Skip to content

Commit 920fc69

Browse files
author
Patrick Bareiss
committed
bug fix
1 parent 8ef62a2 commit 920fc69

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

detections/cloud/github_enterprise_created_self_hosted_runner.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ search: '`github_enterprise` action=enterprise.register_self_hosted_runner
1919
| stats count min(_time) as firstTime max(_time) as lastTime by actor, actor_id, actor_is_bot, actor_location.country_code, business, business_id, user_agent, action
2020
| eval user=actor
2121
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
22-
| `github_enterprise_disabled_ip_allow_list_filter`'
22+
| `github_enterprise_created_self_hosted_runner_filter`'
2323
how_to_implement: You must ingest GitHub Enterprise logs using Audit log streaming as described in this documentation https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-streaming-to-splunk using a Splunk HTTP Event Collector.
2424
known_false_positives: unknown
2525
references:

detections/cloud/github_enterprise_disabled_ip_allow_list.yml renamed to detections/cloud/github_enterprise_disable_ip_allow_list.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ search: '`github_enterprise` action=ip_allow_list.disable
1919
| stats count min(_time) as firstTime max(_time) as lastTime by actor, actor_id, actor_is_bot, actor_location.country_code, business, business_id, user_agent, user_id, action
2020
| eval user=actor
2121
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
22-
| `github_enterprise_disabled_ip_allow_list_filter`'
22+
| `github_enterprise_disable_ip_allow_list_filter`'
2323
how_to_implement: You must ingest GitHub Enterprise logs using Audit log streaming as described in this documentation https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-streaming-to-splunk using a Splunk HTTP Event Collector.
2424
known_false_positives: unknown
2525
references:

0 commit comments

Comments
 (0)