1
- name : Cisco AI Defense Security Alerts
1
+ name : Cisco AI Defense Security Alerts by Application Name
2
2
id : 105e4a69-ec55-49fc-be1f-902467435ea8
3
3
version : 1
4
4
date : ' 2025-02-14'
@@ -9,17 +9,18 @@ description: The search surfaces alerts from the Cisco AI Defense product for po
9
9
data_source :
10
10
- Cisco AI Defense Alerts
11
11
search : |-
12
- `cisco_ai_defense`
12
+ `cisco_ai_defense`
13
13
| rename genai_application.application_name as application_name
14
14
| rename connection.connection_name as connection_name
15
15
```Aggregating data by model name, connection name, application name, application ID, and user ID```
16
16
| stats count
17
+ values(user_id) as user_id
17
18
values(event_message_type) as event_message_type
18
19
values(event_action) as event_action
19
20
values(policy.policy_name) as policy_name
20
21
values(event_policy_guardrail_assocs{}.policy_guardrail_assoc.guardrail_avail_entity.guardrail_entity_name) as guardrail_entity_name
21
22
values(event_policy_guardrail_assocs{}.policy_guardrail_assoc.guardrail_avail_ruleset.guardrail_ruleset_type) as guardrail_ruleset_type
22
- by model.model_name connection_name application_name application_id user_id
23
+ by model.model_name connection_name application_name application_id
23
24
```Evaluating severity based on policy name and guardrail ruleset type```
24
25
| eval severity=case(
25
26
policy_name IN ("AI Runtime Latency Testing - Prompt Injection"), "critical",
@@ -53,7 +54,7 @@ drilldown_searches:
53
54
rba :
54
55
message : Cisco AI Defense Security Alert has been detected for the application name - [$application_name$]
55
56
risk_objects :
56
- - field : application_id
57
+ - field : application_name
57
58
type : other
58
59
score : 10
59
60
threat_objects : []
0 commit comments