Skip to content

Commit

Permalink
Revert "Repackaging - PaloAlto-PAN-OS (MMA to AMA Migration)"
Browse files Browse the repository at this point in the history
  • Loading branch information
v-rusraut authored Oct 5, 2023
1 parent 51b69c9 commit 574004c
Show file tree
Hide file tree
Showing 18 changed files with 4,969 additions and 5,582 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -209,7 +209,6 @@
"ClarotyAma",
"illusiveAttackManagementSystemAma",
"TrendMicroApexOneAma",
"PaloAltoNetworksAma",
"PaloAltoCDLAma",
"CiscoSEGAma"
]
Original file line number Diff line number Diff line change
Expand Up @@ -8,9 +8,6 @@ requiredDataConnectors:
- connectorId: PaloAltoNetworks
dataTypes:
- CommonSecurityLog
- connectorId: PaloAltoNetworksAma
dataTypes:
- CommonSecurityLog
queryFrequency: 1h
queryPeriod: 14d
triggerOperator: gt
Expand Down Expand Up @@ -57,5 +54,5 @@ entityMappings:
columnName: FileHashValue
- identifier: Algorithm
columnName: FileHashType
version: 1.3.2
version: 1.3.1
kind: Scheduled
Original file line number Diff line number Diff line change
Expand Up @@ -13,9 +13,6 @@ requiredDataConnectors:
- connectorId: PaloAltoNetworks
dataTypes:
- CommonSecurityLog
- connectorId: PaloAltoNetworksAma
dataTypes:
- CommonSecurityLog
queryFrequency: 1d
queryPeriod: 2d
triggerOperator: gt
Expand Down Expand Up @@ -65,5 +62,5 @@ entityMappings:
fieldMappings:
- identifier: Address
columnName: IPCustomEntity
version: 1.0.3
version: 1.0.2
kind: Scheduled
Original file line number Diff line number Diff line change
Expand Up @@ -12,9 +12,6 @@ requiredDataConnectors:
- connectorId: PaloAltoNetworks
dataTypes:
- CommonSecurityLog
- connectorId: PaloAltoNetworksAma
dataTypes:
- CommonSecurityLog
queryFrequency: 1h
queryPeriod: 1h
triggerOperator: gt
Expand Down Expand Up @@ -67,5 +64,5 @@ entityMappings:
fieldMappings:
- identifier: Address
columnName: IPCustomEntity
version: 1.0.3
version: 1.0.2
kind: Scheduled
Original file line number Diff line number Diff line change
Expand Up @@ -10,9 +10,6 @@ requiredDataConnectors:
- connectorId: PaloAltoNetworks
dataTypes:
- CommonSecurityLog
- connectorId: PaloAltoNetworksAma
dataTypes:
- CommonSecurityLog
queryFrequency: 1h
queryPeriod: 7d
triggerOperator: gt
Expand Down Expand Up @@ -56,5 +53,5 @@ entityMappings:
fieldMappings:
- identifier: Address
columnName: SourceIP
version: 1.0.1
version: 1.0.0
kind: Scheduled
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"id": "PaloAltoNetworks",
"title": "[Deprecated] Palo Alto Networks (Firewall) via Legacy Agent",
"title": "Palo Alto Networks (Firewall)",
"publisher": "Palo Alto Networks",
"descriptionMarkdown": "The Palo Alto Networks firewall connector allows you to easily connect your Palo Alto Networks logs with Microsoft Sentinel, to view dashboards, create custom alerts, and improve investigation. This gives you more insight into your organization's network and improves your security operation capabilities.",
"graphQueries": [
Expand Down

This file was deleted.

Original file line number Diff line number Diff line change
Expand Up @@ -13,9 +13,6 @@ requiredDataConnectors:
- connectorId: PaloAltoNetworks
dataTypes:
- CommonSecurityLog
- connectorId: PaloAltoNetworksAma
dataTypes:
- CommonSecurityLog
queryFrequency: 1d
queryPeriod: 2d
triggerOperator: gt
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,9 +7,6 @@ requiredDataConnectors:
- connectorId: PaloAltoNetworks
dataTypes:
- CommonSecurityLog
- connectorId: PaloAltoNetworksAma
dataTypes:
- CommonSecurityLog
tactics:
- InitialAccess
- Discovery
Expand Down
Binary file removed Solutions/PaloAlto-PAN-OS/Package/3.0.0.zip
Binary file not shown.
3 changes: 1 addition & 2 deletions Solutions/PaloAlto-PAN-OS/Package/createUiDefinition.json
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
"config": {
"isWizard": false,
"basics": {
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/PaloAlto-PAN-OS/logo/Palo-alto-logo.png\" width=\"75px\" height=\"75px\">\n\n**Note:** Please refer to the following before installing the solution: \r \n • Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/PaloAlto-PAN-OS/ReleaseNotes.md)\r \n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe [Palo Alto Networks (Firewall)](https://www.paloaltonetworks.com/network-security/next-generation-firewall) Solution for Microsoft Sentinel allows you to easily connect your Palo Alto Networks Firewall logs with Microsoft Sentinel, to view dashboards, create custom alerts, and improve investigation. This gives you more insight into your organization's network and improves your security operation capabilities. This solution also contains playbooks to help in automated remediation.\n\r\n1. **PaloAlto-PAN-OS via AMA** - This data connector helps in ingesting PaloAlto-PAN-OS logs into your Log Analytics Workspace using the new Azure Monitor Agent. Learn more about ingesting using the new Azure Monitor Agent [here](https://learn.microsoft.com/azure/sentinel/connect-cef-ama). **Microsoft recommends using this Data Connector**.\n\r\n2. **PaloAlto-PAN-OS via Legacy Agent** - This data connector helps in ingesting PaloAlto-PAN-OS logs into your Log Analytics Workspace using the legacy Log Analytics agent.\n\n**NOTE:** Microsoft recommends installation of PaloAlto-PAN-OS via AMA Connector. Legacy connector uses the Log Analytics agent which is about to be deprecated by **Aug 31, 2024,** and thus should only be installed where AMA is not supported. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost [more details](https://learn.microsoft.com/en-us/azure/sentinel/ama-migrate).\n\n**Data Connectors:** 2, **Workbooks:** 2, **Analytic Rules:** 4, **Hunting Queries:** 2, **Custom Azure Logic Apps Connectors:** 2, **Playbooks:** 7\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/PaloAlto-PAN-OS/logo/Palo-alto-logo.png\" width=\"75px\" height=\"75px\">\n\n**Note:** _There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing._\n\nThe [Palo Alto Networks (Firewall)](https://www.paloaltonetworks.com/network-security/next-generation-firewall) Solution for Microsoft Sentinel allows you to easily connect your Palo Alto Networks Firewall logs with Microsoft Sentinel, to view dashboards, create custom alerts, and improve investigation. This gives you more insight into your organization's network and improves your security operation capabilities. This solution also contains playbooks to help in automated remediation. \n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs: \n\na. [Agent-based log collection (CEF over Syslog)](https://docs.microsoft.com/azure/sentinel/connect-common-event-format)\n\n**Data Connectors:** 1, **Workbooks:** 2, **Analytic Rules:** 4, **Hunting Queries:** 2, **Custom Azure Logic Apps Connectors:** 2, **Playbooks:** 7\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
"subscription": {
"resourceProviders": [
"Microsoft.OperationsManagement/solutions",
Expand Down Expand Up @@ -73,7 +73,6 @@
}
}
}

]
},
{
Expand Down
Loading

0 comments on commit 574004c

Please sign in to comment.