Edits to documentation
This commit is contained in:
@@ -15,12 +15,12 @@ Detection Rules contains more than just static rule files. This repository also
|
||||
|
||||
| folder | description |
|
||||
|-------------------------------------- |------------------------------------------------------------------------------------ |
|
||||
| [`detection_rules/`](detection_rules) | Python module for rule parsing, validating and packaging |
|
||||
| [`etc/`](etc) | Miscellaneous files, such as ECS and Beats schemas |
|
||||
| [`kibana/`](kibana) | Python library for handling the API calls to Kibana and the Detection Engine |
|
||||
| [`kql/`](kql) | Python library for parsing and validating Kibana Query Language |
|
||||
| [`rta/`](rta) | Red Team Automation code used to emulate attacker techniques, used for rule testing |
|
||||
| [`rules/`](rules) | Root directory where rules are stored |
|
||||
| [`detection_rules/`](detection_rules) | Python module for rule parsing, validating and packaging |
|
||||
| [`tests/`](tests) | Python code for unit testing rules |
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user