Skip to content

Commit 8efe3b1

Browse files
committed
add manual_test tag
1 parent 05df61c commit 8efe3b1

10 files changed

+27
-7
lines changed

detections/cloud/abnormally_high_number_of_cloud_infrastructure_api_calls.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,8 @@ tags:
6565
- Splunk Enterprise Security
6666
- Splunk Cloud
6767
security_domain: network
68+
manual_test: This search needs the baseline `Baseline Of Cloud Infrastructure API Calls Per User` to be run first.
69+
tests:
6870
tests:
6971
- name: True Positive Test
7072
attack_data:

detections/cloud/abnormally_high_number_of_cloud_security_group_api_calls.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,7 @@ tags:
6565
- Splunk Enterprise Security
6666
- Splunk Cloud
6767
security_domain: network
68+
manual_test: This search needs the baseline `Baseline Of Cloud Security Group API Calls Per User` to be run first.
6869
tests:
6970
- name: True Positive Test
7071
attack_data:

detections/cloud/cloud_api_calls_from_previously_unseen_user_roles.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,7 @@ tags:
6767
- Splunk Enterprise Security
6868
- Splunk Cloud
6969
security_domain: threat
70+
manual_test: This search needs the baseline `Previously Seen Cloud API Calls Per User Role - Initial` to be run first.
7071
tests:
7172
- name: True Positive Test
7273
attack_data:

detections/cloud/cloud_compute_instance_created_by_previously_unseen_user.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,7 @@ tags:
6565
- Splunk Enterprise Security
6666
- Splunk Cloud
6767
security_domain: threat
68+
manual_test: This search needs the baseline `Previously Seen Cloud Compute Creations By User` to be run first.
6869
tests:
6970
- name: True Positive Test
7071
attack_data:

detections/cloud/cloud_compute_instance_created_in_previously_unused_region.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,7 @@ tags:
6969
- Splunk Enterprise Security
7070
- Splunk Cloud
7171
security_domain: threat
72+
manual_test: This search needs the baseline `Previously Seen Cloud Regions - Update` to be run first.
7273
tests:
7374
- name: True Positive Test
7475
attack_data:

detections/cloud/cloud_compute_instance_created_with_previously_unseen_image.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -68,6 +68,7 @@ tags:
6868
- Splunk Enterprise Security
6969
- Splunk Cloud
7070
security_domain: threat
71+
manual_test: This search needs the baseline `Previously Seen Cloud Compute Images - Initial` to be run first.
7172
tests:
7273
- name: True Positive Test
7374
attack_data:

detections/cloud/cloud_compute_instance_created_with_previously_unseen_instance_type.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -69,6 +69,7 @@ tags:
6969
- Splunk Enterprise Security
7070
- Splunk Cloud
7171
security_domain: threat
72+
manual_test: This search needs the baseline `Previously Seen Cloud Compute Instance Types - Initial` to be run first.
7273
tests:
7374
- name: True Positive Test
7475
attack_data:

detections/cloud/cloud_instance_modified_by_previously_unseen_user.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,7 @@ tags:
6363
- Splunk Enterprise Security
6464
- Splunk Cloud
6565
security_domain: threat
66+
manual_test: This search needs the baseline `Previously Seen Cloud Instance Modifications By User - Update` to be run first.
6667
tests:
6768
- name: True Positive Test
6869
attack_data:

detections/cloud/detect_aws_console_login_by_new_user.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,7 @@ tags:
4545
- Splunk Enterprise Security
4646
- Splunk Cloud
4747
security_domain: threat
48+
manual_test: This search needs the baseline `Previously Seen Users in CloudTrail - Initial` to be run first.
4849
tests:
4950
- name: True Positive Test
5051
attack_data:

detections/network/detect_outbound_smb_traffic.yml

Lines changed: 17 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -16,16 +16,26 @@ description: The following analytic detects outbound SMB (Server Message Block)
1616
data_source:
1717
- Zeek Conn
1818
- Cisco Secure Firewall Threat Defense Connection Event
19-
search: '| tstats `security_content_summariesonly` earliest(_time) as start_time latest(_time)
20-
as end_time values(All_Traffic.action) as action values(All_Traffic.app) as app
21-
values(sourcetype) as sourcetype count from datamodel=Network_Traffic where (All_Traffic.action=allowed
22-
All_Traffic.dest_port=139 OR All_Traffic.dest_port=445 OR All_Traffic.app="smb")
23-
AND All_Traffic.src_ip IN ("10.0.0.0/8","172.16.0.0/12","192.168.0.0/16") AND NOT
24-
All_Traffic.dest_ip IN ("10.0.0.0/8","172.16.0.0/12","192.168.0.0/16","100.64.0.0/10",
19+
search: '
20+
| tstats `security_content_summariesonly`
21+
earliest(_time) as start_time
22+
latest(_time) as end_time
23+
values(All_Traffic.action) as action
24+
values(All_Traffic.app) as app
25+
values(sourcetype) as sourcetype count
26+
from datamodel=Network_Traffic where
27+
All_Traffic.action=allowed AND
28+
(All_Traffic.dest_port=139 OR All_Traffic.dest_port=445 OR All_Traffic.app="smb")
29+
AND All_Traffic.src_ip IN (
30+
"10.0.0.0/8","172.16.0.0/12","192.168.0.0/16"
31+
)
32+
AND NOT All_Traffic.dest_ip IN (
33+
"10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16", "100.64.0.0/10",
2534
"127.0.0.0/8", "169.254.0.0/16", "192.0.0.0/24", "192.0.0.0/29", "192.0.0.8/32",
2635
"192.0.0.9/32", "192.0.0.10/32", "192.0.0.170/32", "192.0.0.171/32", "192.0.2.0/24",
2736
"192.31.196.0/24", "192.52.193.0/24", "192.88.99.0/24", "224.0.0.0/4", "192.175.48.0/24",
28-
"198.18.0.0/15", "198.51.100.0/24", "203.0.113.0/24", "240.0.0.0/4", "::1", "FE80::/10", "FF00::/8")
37+
"198.18.0.0/15", "198.51.100.0/24", "203.0.113.0/24", "240.0.0.0/4", "::1"
38+
)
2939
by All_Traffic.action All_Traffic.app All_Traffic.bytes All_Traffic.bytes_in All_Traffic.bytes_out
3040
All_Traffic.dest All_Traffic.dest_ip All_Traffic.dest_port All_Traffic.dvc All_Traffic.protocol
3141
All_Traffic.protocol_version All_Traffic.src All_Traffic.src_ip All_Traffic.src_port

0 commit comments

Comments
 (0)