Skip to content
This repository has been archived by the owner on Dec 14, 2024. It is now read-only.

fix(addon): Remove pan_file eventtype from IDS CIM datamodel #268

Open
wants to merge 2 commits into
base: develop
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 0 additions & 2 deletions Splunk_TA_paloalto/default/eventtypes.conf
Original file line number Diff line number Diff line change
Expand Up @@ -44,15 +44,13 @@ search = sourcetype=pan_threat OR sourcetype=pan:threat OR (sourcetype=pan:firew

[pan_file]
search = sourcetype=pan_threat OR sourcetype=pan:threat OR (sourcetype=pan:firewall_cloud AND LogType="THREAT") AND log_subtype = "file"
#tags = ids attack

[pan_url]
search = sourcetype=pan_threat OR sourcetype=pan:threat OR (sourcetype=pan:firewall_cloud AND LogType="THREAT") AND log_subtype = "url"
#tags = web

[pan_data]
search = sourcetype=pan_threat OR sourcetype=pan:threat OR (sourcetype=pan:firewall_cloud AND LogType="THREAT") AND log_subtype = "data"
#tags = web

[pan_virus]
search = (sourcetype=pan_threat OR sourcetype=pan:threat OR (sourcetype=pan:firewall_cloud AND LogType="THREAT")) AND (log_subtype = "virus" OR log_subtype = "wildfire-virus")
Expand Down
4 changes: 1 addition & 3 deletions Splunk_TA_paloalto/default/tags.conf
Original file line number Diff line number Diff line change
Expand Up @@ -18,9 +18,7 @@ communicate = enabled
ids = enabled
attack = enabled

[eventtype=pan_file]
ids = enabled
attack = enabled
#[eventtype=pan_file]

#[eventtype=pan_data]

Expand Down