-
Notifications
You must be signed in to change notification settings - Fork 433
Open
Labels
bugSomething isn't workingSomething isn't working
Description
Describe the bug
This detection is filtering based on the condition Processes.process=s3.amazonaws.com. This will never generate an alert if the datamodel is configured correctly as specified here. If you look at the description for Processes.process you'll see that it's intended to contain the name of the calling process so this would always fail to catch the intended acitivity. Changing this to Processes.process IN("*s3.amazonaws.com*") would resolve this issue.
Expected behavior
An alert/risk score is generated when a URL containing "s3.amazonaws.com" is curled.
App Version:
- Splunk Cloud
- Enterprise Security Version: 8.2.2
- Build: 198157
nasbench
Metadata
Metadata
Assignees
Labels
bugSomething isn't workingSomething isn't working