Skip to content

Commit e434b1a

Browse files
committed
remove extraquote
1 parent 65291ca commit e434b1a

12 files changed

+12
-12
lines changed

detections/application/cisco_duo_admin_login_unusual_os.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ drilldown_searches:
4242
earliest_offset: $info_min_time$
4343
latest_offset: $info_max_time$
4444
rba:
45-
message: A user $user$ has logged in using an unusual OS using browser $access_device.browser$ from $src_ip$.
45+
message: A user $user$ has logged in using an unusual OS $access_device.os$ using browser $access_device.browser$ from $src_ip$.
4646
risk_objects:
4747
- field: user
4848
type: user

detections/application/cisco_duo_bulk_policy_deletion.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ drilldown_searches:
4444
earliest_offset: $info_min_time$
4545
latest_offset: $info_max_time$
4646
rba:
47-
message: A user $user$ has deleted more than 3 policies"
47+
message: A user $user$ has deleted more than 3 policies
4848
risk_objects:
4949
- field: user
5050
type: user

detections/application/cisco_duo_bypass_code_generation.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ drilldown_searches:
4141
earliest_offset: $info_min_time$
4242
latest_offset: $info_max_time$
4343
rba:
44-
message: A user $user$ has generated a bypass code"
44+
message: A user $user$ has generated a bypass code
4545
risk_objects:
4646
- field: user
4747
type: user

detections/application/cisco_duo_policy_allow_devices_without_screen_lock.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ drilldown_searches:
4141
earliest_offset: $info_min_time$
4242
latest_offset: $info_max_time$
4343
rba:
44-
message: A policy has been created or updated to allow devices without screen lock by user $user$ with email $admin_email$"
44+
message: A policy has been created or updated to allow devices without screen lock by user $user$ with email $admin_email$
4545
risk_objects:
4646
- field: user
4747
type: user

detections/application/cisco_duo_policy_allow_network_bypass_2fa.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ drilldown_searches:
4343
earliest_offset: $info_min_time$
4444
latest_offset: $info_max_time$
4545
rba:
46-
message: A policy has been created or updated to allow network bypass 2FA by user $user$ with email $admin_email$"
46+
message: A policy has been created or updated to allow network bypass 2FA by user $user$ with email $admin_email$
4747
risk_objects:
4848
- field: user
4949
type: user

detections/application/cisco_duo_policy_allow_old_flash.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ drilldown_searches:
4141
earliest_offset: $info_min_time$
4242
latest_offset: $info_max_time$
4343
rba:
44-
message: A policy has been created or updated to allow old flash by user $user$ with email $admin_email$"
44+
message: A policy has been created or updated to allow old flash by user $user$ with email $admin_email$
4545
risk_objects:
4646
- field: user
4747
type: user

detections/application/cisco_duo_policy_allow_old_java.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ drilldown_searches:
4242
earliest_offset: $info_min_time$
4343
latest_offset: $info_max_time$
4444
rba:
45-
message: A policy has been created or updated to allow old java by user $user$ with email $admin_email$"
45+
message: A policy has been created or updated to allow old java by user $user$ with email $admin_email$
4646
risk_objects:
4747
- field: user
4848
type: user

detections/application/cisco_duo_policy_allow_tampered_devices.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ drilldown_searches:
4343
earliest_offset: $info_min_time$
4444
latest_offset: $info_max_time$
4545
rba:
46-
message: A policy has been created or updated to allow tampered devices by user $user$ with email $admin_email$"
46+
message: A policy has been created or updated to allow tampered devices by user $user$ with email $admin_email$
4747
risk_objects:
4848
- field: user
4949
type: user

detections/application/cisco_duo_policy_bypass_2fa.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ drilldown_searches:
4040
earliest_offset: $info_min_time$
4141
latest_offset: $info_max_time$
4242
rba:
43-
message: A policy has been created or updated to allow access without 2FA by user $user$ with email $admin_email$"
43+
message: A policy has been created or updated to allow access without 2FA by user $user$ with email $admin_email$
4444
risk_objects:
4545
- field: user
4646
type: user

detections/application/cisco_duo_policy_deny_access.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ drilldown_searches:
4141
earliest_offset: $info_min_time$
4242
latest_offset: $info_max_time$
4343
rba:
44-
message: A policy has been created or updated to deny access by user $user$ with email $admin_email$"
44+
message: A policy has been created or updated to deny access by user $user$ with email $admin_email$
4545
risk_objects:
4646
- field: user
4747
type: user

0 commit comments

Comments
 (0)