Skip to content

Commit e7e142f

Browse files
authored
Xdm.event.outcome bulk6 (#24668)
1 parent f77593b commit e7e142f

File tree

9 files changed

+20
-9
lines changed

9 files changed

+20
-9
lines changed

Packs/DuoAdminApi/ModelingRules/DuoModelingRule_1_3/DuoModelingRule_1_3.xif

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,9 @@ filter
1212
xdm.intermediate.host.fqdn = HOST,
1313
xdm.source.user.username = username,
1414
xdm.event.outcome_reason = reason,
15-
xdm.event.outcome = result,
15+
xdm.event.outcome = if(result = "FAILURE", XDM_CONST.OUTCOME_FAILED, result = "SUCCESS", XDM_CONST.OUTCOME_SUCCESS, result = "ERROR", XDM_CONST.OUTCOME_UNKNOWN, result = null, null, to_string(result)),
1616
xdm.source.application.name = integration,
1717
xdm.auth.auth_method = factor;
18-
1918
filter
2019
eventtype = "administrator"
2120
| alter
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
2+
#### Modeling Rules
3+
##### Duo Modeling Rule
4+
- Updated Modeling Rules

Packs/DuoAdminApi/pack_metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"name": "DUO Admin",
33
"description": "DUO for admins.\nMust have access to the admin api in order to use this",
44
"support": "xsoar",
5-
"currentVersion": "3.2.4",
5+
"currentVersion": "3.2.5",
66
"author": "Cortex XSOAR",
77
"url": "https://www.paloaltonetworks.com/cortex",
88
"email": "",

Packs/FireEyeNX/ModelingRules/FireEyeNX_1_3/FireEyeNX_1_3.xif

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
[MODEL: dataset=fireeye_mps_raw]
22
alter xdm.target.port = to_number(dpt),
33
xdm.source.port = to_number(spt),
4-
xdm.event.outcome = act,
4+
xdm.event.operation_sub_type = act,
55
xdm.target.ipv4 = dst,
66
xdm.source.ipv4 = src,
77
xdm.target.host.mac_addresses = arraycreate(coalesce(dmac,"")) ,
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
2+
#### Modeling Rules
3+
##### FireEye NX Modeling Rule
4+
- Updated Modeling Rules

Packs/FireEyeNX/pack_metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"name": "FireEye Network Security (NX)",
33
"description": "FireEye Network Security is an effective cyber threat protection solution that helps organizations minimize the risk of costly breaches by accurately detecting and immediately stopping advanced, targeted, and other evasive attacks hiding in Internet traffic.",
44
"support": "xsoar",
5-
"currentVersion": "1.1.14",
5+
"currentVersion": "1.1.15",
66
"author": "Cortex XSOAR",
77
"url": "https://www.paloaltonetworks.com/cortex",
88
"email": "",

Packs/cisco-meraki/ModelingRules/CiscoMerakiModelingRules_1_3/CiscoMerakiModelingRules_1_3.xif

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,14 +29,13 @@ filter
2929
xdm.target.host.ipv4_addresses = arraycreate(coalesce(source_ip, "")),
3030
xdm.source.host.ipv4_addresses = arraycreate(coalesce(destination_ip, "")),
3131
xdm.event.type = event_type,
32-
xdm.event.outcome = action,
32+
xdm.event.outcome = if(action ~= "block", XDM_CONST.OUTCOME_FAILED, action = "allow", XDM_CONST.OUTCOME_SUCCESS, action = null, null, to_string(action)),
3333
xdm.event.outcome_reason = message,
3434
xdm.source.process.executable.sha256 = sha_256,
3535
xdm.source.process.executable.filename = found_malisious,
3636
xdm.source.process.executable.path = url,
3737
xdm.alert.severity = priority,
3838
xdm.target.file.filename = file_name;
39-
4039
filter
4140
_raw_log contains "urls src=" or (_raw_log contains "flows" and _raw_log contains "src=") or _raw_log contains "vpn_connectivity_change" or _raw_log contains "events dhcp" or _raw_log contains "Site-to-site VPN" or _raw_log contains "events"
4241
| alter appliance_name1 = arrayindex(regextract(_raw_log,"\.\d+\s(\w+)\s[events]"),0),
@@ -81,6 +80,7 @@ filter
8180
protocl = arrayindex(regextract(_raw_log,"protocol\=(\w+)"),0),
8281
protocl_type = arrayindex(regextract(_raw_log,"type\=(\d+)"),0)
8382
| alter
83+
xdm.observer.name = appliance_name,
8484
xdm.source.ipv4 = source_ip,
8585
xdm.source.port = to_number(source_port),
8686
xdm.target.ipv4 = destination_ip,
@@ -89,7 +89,7 @@ filter
8989
xdm.target.interface = destination_mac,
9090
xdm.alert.description = Message,
9191
xdm.network.dhcp.dns_server = arraycreate(coalesce(Dns_server_ips, "")),
92-
xdm.event.outcome = connectivity,
92+
xdm.event.outcome = if(connectivity = "false", XDM_CONST.OUTCOME_FAILED, connectivity = "true", XDM_CONST.OUTCOME_SUCCESS, connectivity = null, null, to_string(connectivity)),
9393
xdm.event.operation_sub_type = vpn_type,
9494
xdm.network.session_id = spi_unique_identifier,
9595
xdm.observer.unique_identifier = peer_unique_identifier,
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
2+
#### Modeling Rules
3+
##### Cisco Meraki
4+
- Updated Modeling Rules

Packs/cisco-meraki/pack_metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"name": "Cisco Meraki",
33
"description": "Cloud controlled WiFi, routing, and security.",
44
"support": "xsoar",
5-
"currentVersion": "1.0.5",
5+
"currentVersion": "1.0.6",
66
"author": "Cortex XSOAR",
77
"url": "https://www.paloaltonetworks.com/cortex",
88
"email": "",

0 commit comments

Comments
 (0)