diff --git a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGDLPViolation.yaml b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGDLPViolation.yaml index a83ec1dfc98..f58fc70e58c 100755 --- a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGDLPViolation.yaml +++ b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGDLPViolation.yaml @@ -8,6 +8,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent queryFrequency: 1h queryPeriod: 1h triggerOperator: gt @@ -28,5 +31,5 @@ entityMappings: fieldMappings: - identifier: Name columnName: AccountCustomEntity -version: 1.0.0 +version: 1.0.1 kind: Scheduled \ No newline at end of file diff --git a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGMaliciousAttachmentNotBlocked.yaml b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGMaliciousAttachmentNotBlocked.yaml index 820e49fa9c0..ecd0683431d 100755 --- a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGMaliciousAttachmentNotBlocked.yaml +++ b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGMaliciousAttachmentNotBlocked.yaml @@ -8,6 +8,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent queryFrequency: 10m queryPeriod: 10m triggerOperator: gt @@ -29,5 +32,5 @@ entityMappings: fieldMappings: - identifier: Name columnName: AccountCustomEntity -version: 1.0.0 +version: 1.0.1 kind: Scheduled \ No newline at end of file diff --git a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGMultipleLargeEmails.yaml b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGMultipleLargeEmails.yaml index 49593c35408..d90b8ebb564 100755 --- a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGMultipleLargeEmails.yaml +++ b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGMultipleLargeEmails.yaml @@ -8,6 +8,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent queryFrequency: 1h queryPeriod: 1h triggerOperator: gt @@ -33,5 +36,5 @@ entityMappings: fieldMappings: - identifier: Name columnName: AccountCustomEntity -version: 1.0.0 +version: 1.0.1 kind: Scheduled \ No newline at end of file diff --git a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGMultipleSuspiciousEmails.yaml b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGMultipleSuspiciousEmails.yaml index aa706536c53..cb6a6f7cf0b 100755 --- a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGMultipleSuspiciousEmails.yaml +++ b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGMultipleSuspiciousEmails.yaml @@ -8,6 +8,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent queryFrequency: 1h queryPeriod: 1h triggerOperator: gt @@ -30,5 +33,5 @@ entityMappings: fieldMappings: - identifier: Name columnName: AccountCustomEntity -version: 1.0.0 +version: 1.0.1 kind: Scheduled \ No newline at end of file diff --git a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGPossibleOutbreak.yaml b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGPossibleOutbreak.yaml index ea33c96a937..251b691ff24 100755 --- a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGPossibleOutbreak.yaml +++ b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGPossibleOutbreak.yaml @@ -8,6 +8,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent queryFrequency: 1h queryPeriod: 1h triggerOperator: gt @@ -28,5 +31,5 @@ entityMappings: fieldMappings: - identifier: Name columnName: AccountCustomEntity -version: 1.0.0 +version: 1.0.1 kind: Scheduled \ No newline at end of file diff --git a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGPotentialLinkToMalwareDownload.yaml b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGPotentialLinkToMalwareDownload.yaml index 24d5689bdd4..ba6742ba684 100755 --- a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGPotentialLinkToMalwareDownload.yaml +++ b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGPotentialLinkToMalwareDownload.yaml @@ -8,6 +8,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent queryFrequency: 1h queryPeriod: 1h triggerOperator: gt @@ -29,5 +32,5 @@ entityMappings: fieldMappings: - identifier: Name columnName: AccountCustomEntity -version: 1.0.0 +version: 1.0.1 kind: Scheduled \ No newline at end of file diff --git a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGSuspiciousLink.yaml b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGSuspiciousLink.yaml index 85e400ffa43..8ddfdf56bb0 100755 --- a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGSuspiciousLink.yaml +++ b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGSuspiciousLink.yaml @@ -8,6 +8,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent queryFrequency: 15m queryPeriod: 15m triggerOperator: gt @@ -29,5 +32,5 @@ entityMappings: fieldMappings: - identifier: Name columnName: AccountCustomEntity -version: 1.0.0 +version: 1.0.1 kind: Scheduled \ No newline at end of file diff --git a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGSuspiciousSenderDomain.yaml b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGSuspiciousSenderDomain.yaml index d866d05594d..1786d313086 100755 --- a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGSuspiciousSenderDomain.yaml +++ b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGSuspiciousSenderDomain.yaml @@ -8,6 +8,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent queryFrequency: 1h queryPeriod: 1h triggerOperator: gt @@ -35,5 +38,5 @@ entityMappings: fieldMappings: - identifier: Name columnName: AccountCustomEntity -version: 1.0.0 +version: 1.0.1 kind: Scheduled \ No newline at end of file diff --git a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGUnclassifiedLink.yaml b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGUnclassifiedLink.yaml index 75c84b6037a..9cd9e1897fc 100755 --- a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGUnclassifiedLink.yaml +++ b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGUnclassifiedLink.yaml @@ -8,6 +8,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent queryFrequency: 1h queryPeriod: 1h triggerOperator: gt @@ -29,5 +32,5 @@ entityMappings: fieldMappings: - identifier: Name columnName: AccountCustomEntity -version: 1.0.0 +version: 1.0.1 kind: Scheduled \ No newline at end of file diff --git a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGUnexpextedAttachment.yaml b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGUnexpextedAttachment.yaml index 185df4739b5..de7ee9bfe69 100755 --- a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGUnexpextedAttachment.yaml +++ b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGUnexpextedAttachment.yaml @@ -8,6 +8,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent queryFrequency: 1h queryPeriod: 1h triggerOperator: gt @@ -28,5 +31,5 @@ entityMappings: fieldMappings: - identifier: Name columnName: AccountCustomEntity -version: 1.0.0 +version: 1.0.1 kind: Scheduled \ No newline at end of file diff --git a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGUnscannableAttachment.yaml b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGUnscannableAttachment.yaml index f8516ef3d47..a75c3a32edd 100755 --- a/Solutions/CiscoSEG/Analytic Rules/CiscoSEGUnscannableAttachment.yaml +++ b/Solutions/CiscoSEG/Analytic Rules/CiscoSEGUnscannableAttachment.yaml @@ -8,6 +8,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent queryFrequency: 1h queryPeriod: 1h triggerOperator: gt @@ -28,5 +31,5 @@ entityMappings: fieldMappings: - identifier: Name columnName: AccountCustomEntity -version: 1.0.0 +version: 1.0.1 kind: Scheduled \ No newline at end of file diff --git a/Solutions/CiscoSEG/Data Connectors/Connector_Cisco_SEG_CEF.json b/Solutions/CiscoSEG/Data Connectors/Connector_Cisco_SEG_CEF.json index ffa305863f8..706d2233148 100644 --- a/Solutions/CiscoSEG/Data Connectors/Connector_Cisco_SEG_CEF.json +++ b/Solutions/CiscoSEG/Data Connectors/Connector_Cisco_SEG_CEF.json @@ -1,6 +1,6 @@ { "id": "CiscoSEG", - "title": "Cisco Secure Email Gateway", + "title": "[Deprecated] Cisco Secure Email Gateway via Legacy Agent", "publisher": "Cisco", "descriptionMarkdown": "The [Cisco Secure Email Gateway (SEG)](https://www.cisco.com/c/en/us/products/security/email-security/index.html) data connector provides the capability to ingest [Cisco SEG Consolidated Event Logs](https://www.cisco.com/c/en/us/td/docs/security/esa/esa14-0/user_guide/b_ESA_Admin_Guide_14-0/b_ESA_Admin_Guide_12_1_chapter_0100111.html#con_1061902) into Microsoft Sentinel.", "additionalRequirementBanner": "This data connector depends on a parser based on a Kusto Function to work as expected [**CiscoSEGEvent**](https://aka.ms/sentinel-CiscoSEG-parser) which is deployed with the Microsoft Sentinel Solution.", diff --git a/Solutions/CiscoSEG/Data Connectors/template_CiscoSEGAMA.json b/Solutions/CiscoSEG/Data Connectors/template_CiscoSEGAMA.json new file mode 100644 index 00000000000..abb1b75c727 --- /dev/null +++ b/Solutions/CiscoSEG/Data Connectors/template_CiscoSEGAMA.json @@ -0,0 +1,116 @@ +{ + "id": "CiscoSEGAma", + "title": "[Recommended] Cisco Secure Email Gateway via AMA", + "publisher": "Cisco", + "descriptionMarkdown": "The [Cisco Secure Email Gateway (SEG)](https://www.cisco.com/c/en/us/products/security/email-security/index.html) data connector provides the capability to ingest [Cisco SEG Consolidated Event Logs](https://www.cisco.com/c/en/us/td/docs/security/esa/esa14-0/user_guide/b_ESA_Admin_Guide_14-0/b_ESA_Admin_Guide_12_1_chapter_0100111.html#con_1061902) into Microsoft Sentinel.", + "additionalRequirementBanner": "This data connector depends on a parser based on a Kusto Function to work as expected [**CiscoSEGEvent**](https://aka.ms/sentinel-CiscoSEG-parser) which is deployed with the Microsoft Sentinel Solution.", + "graphQueries": [ + { + "metricName": "Total data received", + "legend": "CiscoSEG", + "baseQuery": "CommonSecurityLog\n |where DeviceVendor =~ 'Cisco'\n |where DeviceProduct =~ 'ESA_CONSOLIDATED_LOG_EVENT'\n |extend sent_by_ama = column_ifexists('CollectorHostName','')\n |where isnotempty(sent_by_ama)" + } + ], + "sampleQueries": [ + { + "description" : "Top 10 Senders", + "query": "CiscoSEGEvent\n | where isnotempty(SrcUserName)\n | summarize count() by SrcUserName\n | top 10 by count_" + } + ], + "dataTypes": [ + { + "name": "CommonSecurityLog (CiscoSEG)", + "lastDataReceivedQuery": "CommonSecurityLog\n |where DeviceVendor =~ 'Cisco'\n |where DeviceProduct =~ 'ESA_CONSOLIDATED_LOG_EVENT'\n |extend sent_by_ama = column_ifexists('CollectorHostName','')\n |where isnotempty(sent_by_ama)\n | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" + } + ], + "connectivityCriterias": [ + { + "type": "IsConnectedQuery", + "value": [ + "CommonSecurityLog\n |where DeviceVendor =~ 'Cisco'\n |where DeviceProduct =~ 'ESA_CONSOLIDATED_LOG_EVENT'\n |extend sent_by_ama = column_ifexists('CollectorHostName','')\n |where isnotempty(sent_by_ama)\n | summarize LastLogReceived = max(TimeGenerated)\n | project IsConnected = LastLogReceived > ago(30d)" + ] + } + ], + "availability": { + "status": 1, + "isPreview": false + }, + "permissions": { + "resourceProvider": [ + { + "provider": "Microsoft.OperationalInsights/workspaces", + "permissionsDisplayText": "read and write permissions are required.", + "providerDisplayName": "Workspace", + "scope": "Workspace", + "requiredPermissions": { + "write": true, + "read": true, + "delete": true + } + }, + { + "provider": "Microsoft.OperationalInsights/workspaces/sharedKeys", + "permissionsDisplayText": "read permissions to shared keys for the workspace are required. [See the documentation to learn more about workspace keys](https://docs.microsoft.com/azure/azure-monitor/platform/agent-windows#obtain-workspace-id-and-key).", + "providerDisplayName": "Keys", + "scope": "Workspace", + "requiredPermissions": { + "action": true + } + } + ], + "customs": [ + { + "description": "To collect data from non-Azure VMs, they must have Azure Arc installed and enabled. [Learn more](https://docs.microsoft.com/azure/azure-monitor/agents/azure-monitor-agent-install?tabs=ARMAgentPowerShell,PowerShellWindows,PowerShellWindowsArc,CLIWindows,CLIWindowsArc)" + }, + { + "description": "Common Event Format (CEF) via AMA and Syslog via AMA data connectors must be installed [Learn more](https://learn.microsoft.com/azure/sentinel/connect-cef-ama#open-the-connector-page-and-create-the-dcr)" + } + ] + }, + "instructionSteps": [ + { + "title": "", + "description": ">**NOTE:** This data connector depends on a parser based on a Kusto Function to work as expected [**CiscoSEGEvent**](https://aka.ms/sentinel-CiscoSEG-parser) which is deployed with the Microsoft Sentinel Solution.", + "instructions": [ + { + "parameters": { + "title": "1. Kindly follow the steps to configure the data connector", + "instructionSteps": [ + { + "title": "Step A. Configure the Common Event Format (CEF) via AMA data connector", + "description": "_Note:- CEF logs are collected only from Linux Agents_\n\n1. Navigate to Microsoft Sentinel workspace ---> configuration ---> Data connector blade .\n\n2. Search for 'Common Event Format (CEF) via AMA' data connector and open it.\n\n3. Check If there is no existing DCR configured to collect required facility of logs, Create a new DCR (Data Collection Rule)\n\n\t_Note:- It is recommended to install minimum 1.27 version of AMA agent [Learn more](https://learn.microsoft.com/azure/azure-monitor/agents/azure-monitor-agent-manage?tabs=azure-portal ) and ensure there is no duplicate DCR as it can cause log duplicacy_\n\n4. Run the command provided in the CEF via AMA data connector page to configure the CEF collector on the machine", + "instructions": [ + ] + }, + { + "title": "Step B. Forward Common Event Format (CEF) logs to Syslog agent", + "description": "Follow these steps to configure Cisco Secure Email Gateway to forward logs via syslog:\n\n Configure [Log Subscription](https://www.cisco.com/c/en/us/td/docs/security/esa/esa14-0/user_guide/b_ESA_Admin_Guide_14-0/b_ESA_Admin_Guide_12_1_chapter_0100111.html#con_1134718)\n\n>**NOTE:** Select **Consolidated Event Logs** in Log Type field.", + "instructions": [ + ] + }, + { + "title": "Step C. Validate connection", + "description": "Follow the instructions to validate your connectivity:\n\nOpen Log Analytics to check if the logs are received using the CommonSecurityLog schema.\n\nIt may take about 20 minutes until the connection streams data to your workspace.\n\nIf the logs are not received, run the following connectivity validation script:\n\n 1. Make sure that you have Python on your machine using the following command: python -version\n\n2. You must have elevated permissions (sudo) on your machine", + "instructions": [ + { + "parameters": { + "label": "Run the following command to validate your connectivity:", + "value": "sudo wget -O Sentinel_AMA_troubleshoot.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/Syslog/Sentinel_AMA_troubleshoot.py&&sudo python Sentinel_AMA_troubleshoot.py --cef" + }, + "type": "CopyableLabel" + } + ] + } + ] + }, + "type": "InstructionStepsGroup" + } + ] + }, + + { + "title": "2. Secure your machine ", + "description": "2Make sure to configure the machine's security according to your organization's security policy\n\n\n[Learn more >](https://aka.ms/SecureCEF)" + } + ] +} diff --git a/Solutions/CiscoSEG/Data/Solution_CiscoSEG.json b/Solutions/CiscoSEG/Data/Solution_CiscoSEG.json index bcfce482be6..b9ff68f6b45 100644 --- a/Solutions/CiscoSEG/Data/Solution_CiscoSEG.json +++ b/Solutions/CiscoSEG/Data/Solution_CiscoSEG.json @@ -2,7 +2,7 @@ "Name": "CiscoSEG", "Author": "Microsoft - support@microsoft.com", "Logo": "", - "Description": "The [Cisco Secure Email Gateway (SEG)](https://www.cisco.com/c/en/us/products/security/email-security/index.html) solution provides the capability to ingest [Cisco SEG Consolidated Event Logs](https://www.cisco.com/c/en/us/td/docs/security/esa/esa14-0/user_guide/b_ESA_Admin_Guide_14-0/b_ESA_Admin_Guide_12_1_chapter_0100111.html#con_1061902) into Microsoft Sentinel. \n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs\n\n a. [Agent-based log collection (CEF over Syslog)](https://docs.microsoft.com/azure/sentinel/connect-common-event-format)", + "Description": "The [Cisco Secure Email Gateway (SEG)](https://www.cisco.com/c/en/us/products/security/email-security/index.html) solution provides the capability to ingest [Cisco SEG Consolidated Event Logs](https://www.cisco.com/c/en/us/td/docs/security/esa/esa14-0/user_guide/b_ESA_Admin_Guide_14-0/b_ESA_Admin_Guide_12_1_chapter_0100111.html#con_1061902) into Microsoft Sentinel.\n\r\n1. **CiscoSEG via AMA** - This data connector helps in ingesting CiscoSEG logs into your Log Analytics Workspace using the new Azure Monitor Agent. Learn more about ingesting using the new Azure Monitor Agent [here](https://learn.microsoft.com/azure/sentinel/connect-cef-ama). **Microsoft recommends using this Data Connector**.\n\r\n2. **CiscoSEG via Legacy Agent** - This data connector helps in ingesting CiscoSEG logs into your Log Analytics Workspace using the legacy Log Analytics agent.\n\n**NOTE:** Microsoft recommends installation of CiscoSEG via AMA Connector. Legacy connector uses the Log Analytics agent which is about to be deprecated by **Aug 31, 2024,** and thus should only be installed where AMA is not supported. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost [more details](https://learn.microsoft.com/en-us/azure/sentinel/ama-migrate).", "Analytic Rules" : [ "Analytic Rules/CiscoSEGDLPViolation.yaml", "Analytic Rules/CiscoSEGMaliciousAttachmentNotBlocked.yaml", @@ -29,17 +29,18 @@ "Hunting Queries/CiscoSEGUsersReceivedSpam.yaml" ], "Parsers": [ - "Parsers/CiscoSEGEvent.txt" + "Parsers/CiscoSEGEvent.yaml" ], "Data Connectors": [ - "Data Connectors/Connector_Cisco_SEG_CEF.json" + "Data Connectors/Connector_Cisco_SEG_CEF.json", + "Data Connectors/template_CiscoSEGAMA.json" ], "Workbooks" : [ "Workbooks/CiscoSEG.json" ], "Metadata": "SolutionMetadata.json", "BasePath": "C:\\GitHub\\azure-sentinel\\Solutions\\CiscoSEG", - "Version": "2.0.1", + "Version": "3.0.0", "TemplateSpec": true, "Is1PConnector": false } \ No newline at end of file diff --git a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGDroppedInMails.yaml b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGDroppedInMails.yaml index 7d6ece688c0..44bf34040b0 100755 --- a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGDroppedInMails.yaml +++ b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGDroppedInMails.yaml @@ -7,6 +7,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent tactics: - InitialAccess relevantTechniques: diff --git a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGDroppedOutMails.yaml b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGDroppedOutMails.yaml index 83ae00f16f6..f5402bf5a27 100755 --- a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGDroppedOutMails.yaml +++ b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGDroppedOutMails.yaml @@ -7,6 +7,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent tactics: - Exfiltration relevantTechniques: diff --git a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedDKIMFailure.yaml b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedDKIMFailure.yaml index 7692ac5d5d9..a2170d2001d 100755 --- a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedDKIMFailure.yaml +++ b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedDKIMFailure.yaml @@ -7,6 +7,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent tactics: - InitialAccess relevantTechniques: diff --git a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedDMARKFailure.yaml b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedDMARKFailure.yaml index 53a4963db1d..d2b3f8289ac 100755 --- a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedDMARKFailure.yaml +++ b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedDMARKFailure.yaml @@ -7,6 +7,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent tactics: - InitialAccess relevantTechniques: diff --git a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedSPFFailure.yaml b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedSPFFailure.yaml index a4d1c71aee2..b674824ce62 100755 --- a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedSPFFailure.yaml +++ b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedSPFFailure.yaml @@ -7,6 +7,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent tactics: - InitialAccess relevantTechniques: diff --git a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedTLSIn.yaml b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedTLSIn.yaml index 89e3b5ee38c..7db98b94678 100755 --- a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedTLSIn.yaml +++ b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedTLSIn.yaml @@ -7,6 +7,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent tactics: - InitialAccess relevantTechniques: diff --git a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedTLSOut.yaml b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedTLSOut.yaml index c4ff4c8fa05..38aa84db67b 100755 --- a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedTLSOut.yaml +++ b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGFailedTLSOut.yaml @@ -7,6 +7,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent tactics: - Impact relevantTechniques: diff --git a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGInsecureProtocol.yaml b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGInsecureProtocol.yaml index 8467f9223b3..9f51acdeb02 100755 --- a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGInsecureProtocol.yaml +++ b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGInsecureProtocol.yaml @@ -7,6 +7,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent tactics: - Impact relevantTechniques: diff --git a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGSpamMails.yaml b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGSpamMails.yaml index 743d14db18f..ff778c61b7b 100755 --- a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGSpamMails.yaml +++ b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGSpamMails.yaml @@ -7,6 +7,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent tactics: - InitialAccess relevantTechniques: diff --git a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGUsersReceivedSpam.yaml b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGUsersReceivedSpam.yaml index 35e3bac4692..0e9d5519176 100755 --- a/Solutions/CiscoSEG/Hunting Queries/CiscoSEGUsersReceivedSpam.yaml +++ b/Solutions/CiscoSEG/Hunting Queries/CiscoSEGUsersReceivedSpam.yaml @@ -7,6 +7,9 @@ requiredDataConnectors: - connectorId: CiscoSEG dataTypes: - CiscoSEGEvent + - connectorId: CiscoSEGAma + dataTypes: + - CiscoSEGEvent tactics: - InitialAccess relevantTechniques: diff --git a/Tools/Create-Azure-Sentinel-Solution/V2/WorkbookMetadata/WorkbooksMetadata.json b/Tools/Create-Azure-Sentinel-Solution/V2/WorkbookMetadata/WorkbooksMetadata.json index fe602681cbb..83b893e916f 100644 --- a/Tools/Create-Azure-Sentinel-Solution/V2/WorkbookMetadata/WorkbooksMetadata.json +++ b/Tools/Create-Azure-Sentinel-Solution/V2/WorkbookMetadata/WorkbooksMetadata.json @@ -3583,7 +3583,8 @@ "CommonSecurityLog" ], "dataConnectorsDependencies": [ - "CiscoSEG" + "CiscoSEG", + "CiscoSEGAma" ], "previewImagesFileNames": [ "CiscoSEGBlack.png",