Open Res260 opened 1 month ago
An ugly but working workaround is to add this to the Detection YAML:
tags:
analytic_story: []
asset_type: Account
confidence: 1
cve: []
impact: 60
message: N/A
mitre_attack_id:
- T1555
observable:
- name: host
role:
- Victim
type: Unknown
product:
- Splunk Enterprise Security
required_fields:
- nothing
risk_score: N/A
security_domain: access
Hello, when I put an empty list in the
tags
section forobservable
, I get this error:I'd like to be able to create a Detection without an observable. I don't understand why this should be enforced, can we somehow remove this rigid constraint?
Thanks!