Skip to content

Commit 6ac8e21

Browse files
authored
Merge pull request #3622 from splunk/auto-ta-update-341
Automated Splunk TA Update 341
2 parents 775402f + 391fedb commit 6ac8e21

22 files changed

+25
-25
lines changed

contentctl.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -167,9 +167,9 @@ apps:
167167
- uid: 4055
168168
title: Splunk Add-on for Microsoft Office 365
169169
appid: SPLUNK_ADD_ON_FOR_MICROSOFT_OFFICE_365
170-
version: 4.8.1
170+
version: 4.9.0
171171
description: description of app
172-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-office-365_481.tgz
172+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-office-365_490.tgz
173173
- uid: 2890
174174
title: Splunk Machine Learning Toolkit
175175
appid: SPLUNK_MACHINE_LEARNING_TOOLKIT
@@ -248,5 +248,5 @@ apps:
248248
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-vmware-indexes_403.tgz
249249
githash: d6fac80e6d50ae06b40f91519a98489d4ce3a3fd
250250
test_data_caches:
251-
- base_url: https://media.githubusercontent.com/media/splunk/attack_data/master/
252-
base_directory_name: external_repos/attack_data
251+
- base_url: https://media.githubusercontent.com/media/splunk/attack_data/master/
252+
base_directory_name: external_repos/attack_data

data_sources/o365.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,4 @@ separator: Operation
1717
supported_TA:
1818
- name: Splunk Add-on for Microsoft Office 365
1919
url: https://splunkbase.splunk.com/app/4055
20-
version: 4.8.1
20+
version: 4.9.0

data_sources/o365_add_app_role_assignment_grant_to_user_.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ separator_value: Add app role assignment grant to user.
1717
supported_TA:
1818
- name: Splunk Add-on for Microsoft Office 365
1919
url: https://splunkbase.splunk.com/app/4055
20-
version: 4.8.1
20+
version: 4.9.0
2121
fields:
2222
- _time
2323
- ActorContextId

data_sources/o365_add_app_role_assignment_to_service_principal_.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Add app role assignment to service principal.
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Office 365
2020
url: https://splunkbase.splunk.com/app/4055
21-
version: 4.8.1
21+
version: 4.9.0
2222
fields:
2323
- _time
2424
- ActorContextId

data_sources/o365_add_mailboxpermission.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Add-MailboxPermission
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Office 365
2020
url: https://splunkbase.splunk.com/app/4055
21-
version: 4.8.1
21+
version: 4.9.0
2222
fields:
2323
- _time
2424
- AccessRights

data_sources/o365_add_member_to_role_.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ separator_value: Add member to role.
1717
supported_TA:
1818
- name: Splunk Add-on for Microsoft Office 365
1919
url: https://splunkbase.splunk.com/app/4055
20-
version: 4.8.1
20+
version: 4.9.0
2121
fields:
2222
- _time
2323
- ActorContextId

data_sources/o365_add_owner_to_application_.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Add owner to application.
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Office 365
2020
url: https://splunkbase.splunk.com/app/4055
21-
version: 4.8.1
21+
version: 4.9.0
2222
fields:
2323
- _time
2424
- ActorContextId

data_sources/o365_add_service_principal_.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ separator_value: Add service principal.
1717
supported_TA:
1818
- name: Splunk Add-on for Microsoft Office 365
1919
url: https://splunkbase.splunk.com/app/4055
20-
version: 4.8.1
20+
version: 4.9.0
2121
fields:
2222
- _time
2323
- ActorContextId

data_sources/o365_change_user_license_.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ separator_value: Change user license.
1717
supported_TA:
1818
- name: Splunk Add-on for Microsoft Office 365
1919
url: https://splunkbase.splunk.com/app/4055
20-
version: 4.8.1
20+
version: 4.9.0
2121
fields:
2222
- _time
2323
- ActorContextId

data_sources/o365_consent_to_application_.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Consent to application.
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Office 365
2020
url: https://splunkbase.splunk.com/app/4055
21-
version: 4.8.1
21+
version: 4.9.0
2222
fields:
2323
- _time
2424
- ActorContextId

0 commit comments

Comments
 (0)