Skip to content

Commit ac7dcfb

Browse files
authored
Merge pull request #3808 from splunk/auto-ta-update-462
Automated Splunk TA Update 462
2 parents 442e815 + 9604770 commit ac7dcfb

8 files changed

+10
-10
lines changed

contentctl.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -44,9 +44,9 @@ apps:
4444
- uid: 7404
4545
title: Cisco Security Cloud
4646
appid: CiscoSecurityCloud
47-
version: 3.4.2
47+
version: 3.5.1
4848
description: description of app
49-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-security-cloud_342.tgz
49+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-security-cloud_351.tgz
5050
- uid: 6652
5151
title: Add-on for Linux Sysmon
5252
appid: Splunk_TA_linux_sysmon
@@ -254,4 +254,4 @@ apps:
254254
githash: d6fac80e6d50ae06b40f91519a98489d4ce3a3fd
255255
test_data_caches:
256256
- base_url: https://media.githubusercontent.com/media/splunk/attack_data/master/
257-
base_directory_name: external_repos/attack_data
257+
base_directory_name: external_repos/attack_data

data_sources/cisco_ai_defense_alerts.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,5 +10,5 @@ separator: null
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.4.2
13+
version: 3.5.1
1414
fields: null

data_sources/cisco_asa_logs.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ separator: null
2121
supported_TA:
2222
- name: Cisco Security Cloud
2323
url: https://splunkbase.splunk.com/app/7404
24-
version: 3.4.2
24+
version: 3.5.1
2525
fields:
2626
- Cisco_ASA_action
2727
- Cisco_ASA_message_id

data_sources/cisco_duo_activity.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: null
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.4.2
13+
version: 3.5.1
1414
fields:
1515
- access_device.browser
1616
- access_device.browser_version

data_sources/cisco_duo_administrator.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: null
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.4.2
13+
version: 3.5.1
1414
fields:
1515
- action
1616
- actionlabel

data_sources/cisco_secure_firewall_threat_defense_connection_event.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ sourcetype: cisco:sfw:estreamer
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.4.2
13+
version: 3.5.1
1414
fields:
1515
- AC_RuleAction
1616
- action

data_sources/cisco_secure_firewall_threat_defense_file_event.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ sourcetype: cisco:sfw:estreamer
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.4.2
13+
version: 3.5.1
1414
fields:
1515
- app
1616
- Application

data_sources/cisco_secure_firewall_threat_defense_intrusion_event.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ sourcetype: cisco:sfw:estreamer
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.4.2
13+
version: 3.5.1
1414
fields:
1515
- Application
1616
- Classification

0 commit comments

Comments
 (0)