diff --git a/docs/audit_policies/windows/README.md b/docs/audit_policies/windows/readme.md similarity index 99% rename from docs/audit_policies/windows/README.md rename to docs/audit_policies/windows/readme.md index 66e703132..507410bd6 100644 --- a/docs/audit_policies/windows/README.md +++ b/docs/audit_policies/windows/readme.md @@ -49,4 +49,4 @@ For a production-ready and more integrated solution that is designed to work wit * [Sysmon Event IDs 17, 18: Named Pipe Events](sysmon_eventid17_18_pipe_event.md) * [Sysmon Event IDs 19, 20, 21: WMI Events](sysmon_eventid19_20_21_wmi_event.md) * [Sysmon Event ID 22: DNS Query](sysmon_eventid22_dns_query.md) -* [Sysmon Event ID 23: File Delete](sysmon_eventid23_file_delete.md) \ No newline at end of file +* [Sysmon Event ID 23: File Delete](sysmon_eventid23_file_delete.md) diff --git a/docs/docset.yml b/docs/docset.yml index 4a954a464..76b35f827 100644 --- a/docs/docset.yml +++ b/docs/docset.yml @@ -3,7 +3,7 @@ cross_links: - docs-content exclude: - '_*.md' - - 'README.md' + - 'readme.md' extensions: - detection-rules @@ -13,7 +13,7 @@ toc: detection_rules: ['../rules', '../rules_building_block'] - folder: audit_policies/windows children: - - file: README.md + - file: readme.md - file: audit_authorization_policy_change.md - file: audit_computer_account_management.md - file: audit_detailed_file_share.md diff --git a/pyproject.toml b/pyproject.toml index 350f74e65..dc86a2c61 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -1,6 +1,6 @@ [project] name = "detection_rules" -version = "1.5.23" +version = "1.5.24" description = "Detection Rules is the home for rules used by Elastic Security. This repository is used for the development, maintenance, testing, validation, and release of rules for Elastic Security’s Detection Engine." readme = "README.md" requires-python = ">=3.12"