Skip to content

Commit 91eb95a

Browse files
authored
Merge branch 'develop' into sesameop
2 parents 3a1c68d + 61d302d commit 91eb95a

File tree

53 files changed

+1290
-73
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

53 files changed

+1290
-73
lines changed

contentctl.yml

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,9 @@ apps:
3838
- uid: 6553
3939
title: Splunk Add-on for Okta Identity Cloud
4040
appid: Splunk_TA_okta_identity_cloud
41-
version: 4.1.0
41+
version: 5.0.0
4242
description: description of app
43-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-okta-identity-cloud_410.tgz
43+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-okta-identity-cloud_500.tgz
4444
- uid: 7404
4545
title: Cisco Security Cloud
4646
appid: CiscoSecurityCloud
@@ -167,9 +167,9 @@ apps:
167167
- uid: 4055
168168
title: Splunk Add-on for Microsoft Office 365
169169
appid: SPLUNK_ADD_ON_FOR_MICROSOFT_OFFICE_365
170-
version: 5.0.0
170+
version: 5.1.0
171171
description: description of app
172-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-office-365_500.tgz
172+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-office-365_510.tgz
173173
- uid: 2890
174174
title: Splunk Machine Learning Toolkit
175175
appid: SPLUNK_MACHINE_LEARNING_TOOLKIT
@@ -251,6 +251,11 @@ apps:
251251
appid: TA-cisco_ios
252252
version: 2.7.9
253253
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/add-on-for-cisco-network-data_279.tgz
254+
- uid: 8024
255+
title: TA-ollama
256+
appid: ta-ollama
257+
version: 0.1.5
258+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/ta-ollama_015.tgz
254259
githash: d6fac80e6d50ae06b40f91519a98489d4ce3a3fd
255260
test_data_caches:
256261
- base_url: https://media.githubusercontent.com/media/splunk/attack_data/master/

data_sources/m365_copilot_graph_api.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ sourcetype: o365:graph:api
99
supported_TA:
1010
- name: Splunk Add-on for Microsoft Office 365
1111
url: https://splunkbase.splunk.com/app/4055
12-
version: 5.0.0
12+
version: 5.1.0
1313
fields:
1414
- appDisplayName
1515
- appId

data_sources/o365.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,4 @@ separator: Operation
1717
supported_TA:
1818
- name: Splunk Add-on for Microsoft Office 365
1919
url: https://splunkbase.splunk.com/app/4055
20-
version: 5.0.0
20+
version: 5.1.0

data_sources/o365_add_app_role_assignment_grant_to_user_.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ separator_value: Add app role assignment grant to user.
1717
supported_TA:
1818
- name: Splunk Add-on for Microsoft Office 365
1919
url: https://splunkbase.splunk.com/app/4055
20-
version: 5.0.0
20+
version: 5.1.0
2121
fields:
2222
- _time
2323
- ActorContextId

data_sources/o365_add_app_role_assignment_to_service_principal_.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Add app role assignment to service principal.
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Office 365
2020
url: https://splunkbase.splunk.com/app/4055
21-
version: 5.0.0
21+
version: 5.1.0
2222
fields:
2323
- _time
2424
- ActorContextId

data_sources/o365_add_mailboxpermission.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Add-MailboxPermission
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Office 365
2020
url: https://splunkbase.splunk.com/app/4055
21-
version: 5.0.0
21+
version: 5.1.0
2222
fields:
2323
- _time
2424
- AccessRights

data_sources/o365_add_member_to_role_.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ separator_value: Add member to role.
1717
supported_TA:
1818
- name: Splunk Add-on for Microsoft Office 365
1919
url: https://splunkbase.splunk.com/app/4055
20-
version: 5.0.0
20+
version: 5.1.0
2121
fields:
2222
- _time
2323
- ActorContextId

data_sources/o365_add_owner_to_application_.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Add owner to application.
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Office 365
2020
url: https://splunkbase.splunk.com/app/4055
21-
version: 5.0.0
21+
version: 5.1.0
2222
fields:
2323
- _time
2424
- ActorContextId

data_sources/o365_add_service_principal_.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ separator_value: Add service principal.
1717
supported_TA:
1818
- name: Splunk Add-on for Microsoft Office 365
1919
url: https://splunkbase.splunk.com/app/4055
20-
version: 5.0.0
20+
version: 5.1.0
2121
fields:
2222
- _time
2323
- ActorContextId

data_sources/o365_change_user_license_.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ separator_value: Change user license.
1717
supported_TA:
1818
- name: Splunk Add-on for Microsoft Office 365
1919
url: https://splunkbase.splunk.com/app/4055
20-
version: 5.0.0
20+
version: 5.1.0
2121
fields:
2222
- _time
2323
- ActorContextId

0 commit comments

Comments
 (0)