Skip to content

Commit

Permalink
discarded changes updated with master
Browse files Browse the repository at this point in the history
  • Loading branch information
v-prasadboke committed Aug 29, 2023
1 parent 78c05f2 commit c7f3b2d
Show file tree
Hide file tree
Showing 4 changed files with 138 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
{
"Name": "Microsoft Exchange Security - Exchange On-Premises",
"Author": "Microsoft - support@microsoft.com",
"Logo": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Azure_Sentinel.svg\"width=\"75px\"height=\"75px\">",
"Description": "The Exchange Security Audit and Configuration Insight solution analyze Exchange On-Premises configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Windows Event logs collection, including MS Exchange Management Event logs](https://learn.microsoft.com/azure/azure-monitor/agents/data-sources-windows-events)\n\nb. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)",
"Data Connectors": [
"Data Connectors/ESI-ExchangeAdminAuditLogEvents.json",
"Data Connectors/ESI-ExchangeOnPremisesCollector.json"
],
"Parsers": [
"Parsers/ExchangeAdminAuditLogs.txt",
"Parsers/ExchangeConfiguration.txt",
"Parsers/ExchangeEnvironmentList.txt"
],
"Workbooks": [
"Workbooks/Microsoft Exchange Least Privilege with RBAC.json",
"Workbooks/Microsoft Exchange Search AdminAuditLog.json",
"Workbooks/Microsoft Exchange Admin Activity.json",
"Workbooks/Microsoft Exchange Security Review.json"
],
"Analytic Rules": [
"Analytic Rules/CriticalCmdletsUsageDetection.yaml",
"Analytic Rules/ServerOrientedWithUserOrientedAdministration.yaml"
],
"BasePath": "C:\\Git Repositories\\Azure-Sentinel\\Solutions\\Microsoft Exchange Security - Exchange On-Premises\\",
"Version": "2.0.0",
"Metadata": "SolutionMetadata.json",
"TemplateSpec": true,
"Is1Pconnector": false
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
{
"Name": "Microsoft Exchange Security - Exchange Online",
"Author": "Microsoft - support@microsoft.com",
"Logo": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Azure_Sentinel.svg\"width=\"75px\"height=\"75px\">",
"Description": "The Exchange Security Audit and Configuration Insight solution analyze Exchange Online configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)",
"Data Connectors": [
"Data Connectors/ESI-ExchangeOnlineCollector.json"
],
"Parsers": [
"Parsers/ExchangeConfiguration.txt",
"Parsers/ExchangeEnvironmentList.txt"
],
"Workbooks": [
"Workbooks/Microsoft Exchange Least Privilege with RBAC - Online.json",
"Workbooks/Microsoft Exchange Security Review - Online.json"
],
"Analytic Rules": [],
"BasePath": "C:\\Git Repositories\\Azure-Sentinel\\Solutions\\Microsoft Exchange Security - Exchange Online",
"Version": "2.0.0",
"Metadata": "SolutionMetadata.json",
"TemplateSpec": true,
"Is1Pconnector": false
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
{
"Name": "CyberArkEPM",
"Author": "CyberArk Business Development - business_development@cyberark.com",
"Logo": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/CyberArk_Logo.svg\" width=\"75px\" height=\"75px\">",
"Description": "Endpoint Privilege Manager, a critical and foundational endpoint control addresses the underlying weaknesses of endpoint defenses against a privileged attacker and helps enterprises defend against these attacks.",
"Data Connectors": [
"Solutions/CyberArkEPM/DataConnectors/CyberArkEPM_API_FunctionApp.json"
],
"Parsers": [
"Solutions/CyberArkEPM/Parsers/CyberArkEPM.txt"
],
"Hunting Queries": [
"Solutions/CyberArkEPM/Hunting Queries/CyberArkEPMElevationRequests.yaml",
"Solutions/CyberArkEPM/Hunting Queries/CyberArkEPMPowershellDownloads.yaml",
"Solutions/CyberArkEPM/Hunting Queries/CyberArkEPMPowershellExecutionParameters.yaml",
"Solutions/CyberArkEPM/Hunting Queries/CyberArkEPMProcessNewHash.yaml",
"Solutions/CyberArkEPM/Hunting Queries/CyberArkEPMProcessesAccessedInternet.yaml",
"Solutions/CyberArkEPM/Hunting Queries/CyberArkEPMProcessesRunAsAdmin.yaml",
"Solutions/CyberArkEPM/Hunting Queries/CyberArkEPMRareProcVendors.yaml",
"Solutions/CyberArkEPM/Hunting Queries/CyberArkEPMRareProcessesRunByUsers.yaml",
"Solutions/CyberArkEPM/Hunting Queries/CyberArkEPMScriptsExecuted.yaml",
"Solutions/CyberArkEPM/Hunting Queries/CyberArkEPMSuspiciousActivityAttempts.yaml"
],
"Analytic Rules": [
"Solutions/CyberArkEPM/Analytic Rules/CyberArkEPMAttackAttemptNotBlocked.yaml",
"Solutions/CyberArkEPM/Analytic Rules/CyberArkEPMMSBuildLOLBin.yaml",
"Solutions/CyberArkEPM/Analytic Rules/CyberArkEPMMultipleAttackAttempts.yaml",
"Solutions/CyberArkEPM/Analytic Rules/CyberArkEPMNewProcessStartetFromSystem.yaml",
"Solutions/CyberArkEPM/Analytic Rules/CyberArkEPMPossibleExecutionOfPowershellEmpire.yaml",
"Solutions/CyberArkEPM/Analytic Rules/CyberArkEPMProcessChangedStartLocation.yaml",
"Solutions/CyberArkEPM/Analytic Rules/CyberArkEPMRareProcInternetAccess.yaml",
"Solutions/CyberArkEPM/Analytic Rules/CyberArkEPMRenamedWindowsBinary.yaml",
"Solutions/CyberArkEPM/Analytic Rules/CyberArkEPMUnexpectedExecutableExtension.yaml",
"Solutions/CyberArkEPM/Analytic Rules/CyberArkEPMUnexpectedExecutableLocation.yaml"
],
"Workbooks": [
"Solutions/CyberArkEPM/Workbooks/CyberArkEPM.json"
],
"BasePath": "/Users/Julie.Mauch/Documents/GitHub/Azure-Sentinel/Solutions/CyberArkEPM",
"Version": "2.0.0",
"Metadata": "SolutionMetadata.json",
"TemplateSpec": true,
"Is1PConnector": false
}
41 changes: 41 additions & 0 deletions Tools/Create-Azure-Sentinel-Solution/input/Solution_DNS.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
{
"Name": "DNS Domain Solution for Microsoft Sentinel",
"Author": "Microsoft - support@microsoft.com",
"Logo": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Azure_Sentinel.svg\" width=\"75px\" height=\"75px\">",
"Description": "This is a [domain solution](https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.microsoft.com%2Fazure%2Fsentinel%2Fsentinel-solutions-catalog%23domain-solutions&data=05%7C01%7Ckavishbakshi%40microsoft.com%7Cbe2a496082b24caa4b8c08da9cefacca%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637994850502413731%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=OJegu%2B2EqD7rmYmK9pm9QniD6YWp5ooloZ6tHzcwVi0%3D&reserved=0) and does not include any data connectors. The content in this solution requires one of the product solutions below , as well as any other connector or data source normalized to the [ASIM](https://aka.ms/AboutASIM).\n\n**Prerequisite :-**\n\n Install one or more of the listed solutions, or develop your custom ASIM parsers to unlock the value provided by this solution.\n 1. Windows Server DNS \n 2. Azure Firewall \n 3. Cisco Umbrella \n 4. Corelight Zeek \n 5. Google Cloud Platform DNS \n 6. Infoblox NIOS \n 7. ISC Bind \n 8. Vectra AI \n 9. Zscaler Internet Access \n\n**Underlying Microsoft Technologies used:** \n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in Preview state or might result in additional ingestion or operational costs: \n 1. Product solutions as described above \n 2. Logic app for data summarization\n\n**Recommendation :-**\n\nIt is highly recommended to use the **Summarize data** logic app playbook provided with this solution as it will significantly improve the performance of the Workbook, Analytic rules & Hunting queries.",
"Workbooks": ["Workbooks/DNSSolutionWorkbook.json"],
"Analytic Rules": [
"Analytic Rules/DNSRequestToMaliciousDomain.yaml",
"Analytic Rules/ExcessiveNXDOMAINDNSQueriesAnomalyBased.yaml",
"Analytic Rules/ExcessiveNXDOMAINDNSQueriesStaticThresholdBased.yaml",
"Analytic Rules/MultipleErrorsReportedForSameDNSQueryAnomalyBased.yaml",
"Analytic Rules/MultipleErrorsReportedForSameDNSQueryStaticThresholdBased.yaml",
"Analytic Rules/PotentialDGADetectedviaRepetitiveFailuresAnomalyBased.yaml",
"Analytic Rules/PotentialDGADetectedviaRepetitiveFailuresStaticThresholdBased.yaml",
"Analytic Rules/RareClientObservedWithHighReverseDNSLookupCountAnomalyBased.yaml",
"Analytic Rules/RareClientObservedWithHighReverseDNSLookupCountStaticThresholdBased.yaml"
],
"Playbooks": ["Playbooks/SummarizeData/azuredeploy.json"],
"Hunting Queries": [
"Hunting Queries/AnomalousIncreaseInDNSActivityByClients.yaml",
"Hunting Queries/ConnectionToUnpopularWebsiteDetected.yaml",
"Hunting Queries/CVE-2020-1350 (SIGRED)ExploitationPattern.yaml",
"Hunting Queries/DNSQueryWithFailuresInLast24Hours.yaml",
"Hunting Queries/DNSRequestsToRiskyDomains.yaml",
"Hunting Queries/DomainsWithLargeNumberOfSubDomains.yaml",
"Hunting Queries/IncreaseInDNSRequestsByClientThanTheDailyAverageCount.yaml",
"Hunting Queries/PossibleDNSTunnelingOrDataExfilterationActivity.yaml",
"Hunting Queries/PotentialBeaconingActivity.yaml",
"Hunting Queries/Sources(Clients)WithHighNumberOfErrors.yaml",
"Hunting Queries/UnexpectedTopLevelDomains.yaml"
],
"Watchlists": [
"Watchlists/DNS_Solution_Monitoring_Configuration.json",
"Watchlists/DNS_Solution_Domain_IOCs.json"
],
"BasePath": "C:\\Users\\vakohl\\Documents\\GitHub\\Azure-Sentinel\\Solutions\\DNS Domain Solution for Microsoft Sentinel",
"Version": "2.0.0",
"Metadata": "SolutionMetadata.json",
"TemplateSpec": true,
"Is1PConnector": false
}

0 comments on commit c7f3b2d

Please sign in to comment.