Skip to content

Commit 9ae1c7a

Browse files
authored
kfp
1 parent 2ba144b commit 9ae1c7a

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

detections/application/cisco_secure_application_alerts.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ search: |-
4444
)
4545
| `cisco_secure_application_alerts_filter`
4646
how_to_implement: In order to properly run this search, you need to ingest alerts data from AppD SecureApp, specifically ingesting data via HEC. You will also need to ensure that the data is going to sourcetype - `appdynamics_security`. You will need to install the Splunk Add-on for AppDynamics.
47-
known_false_positives: None known false postive for this detection search. If the alerts are noisy, consider tuning this detection by using the _filter macro in this search and/or by updating the tool this alert originates from.
47+
known_false_positives: No known false positives for this detection. If the alerts are noisy, consider tuning this detection by using the _filter macro in this search, and/or updating the tool this alert originates from.
4848
references:
4949
- https://docs.appdynamics.com/appd/24.x/latest/en/application-security-monitoring/integrate-cisco-secure-application-with-splunk
5050
drilldown_searches:

0 commit comments

Comments
 (0)