Skip to content

Commit 9d2be76

Browse files
author
Patrick Bareiss
committed
improvements
1 parent 2917e24 commit 9d2be76

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

data_sources/github.yml renamed to data_sources/github_enterprise_audit_logs.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
name: GitHub
1+
name: GitHub Enterprise Audit Logs
22
id: 8a4d656f-8801-4a2c-ae10-553d2696a59f
33
version: 1
44
date: '2025-01-15'

detections/cloud/github_disable_dependabot.yml renamed to detections/cloud/github_enterprise_disable_dependabot.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
name: GitHub Disable Dependabot
1+
name: GitHub Enterprise Disable Dependabot
22
id: 787dd1c1-eb3a-4a31-8e8c-2ad24b214bc8
33
version: 1
44
date: '2025-01-14'
@@ -19,7 +19,7 @@ search: '`github_enterprise` action=repository_vulnerability_alerts.disable
1919
| stats count min(_time) as firstTime max(_time) as lastTime by actor, actor_id, actor_ip, actor_is_bot, actor_location.country_code, business, business_id, org, org_id, repo, repo_id, user, user_agent, user_id, action
2020
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
2121
| `github_disable_dependabot_filter`'
22-
how_to_implement: You must ingest GitHub Enterprise logs using Audit log streaming as described in this documentation https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-streaming-to-splunk .
22+
how_to_implement: You must ingest GitHub Enterprise logs using Audit log streaming as described in this documentation https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-streaming-to-splunk using a Splunk HTTP Event Collector.
2323
known_false_positives: unknown
2424
references:
2525
- https://www.googlecloudcommunity.com/gc/Community-Blog/Monitoring-for-Suspicious-GitHub-Activity-with-Google-Security/ba-p/763610

macros/github_enterprise.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
definition: sourcetype=github:cloud:audit
1+
definition: source=http:github sourcetype=httpevent
22
description: customer specific splunk configurations(eg- index, source, sourcetype).
33
Replace the macro definition with configurations for your Splunk Environment.
44
name: github_enterprise

0 commit comments

Comments
 (0)