Skip to content

Commit 7b24f8a

Browse files
Correct Azure localization issues
1 parent de011b1 commit 7b24f8a

File tree

3 files changed

+11
-11
lines changed

3 files changed

+11
-11
lines changed

detections/cloud/azure_automation_account_created.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Azure Automation Account Created
22
id: 860902fd-2e76-46b3-b050-ba548dab576c
3-
version: 9
4-
date: '2025-05-02'
3+
version: 10
4+
date: '2025-09-03'
55
author: Mauricio Velazco, Splunk
66
status: production
77
type: TTP
@@ -15,9 +15,9 @@ description: The following analytic detects the creation of a new Azure Automati
1515
on virtual machines, posing a significant security risk.
1616
data_source:
1717
- Azure Audit Create or Update an Azure Automation account
18-
search: '`azure_audit` operationName.localizedValue="Create or Update an Azure Automation account" status.value=Succeeded
18+
search: '`azure_audit` operationName.value="Microsoft.Automation/automationAccounts/write" status.value=Succeeded
1919
| dedup object
20-
| rename claims.ipaddr as src, subscriptionId as vendor_account, operationName.localizedValue as signature
20+
| rename claims.ipaddr as src, subscriptionId as vendor_account, operationName.value as signature
2121
| stats count min(_time) as firstTime max(_time) as lastTime by dest user src vendor_account vendor_product object object_path signature
2222
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `azure_automation_account_created_filter`'
2323
how_to_implement: You must install the latest version of Splunk Add-on for Microsoft

detections/cloud/azure_automation_runbook_created.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Azure Automation Runbook Created
22
id: 178d696d-6dc6-4ee8-9d25-93fee34eaf5b
3-
version: 9
4-
date: '2025-05-02'
3+
version: 10
4+
date: '2025-09-03'
55
author: Mauricio Velazco, Splunk
66
status: production
77
type: TTP
@@ -15,9 +15,9 @@ description: The following analytic detects the creation of a new Azure Automati
1515
environment.
1616
data_source:
1717
- Azure Audit Create or Update an Azure Automation Runbook
18-
search: '`azure_audit` operationName.localizedValue="Create or Update an Azure Automation Runbook" object!=AzureAutomationTutorial* status.value=Succeeded
18+
search: '`azure_audit` operationName.value="Microsoft.Automation/automationAccounts/runbooks/write" object!=AzureAutomationTutorial* status.value=Succeeded
1919
| dedup object
20-
| rename claims.ipaddr as src, subscriptionId as vendor_account, operationName.localizedValue as operationName
20+
| rename claims.ipaddr as src, subscriptionId as vendor_account, operationName.value as operationName
2121
| stats count min(_time) as firstTime max(_time) as lastTime by dest user src vendor_account vendor_product object object_path
2222
| `security_content_ctime(firstTime)`
2323
| `security_content_ctime(lastTime)`

detections/cloud/azure_runbook_webhook_created.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Azure Runbook Webhook Created
22
id: e98944a9-92e4-443c-81b8-a322e33ce75a
3-
version: 10
4-
date: '2025-05-02'
3+
version: 11
4+
date: '2025-09-03'
55
author: Mauricio Velazco, Splunk
66
status: production
77
type: TTP
@@ -15,7 +15,7 @@ description: The following analytic detects the creation of a new Automation Run
1515
control over Azure resources.
1616
data_source:
1717
- Azure Audit Create or Update an Azure Automation webhook
18-
search: '`azure_audit` operationName.localizedValue="Create or Update an Azure Automation webhook" status.value=Succeeded
18+
search: '`azure_audit` operationName.value="Microsoft.Automation/automationAccounts/webhooks/write" status.value=Succeeded
1919
| dedup object
2020
| rename claims.ipaddr as src_ip
2121
| rename caller as user

0 commit comments

Comments
 (0)