Skip to content

Commit

Permalink
Solution packaged
Browse files Browse the repository at this point in the history
  • Loading branch information
v-prasadboke committed Dec 10, 2024
1 parent 170600b commit 0909ff6
Show file tree
Hide file tree
Showing 4 changed files with 1,087 additions and 921 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -72,7 +72,8 @@
"Analytic Rules/EmailEntity_CloudAppEvents.yaml",
"Analytic Rules/FileHashEntity_CloudAppEvents.yaml",
"Analytic Rules/IPEntity_CloudAppEvents.yaml",
"Analytic Rules/URLEntity_CloudAppEvents.yaml"
"Analytic Rules/URLEntity_CloudAppEvents.yaml",
"Analytic Rules/IPEntity_Workday.yaml"
],
"Metadata": "SolutionMetadata.json",
"BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions\\Threat Intelligence\\",
Expand Down
Binary file modified Solutions/Threat Intelligence/Package/3.0.9.zip
Binary file not shown.
18 changes: 16 additions & 2 deletions Solutions/Threat Intelligence/Package/createUiDefinition.json
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
"config": {
"isWizard": false,
"basics": {
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Azure_Sentinel.svg\"width=\"75px\" height=\"75px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Threat%20Intelligence/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe Threat Intelligence solution contains data connectors for import of supported STIX objects into Microsoft Sentinel, analytic rules for matching TI data with event data, workbook, and hunting queries. Threat indicators can be malicious IP's, URL's, filehashes, domains, email addresses etc.\n\n**Data Connectors:** 5, **Workbooks:** 1, **Analytic Rules:** 52, **Hunting Queries:** 5\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Azure_Sentinel.svg\"width=\"75px\" height=\"75px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Threat%20Intelligence/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe Threat Intelligence solution contains data connectors for import of supported STIX objects into Microsoft Sentinel, analytic rules for matching TI data with event data, workbook, and hunting queries. Threat indicators can be malicious IP's, URL's, filehashes, domains, email addresses etc.\n\n**Data Connectors:** 5, **Workbooks:** 1, **Analytic Rules:** 53, **Hunting Queries:** 5\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
"subscription": {
"resourceProviders": [
"Microsoft.OperationsManagement/solutions",
Expand Down Expand Up @@ -954,6 +954,20 @@
}
}
]
},
{
"name": "analytic53",
"type": "Microsoft.Common.Section",
"label": "TI map IP entity to Workday(ASimAuditEventLogs)",
"elements": [
{
"name": "analytic53-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "Detects a match in Workday activity from any IP Indicator of Compromise (IOC) provided by Threat Intelligence (TI)."
}
}
]
}
]
},
Expand Down Expand Up @@ -1058,4 +1072,4 @@
"workspace": "[basics('workspace')]"
}
}
}
}
Loading

0 comments on commit 0909ff6

Please sign in to comment.