Skip to content

Commit

Permalink
Merge pull request #1368 from SEKOIA-IO/fix-includes-sharedcontent
Browse files Browse the repository at this point in the history
Fixing includes as they were ignored because of the backslash escape
  • Loading branch information
GuillaumeCSekoia authored Oct 11, 2023
2 parents ba384ba + 73889e3 commit 78344e4
Show file tree
Hide file tree
Showing 3 changed files with 6 additions and 6 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -9,9 +9,9 @@ The Sophos Threat Analysis Center (STAC), is a dedicated tool for research and a
!!! warning
Important note - This format is currently in beta. We highly value your feedback to improve its performance.

{!\_shared_content/operations_center/detection/generated/suggested_rules_99da26fc-bf7b-4e5b-a76c-408472fcfebb_do_not_edit_manually.md!}
{!_shared_content/operations_center/detection/generated/suggested_rules_99da26fc-bf7b-4e5b-a76c-408472fcfebb_do_not_edit_manually.md!}

{!\_shared_content/operations_center/integrations/generated/99da26fc-bf7b-4e5b-a76c-408472fcfebb.md!}
{!_shared_content/operations_center/integrations/generated/99da26fc-bf7b-4e5b-a76c-408472fcfebb.md!}

## Configure

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,9 +21,9 @@ This integration can ingest the following logs:
- `Tunnel`
- `Web Log`

{!\_shared_content/operations_center/detection/generated/suggested_rules_dc0f339f-5dbe-4e68-9fa0-c63661820941_do_not_edit_manually.md!}
{!_shared_content/operations_center/detection/generated/suggested_rules_dc0f339f-5dbe-4e68-9fa0-c63661820941_do_not_edit_manually.md!}

{!\_shared_content/operations_center/integrations/generated/dc0f339f-5dbe-4e68-9fa0-c63661820941.md!}
{!_shared_content/operations_center/integrations/generated/dc0f339f-5dbe-4e68-9fa0-c63661820941.md!}

## Configure

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,9 +6,9 @@ type: intake

Cisco Identity Services Engine (ISE) is an intelligent security policy enforcement platform that reduces security risks by providing visibility of connections between all users and devices across all network infrastructure. This product provides exceptional control over the information and locations to which users have access on the network. This solution, and all its components, have been approved and rigorously tested as an integrated system.

{!\_shared_content/operations_center/detection/generated/suggested_rules_8a9894f8-d7bc-4c06-b96a-8808b3c6cade_do_not_edit_manually.md!}
{!_shared_content/operations_center/detection/generated/suggested_rules_8a9894f8-d7bc-4c06-b96a-8808b3c6cade_do_not_edit_manually.md!}

{!\_shared_content/operations_center/integrations/generated/8a9894f8-d7bc-4c06-b96a-8808b3c6cade.md!}
{!_shared_content/operations_center/integrations/generated/8a9894f8-d7bc-4c06-b96a-8808b3c6cade.md!}

## Configure

Expand Down

0 comments on commit 78344e4

Please sign in to comment.