-workspace_310.tgz
161161
- uid: 3110
162162
title: Splunk Add-on for Microsoft Cloud Services
163163
appid: SPLUNK_TA_MICROSOFT_CLOUD_SERVICES
164-
version: 5.5.0
164+
version: 5.6.0
165165
description: description of app
166-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-cloud-services_550.tgz
166+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-cloud-services_560.tgz
167167
- uid: 4055
168168
title: Splunk Add-on for Microsoft Office 365
169169
appid: SPLUNK_ADD_ON_FOR_MICROSOFT_OFFICE_365

data_sources/azure_active_directory.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: operationName
1010
supported_TA:
1111
- name: Splunk Add-on for Microsoft Cloud Services
1212
url: https://splunkbase.splunk.com/app/3110
13-
version: 5.5.0
13+
version: 5.6.0
1414
output_fields:
1515
- dest
1616
- user

data_sources/azure_active_directory_add_app_role_assignment_to_service_principal.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Add app role assignment to service principal
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Cloud Services
2020
url: https://splunkbase.splunk.com/app/3110
21-
version: 5.5.0
21+
version: 5.6.0
2222
fields:
2323
- _time
2424
- Level

data_sources/azure_active_directory_add_member_to_role.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Add member to role
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Cloud Services
2020
url: https://splunkbase.splunk.com/app/3110
21-
version: 5.5.0
21+
version: 5.6.0
2222
fields:
2323
- _time
2424
- Level

data_sources/azure_active_directory_add_owner_to_application.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Add owner to application
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Cloud Services
2020
url: https://splunkbase.splunk.com/app/3110
21-
version: 5.5.0
21+
version: 5.6.0
2222
fields:
2323
- _time
2424
- Level

data_sources/azure_active_directory_add_service_principal.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Add service principal
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Cloud Services
2020
url: https://splunkbase.splunk.com/app/3110
21-
version: 5.5.0
21+
version: 5.6.0
2222
fields:
2323
- _time
2424
- Level

data_sources/azure_active_directory_add_unverified_domain.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ separator_value: Add unverified domain
1717
supported_TA:
1818
- name: Splunk Add-on for Microsoft Cloud Services
1919
url: https://splunkbase.splunk.com/app/3110
20-
version: 5.5.0
20+
version: 5.6.0
2121
fields:
2222
- _time
2323
- Level

data_sources/azure_active_directory_consent_to_application.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Consent to application
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Cloud Services
2020
url: https://splunkbase.splunk.com/app/3110
21-
version: 5.5.0
21+
version: 5.6.0
2222
fields:
2323
- _time
2424
- Level

data_sources/azure_active_directory_disable_strong_authentication.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ separator_value: Disable Strong Authentication
1616
supported_TA:
1717
- name: Splunk Add-on for Microsoft Cloud Services
1818
url: https://splunkbase.splunk.com/app/3110
19-
version: 5.5.0
19+
version: 5.6.0
2020
fields:
2121
- _time
2222
- Level

data_sources/azure_active_directory_enable_account.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ separator_value: Enable account
1515
supported_TA:
1616
- name: Splunk Add-on for Microsoft Cloud Services
1717
url: https://splunkbase.splunk.com/app/3110
18-
version: 5.5.0
18+
version: 5.6.0
1919
fields:
2020
- _time
2121
- Level

0 commit comments

Comments
 (0)