diff --git a/data_sources/github.yml b/data_sources/github.yml index 5114322fa2..2c5c88084d 100644 --- a/data_sources/github.yml +++ b/data_sources/github.yml @@ -9,7 +9,7 @@ sourcetype: aws:firehose:json supported_TA: - name: Splunk Add-on for Github url: https://splunkbase.splunk.com/app/6254 - version: 3.0.0 + version: 3.1.0 fields: - _time - action diff --git a/data_sources/powershell_script_block_logging_4104.yml b/data_sources/powershell_script_block_logging_4104.yml index 4a0f37f2b9..7463322d94 100644 --- a/data_sources/powershell_script_block_logging_4104.yml +++ b/data_sources/powershell_script_block_logging_4104.yml @@ -9,7 +9,7 @@ sourcetype: xmlwineventlog supported_TA: - name: Splunk Add-on for Microsoft Windows url: https://splunkbase.splunk.com/app/742 - version: 8.9.0 + version: 9.0.0 fields: - _time - ActivityID @@ -65,21 +65,21 @@ fields: - user_id - vendor_product field_mappings: - - data_model: cim - data_set: Endpoint.Processes - mapping: - Computer: Processes.dest - Path: Processes.process_path - ScriptBlockId: Processes.process_id - ScriptBlockText: Processes.process - UserID: Processes.user_id - - data_model: ocsf - mapping: - Computer: device.hostname - Path: process.file.path - ScriptBlockId: process.uid - ScriptBlockText: process.cmd_line - UserID: actor.user.uid +- data_model: cim + data_set: Endpoint.Processes + mapping: + Computer: Processes.dest + Path: Processes.process_path + ScriptBlockId: Processes.process_id + ScriptBlockText: Processes.process + UserID: Processes.user_id +- data_model: ocsf + mapping: + Computer: device.hostname + Path: process.file.path + ScriptBlockId: process.uid + ScriptBlockText: process.cmd_line + UserID: actor.user.uid example_log: 4104152150x01127484688201331200x80200000000000004328205140101280800x80200000000000001385415145001281100x80200000000000002018939