mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-18 15:02:50 +01:00
Add Actions
This commit is contained in:
@@ -63,6 +63,31 @@ soc:
|
|||||||
description: A list of actions a user can take from the SOC UI against a hunt, alert, and other records. The action must be defined in JSON object format, and contain a "name" key and "links" key. The links is a list of URLs, where the most suitable URL in the list will be the selected URL when the user clicks the action.
|
description: A list of actions a user can take from the SOC UI against a hunt, alert, and other records. The action must be defined in JSON object format, and contain a "name" key and "links" key. The links is a list of URLs, where the most suitable URL in the list will be the selected URL when the user clicks the action.
|
||||||
global: True
|
global: True
|
||||||
forcedType: "[]{}"
|
forcedType: "[]{}"
|
||||||
|
syntax: json
|
||||||
|
uiElements:
|
||||||
|
- field: description
|
||||||
|
label: Description
|
||||||
|
- field: icon
|
||||||
|
label: Icon
|
||||||
|
- field: links
|
||||||
|
label: Links
|
||||||
|
required: True
|
||||||
|
forcedType: "[]string"
|
||||||
|
multiline: True
|
||||||
|
- field: name
|
||||||
|
label: Name
|
||||||
|
required: True
|
||||||
|
- field: target
|
||||||
|
label: Target
|
||||||
|
- field: jscall
|
||||||
|
label: JavaScript Call
|
||||||
|
- field: category
|
||||||
|
label: Category
|
||||||
|
options:
|
||||||
|
- hunt
|
||||||
|
- alerts
|
||||||
|
- dashboards
|
||||||
|
forcedType: "[]string"
|
||||||
eventFields:
|
eventFields:
|
||||||
default: &eventFields
|
default: &eventFields
|
||||||
description: Event fields mappings are defined by the format ":event.module:event.dataset". For example, to customize which fields show for 'syslog' events originating from 'zeek', find the eventField item in the left panel that looks like ':zeek:syslog'. The 'default' entry is used for all events that do not match an existing mapping defined in the list to the left.
|
description: Event fields mappings are defined by the format ":event.module:event.dataset". For example, to customize which fields show for 'syslog' events originating from 'zeek', find the eventField item in the left panel that looks like ':zeek:syslog'. The 'default' entry is used for all events that do not match an existing mapping defined in the list to the left.
|
||||||
|
|||||||
Reference in New Issue
Block a user