diff --git a/Solutions/FireEye Network Security/Data Connectors/template_FireEyeNX_CEFAMA.json b/Solutions/FireEye Network Security/Data Connectors/template_FireEyeNX_CEFAMA.json index 3fcf256af20..3ae7af8b1e0 100644 --- a/Solutions/FireEye Network Security/Data Connectors/template_FireEyeNX_CEFAMA.json +++ b/Solutions/FireEye Network Security/Data Connectors/template_FireEyeNX_CEFAMA.json @@ -1,6 +1,6 @@ { "id": "FireEyeNXAma", - "title": "FireEye Network Security (NX)", + "title": "[Recommended] FireEye Network Security (NX) via AMA", "publisher": "FireEye", "descriptionMarkdown": "The [FireEye Network Security (NX)](https://www.fireeye.com/products/network-security.html) data connector provides the capability to ingest FireEye Network Security logs into Microsoft Sentinel.", "additionalRequirementBanner": "This data connector depends on a parser based on a Kusto Function to work as expected [**FireEyeNXEvent**](https://aka.ms/sentinel-FireEyeNX-parser) which is deployed with the Microsoft Sentinel Solution.", diff --git a/Solutions/FireEye Network Security/Package/3.0.0.zip b/Solutions/FireEye Network Security/Package/3.0.0.zip index 2275d139761..0a09b85e9df 100644 Binary files a/Solutions/FireEye Network Security/Package/3.0.0.zip and b/Solutions/FireEye Network Security/Package/3.0.0.zip differ diff --git a/Solutions/FireEye Network Security/Package/mainTemplate.json b/Solutions/FireEye Network Security/Package/mainTemplate.json index abc28f80ecc..a8c0fc5f9df 100644 --- a/Solutions/FireEye Network Security/Package/mainTemplate.json +++ b/Solutions/FireEye Network Security/Package/mainTemplate.json @@ -30,12 +30,12 @@ } }, "variables": { - "solutionId": "azuresentinel.azure-sentinel-solution-fireeyenx", - "_solutionId": "[variables('solutionId')]", "email": "support@microsoft.com", "_email": "[variables('email')]", "_solutionName": "FireEye Network Security", "_solutionVersion": "3.0.0", + "solutionId": "azuresentinel.azure-sentinel-solution-fireeyenx", + "_solutionId": "[variables('solutionId')]", "uiConfigId1": "FireEyeNX", "_uiConfigId1": "[variables('uiConfigId1')]", "dataConnectorContentId1": "FireEyeNX", @@ -438,7 +438,7 @@ "properties": { "connectorUiConfig": { "id": "[variables('_uiConfigId2')]", - "title": "FireEye Network Security (NX)", + "title": "[Recommended] FireEye Network Security (NX) via AMA", "publisher": "FireEye", "descriptionMarkdown": "The [FireEye Network Security (NX)](https://www.fireeye.com/products/network-security.html) data connector provides the capability to ingest FireEye Network Security logs into Microsoft Sentinel.", "additionalRequirementBanner": "This data connector depends on a parser based on a Kusto Function to work as expected [**FireEyeNXEvent**](https://aka.ms/sentinel-FireEyeNX-parser) which is deployed with the Microsoft Sentinel Solution.", @@ -585,7 +585,7 @@ "contentSchemaVersion": "3.0.0", "contentId": "[variables('_dataConnectorContentId2')]", "contentKind": "DataConnector", - "displayName": "FireEye Network Security (NX)", + "displayName": "[Recommended] FireEye Network Security (NX) via AMA", "contentProductId": "[variables('_dataConnectorcontentProductId2')]", "id": "[variables('_dataConnectorcontentProductId2')]", "version": "[variables('dataConnectorVersion2')]" @@ -629,7 +629,7 @@ "kind": "GenericUI", "properties": { "connectorUiConfig": { - "title": "FireEye Network Security (NX)", + "title": "[Recommended] FireEye Network Security (NX) via AMA", "publisher": "FireEye", "descriptionMarkdown": "The [FireEye Network Security (NX)](https://www.fireeye.com/products/network-security.html) data connector provides the capability to ingest FireEye Network Security logs into Microsoft Sentinel.", "graphQueries": [ @@ -711,7 +711,7 @@ { "title": "Step B. Configure FireEye NX to send logs using CEF", "description": "Complete the following steps to send data using CEF:\n\n2.1. Log into the FireEye appliance with an administrator account\n\n2.2. Click **Settings**\n\n2.3. Click **Notifications**\n\nClick **rsyslog**\n\n2.4. Check the **Event type** check box\n\n2.5. Make sure Rsyslog settings are:\n\n- Default format: CEF\n\n- Default delivery: Per event\n\n- Default send as: Alert" - + }, { "title": "Step C. Validate connection",