diff --git a/Solutions/SonicWall Firewall/Data/Solution_SonicWall Firewall.json b/Solutions/SonicWall Firewall/Data/Solution_SonicWall Firewall.json index 89415d2475c..3d2ce0ba1c4 100644 --- a/Solutions/SonicWall Firewall/Data/Solution_SonicWall Firewall.json +++ b/Solutions/SonicWall Firewall/Data/Solution_SonicWall Firewall.json @@ -5,10 +5,10 @@ "Description": "The [SonicWall Firewall](https://www.sonicwall.com/products/firewalls/) solution for Microsoft Sentinel enables ingestion of events using the Common Event Format (CEF) into Microsoft Sentinel for [SonicWall Firewalls](https://www.sonicwall.com/support/technical-documentation/?q=CEF&language=English).\n\r\n1. **SonicWall Firewall via AMA** - This data connector helps in ingesting SonicWall Firewall logs into your Log Analytics Workspace using the new Azure Monitor Agent. Learn more about ingesting using the new Azure Monitor Agent [here](https://learn.microsoft.com/azure/sentinel/connect-cef-ama). **Microsoft recommends using this Data Connector**.\n\r\n2. **SonicWall Firewall via Legacy Agent** - This data connector helps in ingesting SonicWall Firewall logs into your Log Analytics Workspace using the legacy Log Analytics agent.\n\n**NOTE:** Microsoft recommends installation of SonicWall Firewall via AMA Connector. Legacy connector uses the Log Analytics agent which is about to be deprecated by **Aug 31, 2024,** and thus should only be installed where AMA is not supported. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost [more details](https://learn.microsoft.com/en-us/azure/sentinel/ama-migrate).", "Data Connectors": [ "Data Connectors/SonicwallFirewall.json", - "Data Connectors/template_SonicwallFirewallAMA.json" + "Data Connectors/template_SonicwallFirewallAMA.json" ], "Metadata": "SolutionMetadata.json", - "BasePath": "C:\\Sentinel-Repos\\19.05.22\\Azure-Sentinel\\Solutions\\SonicWall Firewall", + "BasePath": "C:\\Github\\Azure-Sentinel\\Solutions\\SonicWall Firewall", "Version": "3.0.0", "TemplateSpec": true, "Is1PConnector": false diff --git a/Solutions/SonicWall Firewall/Data/system_generated_metadata.json b/Solutions/SonicWall Firewall/Data/system_generated_metadata.json deleted file mode 100644 index 78e50db15d5..00000000000 --- a/Solutions/SonicWall Firewall/Data/system_generated_metadata.json +++ /dev/null @@ -1,28 +0,0 @@ -{ - "Name": "SonicWall Firewall", - "Author": "SonicWall", - "Logo": "", - "Description": "The [SonicWall Firewall](https://www.sonicwall.com/products/firewalls/) solution for Microsoft Sentinel enables ingestion of events using the Common Event Format (CEF) into Microsoft Sentinel for [SonicWall Firewalls](https://www.sonicwall.com/support/technical-documentation/?q=CEF&language=English).\n\r\n1. **SonicWall Firewall via AMA** - This data connector helps in ingesting SonicWall Firewall logs into your Log Analytics Workspace using the new Azure Monitor Agent. Learn more about ingesting using the new Azure Monitor Agent [here](https://learn.microsoft.com/azure/sentinel/connect-cef-ama). **Microsoft recommends using this Data Connector**.\n\r\n2. **SonicWall Firewall via Legacy Agent** - This data connector helps in ingesting SonicWall Firewall logs into your Log Analytics Workspace using the legacy Log Analytics agent.\n\n**NOTE:** Microsoft recommends installation of SonicWall Firewall via AMA Connector. Legacy connector uses the Log Analytics agent which is about to be deprecated by **Aug 31, 2024,** and thus should only be installed where AMA is not supported. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost [more details](https://learn.microsoft.com/en-us/azure/sentinel/ama-migrate).", - "Metadata": "SolutionMetadata.json", - "BasePath": "C:\\Sentinel-Repos\\19.05.22\\Azure-Sentinel\\Solutions\\SonicWall Firewall", - "Version": "3.0.0", - "TemplateSpec": true, - "Is1PConnector": false, - "publisherId": "sonicwall-inc", - "offerId": "sonicwall-networksecurity-azure-sentinal", - "providers": [ - "SonicWall" - ], - "categories": { - "domains": [ - "Security - Network" - ] - }, - "firstPublishDate": "2022-05-06", - "support": { - "name": "SonicWall", - "tier": "Partner", - "link": "https://www.sonicwall.com/support/" - }, - "Data Connectors": "[\n \"Data Connectors/SonicwallFirewall.json\",\n \"Data Connectors/template_SonicwallFirewallAMA.json\"\n]" -} diff --git a/Solutions/SonicWall Firewall/Package/mainTemplate.json b/Solutions/SonicWall Firewall/Package/mainTemplate.json deleted file mode 100644 index 27055f30f7d..00000000000 --- a/Solutions/SonicWall Firewall/Package/mainTemplate.json +++ /dev/null @@ -1,86 +0,0 @@ -{ - "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", - "contentVersion": "1.0.0.0", - "metadata": { - "author": "SonicWall", - "comments": "Solution template for SonicWall Firewall" - }, - "parameters": { - "location": { - "type": "string", - "minLength": 1, - "defaultValue": "[resourceGroup().location]", - "metadata": { - "description": "Not used, but needed to pass arm-ttk test `Location-Should-Not-Be-Hardcoded`. We instead use the `workspace-location` which is derived from the LA workspace" - } - }, - "workspace-location": { - "type": "string", - "defaultValue": "", - "metadata": { - "description": "[concat('Region to deploy solution resources -- separate from location selection',parameters('location'))]" - } - }, - "workspace": { - "defaultValue": "", - "type": "string", - "metadata": { - "description": "Workspace name for Log Analytics where Microsoft Sentinel is setup" - } - } - }, - "variables": { - "solutionId": "sonicwall-inc.sonicwall-networksecurity-azure-sentinal", - "_solutionId": "[variables('solutionId')]", - "_solutionName": "SonicWall Firewall", - "_solutionVersion": "3.0.0", - "_solutioncontentProductId": "[concat(take(variables('_solutionId'),50),'-','sl','-', uniqueString(concat(variables('_solutionId'),'-','Solution','-',variables('_solutionId'),'-', variables('_solutionVersion'))))]" - }, - "resources": { - "type": "Microsoft.OperationalInsights/workspaces/providers/contentPackages", - "apiVersion": "2023-04-01-preview", - "location": "[parameters('workspace-location')]", - "properties": { - "version": "3.0.0", - "kind": "Solution", - "contentSchemaVersion": "3.0.0", - "displayName": "SonicWall Firewall", - "publisherDisplayName": "SonicWall", - "descriptionHtml": "
Note: There may be known issues pertaining to this Solution, please refer to them before installing.
\nThe SonicWall Firewall solution for Microsoft Sentinel enables ingestion of events using the Common Event Format (CEF) into Microsoft Sentinel for SonicWall Firewalls.
\nSonicWall Firewall via AMA - This data connector helps in ingesting SonicWall Firewall logs into your Log Analytics Workspace using the new Azure Monitor Agent. Learn more about ingesting using the new Azure Monitor Agent here. Microsoft recommends using this Data Connector.
\nSonicWall Firewall via Legacy Agent - This data connector helps in ingesting SonicWall Firewall logs into your Log Analytics Workspace using the legacy Log Analytics agent.
\nNOTE: Microsoft recommends installation of SonicWall Firewall via AMA Connector. Legacy connector uses the Log Analytics agent which is about to be deprecated by Aug 31, 2024, and thus should only be installed where AMA is not supported. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost more details.
\nLearn more about Microsoft Sentinel | Learn more about Solutions
\n", - "contentKind": "Solution", - "contentProductId": "[variables('_solutioncontentProductId')]", - "id": "[variables('_solutioncontentProductId')]", - "icon": "", - "contentId": "[variables('_solutionId')]", - "parentId": "[variables('_solutionId')]", - "source": { - "kind": "Solution", - "name": "SonicWall Firewall", - "sourceId": "[variables('_solutionId')]" - }, - "author": { - "name": "SonicWall" - }, - "support": { - "name": "SonicWall", - "tier": "Partner", - "link": "https://www.sonicwall.com/support/" - }, - "dependencies": { - "operator": "AND", - "criteria": [] - }, - "firstPublishDate": "2022-05-06", - "providers": [ - "SonicWall" - ], - "categories": { - "domains": [ - "Security - Network" - ] - } - }, - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/', variables('_solutionId'))]" - }, - "outputs": {} -}