heroui logo

Cisco AI Defense Security Alerts by Application Name

Splunk Security Content

View Source
Summary
This threat detection rule, 'Cisco AI Defense Security Alerts by Application Name', focuses on the security alerts generated by the Cisco AI Defense product. The rule analyzes various parameters, including application names, connection names, and event messages to identify potential security threats and policy violations related to the AI models within a network. By aggregating data from Cisco AI Defense alerts, it helps security teams proactively respond to incidents affecting their AI capabilities. The severity of alerts is categorized based on predefined policy names and guardrail ruleset types, allowing for a risk score calculation that aids in prioritizing responses. The rule is designed for use in environments leveraging Splunk software, and it is primarily aimed at detecting anomalies associated with AI defense mechanisms, ensuring integrity and security in AI deployment environments.
Categories
  • Cloud
  • Web
  • Endpoint
Data Sources
  • Cloud Service
  • Application Log
  • Process
Created: 2025-02-14