Skip to content

Commit aba0bdc

Browse files
committed
updating detection
1 parent 63facf9 commit aba0bdc

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

detections/application/cisco_ai_defense_security_alerts.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,8 @@ search: |-
3434
severity="medium", 50,
3535
severity="low", 25
3636
)
37-
| table model.model_name, user_id, event_action, application_id, application_name, severity, risk_score, policy_name, connection_name, guardrail_ruleset_type, guardrail_entity_name |`cisco_ai_defense_security_alerts_filter`'
37+
| table model.model_name, user_id, event_action, application_id, application_name, severity, risk_score, policy_name, connection_name, guardrail_ruleset_type, guardrail_entity_name
38+
|`cisco_ai_defense_security_alerts_filter`'
3839
how_to_implement: To enable this detection, you need to ingest alerts from the Cisco AI Defense product. This can be done by using this app from splunkbase - Cisco Security Cloud and ingest alerts into the cisco:ai:defense sourcetype.
3940
known_false_positives: False positives may vary based on Cisco AI Defense configuration; monitor and filter out the alerts that are not relevant to your environment.
4041
references:

0 commit comments

Comments
 (0)