Skip to content

Commit ebdd770

Browse files
committed
udpating name
1 parent d25d712 commit ebdd770

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

detections/application/cisco_ai_defense_security_alerts.yml renamed to detections/application/cisco_ai_defense_security_alerts_by_application_name.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ search: |-
3636
severity="low", 25
3737
)
3838
| table model.model_name, user_id, event_action, application_id, application_name, severity, risk_score, policy_name, connection_name, guardrail_ruleset_type, guardrail_entity_name
39-
|`cisco_ai_defense_security_alerts_filter`'
39+
|`cisco_ai_defense_security_alerts_by_application_name_filter`'
4040
how_to_implement: To enable this detection, you need to ingest alerts from the Cisco AI Defense product. This can be done by using this app from splunkbase - Cisco Security Cloud and ingest alerts into the cisco:ai:defense sourcetype.
4141
known_false_positives: False positives may vary based on Cisco AI Defense configuration; monitor and filter out the alerts that are not relevant to your environment.
4242
references:
@@ -52,7 +52,7 @@ drilldown_searches:
5252
earliest_offset: $info_min_time$
5353
latest_offset: $info_max_time$
5454
rba:
55-
message: Cisco AI Defense Security Alert has been detected for the application name - [$application_name$]
55+
message: Cisco AI Defense Security Alert has been action - [$event_action$] for the application name - [$application_name$]
5656
risk_objects:
5757
- field: application_name
5858
type: other

0 commit comments

Comments
 (0)