From 2250781558d97411ce7a61ffd2f00a0328366b00 Mon Sep 17 00:00:00 2001 From: nipun-crestdatasystem Date: Mon, 18 Sep 2023 17:46:31 +0530 Subject: [PATCH] Added shorten url --- ...mecastTIRegional_API_AzureFunctionApp.json | 2 +- ...y_MimecastTIRegional_AzureFunctionApp.json | 2 +- .../MimecastTIRegional/Package/3.0.0.zip | Bin 8497 -> 8507 bytes .../Package/mainTemplate.json | 4 ++-- 4 files changed, 4 insertions(+), 4 deletions(-) diff --git a/Solutions/MimecastTIRegional/Data Connectors/MimecastTIRegional_API_AzureFunctionApp.json b/Solutions/MimecastTIRegional/Data Connectors/MimecastTIRegional_API_AzureFunctionApp.json index 2d1370cdc22..319a65a4196 100644 --- a/Solutions/MimecastTIRegional/Data Connectors/MimecastTIRegional_API_AzureFunctionApp.json +++ b/Solutions/MimecastTIRegional/Data Connectors/MimecastTIRegional_API_AzureFunctionApp.json @@ -114,7 +114,7 @@ }, { "title": "Enable Mimecast Intelligence for Microsoft - Microsoft Sentinel Connector:", - "description": "\n1. Click the **Deploy to Azure** button below. \n\n\t[![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-MimecastTIRegionalConnectorAzureFunctions-azuredeploy)\n2. Select the preferred **Subscription**, **Resource Group** and **Location**. \n3. Enter the following fields:\n - appName: Unique string that will be used as id for the app in Azure platform\n - objectId: Azure portal ---> Azure Active Directory ---> more info ---> Profile -----> Object ID\n - appInsightsLocation(default): westeurope\n - mimecastEmail: Email address of dedicated user for this integraion\n - mimecastPassword: Password for dedicated user\n - mimecastAppId: Application Id from the Microsoft Sentinel app registered with Mimecast\n - mimecastAppKey: Application Key from the Microsoft Sentinel app registered with Mimecast\n - mimecastAccessKey: Access Key for the dedicated Mimecast user\n - mimecastSecretKey: Secret Key for dedicated Mimecast user\n - mimecastBaseURL: Regional Mimecast API Base URL\n - activeDirectoryAppId: Azure portal ---> App registrations ---> [your_app] ---> Application ID\n - activeDirectoryAppSecret: Azure portal ---> App registrations ---> [your_app] ---> Certificates & secrets ---> [your_app_secret]\n\n >Note: If using Azure Key Vault secrets for any of the values above, use the`@Microsoft.KeyVault(SecretUri={Security Identifier})`schema in place of the string values. Refer to [Key Vault references documentation](https://docs.microsoft.com/azure/app-service/app-service-key-vault-references) for further details.\n\n4. Mark the checkbox labeled **I agree to the terms and conditions stated above**. \n5. Click **Purchase** to deploy.\n\n6. Go to ***Azure portal ---> Resource groups ---> [your_resource_group] ---> [appName](type: Storage account) ---> Storage Explorer ---> BLOB CONTAINERS ---> TIR checkpoints ---> Upload*** and create empty file on your machine named checkpoint.txt and select it for upload (this is done so that date_range for TIR logs is stored in consistent state)\n" + "description": "\n1. Click the **Deploy to Azure** button below. \n\n\t[![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-MimecastTIRegional-azuredeploy)\n2. Select the preferred **Subscription**, **Resource Group** and **Location**. \n3. Enter the following fields:\n - appName: Unique string that will be used as id for the app in Azure platform\n - objectId: Azure portal ---> Azure Active Directory ---> more info ---> Profile -----> Object ID\n - appInsightsLocation(default): westeurope\n - mimecastEmail: Email address of dedicated user for this integraion\n - mimecastPassword: Password for dedicated user\n - mimecastAppId: Application Id from the Microsoft Sentinel app registered with Mimecast\n - mimecastAppKey: Application Key from the Microsoft Sentinel app registered with Mimecast\n - mimecastAccessKey: Access Key for the dedicated Mimecast user\n - mimecastSecretKey: Secret Key for dedicated Mimecast user\n - mimecastBaseURL: Regional Mimecast API Base URL\n - activeDirectoryAppId: Azure portal ---> App registrations ---> [your_app] ---> Application ID\n - activeDirectoryAppSecret: Azure portal ---> App registrations ---> [your_app] ---> Certificates & secrets ---> [your_app_secret]\n\n >Note: If using Azure Key Vault secrets for any of the values above, use the`@Microsoft.KeyVault(SecretUri={Security Identifier})`schema in place of the string values. Refer to [Key Vault references documentation](https://docs.microsoft.com/azure/app-service/app-service-key-vault-references) for further details.\n\n4. Mark the checkbox labeled **I agree to the terms and conditions stated above**. \n5. Click **Purchase** to deploy.\n\n6. Go to ***Azure portal ---> Resource groups ---> [your_resource_group] ---> [appName](type: Storage account) ---> Storage Explorer ---> BLOB CONTAINERS ---> TIR checkpoints ---> Upload*** and create empty file on your machine named checkpoint.txt and select it for upload (this is done so that date_range for TIR logs is stored in consistent state)\n" }, { "title": "Additional configuration:", diff --git a/Solutions/MimecastTIRegional/Data Connectors/azuredeploy_MimecastTIRegional_AzureFunctionApp.json b/Solutions/MimecastTIRegional/Data Connectors/azuredeploy_MimecastTIRegional_AzureFunctionApp.json index b7bdefbc17f..2769b89263d 100644 --- a/Solutions/MimecastTIRegional/Data Connectors/azuredeploy_MimecastTIRegional_AzureFunctionApp.json +++ b/Solutions/MimecastTIRegional/Data Connectors/azuredeploy_MimecastTIRegional_AzureFunctionApp.json @@ -206,7 +206,7 @@ "active_directory_tenant_id": "[concat('@Microsoft.KeyVault(SecretUri=https://', variables('functionAppName'), '.vault.azure.net/secrets/', 'active-directory-tenant-id', '/)')]", "log_analytics_workspace_id": "[concat('@Microsoft.KeyVault(SecretUri=https://', variables('functionAppName'), '.vault.azure.net/secrets/', 'log-analytics-workspace-id', '/)')]", "log_analytics_workspace_key": "[concat('@Microsoft.KeyVault(SecretUri=https://', variables('functionAppName'), '.vault.azure.net/secrets/', 'log-analytics-workspace-key', '/)')]", - "WEBSITE_RUN_FROM_PACKAGE": "https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/MimecastTIRegional/Data%20Connectors/MimecastTIRegionalSentinelConn.zip" + "WEBSITE_RUN_FROM_PACKAGE": "https://aka.ms/sentinel-MimecastTIRegional-functionapp" } } ] diff --git a/Solutions/MimecastTIRegional/Package/3.0.0.zip b/Solutions/MimecastTIRegional/Package/3.0.0.zip index 31fb953e95a90d2749486ca1ae91f344292a7d36..7ea126a076bc6823e464fe85a51df3a0ab990be5 100644 GIT binary patch delta 5510 zcmV;16?y8hLc2n+bq5X3doov#=61jb82|t*lY$2{3W{TEEjg|&QDuXZzz2B&7n3>& z9s$pjSqLftmXm}CD-UQeO=fU+m|b@1#9sKxFO$9qA^{GQ;Rqdn$5(O^>ueS-eAj}Z z*7wxuc)%TDN=Iy!OJ9YgT5KwpL4iujV5G5X$x7RX8O_ApN(A z=P=ky8dJ~>Ck|OSNyr%}krz-Ox0lgm5!Ehb9EMjz3sJAOg&Lh~)Ted}f322_VyQ^2 ztR-gvuI<>f$3D&LKbSesM{G5Q=R*o~k)l{%;}_Suml>FU60z5USv5<~U~>j@J2RI6 zp#V-?yqD6&ZM4PY7Fr6*QUHk;8|MNDnbCYKK=^|5uf?PK&RKsl<0i4F6yKqvvCBG8;iWV4=m%NSLP2}9##@fwz zjlUs+foFn&5{Gd(AF4!6AZX&bm_@@>CG)0j(XUc}gQx6t{8y8fJQjahlks z47Vm@cNr9>=>Uws5OY+c+_vUs5XIrO2RRcP$Z3`Grlu3HLZF!o`?fZ>wndI@MKQhh z=uHk(#@$*EQ?Uy<5g>)kwsWCXbSuke@&h4%VWNS{-UJy(`1P-El+{++&Xql-WviT* zs$70{nXL?V2M9~Ndt3F(d{Un7Lo}-2=Ay7M2oRvI$Stgyx zsg!4Q5|!Dh%hLE_?c_`GW+AUC-P5R-dVMZ_)T&!G6DShKht(-b-bi0+#;&R*DS|71 zFW{z!&Fq-E8i0zn53S9ouyq=@4^|b%{Z4tJFIBosdXoaU9s}9CRf%tfky#Nz%S3cp6t>RyexvTOU_j^ds3Wy% z)HxVoA&erL0R#`D&c>+Yf$}l9bpe2XC^+zTA1+HthfgI0KmF>TDzZ*sY>Fr&R$}v9 zKH%xrgu3JHZEJsTXj?nO{e8>cwa3O8L(6J_W|qu_U03O&y3 z==0~J(WqlIlN=L5@X>5BpM!__jS@Saewf>z*3V(!k2FBWQg@@*CF5Iv@)Dw?ma2o#L`4oeg6tK^(r{9ts&gb_NbpcM;EL2c`cFfZ)uvM_8=V!Md z^z;6k@jt*#Ut9{XH0f`EmHT-z$K*&YMFS^Qoq;CpQ??K3 zW44yGutgMwadL0ONPOBSgQYQGmH2T6aMlUL1O_N@yjPuE!jH!q76BN}etwF9sCL*+ zq88M0{cg@g7?~i#0CD)@==HIIQqau=)3Qz_byqJfc6=3o^{*x@(@)J&DA_-jmQuq3 zeCfD=ua>ke{p>@7Fi&YZ+C;AI@}*{T%a_X0ME+xLe4ZU(KzXI?ry47wU<{?9YBly! zH#*JybwgiQ^L{n1(E{bi$bCEG5uxe9c^+~V>#xTCRAc;CuXiZy#;UdXL1P({cZab{ zI4w1*bT;IZ?hru=yAuseWA>Q}{yUR75jX*}vvLtz0S5vD@G6|Xm6OyGlmdRQlWG$$ zfBZym?<6#NQGvKfASG9Twa}xX5gl@IMnx-<8#)Wj(L_K5SbS>70hxyYZjZx7l0$)* zFV|H%2qRfPd(4ShAkPQIUuzx)9$3WzW_~~o+yrx(ST_*zhd1n-aGXH;X=Ry$=USiy z7R=FINwOQ6`3DHK?Z{wZRSDGJ(3@rSf0q2jLXCf{7u~EbuQu^L9S;~NCd%V% zMLh%I*~@`UVr>K*ye84ML3l84#d8cW70)&md}$Ie7}Z(e;=NAez=kj}6MxGmSehk} zUdA-xXvEvq(0mWc*Soi`4m3~8e~}M(o51~1FbWRId7cHujo2u&4AO5u1OXJ4M;Mq} zEE)qzbip&#Qq8@Ua1mIkA=jQ=+>;{&1@;RuCJ-aD(5DCG>%YU)@wJCq@jG85QgbRj z5>JMuBCx)0)j6hcy75eoEQ|0)U1^VC4S2}ufGBI@YjCf4oKt>CIs3 zhhy8fFhjN$vCjq%WQbIOoJ_G(`cCG@PCI)AGNOt)To7zLo{%CSw=f#FbsD0r0u->( z4`pmK7XzAlwtmUWhRWK~`WBOBw~keo0?O!B(G~)4&cA{%N~UUicoBpLWtu zLQTvpF+>Nt%Z4Nh8`0whe`n2ELZg*3>k`Kfd%f3h&R-t%dZ0W7egHF=*5wNbUhXR@ z8#dW5e4ls;!?Qu@*`Bif?Te}Aye0@DxbU$wh(5~`F}J8^ft+En5B9(bS;BzNGwNJ% zLvm53D~dgb`%nl|v#>!t;3&oo5^~^DFi)VSx!8eAg}iPO?d6}He^(j4{w9*^#9izH z>qP<5zaOziA7$>C`@btL;Xv=VO|Y-J@iFC zhPaAeuP2Db^C+<2mSr90Op)|4;_?Mp*!Tl5=Tdxrfsail+{rTXH{3DU776>B-VjGv z9dR8d;yahd;{ia3TV$Q7Sd*V%CoG&(ajciw6UZvL8roR$e;&gkknw2iZ#>ZCAWYyQ z;Z7X2Ta6X8hdj)zU9)p?tst&8zF=B@?Q*+ zhW=fMz!*0CuVtsX1=JS6Y^S5k|Mj=~sLL^N>1pUyHv| zGC?r!jlDTx|3kTJx@9Vw-_^+Q;1Hrc8HMzE($uKhe+XET@ghk=)OOJ9K0#YEN-qB6 zLIR#kz+8xOW%uVyp0-Fr?kxq5ZUrd)4ijY^vO^>mA1JVNdBA$c`<6JJ5%;Ya_JWnn z#q_=223$!K3jWng(vS3d>bsG8JzNIFye}auic2MniAQ~x9gG4nyWqL7n0G+l@xEsw zn&4r8f1L*Re@J6cwK%UPxk;UGPwB#o?zg>O_i1`C+10Tnq$a( z5^xvL7^*ErEQJxOwoFJiYx5Zv0(3<=>_tXfmMRo$%J-g!;NmBX7|6=Ge**9?w81!5F7s$Hph#>yw(qqF5R# zY`-e>eBigF)Q}5lvoF`t^@3`FJVF8ue-i41iy-L=Fm?6iC!iw+R`9Fezk2gMdGY4; z`O(Simv7I+MQ})hAyEiMPg3v>hS_c@L!t8s1cDo8QCy12+;(PQSNNB*xj8ib&2` zV}UfGc`1sTsR>#3G+CO9JXkVx_#$7U>GgD{hg2Dr!M@-r{EVzVk(quzS5ObLv-(iP zB_+T^Tr|LJ6hv3mhC~EYmxrX>Jj$v*POD5&cUd2*Hhen(2N8z~$NSFS?)KK6HQC!8 zTRW58UF+%Ilc6;kQ`e@OyS6*oe>W|r)IX{3pyYt+yky~IrV+Zn&xwPi-=t96>%>7T zO+3qqUPHqY2f6DM4Sh%)rd7ibhiuoi#6ef+T;k*IuP+H-TEW&_Y;1EW5nN&BT@Dp5 z(===BKS+n%(}`?3y7*O8=FZv5_l(`Kf40zb`PCa4ipRc}{~ET!(i~$~e~=MVePifx zlj$=x+O+E=kT@P&L{qTG7SSb5aie+7e|+pBY}-ZH&R&#T3618W+)uc2Fy5lIqqzgI zu(&dGn>NJd5G-pV)zF7%NUR0~O9TRc>HxsptXPjq+a9=Tua&v4@UItj+}(OKMj1=1 zPJXODs%VHNT1OGfM-K&$f1{5U8XR-`=%6r{AsT2sS+n=A_xktX?Ncvqw2Aj*np#P5 zLF3zZiQdI-7Zo;#b7f0a(+z62VvZug)cyHKb#J!m+I;NR{OfdUHgsuLizfHqmAPs+ z=Bizo#muE7+2$6*Dl1lQDXgPF>P}PZpt+jW+$vbtBKS|#8hF{Bf2j>kv{h!_rD^v5 zn`P^kR^QcV?q;m-Vk}la>bn+Obt`HMhAZ@(RoPu6?;*PqSL#M=*|4=tqgHd*VPm&p zQ zH(z6qN%2VBV;5ihfA+e^Ef&3@&@^}JHJXM?G{_UORVmR zar5`bXW-4}!|rhQ$|?TVMBUjh^U>Lr&uJOYV&%?8R!?@gfW=qpxa0bK%@*)K7&|=~vMy zu$-z57dMCkdar27-_B5(RFDT-N)JKjUX`CHlYJi=f89RH<{NuR6cJ^>7TqJQhdRP6 zKlA2O!eS@Kme{`Oi{G8abVnlMkuDDm#a~NtSN+oLt8f~!fl>kd<#3zrxA=qR%(~bYuNbHrD)9V>MuI{#nzz z{C=Lqe_&`$QNwi&UE%K!iX delta 5465 zcmV-f6{hODLa{=ybq5Wilq**h@p1J17ytlTlY$2{3bJEsEjg|&QRRS>zz2B&XOlVz z9sy62SqLftj+2B4D-UTfO=fU+m|b@1#9sKx&y&6gA^{1L;RqdnFR$e!*4Zpv_^t&* zt?#MzcRO~S5QhEIC*%VqUceG+yNHz}GfIBB3F9jk*$%Z7nZJ;mndi)i$B0W~?;56@ z#NnKSzdj=AfR3X3i+J-zZB-RzJN}j#xiq^jKn`KT^)(>?$SEPXgei$pd&7uj5k^re zP<(KGideYpQwQIFt!-pdv%aS8uXVeZ&1)|#xn^Z%X=}CQ4{AOV0HItDUWZe11k!(- zcn*WTq%j5EaN>}KlZ2ds5_tjjaeEm}7E$d|#$k9hv=H@bTd2{=Mty3x@Hc9?D3*%U z%35*;;M$Hod+gJ^{)3tGe8g5`cs`~;7b%MMHGXledzpcMDG_@km{qg%3^r#lw=;7I z5DMVL#d|4T+(uhWZlR^1ECrBwv2iYeD!+#8PJSVZmy)(&M_Ka<#0z2dPu!t?y&u%B zln2TYsi8b^*Vj@B?Vkk9o6Zt8P~dEBgXGArPR}*6Jc)8tXAyO9PlkC5k=N@~W!JhJ zYlDoAGwLjVVlTN(=~>%o8g1Q-t+kCs;QhLwLO0fPgn!gho~K;{QQkBij^g4uHSbc^ zRyaLRSNJxfF*j+ppDr>rD9ClgLN(l$5x{92x(g?zTki&->GRWfhd7X2!JHHa#J`Au4QK+MFO8Wjg_2jGFi z_z3m=heg1>5zFW)VaQXEyOp044Qh(ENpTzJufdk5#Q@=pnpRlRut1~ zkKW`!W!$axFcrIy69H1lY&#cPMYpniCO;5=5+)kB>}`;7gkS&qMp%Jn4HgI zYA0~l^oJhMTb1}$7?~9jv`j>oMPciF?>Fim3kGyPk2+GT zMxBEZ7Q!f^89?wb>THZU9w;A!TNeO-h=K!e_u;aXbof+4@ak9pRFQQ8V^c&Ku@al- z@&Qk`Ce$5oZ(I9&L)+RJ?(bXnu06Jfd)qsk`#VpmI}`|7&4P>P5DDzb$Jh?0lwbGl zG4<0MB)cKkw1Z1!@93`!$n24@BwkRQ6bme3mF_|q+n;a&JKI~E`1&GIoY5qI0l{Db zR1~&QM|goot+;?;TaGVZ-#1(zJ~iCf-ZPEZ*)iP7s4w4nx@Q_Qe6nStU~6~Zgl}(i z$24lVwYhI1eGBBkgfg8?b8mO}bjNh>$&)90^4=xvn(h1H&5H#~!nxe;FZ?=7Zhav_ zk>~r23kif|@$I>gluh`o%&okCH0orjewg`Wuj-RWoiBMI&2)lTWD9R*S~e_e89E$3 z>YIw4IRP-=_og&(DEWa>w>(h-K?P2+TbyINL6Zxr#hJkGh*|TKo+v{%8U?@0Qs{AJ zN1s0*jYb`#ndF!df{$j4`5ZjVZi9V4aR;r9zdW2>y

i_#f*uIS7QJ{4s*M%p4P<{G+mBOQ`PRL*@=8PeJuW_mts>pDaWULk!{+bfglK{4seQPv!a6oaJi zJ}cC(=|V&^DRld#HSk8e4C~>?GA#=w&&7M}n%Q=y2rpweDeCVSvd57Lw@8ibd092PF3-U%!Ylbq1QWPuV`E zkJ(z%!WK~!#>u@ABk^gU43@@#RpQ4Pz*#2{6BwYt@m_Uu2|pfdSOj1=`}rvbqS|3Q ziCR$0^}9I}VPt{`1H|Erqc_I}NxRCm=KX41qXo*3k^6SWBSO=I^E~7#)?bZ%Rb%{DuXiZy#;UdXL1P({cZab{ zI4w1*bT;IZ?hru=`x6aJWA>Q}{(F--5jX*pvvLtz0S5*H@H(8nlatgElmh;slWG$$ zf4ri%cM_Vss6bpKkdiCFTIkWxhz_|pqoNhb4V?w%Xd)m2EIzg4fXqVxx5wck$)P~Z zm+LAWgpsVDJ?6wLkmrNquQd+?53J$Ee@lL1p~gSfi*8nzSDW~Ojt2}BljUWrmQAG~ z>7Ch_fozrXAG{>e0Aiuujy7LAQE3OTAXJ59Nm+{0~4pKu-!SNTMI_xJc?7BF;HnpkJP)=61Bzw`+oum zkWINW3*^K_S`bq@UXy6sAUv42;yDJGif5Y&zBCCKjOr|K@m{BKU_+RgiNEC&EX@)~ zFJqc;G~(@QXugN!>;1de2b!nlf5->CP2m107zKyqJkNsSMr@Q>2I;pSf&hxjBMi(f z7L9=Ks!z-FPNPmPL4@uCzz620Y|+K$Nxd@`wwM7z-wBU`L)6e_kVn^ky*i z!?EpKm?2w>*k^+WGDNCCPNvu?eJAr{r=7h58Bs+YE(kUrPe>7vTNsVoIt|fQ0SegY zhcdRAivdl&+Y$rmRE~-&FT@yxASJy4zkKY$rb>+%HzFZUId z4V&y2zE8Y_;n|?{Y){$#_Qh0lUK0cnT=-ZTM4#n}m|N7dK+dq(2YcXzEMdUs8Fj9> zA-O2i6~&&zeJF&fS=b;Ra1`SP2{~{nm?u!vTVw;;Ldph!siy%)+F}mHBT7`ud4v}FMi;W3i6+c??jNI*eXtoB8v%Io_~+|f_06= zSuve}W(HvEyHXV^fAkBp6qJM#we`VvtJga_e|buV#3C?IM&PT31pRA4Q(uWe~)1i$au8%Hy&tm5GHVu za3_x1Ey_Qj-~=BC#)c;#oRR5Mmjd4o9(bd+V55%3*H;uwQ~DrG><%d5$xo+m-<==5 zIY-m?J)NNJi)WtPzm)@t)Glshp?jK%l9OY?*`HlGjlH=Y-*V|)cR*-?jgY~5`7Z`Z zL;o&BV2s>Qf8aR$zcRN;`Oi`LHwYFJJg^HUn*Xv#9F;Xr%0h@06SHS)Eu|qD=kaE2%}r%^lLtWc}N|)uf<;} znIM?=#@?K;|DoJ9-7*!;?`mXta0t)LA1`H#9T@zY9FRM3Tik`+astCyuhWu1EuQ60ztBCdS2^1yAUd&l?EAH_+ z6INEl$J00jwW0U{KZ>*7U>+3Fs_v^6ye_|{r+WZ~8od7k4>oY%rUFcsD)ZbpO+93q z3AhVr3`LkCmcj^Caw(QuQa7`70fcA@Eu|vMfBhg|w!BhVxw*2^W^`ImN$V)u+JTS= zE>o#UDVDDq+!glf*f4`w(j8{03n5e3kK*zr+A4C0O``|oWJ2;sUa}Bep+FYfL0W7R zIRaL3ujz*Rp0r=S%PP}=fg@NKYkD7h&p)fPRUoV=I$$*7FWq0nQ8d(j(0VXGat3KO ze^fH^4ow%@-HVL2EQ2VPn(sY5!NpG&F_4v|i^#p5KEXpgoL&cW)p7WVa3{%aECh1X znDRgxAwWCk;&=+gmLl_I1RuhpEks5N6T7QCPOoT8LrAb442>5iSGXNrf73}H z9wMZ9&P!42OijqLhs;tJ{$M%M;fs9frq|OQDpJ)|2K$1C^E0ygL>2(@DTI2)ot2Fu zE-3+??VmcDJ|otjXT) z*xH%w?pjaxo(!$Yn7TII+_l}wf4*rkrM60aVFrrg^cwn@ILKY6XlPI3Fs=HCIAptKCJwqnLlYl&f9*>6(h9cbVq^D9iQoz|?{e07 znO<6BTS7YIo(^iu(Zz45GB?y#zJBbEZMB6~%&*?xP&^I3{I|0emgX3ne}#;g>ib2H zn@pdn|E67ofyD9HIhuk!c8)G-iW|*q{^MhFVcX`ycJ`v&VQ4fL#i9+OEM>Td>UShJU@N}5`rl!z8s;RS0Gv{Ly=U=CZv!QvjS~R);X3bTb zG*@lTEM_hx$u@T$R#~xfr(qohQg@m<3eDB5<_^NT&cT18j={_Je@t!Yt*tWiF1@t( z-$PrswEAX8bCY9zb7QgkQQyqis)Q*+;PhNiiRuhG0bK=a;mYiMlJYhJ?FZ_X=w zJ!e{5-LPP;2t%9qM@*kzUV zvB~VQ$?UPo?A2qF*<+L0W0Toqli9y=li458T()$0^5< za3sqq{xU_~kudX#+Le!Q8INe?j!ae$eAgX*T;klg;WW4YtYmgn>sUXmh&q$%zbA8^ zC_IY}pMg+@J;78ssAmKDi9Dn8!*ibW&v~Lxp4kM%e)2r~(Z*8rtPW?gt024yJjVDh z#~$)eM0|WUun+Me8y3=KRhE;=9w!|t`QxdxB~P6_8^>gD*#6|1=U$f|G*_9zRq=PT zRu@pFsttjj4t=^uh*glQGk>*BK+5JDTT2uXG-bdRO(m^|I>IbJ^X5~+VkgIz*uLqD zU#Z1(M Azure Active Directory ---> more info ---> Profile -----> Object ID\n - appInsightsLocation(default): westeurope\n - mimecastEmail: Email address of dedicated user for this integraion\n - mimecastPassword: Password for dedicated user\n - mimecastAppId: Application Id from the Microsoft Sentinel app registered with Mimecast\n - mimecastAppKey: Application Key from the Microsoft Sentinel app registered with Mimecast\n - mimecastAccessKey: Access Key for the dedicated Mimecast user\n - mimecastSecretKey: Secret Key for dedicated Mimecast user\n - mimecastBaseURL: Regional Mimecast API Base URL\n - activeDirectoryAppId: Azure portal ---> App registrations ---> [your_app] ---> Application ID\n - activeDirectoryAppSecret: Azure portal ---> App registrations ---> [your_app] ---> Certificates & secrets ---> [your_app_secret]\n\n >Note: If using Azure Key Vault secrets for any of the values above, use the`@Microsoft.KeyVault(SecretUri={Security Identifier})`schema in place of the string values. Refer to [Key Vault references documentation](https://docs.microsoft.com/azure/app-service/app-service-key-vault-references) for further details.\n\n4. Mark the checkbox labeled **I agree to the terms and conditions stated above**. \n5. Click **Purchase** to deploy.\n\n6. Go to ***Azure portal ---> Resource groups ---> [your_resource_group] ---> [appName](type: Storage account) ---> Storage Explorer ---> BLOB CONTAINERS ---> TIR checkpoints ---> Upload*** and create empty file on your machine named checkpoint.txt and select it for upload (this is done so that date_range for TIR logs is stored in consistent state)\n", + "description": "\n1. Click the **Deploy to Azure** button below. \n\n\t[![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-MimecastTIRegional-azuredeploy)\n2. Select the preferred **Subscription**, **Resource Group** and **Location**. \n3. Enter the following fields:\n - appName: Unique string that will be used as id for the app in Azure platform\n - objectId: Azure portal ---> Azure Active Directory ---> more info ---> Profile -----> Object ID\n - appInsightsLocation(default): westeurope\n - mimecastEmail: Email address of dedicated user for this integraion\n - mimecastPassword: Password for dedicated user\n - mimecastAppId: Application Id from the Microsoft Sentinel app registered with Mimecast\n - mimecastAppKey: Application Key from the Microsoft Sentinel app registered with Mimecast\n - mimecastAccessKey: Access Key for the dedicated Mimecast user\n - mimecastSecretKey: Secret Key for dedicated Mimecast user\n - mimecastBaseURL: Regional Mimecast API Base URL\n - activeDirectoryAppId: Azure portal ---> App registrations ---> [your_app] ---> Application ID\n - activeDirectoryAppSecret: Azure portal ---> App registrations ---> [your_app] ---> Certificates & secrets ---> [your_app_secret]\n\n >Note: If using Azure Key Vault secrets for any of the values above, use the`@Microsoft.KeyVault(SecretUri={Security Identifier})`schema in place of the string values. Refer to [Key Vault references documentation](https://docs.microsoft.com/azure/app-service/app-service-key-vault-references) for further details.\n\n4. Mark the checkbox labeled **I agree to the terms and conditions stated above**. \n5. Click **Purchase** to deploy.\n\n6. Go to ***Azure portal ---> Resource groups ---> [your_resource_group] ---> [appName](type: Storage account) ---> Storage Explorer ---> BLOB CONTAINERS ---> TIR checkpoints ---> Upload*** and create empty file on your machine named checkpoint.txt and select it for upload (this is done so that date_range for TIR logs is stored in consistent state)\n", "title": "Enable Mimecast Intelligence for Microsoft - Microsoft Sentinel Connector:" }, { @@ -507,7 +507,7 @@ ] }, { - "description": "\n1. Click the **Deploy to Azure** button below. \n\n\t[![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-MimecastTIRegionalConnectorAzureFunctions-azuredeploy)\n2. Select the preferred **Subscription**, **Resource Group** and **Location**. \n3. Enter the following fields:\n - appName: Unique string that will be used as id for the app in Azure platform\n - objectId: Azure portal ---> Azure Active Directory ---> more info ---> Profile -----> Object ID\n - appInsightsLocation(default): westeurope\n - mimecastEmail: Email address of dedicated user for this integraion\n - mimecastPassword: Password for dedicated user\n - mimecastAppId: Application Id from the Microsoft Sentinel app registered with Mimecast\n - mimecastAppKey: Application Key from the Microsoft Sentinel app registered with Mimecast\n - mimecastAccessKey: Access Key for the dedicated Mimecast user\n - mimecastSecretKey: Secret Key for dedicated Mimecast user\n - mimecastBaseURL: Regional Mimecast API Base URL\n - activeDirectoryAppId: Azure portal ---> App registrations ---> [your_app] ---> Application ID\n - activeDirectoryAppSecret: Azure portal ---> App registrations ---> [your_app] ---> Certificates & secrets ---> [your_app_secret]\n\n >Note: If using Azure Key Vault secrets for any of the values above, use the`@Microsoft.KeyVault(SecretUri={Security Identifier})`schema in place of the string values. Refer to [Key Vault references documentation](https://docs.microsoft.com/azure/app-service/app-service-key-vault-references) for further details.\n\n4. Mark the checkbox labeled **I agree to the terms and conditions stated above**. \n5. Click **Purchase** to deploy.\n\n6. Go to ***Azure portal ---> Resource groups ---> [your_resource_group] ---> [appName](type: Storage account) ---> Storage Explorer ---> BLOB CONTAINERS ---> TIR checkpoints ---> Upload*** and create empty file on your machine named checkpoint.txt and select it for upload (this is done so that date_range for TIR logs is stored in consistent state)\n", + "description": "\n1. Click the **Deploy to Azure** button below. \n\n\t[![Deploy To Azure](https://aka.ms/deploytoazurebutton)](https://aka.ms/sentinel-MimecastTIRegional-azuredeploy)\n2. Select the preferred **Subscription**, **Resource Group** and **Location**. \n3. Enter the following fields:\n - appName: Unique string that will be used as id for the app in Azure platform\n - objectId: Azure portal ---> Azure Active Directory ---> more info ---> Profile -----> Object ID\n - appInsightsLocation(default): westeurope\n - mimecastEmail: Email address of dedicated user for this integraion\n - mimecastPassword: Password for dedicated user\n - mimecastAppId: Application Id from the Microsoft Sentinel app registered with Mimecast\n - mimecastAppKey: Application Key from the Microsoft Sentinel app registered with Mimecast\n - mimecastAccessKey: Access Key for the dedicated Mimecast user\n - mimecastSecretKey: Secret Key for dedicated Mimecast user\n - mimecastBaseURL: Regional Mimecast API Base URL\n - activeDirectoryAppId: Azure portal ---> App registrations ---> [your_app] ---> Application ID\n - activeDirectoryAppSecret: Azure portal ---> App registrations ---> [your_app] ---> Certificates & secrets ---> [your_app_secret]\n\n >Note: If using Azure Key Vault secrets for any of the values above, use the`@Microsoft.KeyVault(SecretUri={Security Identifier})`schema in place of the string values. Refer to [Key Vault references documentation](https://docs.microsoft.com/azure/app-service/app-service-key-vault-references) for further details.\n\n4. Mark the checkbox labeled **I agree to the terms and conditions stated above**. \n5. Click **Purchase** to deploy.\n\n6. Go to ***Azure portal ---> Resource groups ---> [your_resource_group] ---> [appName](type: Storage account) ---> Storage Explorer ---> BLOB CONTAINERS ---> TIR checkpoints ---> Upload*** and create empty file on your machine named checkpoint.txt and select it for upload (this is done so that date_range for TIR logs is stored in consistent state)\n", "title": "Enable Mimecast Intelligence for Microsoft - Microsoft Sentinel Connector:" }, {