-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Veritas analytics rules #9047
Closed
swapnildombaleveritas
wants to merge
50
commits into
Azure:master
from
swapnildombaleveritas:veritas_analytics_rules
Closed
Veritas analytics rules #9047
Changes from all commits
Commits
Show all changes
50 commits
Select commit
Hold shift + click to select a range
b0e94de
Create README.txt
swapnildombaleveritas 36f70e2
Added NetBackup AnalyticsRules
swapnildombaleveritas 1be883a
Delete Solutions/Veritas/README.txt
swapnildombaleveritas f0bfc43
Delete Solutions/Veritas directory
swapnildombaleveritas df034db
Create README.txt
swapnildombaleveritas b8529ee
Add files via upload
swapnildombaleveritas 2ee8c19
Delete Solutions/Veritas NetBackup/README.txt
swapnildombaleveritas 036c30e
Add files via upload
swapnildombaleveritas 4a1e330
Delete Solutions/Veritas NetBackup/NetBackup_many_Anomalies.json
swapnildombaleveritas 8572eb0
Delete Solutions/Veritas NetBackup/NetBackup_many_login_fail.json
swapnildombaleveritas 23faa3f
Add files via upload
swapnildombaleveritas e875f0a
Create Analytic Rules
swapnildombaleveritas 969a2c0
Delete Solutions/Veritas NetBackup/Analytic Rules
swapnildombaleveritas b872515
Create README.md
swapnildombaleveritas 8377a76
Add files via upload
swapnildombaleveritas ad6562b
Delete Solutions/Veritas NetBackup/Analytic Rules/README.md
swapnildombaleveritas 7fcb37b
Delete Solutions/Veritas NetBackup/MS-Sentinel-Integration.docx
swapnildombaleveritas f0fdb57
Delete Solutions/Veritas NetBackup/NetBackup_many_Anomalies.yaml
swapnildombaleveritas 2736cdc
Delete Solutions/Veritas NetBackup/NetBackup_many_login_fail.yaml
swapnildombaleveritas 097122c
Create Sample.txt
swapnildombaleveritas e2c028f
Add files via upload
swapnildombaleveritas 62eafb0
Add files via upload
swapnildombaleveritas f9e88ac
Delete Solutions/Veritas NetBackup/Data/Sample.txt
swapnildombaleveritas 07c3898
Delete Solutions/Veritas NetBackup/README.md
swapnildombaleveritas 6f2204a
Add files via upload
swapnildombaleveritas efaeb98
Delete Solutions/Veritas NetBackup/Data/Action_Orchestration.png
swapnildombaleveritas 10755a9
Delete Solutions/Veritas NetBackup/Data/Analytics_Query_1.png
swapnildombaleveritas 315ba04
Delete Solutions/Veritas NetBackup/Data/Anamoly_Detection_Query.png
swapnildombaleveritas 6ae6941
Delete Solutions/Veritas NetBackup/Data/Configuring_LogForwarding_End…
swapnildombaleveritas c50ae35
Delete Solutions/Veritas NetBackup/Data/Create_Action_Playbook.png
swapnildombaleveritas 77a5105
Delete Solutions/Veritas NetBackup/Data/Credetials_Setup.png
swapnildombaleveritas 4b3d441
Delete Solutions/Veritas NetBackup/Data/Log_Analysis_Agent_Config.png
swapnildombaleveritas 65b11be
Delete Solutions/Veritas NetBackup/Data/MS-Sentinel_Communication_Wor…
swapnildombaleveritas 44c5e7d
Delete Solutions/Veritas NetBackup/Data/MS_Sentinel_Events_Selector.png
swapnildombaleveritas a19bc94
Delete Solutions/Veritas NetBackup/Data/Malware_Anomoly_Detection_Ale…
swapnildombaleveritas 711474f
Delete Solutions/Veritas NetBackup/Data/NetBackup_Action_Pause_Backup…
swapnildombaleveritas 93f46e4
Delete Solutions/Veritas NetBackup/Data/Veritas_NetBackup_Config_1.png
swapnildombaleveritas 60d980d
Create sample.txt
swapnildombaleveritas 32aba31
Add files via upload
swapnildombaleveritas 2667503
Add files via upload
swapnildombaleveritas 8b4fc43
Delete Solutions/Veritas NetBackup/Data/sample.txt
swapnildombaleveritas 487a91e
Create sample.txt
swapnildombaleveritas 218dca0
Add files via upload
swapnildombaleveritas 9f94fda
Delete Solutions/Veritas NetBackup/Package/sample.txt
swapnildombaleveritas 8024098
Sentinel Content Deployment Script
azure-sentinel[bot] 600abb5
Workflow file for Sentinel-Deploy
azure-sentinel[bot] 203611b
Remove sentinel-deploy-da4498f8-f1b8-4406-8af2-4a691ab19ecb.yml
azure-sentinel[bot] b3dd389
Remove azure-sentinel-deploy-da4498f8-f1b8-4406-8af2-4a691ab19ecb.ps1
azure-sentinel[bot] c997529
Sentinel Content Deployment Script
azure-sentinel[bot] 84bf7cf
Workflow file for Sentinel-Deploy
azure-sentinel[bot] File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
602 changes: 602 additions & 0 deletions
602
.github/workflows/azure-sentinel-deploy-60019580-bd93-4e54-ad5e-d462db768ce0.ps1
Large diffs are not rendered by default.
Oops, something went wrong.
81 changes: 81 additions & 0 deletions
81
.github/workflows/sentinel-deploy-60019580-bd93-4e54-ad5e-d462db768ce0.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,81 @@ | ||
name: Deploy Content to sentinel1 [60019580-bd93-4e54-ad5e-d462db768ce0] | ||
# Note: This workflow will deploy everything in the root directory. | ||
# To deploy content only from a specific path (for example SentinelContent): | ||
# 1. Add the target path to the "paths" property like such | ||
# paths: | ||
# - 'SentinelContent/**' | ||
# - '!.github/workflows/**' | ||
# - '.github/workflows/sentinel-deploy-60019580-bd93-4e54-ad5e-d462db768ce0.yml' | ||
# 2. Append the path to the directory environment variable below | ||
# directory: '${{ github.workspace }}/SentinelContent' | ||
|
||
on: | ||
push: | ||
branches: [ veritas_analytics_rules ] | ||
paths: | ||
- '**' | ||
- '!.github/workflows/**' # this filter prevents other workflow changes from triggering this workflow | ||
- '.github/workflows/sentinel-deploy-60019580-bd93-4e54-ad5e-d462db768ce0.yml' | ||
|
||
jobs: | ||
deploy-content: | ||
runs-on: windows-latest | ||
env: | ||
resourceGroupName: 'quantile' | ||
workspaceName: 'sentinel1' | ||
workspaceId: 'b1b1e270-be02-40ca-a1f7-3aadc46662b1' | ||
directory: '${{ github.workspace }}' | ||
cloudEnv: 'AzureCloud' | ||
creds: ${{ secrets.AZURE_SENTINEL_CREDENTIALS_60019580bd934e54ad5ed462db768ce0 }} | ||
contentTypes: 'AnalyticsRule' | ||
branch: 'veritas_analytics_rules' | ||
sourceControlId: '60019580-bd93-4e54-ad5e-d462db768ce0' | ||
rootDirectory: '${{ github.workspace }}' | ||
githubAuthToken: ${{ secrets.GITHUB_TOKEN }} | ||
smartDeployment: 'true' | ||
|
||
steps: | ||
- name: Login to Azure (Attempt 1) | ||
continue-on-error: true | ||
id: login1 | ||
uses: azure/login@v1 | ||
if: ${{ env.cloudEnv == 'AzureCloud' }} | ||
with: | ||
creds: ${{ secrets.AZURE_SENTINEL_CREDENTIALS_60019580bd934e54ad5ed462db768ce0 }} | ||
enable-AzPSSession: true | ||
|
||
- name: Wait 30 seconds if login attempt 1 failed | ||
if: ${{ env.cloudEnv == 'AzureCloud' && steps.login1.outcome=='failure' }} | ||
run: powershell Start-Sleep -s 30 | ||
|
||
- name: Login to Azure (Attempt 2) | ||
continue-on-error: true | ||
id: login2 | ||
uses: azure/login@v1 | ||
if: ${{ env.cloudEnv == 'AzureCloud' && steps.login1.outcome=='failure' }} | ||
with: | ||
creds: ${{ secrets.AZURE_SENTINEL_CREDENTIALS_60019580bd934e54ad5ed462db768ce0 }} | ||
enable-AzPSSession: true | ||
|
||
- name: Wait 30 seconds if login attempt 2 failed | ||
if: ${{ env.cloudEnv == 'AzureCloud' && steps.login2.outcome=='failure' }} | ||
run: powershell Start-Sleep -s 30 | ||
|
||
- name: Login to Azure (Attempt 3) | ||
continue-on-error: false | ||
id: login3 | ||
uses: azure/login@v1 | ||
if: ${{ env.cloudEnv == 'AzureCloud' && steps.login2.outcome=='failure' }} | ||
with: | ||
creds: ${{ secrets.AZURE_SENTINEL_CREDENTIALS_60019580bd934e54ad5ed462db768ce0 }} | ||
enable-AzPSSession: true | ||
|
||
- name: Checkout | ||
uses: actions/checkout@v3 | ||
|
||
- name: Deploy Content to Azure Sentinel | ||
uses: azure/powershell@v1 | ||
with: | ||
azPSVersion: 'latest' | ||
inlineScript: | | ||
${{ github.workspace }}//.github/workflows/azure-sentinel-deploy-60019580-bd93-4e54-ad5e-d462db768ce0.ps1 |
29 changes: 29 additions & 0 deletions
29
Solutions/Veritas NetBackup/Analytic Rules/NetBackup_many_Anomalies.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,29 @@ | ||
id: 2e0efcd4-56d2-41df-9098-d6898a58c62b | ||
name: NetBackup too many anomalies generated | ||
version: 1.0.0 | ||
kind: Scheduled | ||
description: Trigger Incident if we get too many anomalies in last 5 mins | ||
severity: Medium | ||
queryFrequency: 5m | ||
queryPeriod: 5m | ||
triggerOperator: gt | ||
triggerThreshold: 0 | ||
query: |- | ||
NetBackupAlerts_CL | ||
| where Category contains "ANOMALY" | summarize Total=count() | ||
| where Total > 20 | ||
suppressionEnabled: false | ||
incidentConfiguration: | ||
createIncident: true | ||
groupingConfiguration: | ||
enabled: false | ||
reopenClosedIncident: false | ||
lookbackDuration: 5h | ||
matchingMethod: AllEntities | ||
groupByEntities: [] | ||
groupByAlertDetails: [] | ||
groupByCustomDetails: [] | ||
suppressionDuration: 5h | ||
eventGroupingSettings: | ||
aggregationKind: SingleAlert | ||
|
44 changes: 44 additions & 0 deletions
44
Solutions/Veritas NetBackup/Analytic Rules/NetBackup_many_login_fail.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,44 @@ | ||
id: d39f0c47-2e85-49b9-a686-388c2eb7062c | ||
name: NetBackup Too many failed login attempt | ||
version: 1.0.0 | ||
kind: Scheduled | ||
description: This rule will generate an incident if for a given host there are more than 5 failed login attemts in a last 1 hour timespan | ||
severity: Medium | ||
queryFrequency: 5m | ||
queryPeriod: 1h | ||
triggerOperator: gt | ||
triggerThreshold: 0 | ||
tactics: | ||
- CredentialAccess | ||
- Discovery | ||
relevantTechniques: | ||
- T1110 | ||
- T1212 | ||
query: |- | ||
let time_span = ago(60m); | ||
NetBackupAlerts_CL | ||
| where operation_s contains "LOGIN" and Message contains "authentication failed" | ||
| extend userName = split(userName_s, "@")[0] | extend host = | ||
split(userName_s, "@")[1] | ||
| where TimeGenerated >= time_span | ||
| summarize count() by tostring(host) | ||
entityMappings: | ||
- entityType: Host | ||
fieldMappings: | ||
- identifier: HostName | ||
columnName: host | ||
suppressionEnabled: false | ||
incidentConfiguration: | ||
createIncident: true | ||
groupingConfiguration: | ||
enabled: false | ||
reopenClosedIncident: false | ||
lookbackDuration: 5h | ||
matchingMethod: AllEntities | ||
groupByEntities: [] | ||
groupByAlertDetails: [] | ||
groupByCustomDetails: [] | ||
suppressionDuration: 5h | ||
eventGroupingSettings: | ||
aggregationKind: SingleAlert | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,15 @@ | ||
{ | ||
"Name": "Veritas NetBackup", | ||
"Author": "Microsoft - support@microsoft.com", | ||
"Logo": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Azure_Sentinel.svg\" width=\"75px\" height=\"75px\">", | ||
"Description": "The [Veritas](https://www.veritas.com/) solution for Microsoft Sentinel allows you to analyze NetBackup audit events. It includes analytics rules to automatically generate Incidents when an abnormal activity is detected.", | ||
"Analytic Rules": [ | ||
"Analytic Rules/NetBackup_many_Anomalies.yaml", | ||
"Analytic Rules/NetBackup_many_login_fail.yaml" | ||
], | ||
"Metadata": "SolutionMetadata.json", | ||
"BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions\\Veritas NetBackup", | ||
"Version": "3.0.0", | ||
"TemplateSpec": true, | ||
"Is1PConnector": false | ||
} |
Binary file not shown.
117 changes: 117 additions & 0 deletions
117
Solutions/Veritas NetBackup/Package/createUiDefinition.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,117 @@ | ||
{ | ||
"$schema": "https://schema.management.azure.com/schemas/0.1.2-preview/CreateUIDefinition.MultiVm.json#", | ||
"handler": "Microsoft.Azure.CreateUIDef", | ||
"version": "0.1.2-preview", | ||
"parameters": { | ||
"config": { | ||
"isWizard": false, | ||
"basics": { | ||
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Azure_Sentinel.svg\" width=\"75px\" height=\"75px\">\n\n**Note:** _There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing._\n\nThe [Veritas](https://www.veritas.com/) solution for Microsoft Sentinel allows you to analyze NetBackup audit events. It includes analytics rules to automatically generate Incidents when an abnormal activity is detected.\n\n**Analytic Rules:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", | ||
"subscription": { | ||
"resourceProviders": [ | ||
"Microsoft.OperationsManagement/solutions", | ||
"Microsoft.OperationalInsights/workspaces/providers/alertRules", | ||
"Microsoft.Insights/workbooks", | ||
"Microsoft.Logic/workflows" | ||
] | ||
}, | ||
"location": { | ||
"metadata": { | ||
"hidden": "Hiding location, we get it from the log analytics workspace" | ||
}, | ||
"visible": false | ||
}, | ||
"resourceGroup": { | ||
"allowExisting": true | ||
} | ||
} | ||
}, | ||
"basics": [ | ||
{ | ||
"name": "getLAWorkspace", | ||
"type": "Microsoft.Solutions.ArmApiControl", | ||
"toolTip": "This filters by workspaces that exist in the Resource Group selected", | ||
"condition": "[greater(length(resourceGroup().name),0)]", | ||
"request": { | ||
"method": "GET", | ||
"path": "[concat(subscription().id,'/providers/Microsoft.OperationalInsights/workspaces?api-version=2020-08-01')]" | ||
} | ||
}, | ||
{ | ||
"name": "workspace", | ||
"type": "Microsoft.Common.DropDown", | ||
"label": "Workspace", | ||
"placeholder": "Select a workspace", | ||
"toolTip": "This dropdown will list only workspace that exists in the Resource Group selected", | ||
"constraints": { | ||
"allowedValues": "[map(filter(basics('getLAWorkspace').value, (filter) => contains(toLower(filter.id), toLower(resourceGroup().name))), (item) => parse(concat('{\"label\":\"', item.name, '\",\"value\":\"', item.name, '\"}')))]", | ||
"required": true | ||
}, | ||
"visible": true | ||
} | ||
], | ||
"steps": [ | ||
{ | ||
"name": "analytics", | ||
"label": "Analytics", | ||
"subLabel": { | ||
"preValidation": "Configure the analytics", | ||
"postValidation": "Done" | ||
}, | ||
"bladeTitle": "Analytics", | ||
"elements": [ | ||
{ | ||
"name": "analytics-text", | ||
"type": "Microsoft.Common.TextBlock", | ||
"options": { | ||
"text": "This solution installs the following analytic rule templates. After installing the solution, create and enable analytic rules in Manage solution view." | ||
} | ||
}, | ||
{ | ||
"name": "analytics-link", | ||
"type": "Microsoft.Common.TextBlock", | ||
"options": { | ||
"link": { | ||
"label": "Learn more", | ||
"uri": "https://docs.microsoft.com/azure/sentinel/tutorial-detect-threats-custom?WT.mc_id=Portal-Microsoft_Azure_CreateUIDef" | ||
} | ||
} | ||
}, | ||
{ | ||
"name": "analytic1", | ||
"type": "Microsoft.Common.Section", | ||
"label": "NetBackup too many anomalies generated", | ||
"elements": [ | ||
{ | ||
"name": "analytic1-text", | ||
"type": "Microsoft.Common.TextBlock", | ||
"options": { | ||
"text": "Trigger Incident if we get too many anomalies in last 5 mins" | ||
} | ||
} | ||
] | ||
}, | ||
{ | ||
"name": "analytic2", | ||
"type": "Microsoft.Common.Section", | ||
"label": "NetBackup Too many failed login attempt", | ||
"elements": [ | ||
{ | ||
"name": "analytic2-text", | ||
"type": "Microsoft.Common.TextBlock", | ||
"options": { | ||
"text": "This rule will generate an incident if for a given host there are more than 5 failed login attemts in a last 1 hour timespan" | ||
} | ||
} | ||
] | ||
} | ||
] | ||
} | ||
], | ||
"outputs": { | ||
"workspace-location": "[first(map(filter(basics('getLAWorkspace').value, (filter) => and(contains(toLower(filter.id), toLower(resourceGroup().name)),equals(filter.name,basics('workspace')))), (item) => item.location))]", | ||
"location": "[location()]", | ||
"workspace": "[basics('workspace')]" | ||
} | ||
} | ||
} |
Oops, something went wrong.
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Tactics, relevant techniques and entity mappings is missing from this analytic rule.
Also add required data connector field and can be kept as null. A validation check is failing for requiredDataConnectors.
requiredDataConnectors: []