Skip to content

Commit 78d7f8c

Browse files
authored
Updated TAs (#3832)
Co-authored-by: patel-bhavin <[email protected]>
1 parent 61d302d commit 78d7f8c

File tree

97 files changed

+98
-98
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

97 files changed

+98
-98
lines changed

contentctl.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -65,9 +65,9 @@ apps:
6565
- uid: 742
6666
title: Splunk Add-on for Microsoft Windows
6767
appid: SPLUNK_ADD_ON_FOR_MICROSOFT_WINDOWS
68-
version: 9.1.1
68+
version: 9.1.2
6969
description: description of app
70-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-windows_911.tgz
70+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-windows_912.tgz
7171
- uid: 5709
7272
title: Splunk Add-on for Sysmon
7373
appid: Splunk_TA_microsoft_sysmon

data_sources/ntlm_operational_8004.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: EventCode
1010
supported_TA:
1111
- name: Splunk Add-on for Microsoft Windows
1212
url: https://splunkbase.splunk.com/app/742
13-
version: 9.1.1
13+
version: 9.1.2
1414
fields:
1515
- CategoryString
1616
- Channel

data_sources/ntlm_operational_8005.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: EventCode
1010
supported_TA:
1111
- name: Splunk Add-on for Microsoft Windows
1212
url: https://splunkbase.splunk.com/app/742
13-
version: 9.1.1
13+
version: 9.1.2
1414
fields:
1515
- CategoryString
1616
- Channel

data_sources/ntlm_operational_8006.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: EventCode
1010
supported_TA:
1111
- name: Splunk Add-on for Microsoft Windows
1212
url: https://splunkbase.splunk.com/app/742
13-
version: 9.1.1
13+
version: 9.1.2
1414
fields:
1515
- CategoryString
1616
- Channel

data_sources/powershell_script_block_logging_4104.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: '4104'
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Windows
2020
url: https://splunkbase.splunk.com/app/742
21-
version: 9.1.1
21+
version: 9.1.2
2222
fields:
2323
- _time
2424
- ActivityID

data_sources/windows_active_directory_admon.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ sourcetype: ActiveDirectory
1616
supported_TA:
1717
- name: Splunk Add-on for Microsoft Windows
1818
url: https://splunkbase.splunk.com/app/742
19-
version: 9.1.1
19+
version: 9.1.2
2020
fields:
2121
- _time
2222
- Guid

data_sources/windows_event_log_application_15457.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: EventCode
1010
supported_TA:
1111
- name: Splunk Add-on for Microsoft Windows
1212
url: https://splunkbase.splunk.com/app/742
13-
version: 9.1.1
13+
version: 9.1.2
1414
fields:
1515
- CategoryString
1616
- Channel

data_sources/windows_event_log_application_17135.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: EventCode
1010
supported_TA:
1111
- name: Splunk Add-on for Microsoft Windows
1212
url: https://splunkbase.splunk.com/app/742
13-
version: 9.1.1
13+
version: 9.1.2
1414
fields:
1515
- CategoryString
1616
- Channel

data_sources/windows_event_log_application_2282.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ separator: EventCode
1616
supported_TA:
1717
- name: Splunk Add-on for Microsoft Windows
1818
url: https://splunkbase.splunk.com/app/742
19-
version: 9.1.1
19+
version: 9.1.2
2020
fields:
2121
- _time
2222
- Channel

data_sources/windows_event_log_application_3000.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ separator_value: '3000'
1717
supported_TA:
1818
- name: Splunk Add-on for Microsoft Windows
1919
url: https://splunkbase.splunk.com/app/742
20-
version: 9.1.1
20+
version: 9.1.2
2121
fields:
2222
- _time
2323
- Channel

0 commit comments

Comments
 (0)