Skip to content

Commit 9572eb1

Browse files
patel-bhavingithub-actions[bot]
authored andcommitted
Updated TAs
1 parent c5f13c7 commit 9572eb1

30 files changed

+41
-41
lines changed

contentctl.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -155,15 +155,15 @@ apps:
155155
- uid: 5556
156156
title: Splunk Add-on for Google Workspace
157157
appid: SPLUNK_ADD_ON_FOR_GOOGLE_WORKSPACE
158-
version: 3.0.4
158+
version: 3.1.0
159159
description: description of app
160-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-google-workspace_304.tgz
160+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-google-workspace_310.tgz
161161
- uid: 3110
162162
title: Splunk Add-on for Microsoft Cloud Services
163163
appid: SPLUNK_TA_MICROSOFT_CLOUD_SERVICES
164-
version: 5.5.0
164+
version: 5.6.0
165165
description: description of app
166-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-cloud-services_550.tgz
166+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-cloud-services_560.tgz
167167
- uid: 4055
168168
title: Splunk Add-on for Microsoft Office 365
169169
appid: SPLUNK_ADD_ON_FOR_MICROSOFT_OFFICE_365

data_sources/azure_active_directory.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: operationName
1010
supported_TA:
1111
- name: Splunk Add-on for Microsoft Cloud Services
1212
url: https://splunkbase.splunk.com/app/3110
13-
version: 5.5.0
13+
version: 5.6.0
1414
output_fields:
1515
- dest
1616
- user

data_sources/azure_active_directory_add_app_role_assignment_to_service_principal.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Add app role assignment to service principal
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Cloud Services
2020
url: https://splunkbase.splunk.com/app/3110
21-
version: 5.5.0
21+
version: 5.6.0
2222
fields:
2323
- _time
2424
- Level

data_sources/azure_active_directory_add_member_to_role.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Add member to role
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Cloud Services
2020
url: https://splunkbase.splunk.com/app/3110
21-
version: 5.5.0
21+
version: 5.6.0
2222
fields:
2323
- _time
2424
- Level

data_sources/azure_active_directory_add_owner_to_application.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Add owner to application
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Cloud Services
2020
url: https://splunkbase.splunk.com/app/3110
21-
version: 5.5.0
21+
version: 5.6.0
2222
fields:
2323
- _time
2424
- Level

data_sources/azure_active_directory_add_service_principal.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Add service principal
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Cloud Services
2020
url: https://splunkbase.splunk.com/app/3110
21-
version: 5.5.0
21+
version: 5.6.0
2222
fields:
2323
- _time
2424
- Level

data_sources/azure_active_directory_add_unverified_domain.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ separator_value: Add unverified domain
1717
supported_TA:
1818
- name: Splunk Add-on for Microsoft Cloud Services
1919
url: https://splunkbase.splunk.com/app/3110
20-
version: 5.5.0
20+
version: 5.6.0
2121
fields:
2222
- _time
2323
- Level

data_sources/azure_active_directory_consent_to_application.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Consent to application
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Cloud Services
2020
url: https://splunkbase.splunk.com/app/3110
21-
version: 5.5.0
21+
version: 5.6.0
2222
fields:
2323
- _time
2424
- Level

data_sources/azure_active_directory_disable_strong_authentication.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ separator_value: Disable Strong Authentication
1616
supported_TA:
1717
- name: Splunk Add-on for Microsoft Cloud Services
1818
url: https://splunkbase.splunk.com/app/3110
19-
version: 5.5.0
19+
version: 5.6.0
2020
fields:
2121
- _time
2222
- Level

data_sources/azure_active_directory_enable_account.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ separator_value: Enable account
1515
supported_TA:
1616
- name: Splunk Add-on for Microsoft Cloud Services
1717
url: https://splunkbase.splunk.com/app/3110
18-
version: 5.5.0
18+
version: 5.6.0
1919
fields:
2020
- _time
2121
- Level

0 commit comments

Comments
 (0)