From aa9ed01d2df05bb5b79c0fd9c35a46fba20948eb Mon Sep 17 00:00:00 2001 From: v-rusraut Date: Fri, 3 Jan 2025 10:38:53 +0530 Subject: [PATCH 1/3] Repackaged - Trend Micro Deep Security --- ...on_TrendMicroDeepSecurityTemplateSpec.json | 7 +- .../Package/3.0.1.zip | Bin 0 -> 9272 bytes .../Package/createUiDefinition.json | 33 +- .../Package/mainTemplate.json | 413 +----------------- .../Trend Micro Deep Security/ReleaseNotes.md | 1 + 5 files changed, 10 insertions(+), 444 deletions(-) create mode 100644 Solutions/Trend Micro Deep Security/Package/3.0.1.zip diff --git a/Solutions/Trend Micro Deep Security/Data/Solution_TrendMicroDeepSecurityTemplateSpec.json b/Solutions/Trend Micro Deep Security/Data/Solution_TrendMicroDeepSecurityTemplateSpec.json index 5fab94a8f3d..9fed9bbffbb 100644 --- a/Solutions/Trend Micro Deep Security/Data/Solution_TrendMicroDeepSecurityTemplateSpec.json +++ b/Solutions/Trend Micro Deep Security/Data/Solution_TrendMicroDeepSecurityTemplateSpec.json @@ -2,10 +2,7 @@ "Name": "Trend Micro Deep Security", "Author": "Trend Micro", "Logo": "", - "Description": "The [Trend Micro Deep Security](https://www.trendmicro.com/en_us/business/products/hybrid-cloud/deep-security.html) solution for Microsoft Sentinel enables you to ingest Deep Security logs into Microsoft Sentinel, using the Common Event Format (CEF) for Security Monitoring.\r\n \n\n This solution is dependent on the Common Event Format solution containing the CEF via AMA connector to collect the logs. The CEF solution will be installed as part of this solution installation. \n\n**NOTE:** Microsoft recommends installation of CEF via AMA Connector. Legacy connector uses the Log Analytics agent which is about to be deprecated by **Aug 31, 2024,** and thus should only be installed where AMA is not supported. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost [more details](https://learn.microsoft.com/en-us/azure/sentinel/ama-migrate).", - "Data Connectors": [ - "Data Connectors/TrendMicroDeepSecurity.json" - ], + "Description": "The [Trend Micro Deep Security](https://www.trendmicro.com/en_us/business/products/hybrid-cloud/deep-security.html) solution for Microsoft Sentinel enables you to ingest Deep Security logs into Microsoft Sentinel, using the Common Event Format (CEF) for Security Monitoring.\r\n \n\n This solution is dependent on the Common Event Format solution containing the CEF via AMA connector to collect the logs. The CEF solution will be installed as part of this solution installation. \n\n**NOTE:** Microsoft recommends installation of CEF via AMA Connector. Legacy connector uses the Log Analytics agent which were deprecated on **Aug 31, 2024.** and thus should only be installed where AMA is not supported. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost [more details](https://learn.microsoft.com/en-us/azure/sentinel/ama-migrate).", "Workbooks": [ "Workbooks/TrendMicroDeepSecurityAttackActivity.json", "Workbooks/TrendMicroDeepSecurityOverview.json" @@ -17,7 +14,7 @@ "azuresentinel.azure-sentinel-solution-commoneventformat" ], "BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions\\Trend Micro Deep Security", - "Version": "3.0.0", + "Version": "3.0.1", "Metadata": "SolutionMetadata.json", "TemplateSpec": true, "Is1PConnector": false diff --git a/Solutions/Trend Micro Deep Security/Package/3.0.1.zip b/Solutions/Trend Micro Deep Security/Package/3.0.1.zip new file mode 100644 index 0000000000000000000000000000000000000000..281cc83b08441d717456f569f0da7a153c75043d GIT binary patch literal 9272 zcmZ{Kbxa)2x9{S`-QC^Y7I!c1Qrw}iKw)urDAM9uio08JcPUcbi!HwR`+k4-rGkc1b7}4zBnG9VRGNk& zaQIUjPC+pD#`g>ND)(KBL#Z|oO{aClQqC!yTh9lDz}H*Gcm#=7Et-!MCUsOE9Ib?3 zmD+KBi0!ea#7;)Me6o}!I%!&K{MraH^aV~Q7^u{LHzDcEh3+h+8;q-pls7_JG}U|5 z26~NhU)hNK43TH7=+VYH(o^R2I8BA_x{S$KcAL2f;-lMWtJbF5cgo$VV22ou`mIVD zOHIxR>gdizA5*f4;#6v?i1Ou3zkj&6oUBi;Jby_D*i zs<@JmM`iX&-IN}KUJ&DWa2;Xoq{hY)%p63&6Q>MacAsB5&^MhfiCK^mcf!*IK4-tc zQQ%VR$2jHnX4~DI-QIGp#l$UW-y0#jBJf%-^{hop)VWBZ&3wy>yD3o7lNM~N4ysSxQZW&*wEoS1mdv^wWX z)Om^ul+%t_?oxdM(Ul8cBJTO}$wZahAIVR(S9;c8xPik6`2&4m|8~m*2|?oFwx|k+vip9M>kK?r5u+!1>k{TA(Z(HNgh190C0( zB7sMEsEn~EM_ioA*iXI;^=Qm#2+PoT0rk>__Bp-+RHu?lOP2w4;YVkt9G5&clz3j} zEW9irXFNS*ZlDgW&&hRGi(L+;B|ooc;n1V-uGn0dG3%MsYNpG+XEs7Kd9|Bi2jRD8 z)Y)a#OzDYHzQmuV?*?2h|1K3#a_(0xp?LHH2*II$39dz=7(4euW+0K}9!Wzj6A* zWc0Og%+9E?mWebD?W!XVRd0&VBM*WfBu9y=BM@)$tyPswd5H@XSCoYq$c;&ImlI$g zjR{TnViQ3cK1yMK?ELAf+Ut~PE6jt*H|-XX`^}^#9lc zyE_wsn{F7s>qSQw&qv~O)cI z^q5KyBeRU*52eKZe2p`2<(&}pi-7xsyg{33{f)PfVQPiic4v|7*X!#U`|I&7?H?9R z!(Wn?>K#jF3Jq?ngbmX3ZclLsDW6qS)0`_&z^pDI!?#*c6pc$3ug1=BW0Urd8f79Nxe70(S*d40P3Z-K5cj+S9 znmDE}ays|k8nl{N<=DAtz*yxdJ^>#G8Zyc9tna_lh_D>?Bt%b-!c zL2#P?jTd+{SK;fE0suc=008WNc!7(hgR72>i@Wnb?BG9);LP;Yb6qIotylLM!{F{r z`C>l3<+F>;u#1mKg;2}{h*5$jlN84?#>H$A-a#SPdkHuJTmz0#0N{~R3ly2hRjn3y z9aQMtU4@PY`h?T&9=G1n3x~Ikz0}G6_(qc4P#MhHb?3Fsd)LL;4N|+#4h2O3Pt?U3 zI~4rogCI={Tc@{3;$PXE-NuG1%v%BV>H-jYyuEBfY0V$ zThuTD9>3_IlN`V3$q+x!*vZU*ce9QY`0vEIb8x+gc*igD{Xj$jLp<54x%4Ai8v+p; z>yYVDzT0YxRSUWc_$`EcZU|yM-gJxLPzV-p2RvceK`56kAB5e9;lQHE_=4NRu8-^j zBXxqIy}yvWYXmfU1inSSlMYf2yz6$KTRTzaAY`e|A*M0%`fD7g_+!|ZQ<9qAmQ<}D z&>sG6P&Oor;M>P=a2YQAZwpkCf~_Q4hTO(>!Zll@AD}>nT>TZnG78n_?zmZ`P_|4& z`0RKVltcK}z|+UyULj>Av_miC8`IS%WQKU(2U}f(57IA%1E5zhv5b5re|&a_a!u;R z#vJdbNIYFWgW-?hBC8LXzk6_AB}4RNOZP^b3x6(1rE%3-m<`^3?eDkAR$Z;M6}`&R z)82HuI5SB*&HLyVVLP;`r*wdsO6e)3Nr5r4iALVGVurY!)^CK9AH7|$sSBvzLCjEb zZs|&c-?1uX!JX-(@FF^y%BbVwo9lag3?lE5FAI;TkHPr0Ey!lAGEkjmx~c5MRhyob zR^b?cuN&091HIE&ihqqwzC?T`$Xk&`=usiYa*OC0njaA&)6gma69$8^l9J)%89E8M zVlik}4mddZD)Gdh=4FZg_{@DlXdaqMT4v(;P&3s=(Q52=>Z zE64fLV=3Ta^2}5uUZ~Ks>G9{Hr2?&6vOK)J6*!u0Z-Vdl-PfFH#}O|1ST8mOT0NUSFIjMos=2dM3~y}3>*H)rt!!|Tx6ag3 zpsg0mJmeE_nVwg#+UZ2N5+?g3s>g#UV|xcH=Z&KvJP~vGeTR=gjK?6jR%slkg16=2 zdD3eNbOV~-=S;5K{$6JxTkI~9&jMD%V&d)CE~>9U3!Ch)b|u9x8e~dL^${HGtsgy) zg>tnJQ_7b@xqAAbT*`X`ObM99hC`+aZp)?#o<37q$Y&Zc@2=NKB^F_e>H*BI)ge(- zg`08sjSS)Xw4E4kR<2D7-1}p8@XziRMj=2K9VHs-*w zX2t}%nSg*KycRb}zo9&(c-8-LUZmLVEOr6d250GBilBo33pbl%9jHWG&yS$ED#&Cun7(#bSJ_nQ-cDE>!#YRYtL z>g^#7uY~DZyULboZXnMCUkF1Gux!f_jx&F<1YvJMFCtC=Q}57~gp)hOY2u(j@o0td zhpi;X1yb%Cu7Svu=IaSxPwv(42LkkZmsdHg$j=98FY)PlZSC7~+gA&x*>jI4oDDeJ z3h4m0?p1i3va@k(LzCT8frf@Z2XdS!4Zgt+TJAHYVrWOsQv@n$QcWO4lsYv-6Z0Fz zm7iCBf1+XC{`d;mmWuU{-dc!~39ju$B3vo$EGrO=2B4Z@Y?ROf3poJ^& za;0e=dl<*ug~Bm_IvnrhJ`P5<}8ley^n!@b9JgNn?Iz^e{0p?8;d=5o>H9o1~wd0!s!>J?YepS&)%C z7*eu5d{JCP?C+1@a}P=g71f}?pCT3$h^6DY&nKAEMoXu)zs;8~G7rYDckyqHqDB`( zay7HeP8AIdLsT(l+vsm_8P7y-U=8x)Sgygmq=(994kzq8U()+Gr*BpA2IfL(d>^RJ zH-=!APP|Zd_Z+eYU6q1M#4=8qO!PX`eCV9iaMjm`0S zk*$aURLabb5v$1~qghr3li%0E3-w9W*jk5n5A=6=Xd5>BEP4h?izR91qXUe510nM? zEsuI6+wlqj0FiZow&yR_?SMQYvJv|wWCi7rv?Pf-mxKHEhlw)g`mHPWuxl7Wf@TH~ z-hm!gyC%F_S8S}A;kL`sFj`*)k_8o&Cu!yR!d5f=tmo z1e`S~wv}b&ANr~YBN`@caw@a5@grGUF6 zKff=Uk9c}Xn1rGFagHG`Az!|gpiqOYo+PbZqHFIhcdJ~$Oxxa*7HquQ8K*wW7@R=a z{=#2d>)(O*0bgfu4Mq##cxtH{7k>Tv#Itvndcuuyvhm6)Jx}7B21|QEAcK&)`zRv| zmrq`RDjACn_tU0#&2t{3jKUX{@0iyrWJFsq2vh5&H z0Drz>@L|0vQ%bX>{0|tD<958bPZL18W!qDsLH1>u22bfs+%v98Z%Hidz_|*EBk6=T zWm=o&%TTWM#sWUlG))CAgt$Qy@Iefdv5NyMKhqxxb)~(i3~zt6oz{trdA+UpMt4ZJd^*iceq%Z#{~lsX7ToNKgpUfP|^v^}`#=KSJd&_`GdIOT>tO{+6S) z)*a_FscW)ipZ}5olMZc+OGbxx-{&AgFn;!ysV<4q4)$Er%}ce+E){-VEbi`IPgV%W z`YN+)_6E|^Wz>$jlOB?7p{8gR^Yz!E;(*us#gdg^VrlYbU*4GSRUj#_>s#ZM^~vpr z-6*5-Z?V{5^*CuBvw^ctK`6y zlltBWTnB2kzge;55}A+B_x%eAJ61hR%>?gUdRRD*()*J|7>&|+^Zab{JWfyLT^n#m z+iUfm;j?{c>F&H_Oc*Ud7V7G!sE0N6A!CN$k$8F+K&>eagTv>Y9UG?Ckkv4IFVgRI z(hr4mx%#m)8+;$FVBb6BA8H?Iw{V=hi%eN51LeareTi8?w_nNOCUTKczVoJ&8srMD z^dKOtAD13{HFjQi;e(x+hDHnKIZ4?9ZXR_d_UqkuKMOz_rX+{~PVHFvuJ$*yr${^@ zVQVyKZQl6b-~4jD_p;BcCUBfK6l+OO5L$brX-#j#d-8!IZrUlmwh(ue3s;I9+0h%Owwsr?PDH(USbUTn(2PhPcUUZtGM=( z40+b~2X4RpGP`z;N$o4m6KXHp7WAwg{2Rom(cR<(t=w_ThUjAfoZu{)8|&C+@pHp= zB%(I0h+m)Nc~xTS>v{Iz&3R{@Uy*Qy0=F;I9uwl&mFq>>gAb6r5;N{AXJ+}aw(O`9 zEo(-1dX>`Fful;G7&jFLg+Wuj(T|jiJ7S=WmFeoA4sw&ZmsoVCbj`!VcV8E;nG8g= z!O0&)MMV7dik<1x(h&+tteujbe_4k93{%CHIqjgov)ecQDkZd_}bUZ!$&&cZU3OeV;f;zCT z9z?kI5E>#OR>`XjeyPEJ1kyI3beB%Qt4SNl$+BK}<>DxZdVgK;5Bew}TuI6FGvx9O z*4%-mg9Wgx4!p!PYB+**9AuN5e4-8};iBZR2((;(f7`avtqKUn)Z$KJ4l=17o+c5c zgau_N^ux)|c{faxD4o(ZAiIgyvXA6_x26}#Lgwm`TX&FiY~6yT3u^A_Ao_XQ@9b*&Nv&6cuJZFP$*<*^82!ihwQ`6LCU~T{ zc;87EWED>Oqh>1zPbaM!yIy_}DIq$d9s-%=PA39}k2?(G|5dnjQmx{y=fYY>9CS=y zxD^}#OC5M+BP^bWHOL;sckHE(Tx?+}U&a3!QT}wu3UjKw*A}_`jM~RtQVn``!|7ZO zuF;Vm>p4rA-ELj@lxPF-|7Ow=^=NJDAT=hEUgdEXxMN_*Vn_hzWS8=QjzHPpC$a~B z*ViFGK!V;2u>kj_g;EJIZY#Sl6McVSKv*~6s24?U=!OgLsvl)%d=nJO#YMWQ|1YIW zVeo}Qy+eEEq&r1xPShYcO1(WNR|}6I7jw?1Y+-ZoovAHcb>BILzM*V9bLv&+^EbsbStW zfi(_p72Ap+8d}lZ@IelUzlO{i|4Y>0Wc>lU-@rp)vo%CBgG=0EBJjZREz;RLYJOem zf~qBOs2Yv}t)hhh2Thli-)C*gTCLNQFz&#)rFd1Xy&>0@boC#^Lz$p#;`w1mEB~W! zOu%Pb;nNeMJsJZto3vC<4uWOy_r;a(i0@D~rCx@K!a#)#Alp#D|3yGEF|-xB#N+>m zfm0BD=XS*+(XJ0-P4MqhIi$O1P+-z-)ZWj4K1y|Y=baT>HXqn%H7ROwl~=P-(2KXT z%Qujybj)y9+>g*CkK_IXgS$Fg2cjsb3uW>SP6VtyK#vu$D403p-K zlTqi#R{a)FQ>PQ?W4hGp^%GzT%X1t;e}4fhi7l!Tcu|@Yz@&gT-_~LRG=1_Q2L6?e zPcBN10?32Um}zqQHVv&A5X@2Z8!gPRJ^vA}`I2WZf7tFl9h3bh#d|dg6OwhA7u@?i zSDF=1`4LM#;RsNXqnr4aQzEn<@RQODnv$qn`WI}#cR&%H)g|uiFE0h?8mQs7lG`$S zb9I--bV55cxl=AYiv=(?De$9FrQrQzA}kjbHULwbOhNM@u)>LZ?eh+R^;@(@*^?{< z>>`I-TM3bkRSmfqoPu&D<@hXfg*+Kg?``{rP~TglhGPzM`xi!k=4|A0xAez~8o-YQ zC-?dPV5?v4ND~o$(KE5?*T$`JYX!md4YqIkC^CO@?6szS1u927Cj1HEDsO?-Pq^`km2;v+fxG^;LZ2%P!=g&Za9$TkeJ*3&RFSt!?x=4jWzut4$rDm_AWVzfOp*C`7%!RI^Lat@ z4|G(*w@*iLTAE$LZ?(#idlZU_fhp=zqB)jJQ9>DQ@X0F{R?YA@PPVZqO!_`p6LN)* z7!Q@t36K zX`Kn8dSNPLLWG3T_h#N&>CAj8OlQ;u{`Tu@2bs(s8;R^^3i~g>tWRHJHs~G8^94v7 zHH^xM`JU-?uT!|Cwv&HPZeC0827|v$4s4rg&*KbrtDMFLG}ucTpLNnlyExi%16z)! zja=>5gN?GNMO_Z|%pRYI<>M1Phvkv?HWG*~Gk7=Ej71DD^(oNh6@Ka2DZb)0pK^n$ zD=YQ34X?^7AIslnhtm=hLCFV28FOx=VfO`FZW60@?}(6@;Gj;38zx$6fRk3Ssr2O# z)@U8286q>;{a0%FW>lboSxAyr%uLO=!i_lXK>&#LYBlcBT0+@q+OifW>h)WgQB#F< zP%qA_0{80~t?2<7h3+myXpV|mk2d4WGlfreB$ENm-)PFAZn?~zG>h@KI)K%6)$t8J zmtw@M;V&_ZUs#;zpS=>1)~zk~4TTQh1cc96$e=$GF;o|DIxjhSPD^M`p0Mj}ze&*c zx&M*e#W(qa;TEVvrwT5S9*xyQ$^QK8I2?GgM?BHnmLXvbQ{Ar;QjFsyYch?gVYcSm z!r-z0SeZ2@H>x{@Ab)}Hb}&95i65jm0_I<$2kYgpq9loHR*qgHY96^wvqLh_;PtON&mE{j`Z48dB&0IlfPU{6(xt)&W` zSSdwBx}Fhr6!L($Op-M?@_|0?JS=0Mky$e~vYyKBpTrb!afenr?lS)M?$DZhs~w2= z`B4AP^IBZQ0Hp)x^$x`D_W6^|31w7WU&p8I+kRZVAXwULP^P^wfj!mzMjqV(3nKB#(&m($j?PdDlBF7P5kpFn=5{@&vL#@=T{ z#XX2zHWXjYA~c3H3fT0S>BkNgDJT_IMFE=Oz`u;leF8yOFgNYyT8a_v+h}oQ94YbfmjC%)JOVuGID(@ft zEUkA)s(i|q&u2yL{a(MF$)|sr=Fb1kwdwTR-f-M8%5G-h-yK3`!x=y6V@X>0fL zVqrTdw+T7khJox`VPRyLGXTsew?CZ(9W5+L9iz^DZ~k;=8fj`c9q%q-sST=G#ZkO zv&mu66>0a$WUf-@;}u1(C8gi(;(hiTLq@yT&@t5bWwRI+Vs+Q`FB{ zw2-u%i8r8sJH#v>(9HA4hx@>mRaiv41l$iF|Mfw*Zl^E=kOnu|nD&~yzKsZmj~ccZ zO1$pQii0(dK*o^rC{VAmTiu?Hut)S9%Q$^4lZ^!n>5(6sKPN9Qn=@}H6^J&34>>-I zn%$IewBE*2rIonS3DzmGlplQZC>Q#9Lx+g*U0r+T(8pW|OZ$gHku?`A0jYGJk_pt5 z_ZAzRs{CxXmW4o7tu#S`4d2tg8b^FPIZCQj&sQA|PUZ>FHs;ptNp$4DA z*r-P(U9f-Hk-xxUqy&t!_+#$vSZ{nAR7`0AZ4X8meS%d9=n8mAuuaj%vtG|XLfBL2 zDMVr(>SE^Hx&8d1Yyjfi!St&5{SoT8ang$WR?6i=TziwH-_b#4P9g&4hjc+l@`Jv` zybrx^OH7B|1>fwildRxspO)d^3!-@{O6qOv>TugzZJF?_<$oX!9a}KEgDg^;1%Cbu zTm-LzUIo+9z*=_|PiUt+hLL_5Y66&d_Wj?W547hh&DeL7BrM+&{>+)K5b;Y{tQ>ye z-ue3Fj-QEYxorBy+dA(QdggUdZ(=gn9Xt|5_C*)(`3XNT2u4!{1{M$Szt89V(~1MY w0I2>A|E&LITIYWz`Jc_af4}}$5~2_PpVpqH3IgK4PhkJq;s3-u+JA5V2Sxeovj6}9 literal 0 HcmV?d00001 diff --git a/Solutions/Trend Micro Deep Security/Package/createUiDefinition.json b/Solutions/Trend Micro Deep Security/Package/createUiDefinition.json index 93a9f899b81..dcebb161fff 100644 --- a/Solutions/Trend Micro Deep Security/Package/createUiDefinition.json +++ b/Solutions/Trend Micro Deep Security/Package/createUiDefinition.json @@ -6,7 +6,7 @@ "config": { "isWizard": false, "basics": { - "description": "\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Trend%20Micro%20Deep%20Security/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe [Trend Micro Deep Security](https://www.trendmicro.com/en_us/business/products/hybrid-cloud/deep-security.html) solution for Microsoft Sentinel enables you to ingest Deep Security logs into Microsoft Sentinel, using the Common Event Format (CEF) for Security Monitoring.\r\n \n\n This solution is dependent on the Common Event Format solution containing the CEF via AMA connector to collect the logs. The CEF solution will be installed as part of this solution installation. \n\n**NOTE:** Microsoft recommends installation of CEF via AMA Connector. Legacy connector uses the Log Analytics agent which is about to be deprecated by **Aug 31, 2024,** and thus should only be installed where AMA is not supported. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost [more details](https://learn.microsoft.com/en-us/azure/sentinel/ama-migrate).\n\n**Data Connectors:** 1, **Parsers:** 1, **Workbooks:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", + "description": "\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Trend%20Micro%20Deep%20Security/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe [Trend Micro Deep Security](https://www.trendmicro.com/en_us/business/products/hybrid-cloud/deep-security.html) solution for Microsoft Sentinel enables you to ingest Deep Security logs into Microsoft Sentinel, using the Common Event Format (CEF) for Security Monitoring.\r\n \n\n This solution is dependent on the Common Event Format solution containing the CEF via AMA connector to collect the logs. The CEF solution will be installed as part of this solution installation. \n\n**NOTE:** Microsoft recommends installation of CEF via AMA Connector. Legacy connector uses the Log Analytics agent which were deprecated on **Aug 31, 2024.** and thus should only be installed where AMA is not supported. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost [more details](https://learn.microsoft.com/en-us/azure/sentinel/ama-migrate).\n\n**Parsers:** 1, **Workbooks:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", "subscription": { "resourceProviders": [ "Microsoft.OperationsManagement/solutions", @@ -51,37 +51,6 @@ } ], "steps": [ - { - "name": "dataconnectors", - "label": "Data Connectors", - "bladeTitle": "Data Connectors", - "elements": [ - { - "name": "dataconnectors1-text", - "type": "Microsoft.Common.TextBlock", - "options": { - "text": "This Solution installs the data connector for Trend Micro Deep Security. You can get Trend Micro Deep Security CommonSecurityLog data in your Microsoft Sentinel workspace. After installing the solution, configure and enable this data connector by following guidance in Manage solution view." - } - }, - { - "name": "dataconnectors-parser-text", - "type": "Microsoft.Common.TextBlock", - "options": { - "text": "The Solution installs a parser that transforms the ingested data into Microsoft Sentinel normalized format. The normalized format enables better correlation of different types of data from different data sources to drive end-to-end outcomes seamlessly in security monitoring, hunting, incident investigation and response scenarios in Microsoft Sentinel." - } - }, - { - "name": "dataconnectors-link2", - "type": "Microsoft.Common.TextBlock", - "options": { - "link": { - "label": "Learn more about connecting data sources", - "uri": "https://docs.microsoft.com/azure/sentinel/connect-data-sources" - } - } - } - ] - }, { "name": "workbooks", "label": "Workbooks", diff --git a/Solutions/Trend Micro Deep Security/Package/mainTemplate.json b/Solutions/Trend Micro Deep Security/Package/mainTemplate.json index 199c986e450..b047705a7c5 100644 --- a/Solutions/Trend Micro Deep Security/Package/mainTemplate.json +++ b/Solutions/Trend Micro Deep Security/Package/mainTemplate.json @@ -47,18 +47,9 @@ }, "variables": { "_solutionName": "Trend Micro Deep Security", - "_solutionVersion": "3.0.0", + "_solutionVersion": "3.0.1", "solutionId": "trendmicro.trend_micro_deep_security_mss", "_solutionId": "[variables('solutionId')]", - "uiConfigId1": "TrendMicro", - "_uiConfigId1": "[variables('uiConfigId1')]", - "dataConnectorContentId1": "TrendMicro", - "_dataConnectorContentId1": "[variables('dataConnectorContentId1')]", - "dataConnectorId1": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", - "_dataConnectorId1": "[variables('dataConnectorId1')]", - "dataConnectorTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId1'))))]", - "dataConnectorVersion1": "1.0.0", - "_dataConnectorcontentProductId1": "[concat(take(variables('_solutionId'),50),'-','dc','-', uniqueString(concat(variables('_solutionId'),'-','DataConnector','-',variables('_dataConnectorContentId1'),'-', variables('dataConnectorVersion1'))))]", "workbookVersion1": "1.0.0", "workbookContentId1": "TrendMicroDeepSecurityAttackActivityWorkbook", "workbookId1": "[resourceId('Microsoft.Insights/workbooks', variables('workbookContentId1'))]", @@ -82,393 +73,6 @@ "_solutioncontentProductId": "[concat(take(variables('_solutionId'),50),'-','sl','-', uniqueString(concat(variables('_solutionId'),'-','Solution','-',variables('_solutionId'),'-', variables('_solutionVersion'))))]" }, "resources": [ - { - "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", - "apiVersion": "2023-04-01-preview", - "name": "[variables('dataConnectorTemplateSpecName1')]", - "location": "[parameters('workspace-location')]", - "dependsOn": [ - "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" - ], - "properties": { - "description": "Trend Micro Deep Security data connector with template version 3.0.0", - "mainTemplate": { - "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", - "contentVersion": "[variables('dataConnectorVersion1')]", - "parameters": {}, - "variables": {}, - "resources": [ - { - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',variables('_dataConnectorContentId1'))]", - "apiVersion": "2021-03-01-preview", - "type": "Microsoft.OperationalInsights/workspaces/providers/dataConnectors", - "location": "[parameters('workspace-location')]", - "kind": "GenericUI", - "properties": { - "connectorUiConfig": { - "id": "[variables('_uiConfigId1')]", - "title": "[Deprecated] Trend Micro Deep Security via Legacy", - "publisher": "Trend Micro", - "descriptionMarkdown": "The Trend Micro Deep Security connector allows you to easily connect your Deep Security logs with Microsoft Sentinel, to view dashboards, create custom alerts, and improve investigation. This gives you more insight into your organization's networks/systems and improves your security operation capabilities.", - "additionalRequirementBanner": "These queries and workbooks are dependent on Kusto functions based on Kusto to work as expected. Follow the steps to use the Kusto functions alias \"TrendMicroDeepSecurity\" \nin queries and workbooks. [Follow steps to get this Kusto function.](https://aka.ms/TrendMicroDeepSecurityFunction)", - "graphQueries": [ - { - "metricName": "Total data received", - "legend": "TrendMicroDeepSecurity", - "baseQuery": "\nTrendMicroDeepSecurity\n" - } - ], - "sampleQueries": [ - { - "description": "Intrusion Prevention Events", - "query": "\nTrendMicroDeepSecurity\n\n | where DeepSecurityModuleName == \"Intrusion Prevention\"\n | sort by TimeGenerated" - }, - { - "description": "Integrity Monitoring Events", - "query": "\nTrendMicroDeepSecurity\n\n | where DeepSecurityModuleName == \"Integrity Monitoring\"\n | sort by TimeGenerated" - }, - { - "description": "Firewall Events", - "query": "\nTrendMicroDeepSecurity\n\n | where DeepSecurityModuleName == \"Firewall Events\"\n | sort by TimeGenerated" - }, - { - "description": "Log Inspection Events", - "query": "\nTrendMicroDeepSecurity\n\n | where DeepSecurityModuleName == \"Log Inspection\"\n | sort by TimeGenerated" - }, - { - "description": "Anti-Malware Events", - "query": "\nTrendMicroDeepSecurity\n\n | where DeepSecurityModuleName == \"Anti-Malware\"\n | sort by TimeGenerated" - }, - { - "description": "Web Reputation Events", - "query": "\nTrendMicroDeepSecurity\n\n | where DeepSecurityModuleName == \"Web Reputation\"\n | sort by TimeGenerated" - } - ], - "connectivityCriterias": [ - { - "type": "IsConnectedQuery", - "value": [ - "\nTrendMicroDeepSecurity\n\n | summarize LastLogReceived = max(TimeGenerated)\n | project IsConnected = LastLogReceived > ago(30d)" - ] - } - ], - "dataTypes": [ - { - "name": "CommonSecurityLog (TrendMicroDeepSecurity)", - "lastDataReceivedQuery": "\nTrendMicroDeepSecurity\n\n | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" - } - ], - "availability": { - "status": 1, - "isPreview": false - }, - "permissions": { - "resourceProvider": [ - { - "provider": "Microsoft.OperationalInsights/workspaces", - "permissionsDisplayText": "read and write permissions are required.", - "providerDisplayName": "Workspace", - "scope": "Workspace", - "requiredPermissions": { - "read": true, - "write": true, - "delete": true - } - }, - { - "provider": "Microsoft.OperationalInsights/workspaces/sharedKeys", - "permissionsDisplayText": "read permissions to shared keys for the workspace are required. [See the documentation to learn more about workspace keys](https://docs.microsoft.com/azure/azure-monitor/platform/agent-windows#obtain-workspace-id-and-key).", - "providerDisplayName": "Keys", - "scope": "Workspace", - "requiredPermissions": { - "action": true - } - } - ] - }, - "instructionSteps": [ - { - "description": "Install and configure the Linux agent to collect your Common Event Format (CEF) Syslog messages and forward them to Microsoft Sentinel.\n\n> Notice that the data from all regions will be stored in the selected workspace", - "innerSteps": [ - { - "title": "1.1 Select or create a Linux machine", - "description": "Select or create a Linux machine that Microsoft Sentinel will use as the proxy between your security solution and Microsoft Sentinel this machine can be on your on-prem environment, Azure or other clouds." - }, - { - "title": "1.2 Install the CEF collector on the Linux machine", - "description": "Install the Microsoft Monitoring Agent on your Linux machine and configure the machine to listen on the necessary port and forward messages to your Microsoft Sentinel workspace. The CEF collector collects CEF messages on port 514 TCP.\n\n> 1. Make sure that you have Python on your machine using the following command: python -version.\n\n> 2. You must have elevated permissions (sudo) on your machine.", - "instructions": [ - { - "parameters": { - "fillWith": [ - "WorkspaceId", - "PrimaryKey" - ], - "label": "Run the following command to install and apply the CEF collector:", - "value": "sudo wget -O cef_installer.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_installer.py&&sudo python cef_installer.py {0} {1}" - }, - "type": "CopyableLabel" - } - ] - } - ], - "title": "1. Linux Syslog agent configuration" - }, - { - "description": "1. Set your security solution to send Syslog messages in CEF format to the proxy machine. Make sure to send the logs to port 514 TCP on the machine's IP address.\n2. Forward Trend Micro Deep Security events to the Syslog agent.\n3. Define a new Syslog Configuration that uses the CEF format by referencing [this knowledge article](https://aka.ms/Sentinel-trendmicro-kblink) for additional information.\n4. Configure the Deep Security Manager to use this new configuration to forward events to the Syslog agent using [these instructions](https://aka.ms/Sentinel-trendMicro-connectorInstructions).\n5. Make sure to save the [TrendMicroDeepSecurity](https://aka.ms/TrendMicroDeepSecurityFunction) function so that it queries the Trend Micro Deep Security data properly.", - "title": "2. Forward Trend Micro Deep Security logs to Syslog agent" - }, - { - "description": "Follow the instructions to validate your connectivity:\n\nOpen Log Analytics to check if the logs are received using the CommonSecurityLog schema.\n\n>It may take about 20 minutes until the connection streams data to your workspace.\n\nIf the logs are not received, run the following connectivity validation script:\n\n> 1. Make sure that you have Python on your machine using the following command: python -version\n\n>2. You must have elevated permissions (sudo) on your machine", - "instructions": [ - { - "parameters": { - "fillWith": [ - "WorkspaceId" - ], - "label": "Run the following command to validate your connectivity:", - "value": "sudo wget -O cef_troubleshoot.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_troubleshoot.py&&sudo python cef_troubleshoot.py {0}" - }, - "type": "CopyableLabel" - } - ], - "title": "3. Validate connection" - }, - { - "description": "Make sure to configure the machine's security according to your organization's security policy\n\n\n[Learn more >](https://aka.ms/SecureCEF)", - "title": "4. Secure your machine " - } - ], - "metadata": { - "id": "abf0937a-e5be-4587-a805-fd5dbcffd6cd", - "version": "1.0.0", - "kind": "dataConnector", - "source": { - "kind": "community" - }, - "author": { - "name": "Trend Micro" - }, - "support": { - "name": "Trend Micro", - "link": "https://success.trendmicro.com/technical-support", - "tier": "developer" - } - } - } - } - }, - { - "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2023-04-01-preview", - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId1'),'/'))))]", - "properties": { - "parentId": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", - "contentId": "[variables('_dataConnectorContentId1')]", - "kind": "DataConnector", - "version": "[variables('dataConnectorVersion1')]", - "source": { - "kind": "Solution", - "name": "Trend Micro Deep Security", - "sourceId": "[variables('_solutionId')]" - }, - "author": { - "name": "Trend Micro" - }, - "support": { - "name": "Trend Micro", - "tier": "Partner", - "link": "https://success.trendmicro.com/dcx/s/?language=en_US" - } - } - } - ] - }, - "packageKind": "Solution", - "packageVersion": "[variables('_solutionVersion')]", - "packageName": "[variables('_solutionName')]", - "packageId": "[variables('_solutionId')]", - "contentSchemaVersion": "3.0.0", - "contentId": "[variables('_dataConnectorContentId1')]", - "contentKind": "DataConnector", - "displayName": "[Deprecated] Trend Micro Deep Security via Legacy", - "contentProductId": "[variables('_dataConnectorcontentProductId1')]", - "id": "[variables('_dataConnectorcontentProductId1')]", - "version": "[variables('dataConnectorVersion1')]" - } - }, - { - "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2023-04-01-preview", - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId1'),'/'))))]", - "dependsOn": [ - "[variables('_dataConnectorId1')]" - ], - "location": "[parameters('workspace-location')]", - "properties": { - "parentId": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", - "contentId": "[variables('_dataConnectorContentId1')]", - "kind": "DataConnector", - "version": "[variables('dataConnectorVersion1')]", - "source": { - "kind": "Solution", - "name": "Trend Micro Deep Security", - "sourceId": "[variables('_solutionId')]" - }, - "author": { - "name": "Trend Micro" - }, - "support": { - "name": "Trend Micro", - "tier": "Partner", - "link": "https://success.trendmicro.com/dcx/s/?language=en_US" - } - } - }, - { - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',variables('_dataConnectorContentId1'))]", - "apiVersion": "2021-03-01-preview", - "type": "Microsoft.OperationalInsights/workspaces/providers/dataConnectors", - "location": "[parameters('workspace-location')]", - "kind": "GenericUI", - "properties": { - "connectorUiConfig": { - "title": "[Deprecated] Trend Micro Deep Security via Legacy", - "publisher": "Trend Micro", - "descriptionMarkdown": "The Trend Micro Deep Security connector allows you to easily connect your Deep Security logs with Microsoft Sentinel, to view dashboards, create custom alerts, and improve investigation. This gives you more insight into your organization's networks/systems and improves your security operation capabilities.", - "graphQueries": [ - { - "metricName": "Total data received", - "legend": "TrendMicroDeepSecurity", - "baseQuery": "\nTrendMicroDeepSecurity\n" - } - ], - "dataTypes": [ - { - "name": "CommonSecurityLog (TrendMicroDeepSecurity)", - "lastDataReceivedQuery": "\nTrendMicroDeepSecurity\n\n | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" - } - ], - "connectivityCriterias": [ - { - "type": "IsConnectedQuery", - "value": [ - "\nTrendMicroDeepSecurity\n\n | summarize LastLogReceived = max(TimeGenerated)\n | project IsConnected = LastLogReceived > ago(30d)" - ] - } - ], - "sampleQueries": [ - { - "description": "Intrusion Prevention Events", - "query": "\nTrendMicroDeepSecurity\n\n | where DeepSecurityModuleName == \"Intrusion Prevention\"\n | sort by TimeGenerated" - }, - { - "description": "Integrity Monitoring Events", - "query": "\nTrendMicroDeepSecurity\n\n | where DeepSecurityModuleName == \"Integrity Monitoring\"\n | sort by TimeGenerated" - }, - { - "description": "Firewall Events", - "query": "\nTrendMicroDeepSecurity\n\n | where DeepSecurityModuleName == \"Firewall Events\"\n | sort by TimeGenerated" - }, - { - "description": "Log Inspection Events", - "query": "\nTrendMicroDeepSecurity\n\n | where DeepSecurityModuleName == \"Log Inspection\"\n | sort by TimeGenerated" - }, - { - "description": "Anti-Malware Events", - "query": "\nTrendMicroDeepSecurity\n\n | where DeepSecurityModuleName == \"Anti-Malware\"\n | sort by TimeGenerated" - }, - { - "description": "Web Reputation Events", - "query": "\nTrendMicroDeepSecurity\n\n | where DeepSecurityModuleName == \"Web Reputation\"\n | sort by TimeGenerated" - } - ], - "availability": { - "status": 1, - "isPreview": false - }, - "permissions": { - "resourceProvider": [ - { - "provider": "Microsoft.OperationalInsights/workspaces", - "permissionsDisplayText": "read and write permissions are required.", - "providerDisplayName": "Workspace", - "scope": "Workspace", - "requiredPermissions": { - "read": true, - "write": true, - "delete": true - } - }, - { - "provider": "Microsoft.OperationalInsights/workspaces/sharedKeys", - "permissionsDisplayText": "read permissions to shared keys for the workspace are required. [See the documentation to learn more about workspace keys](https://docs.microsoft.com/azure/azure-monitor/platform/agent-windows#obtain-workspace-id-and-key).", - "providerDisplayName": "Keys", - "scope": "Workspace", - "requiredPermissions": { - "action": true - } - } - ] - }, - "instructionSteps": [ - { - "description": "Install and configure the Linux agent to collect your Common Event Format (CEF) Syslog messages and forward them to Microsoft Sentinel.\n\n> Notice that the data from all regions will be stored in the selected workspace", - "innerSteps": [ - { - "title": "1.1 Select or create a Linux machine", - "description": "Select or create a Linux machine that Microsoft Sentinel will use as the proxy between your security solution and Microsoft Sentinel this machine can be on your on-prem environment, Azure or other clouds." - }, - { - "title": "1.2 Install the CEF collector on the Linux machine", - "description": "Install the Microsoft Monitoring Agent on your Linux machine and configure the machine to listen on the necessary port and forward messages to your Microsoft Sentinel workspace. The CEF collector collects CEF messages on port 514 TCP.\n\n> 1. Make sure that you have Python on your machine using the following command: python -version.\n\n> 2. You must have elevated permissions (sudo) on your machine.", - "instructions": [ - { - "parameters": { - "fillWith": [ - "WorkspaceId", - "PrimaryKey" - ], - "label": "Run the following command to install and apply the CEF collector:", - "value": "sudo wget -O cef_installer.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_installer.py&&sudo python cef_installer.py {0} {1}" - }, - "type": "CopyableLabel" - } - ] - } - ], - "title": "1. Linux Syslog agent configuration" - }, - { - "description": "1. Set your security solution to send Syslog messages in CEF format to the proxy machine. Make sure to send the logs to port 514 TCP on the machine's IP address.\n2. Forward Trend Micro Deep Security events to the Syslog agent.\n3. Define a new Syslog Configuration that uses the CEF format by referencing [this knowledge article](https://aka.ms/Sentinel-trendmicro-kblink) for additional information.\n4. Configure the Deep Security Manager to use this new configuration to forward events to the Syslog agent using [these instructions](https://aka.ms/Sentinel-trendMicro-connectorInstructions).\n5. Make sure to save the [TrendMicroDeepSecurity](https://aka.ms/TrendMicroDeepSecurityFunction) function so that it queries the Trend Micro Deep Security data properly.", - "title": "2. Forward Trend Micro Deep Security logs to Syslog agent" - }, - { - "description": "Follow the instructions to validate your connectivity:\n\nOpen Log Analytics to check if the logs are received using the CommonSecurityLog schema.\n\n>It may take about 20 minutes until the connection streams data to your workspace.\n\nIf the logs are not received, run the following connectivity validation script:\n\n> 1. Make sure that you have Python on your machine using the following command: python -version\n\n>2. You must have elevated permissions (sudo) on your machine", - "instructions": [ - { - "parameters": { - "fillWith": [ - "WorkspaceId" - ], - "label": "Run the following command to validate your connectivity:", - "value": "sudo wget -O cef_troubleshoot.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_troubleshoot.py&&sudo python cef_troubleshoot.py {0}" - }, - "type": "CopyableLabel" - } - ], - "title": "3. Validate connection" - }, - { - "description": "Make sure to configure the machine's security according to your organization's security policy\n\n\n[Learn more >](https://aka.ms/SecureCEF)", - "title": "4. Secure your machine " - } - ], - "id": "[variables('_uiConfigId1')]", - "additionalRequirementBanner": "These queries and workbooks are dependent on Kusto functions based on Kusto to work as expected. Follow the steps to use the Kusto functions alias \"TrendMicroDeepSecurity\" \nin queries and workbooks. [Follow steps to get this Kusto function.](https://aka.ms/TrendMicroDeepSecurityFunction)" - } - } - }, { "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", "apiVersion": "2023-04-01-preview", @@ -478,7 +82,7 @@ "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "TrendMicroDeepSecurityAttackActivity Workbook with template version 3.0.0", + "description": "TrendMicroDeepSecurityAttackActivity Workbook with template version 3.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion1')]", @@ -568,7 +172,7 @@ "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "TrendMicroDeepSecurityOverview Workbook with template version 3.0.0", + "description": "TrendMicroDeepSecurityOverview Workbook with template version 3.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion2')]", @@ -658,7 +262,7 @@ "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "TrendMicroDeepSecurity Data Parser with template version 3.0.0", + "description": "TrendMicroDeepSecurity Data Parser with template version 3.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('parserObject1').parserVersion1]", @@ -782,12 +386,12 @@ "apiVersion": "2023-04-01-preview", "location": "[parameters('workspace-location')]", "properties": { - "version": "3.0.0", + "version": "3.0.1", "kind": "Solution", "contentSchemaVersion": "3.0.0", "displayName": "Trend Micro Deep Security", "publisherDisplayName": "Trend Micro", - "descriptionHtml": "

Note: Please refer to the following before installing the solution:

\n

• Review the solution Release Notes

\n

• There may be known issues pertaining to this Solution, please refer to them before installing.

\n

The Trend Micro Deep Security solution for Microsoft Sentinel enables you to ingest Deep Security logs into Microsoft Sentinel, using the Common Event Format (CEF) for Security Monitoring.

\n\n

This solution is dependent on the Common Event Format solution containing the CEF via AMA connector to collect the logs. The CEF solution will be installed as part of this solution installation.

\n

NOTE: Microsoft recommends installation of CEF via AMA Connector. Legacy connector uses the Log Analytics agent which is about to be deprecated by Aug 31, 2024, and thus should only be installed where AMA is not supported. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost more details.

\n

Data Connectors: 1, Parsers: 1, Workbooks: 2

\n

Learn more about Microsoft Sentinel | Learn more about Solutions

\n", + "descriptionHtml": "

Note: Please refer to the following before installing the solution:

\n

• Review the solution Release Notes

\n

• There may be known issues pertaining to this Solution, please refer to them before installing.

\n

The Trend Micro Deep Security solution for Microsoft Sentinel enables you to ingest Deep Security logs into Microsoft Sentinel, using the Common Event Format (CEF) for Security Monitoring.

\n

This solution is dependent on the Common Event Format solution containing the CEF via AMA connector to collect the logs. The CEF solution will be installed as part of this solution installation.

\n

NOTE: Microsoft recommends installation of CEF via AMA Connector. Legacy connector uses the Log Analytics agent which were deprecated on Aug 31, 2024. and thus should only be installed where AMA is not supported. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost more details.

\n

Parsers: 1, Workbooks: 2

\n

Learn more about Microsoft Sentinel | Learn more about Solutions

\n", "contentKind": "Solution", "contentProductId": "[variables('_solutioncontentProductId')]", "id": "[variables('_solutioncontentProductId')]", @@ -809,11 +413,6 @@ }, "dependencies": { "criteria": [ - { - "kind": "DataConnector", - "contentId": "[variables('_dataConnectorContentId1')]", - "version": "[variables('dataConnectorVersion1')]" - }, { "kind": "Workbook", "contentId": "[variables('_workbookContentId1')]", diff --git a/Solutions/Trend Micro Deep Security/ReleaseNotes.md b/Solutions/Trend Micro Deep Security/ReleaseNotes.md index 4cc5b799798..ff09f0b1e8d 100644 --- a/Solutions/Trend Micro Deep Security/ReleaseNotes.md +++ b/Solutions/Trend Micro Deep Security/ReleaseNotes.md @@ -1,5 +1,6 @@ | **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** | |-------------|--------------------------------|--------------------------------------------------------------------| +| 3.0.1 | 03-01-2025 | Removed Deprecated **Data connector** | | 3.0.0 | 27-06-2024 | Deprecating data connectors | | 2.0.1 | 11-11-2022 | Updated OfferId | | 2.0.0 | 20-07-2022 | Initial Package | \ No newline at end of file From e898783651fb211d0c583c67034d7613fbfcd02d Mon Sep 17 00:00:00 2001 From: v-rusraut Date: Fri, 3 Jan 2025 11:31:44 +0530 Subject: [PATCH 2/3] Repackage - AristaAwakeSecurity --- .../HighMatchCountsByDevice.yaml | 5 +- .../HighSeverityMatchesByDevice.yaml | 5 +- ...tchesWithMultipleDestinationsByDevice.yaml | 5 +- .../Data/Solution_AristaAwakeSecurity.json | 7 +- .../AristaAwakeSecurity/Package/3.0.1.zip | Bin 0 -> 9992 bytes .../Package/createUiDefinition.json | 28 +- .../Package/mainTemplate.json | 515 +++--------------- Solutions/AristaAwakeSecurity/ReleaseNotes.md | 1 + 8 files changed, 70 insertions(+), 496 deletions(-) create mode 100644 Solutions/AristaAwakeSecurity/Package/3.0.1.zip diff --git a/Solutions/AristaAwakeSecurity/Analytic Rules/HighMatchCountsByDevice.yaml b/Solutions/AristaAwakeSecurity/Analytic Rules/HighMatchCountsByDevice.yaml index 19ff9a1af6e..bb692638138 100644 --- a/Solutions/AristaAwakeSecurity/Analytic Rules/HighMatchCountsByDevice.yaml +++ b/Solutions/AristaAwakeSecurity/Analytic Rules/HighMatchCountsByDevice.yaml @@ -4,9 +4,6 @@ description: This query searches for devices with unexpectedly large number of a severity: Medium status: Available requiredDataConnectors: - - connectorId: AristaAwakeSecurity - dataTypes: - - CommonSecurityLog (AwakeSecurity) - connectorId: CefAma dataTypes: - CommonSecurityLog @@ -65,5 +62,5 @@ incidentConfiguration: groupByAlertDetails: [] groupByCustomDetails: - Device -version: 1.0.1 +version: 1.0.2 kind: Scheduled \ No newline at end of file diff --git a/Solutions/AristaAwakeSecurity/Analytic Rules/HighSeverityMatchesByDevice.yaml b/Solutions/AristaAwakeSecurity/Analytic Rules/HighSeverityMatchesByDevice.yaml index b5455cca631..810bc2222bf 100644 --- a/Solutions/AristaAwakeSecurity/Analytic Rules/HighSeverityMatchesByDevice.yaml +++ b/Solutions/AristaAwakeSecurity/Analytic Rules/HighSeverityMatchesByDevice.yaml @@ -4,9 +4,6 @@ description: This query searches for devices with high severity event(s). severity: Medium status: Available requiredDataConnectors: - - connectorId: AristaAwakeSecurity - dataTypes: - - CommonSecurityLog (AwakeSecurity) - connectorId: CefAma dataTypes: - CommonSecurityLog @@ -63,5 +60,5 @@ incidentConfiguration: groupByAlertDetails: [] groupByCustomDetails: - Device -version: 1.0.1 +version: 1.0.2 kind: Scheduled \ No newline at end of file diff --git a/Solutions/AristaAwakeSecurity/Analytic Rules/ModelMatchesWithMultipleDestinationsByDevice.yaml b/Solutions/AristaAwakeSecurity/Analytic Rules/ModelMatchesWithMultipleDestinationsByDevice.yaml index 862fa15593d..ca4870ec60e 100644 --- a/Solutions/AristaAwakeSecurity/Analytic Rules/ModelMatchesWithMultipleDestinationsByDevice.yaml +++ b/Solutions/AristaAwakeSecurity/Analytic Rules/ModelMatchesWithMultipleDestinationsByDevice.yaml @@ -4,9 +4,6 @@ description: This query searches for devices with multiple possibly malicious de severity: Medium status: Available requiredDataConnectors: - - connectorId: AristaAwakeSecurity - dataTypes: - - CommonSecurityLog (AwakeSecurity) - connectorId: CefAma dataTypes: - CommonSecurityLog @@ -63,5 +60,5 @@ incidentConfiguration: groupByAlertDetails: [] groupByCustomDetails: - Device -version: 1.0.1 +version: 1.0.2 kind: Scheduled \ No newline at end of file diff --git a/Solutions/AristaAwakeSecurity/Data/Solution_AristaAwakeSecurity.json b/Solutions/AristaAwakeSecurity/Data/Solution_AristaAwakeSecurity.json index 7a9a4846791..452f16d2e36 100644 --- a/Solutions/AristaAwakeSecurity/Data/Solution_AristaAwakeSecurity.json +++ b/Solutions/AristaAwakeSecurity/Data/Solution_AristaAwakeSecurity.json @@ -2,10 +2,7 @@ "Name": "AristaAwakeSecurity", "Author": "Arista Networks - support-security@arista.com", "Logo": "", - "Description": "The [Awake Security Arista Networks solution](https://awakesecurity.com/) for Microsoft Sentinel enable users to send detection model matches from the Awake Security Platform to Microsoft Sentinel.\n\n This solution is dependent on the Common Event Format solution containing the CEF via AMA connector to collect the logs. The CEF solution will be installed as part of this solution installation.\n\n**NOTE:** Microsoft recommends installation of CEF via AMA Connector. Legacy connector uses the Log Analytics agent which is about to be deprecated by Aug 31, 2024, and thus should only be installed where AMA is not supported. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost [more details](https://learn.microsoft.com/en-us/azure/sentinel/ama-migrate).", - "Data Connectors": [ - "Data Connectors/Connector_AristaAwakeSecurity_CEF.json" - ], + "Description": "The [Awake Security Arista Networks solution](https://awakesecurity.com/) for Microsoft Sentinel enable users to send detection model matches from the Awake Security Platform to Microsoft Sentinel.\n\n This solution is dependent on the Common Event Format solution containing the CEF via AMA connector to collect the logs. The CEF solution will be installed as part of this solution installation.\n\n**NOTE:** Microsoft recommends installation of CEF via AMA Connector. Legacy connector uses the Log Analytics agent which were deprecated on **Aug 31, 2024**. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost [more details](https://learn.microsoft.com/en-us/azure/sentinel/ama-migrate).", "Analytic Rules": [ "Analytic Rules/HighMatchCountsByDevice.yaml", "Analytic Rules/HighSeverityMatchesByDevice.yaml", @@ -19,7 +16,7 @@ ], "Metadata": "SolutionMetadata.json", "BasePath": "C:\\Sentinel-Repos\\19.05.22\\Azure-Sentinel\\Solutions\\AristaAwakeSecurity", - "Version": "3.0.0", + "Version": "3.0.1", "TemplateSpec": true, "Is1Pconnector": false } \ No newline at end of file diff --git a/Solutions/AristaAwakeSecurity/Package/3.0.1.zip b/Solutions/AristaAwakeSecurity/Package/3.0.1.zip new file mode 100644 index 0000000000000000000000000000000000000000..796ec0aea11b3899466af455bd8ee36b729f0375 GIT binary patch literal 9992 zcmZ{~RZtuZ&@74scXxLW?(XjH5M*(82+rab+yVsm;I50iyDveOV8QKv|2<*r;E<1)7YR7W;AN`Ac(i4WUF3Xp;*`{<-!m&aU?AWxWVUZM}aw|UG-S}Hz zos907X=h=5sAfy*y%YbGe-8j78Ewt*kq-@oSqnli1pg_pyPZ7;IRC>?lYUJiHf%F_mfG3;kFC+T_`KvN;GVVNiktCcunx8}>}@<6N3FANp15sVY+p1od-aE*jDH8|ej zD>Aio*FbGb6!3K5nOc(yi0zW<7R}bGl;6D~^I3kIR%H!oCbSeLM-rnR%Tc;Ing5If z%~AH7u@sxsD4I02bgIokwcJd2WVeyl=x6euG2G9@0wX9(+{$^c(^zBUnPDZ>q5>cu zhKq3=Y{-$0T=;MQ$s^VpV|u2iJn@Lwi?CzLzLm%1_NPqF(OhiQU3T-KQ*%YFkNd;8m;J5V!N6kT$*Y; z*U85Ip_HptMay_UhE#qnZBLsN)Z=^`#Sv3IR+7GSM>>Rq@hx6Xq@pbrXJtyXZMZe) z0RNE*@R!ocUJB*VaX~n&$;wp=p$nP*n0YZdf4ROM^Y(~gCJap1i{g7OF)c9$k>pwY z^dJLf8P(Ys@Wf2I&j&B~TimjY&>uJAv+BwIy5E!z-+rP$pV>8^Ui#v(ib>2!`8;^w=K=*0mZSMYPA&v6EdtNQ}duba3c2=>#Yx zTcy@J@tlVW5Wjvq@cYf*_t2&B8IJA{6HcqeBksRPUgS%Iqn(|YFEcLhm#{g3B*~Qz zY59E+jC0CTH~|p+?3IYx$@?43xf9q18x_-IT*Gq=nh6wYJPrFu)!V=tjYapKCZMLj zJ+L3Qs+D0zk6(D0evWbXNj|M(M5N;UIXvZNYX(9} zDj1~-h-Jeh5N2q$+&xqeyiE#s-1^WbjBo4Xw0VM6>qROiuK(_!8<@L-m_TjI)Q~kG zpOvbj15QSmkEt$3Lg$8X{FnvP6};AWk_}HSEw7!Z4cPiLOI=W}wC}uRzt@7B`rb7c zD%Q?blFlakB-sT4CkCjq1wAy7MZ68PwpoY5Ll_CAWtr^6#wlDJ;yF3!ZP2YELD6 ztCoyxmfP$C9mcw7gV?=2+BnZTBuk`F$~kt7$)u{nC3nO2`sS*r&@JzL z!ND`d?5(MXcbR6JodY>5#iTz2?^`ABKKuIceYLbnur_Upk4LMIYvMh{k<6y9LCR$Z z1pwzWM_<9GuHfR=q_+^5H;NW=--gw4h%o9GAO(pGL<6kA`*6=DjO|Di)Dd7xaw}f5 z#xCuCJDhKgDFyPTLH0RC1ufG$kKF3?Ol%`YrYlbKaxu@O!=-7n5g{}>hEMP4xiApC zi_{N^Gs8TH2Yks#B9%RRZ|O;R_tR|r1jtLuxMd@wORj;k%RZ;jzkhI&g`B(WaEu!~ zV$`CFf`Rqlw8erLo^+DMKU+i#bto-DikmsXeyp%n9xwb-5mQUnKm7rtU5CYDel^>+ z{*PRxox3@0?1H^hWy_;UAIAmoC$S4Se|hN-v+~EvUxrLobPo9wkLyq{ePcB@<~s+j zg)((HO3@WPS7dl#7pwEQW0*enA2BrkKaGKEOk+eCGx2qc3<}C*2nq`8KaJsR32@P| zadvb1Pig$W>H;F_=(#1Aw%2g}F^ubJsHq$IC7fdc53H7XB!jo1XQ=cxsKX>}pG&*YkF@CW;|~KwBw)C~#cfgKOJW(OpqdBz=4L{gZ$y@iP`el(#g>y_gNUp$_oz zV=N?{u2QdXntgi;{b)kn2qT*Y8+h60TozmUpfv}dHbxO_AM~*BnfvkBB77#neCEl; zb66mRpj!9;{^|isu?C>Xei9cHv*Yx(PrwZtMYsmC9~ojEE~n2YS}B<|Kk*@o%ZyMi zcr+mntpl@rQFosHeliw?k03<`O$espP(@D-7>_o7jiqz{h8-!hFWOl~v0f&#EU};Q z6Cf##>;*kRRNXUB-ee&u79Ml66Mn#@N!sR0$EziYLr!wm1`n4<(+4(6+ii&G&VW{u&eZQABNhK}68 zw}ageZy{B{h9gx&^ek-#y)PBDGHpaA_iR}g>?gV9R0lD!m9!!Teem32YK zVREZ%Y&YQ(EpBht+1tk?Ee@vx)XrrbkY2z@Hj*=3fj)B+x_Q}lAP~HDngrPTIef5A z=ml@vAIx(~dLK=sVkmx zhmBi31=s9uy=ADJ-ik4?u(#!UNmgI%(a?&t`Lnob&FJOtl`{RTK{GwUtDu-yo(C5E z?4n*^DPgQ+UM`VM=Y)fDjUBaSV4W!O-y43Jc^@YGbOGi;L3^vT6#TFuG)iaVp9hrcu@!6gjoxbmL$f4uTxbzmKO)iCU);H z%uesJ%qGe4Y&z>N7rGtz>W>-+v-Eg>m-Q{hR&wUin`1ILeHgjBoIR})ULy)QEiX%b zvb+miVsxwB{$S~JjK19KcHHS#xv{ag{l_HuIppoPSvkav%>s{PTPkqGLqLWLleY-D zr;_+x;2?BvB=-f(`^c4-&U%|A@Vw=&+50=NqD(}&+g6VAcA7}LHjCErT?|M^odg{b?c@VV^CNzTB1?$)CwmZty{uD)pSd%An#z@{KuODf|4;9JXFgG%Q4N1=fJ{vM*QZmV#?@k6{X?GLg%$_4 zi?mZMLM0kDtWpmPHtji8T>3L)u&PPT?cW>u#^*M#RPah~%xb`LMkM1fLQaE03;{a}Mr) z%EBGdv~~vDTM)#dpZ8z37tMx3gc?Ijb3FHO3MeZVKfg&GkebYF14E%Pt`tV>5r4_{ zM1rr6Fp;9nUm!T^McIP8WHMpV0M?S~fyjYX#b6NmlS9*;h0yIMO?O96YSKsE}8)8MwU zWfKP%&PwU~>NvxI7H+qg{;%!YZBJQs2gc;Eu@el61CwiUcbIpti2+QQ#Qb6bxAzVt zD?Rnc$B8F3?0?#rpvo_2__){USBhIas_gfuwth}jsJ`mxn#ouzO~N@m&DxfM)A*42 z9E<>wEOv)w`_#jcD+P={1qkgg3pAv`AW~n!F(jJ5+;V6@A-O(1md?puRHCdxXD36mpGY|zSN9H9&=Lhf@psT{?fnUspn)a3BPLxKG zfoAamWl^6?bntCHD3%2R=!J_6X)7C1W?J6f*u79!v=J%nhNQ}d0NKT#OMvn6ZLW9L zBTDj~FtkV=>$5W-)pk3yyudC3R(Ma%UeZTK)-LEG|A>#YhOC>S7gdFUd6eCKGiZZd zZ5OCxwFHuj9`hQgbSkwO*o<13knWPV~4+mW;^Fa?{a5<~~ zNY}W!*kSO|lmO29jN|Z&?#gV@$&4z!Om+7}y{qRdEV|F3+LC}&|CF}>KgSvRjcif$ ztS*6wx!dslVZyXeC&HzLZ%Q6Q42RD<820PiXoX#i{IyNlCN!ZF`mBYq8kcGQCNq4g zUPg`DD_)8;jdV6t5i)b)_u)W6JCCDZPOW;T4U&AxM|?wBK~e{jSb+uK`h1?*I)gN= ziu0rHaD$xj3w2=mbO#+*=I@+QY7GK-;_@sIwoQne zO`W!7?d5efLe@eXsXZfuB2hK_?29g88osW_>(7Gco75T$>^eq!U89L#r!*{Cc$p@E zGTSX?N{__UYT`3*)1{*A@MX_b1`eiVos{z4A71I(O4W*KJ)b&R^byCRm-L$sCJoG? zqg>4WKP@4{#_z0i_u~7kx*OoN;$`Zd!Wx_b`q$id?sP?4I0S~QwdwC>rS1-Dva%i9 zR-LPoHH6YAaS?cKBpJLYG#DRr93cetB{^L=$pACl*&=?!tg&jRYPdVL&cK_r2lhMG zPW8|`ET`%ry^iDOcE@c)5@O%gdiOtKdPiz>{9F{fyjNbxjL>x#FuM&+{&u>X_tdYX zXX4fV{L&b|UJxVoFLM_@U|+lx<7LSE`%N2?=2#x9#vgz6J08(Fi^OdF%@2rlaybD! z2Ct#9ghRS4Cmh$%w!DXZb{b9jSrH!8FQRqZ0)Y-epw18?IS)DP31>*5sKcJ})iKV) zxo@A+!qL$~@9#WwPkvwLhC|1-hqQT+e0STL^p+Wj8SdNZcaN>9#j0z3XAU$343|J> z{eDXI#fNG`@ihDY2#XNYt&5HN%d)Vo%38y020-8nFGuqBL$y9*kNibVT+zRywXOEP zHqbMokFMowcYB`@iII7M>BUrV!m56*Z1XAEH`j(tGYGp#=ERCm@7FpxrGZ&*=&QAL zlnWi=*Z=hl0=_JUXx4B>k1_HP`x#GXegnA;Ek&>Xzu6tj@eJver8&;?_D7>Jtz+Xj zUSmFNjjzFJiP2QO-8WC|F<^q^#@6-S)(IbHE?&nq`mNT9mIl*2R^h-k`lYbT&2QDJ z(R;n!|ER_kUkqDeMM~Zc);Hm^Pb=|+?VtHf@TE87Yf`T8>zb$kfG9KT&^gz9mmL0X z)l=yOT@qVicRks!VFubu*BVrZ^1Q3N0KHoVJ>R3VqazUbN7`7dQWyZh6;^7+mhNZ+ zz(YONgVP%3(txwhD(iGQ&&YXh)|eyES(~IsUcNT2_}`XE`xVeR{tgSZX6WJZ99Y$` z!y2q_-52J)m-bYDSLPXW^=n@7_QcTvz?6|Te5sXu%;9L7(ZA+r>Q-lYrjxVDrA_+K zH%2S@Q>xA$o~pKaMDH5$0=$2UarXbC)N47NxjuG1Wj(#9K{56lJ< zL%YUY8&rRN)0McsyV{MSzCg9Wkzs1W&bx36wfwAHvN>6Atg8ojz1ofuQVhy1xzCAN z**2&qJ0<;GWgZtP3S+BkUoPVMSTD6cp_@|_qBK0Gu2?YM;0Zf;TDs2@u+-48->jBC)_^G&<`V^&iQYn zp22p$xGRwxuY&-y5xZO4qYTU(r0*>4R1}HCX9SH10Jnq82$Wf~F4Zce(8?!71ntsA zm-bbI4A1dO596XVGz3+RL___-wuH-&3Ok{nfb`O^g-f)6(Rm13f>?w!XXEKe(-!Hf zZQ-LMbrFk@+E=rK$5@d6ZTjGy%tqsA;z0?ei{NZ1I0m~5%PdYpQ<$d;M31S6n$MZC z9Wm_A10cc4Q?vJ7FFx}5bg#q%1JLR=!gzmhc?vX6Cs`ZNm&!ekLwkybi63ZStPenh z)IL*>nUPC{v^;5KjT$@y#&}_M>UY>r^IO&a{9rj|tC6|!1MmwXPP=y&Q|NX~rfHQz zAEZQE4otkA`UZ#O4tbq~md~PN^LQA=Rl9+sXRlf?M;aF(yd?N{5^8j7Crbz z-O4@}XL&#)Boz8_DyNKE|IA~#VPacqba$|Rk1Qz%86_8tOt~W7NgOX4O?LeX}qkQ5#^OCzy&b zRYWl~>0z|KL}J=Oo%x~Y7XHbt@v7EC8sc%%R|Z~zcj0?=qdt->f8@zG^uYw>!ENfI zs7MQ-`oF!Qj8BcHk8=w@Hg~>kn@u#%pr6E3!X)42NBfr@VjX6{V4Gz->e_C;%B+~N z2(z;5Rh^}wD{?Yu2!D>^7k@*alveed1wkkIMVSp)r~B2F6w&*67`dFa21$xq$YCBL zh_Of3Sj>OqZ^db1Z_1~@^$f~$+{Dc)_z45p-tB^gAGIOt=l+;{*1s9mj&^=@{Ysz1CizJHv-+G75p zRyPOS+(|m8dF;Im_??9{SF&Px#q|2LbDxq#Ow4n3l`nBeJI(WrPD9XNc1oKBAxH~g zt&Q_lm){!n`tNlA(#8NTQ)~&TyL~Z8nB2#v`~uGcpWmeG^Rj*s!w*W9PpXeMxEv>$ zCO0q!Rf$Bz{;uR9vqpsgm5I6+F#3myx{yc0lw?v@`Ts>;zdb9f^fZLSotq&W~J2X1LaI$i>8n$Ue(dcY(D)ApesjIy8sa#lZrj zP++RJ)@vQhO(*P$y*Obwc@iyp*Bezvp#cHP%-5xIEJteIB3aRZs4FUULL0}yXE@_r zjNFzqJS6$6PEUS%t14MS3j)y`cTy15u4H_s^|NCEQmgG$8q(w7Ahdc5ilbfd9YH34 z@{P0!v#Z%rM(Vjm6JL|Y?S7?4C!9Dn)YwofB9GKm@gNT9yR($Z0iMD>=6?6X&!`+z zdQa#AuRl}IWy1G6NF(GSZ$kxLr-e`C;|Ez(A0x8+4A!ek$C{4PDL+>5!XTV2Rj z=VkTAc2oSh9?vwML)~Wcem*L{qGbK6ekPN6pdq_BW1Lx0u`7JtDOX9)lP_`3M=3$Dh&j*me<=ukUHJ`6~rsK_5flD&5u zkRQGK7GM}2xcU5D_W8AYa;SbBmO^K}PHwkBs?XF=$XKx6yfRDo9|IF>ji?CAO6(on zsH($Cy#VP)F{ry`7l`?H5D{+b6 zOi+QFbob3-K<_~O>pvn+Kbya812kE6Gs#e;{LWRpe{e~o8^k5kI%&1;3a%OlEyE2d zuN1<-+D`qB<1Ly#@ASaNxa@m7pWBR+m-G-2U&@$i+MN#swq`omL6HwbolYTxN%`d~ z->@lXkRT3)-fgU0q~s;73TO!;2K;YKMz zVc?pe{FfGFQ$#6pn@-+8Jc*)(0d&r_+HJP?4o<`@h4@7>P8z!AEV+MS40OX(k7iJ= zCEfp=Q=U1*V!mod&lMzFHT{K18LKT9rR35LrJYo`wXOH(Mu|!e7wK=LU*IVPGU1i9 z#dPt7*~n)G!Gpch)4v zCh9K9?}SAZTHM4^ryQ@0DU?-9F-q$uR9g5q74SIvN#Hj5&xz1+(u<>@?^j%7!y!TO~t4k zTb0GB9YsmvYr)zBARW`d zkg7L?-+~hk@+n@4UL)hw&Nae7%&@iSb-*8^EZZR%V?sst@lu_Vy+1dGPiUOyOET}j z65gWFGh}v^>HN2HQNWc~b6!-PUp~DN!kMmX2x&tJT0YufUC@W9(s$t2;;xl^(_IMQ zhA0gL7&dw#B-#?~4(`nW;kaHwE9k(_yR|(?n$RTEfNlN`)LAG0h=_a(_dQwfio2m! zhE%rOVxpkx3)vTxJ4?_b5?nq&cTS6&~r-Zj) zM`%Vxd|J3l9m=7aHzdP%sC}{dyZF9lpZbM{leafqgLGi;oog)9L*-$1_;O3ic=dlu z*sdzzML5#d;xi@`qS_Mt(63?Hm*937{msF?&KV_fb}#txi{9d!C0cpBv9ST-p)3&& zsW5)~FP9}&X`Fd7O1=c;NTx4x^|}bFPSw=M$_||Si+zCK4FOhE~?eh`s*VhySp&JWMP^m;wIxGhfbpDyCXUnNVwZgC0 zrF+Kk)(>VSA7;`^9b3t)5@fNO?z31?CXKuZx}Nr=8Do41dC$efht|3tm`En=e{l`{ zA$SRW+n{?nBBR=MS%e(SzG5;fq&fc|6~^1D2=TKhX))K+3r^k0?TQuAtCC7At$H}c z>ikn8bxcvwqVBeYu(oE!s0jv#HHRAhPI=L*MV9J^DJ_4$Y1alH*VWYQ=d=XH-V@n5j6=$aHjZVInjx9tE;e-{!4t$_Ae2zKIt!%K_I{)ct zX!!)jxVqg~auC3-0T1x(8BrFsK}EU(sj7s9vV=vVZZKcIw^u(#d!_P( zJSF&h%Y9T>-qGj;*#ulYbHrypGo?}ZM~KblUJe9QhU2fhj%L`CO{dsqnwHsfPF{9@ zxKF0Y_t&=0@yp*SmzZ|M*uTq3#Gsbm!)j*AdTz(Rc60_5z@t@+X0+HfqHa+zM>)M; z@?Sr~X(&U(;6nZ1^Jf3q!BEgpl>Y<&)&C`Z_WwWfe=?N+hx)&ceEToT_P^Q78p?3+ R|FZ(~Uq}9jF7*F1{XeGWX&nFn literal 0 HcmV?d00001 diff --git a/Solutions/AristaAwakeSecurity/Package/createUiDefinition.json b/Solutions/AristaAwakeSecurity/Package/createUiDefinition.json index 8a0e6b99fb5..d8f5c1b6718 100644 --- a/Solutions/AristaAwakeSecurity/Package/createUiDefinition.json +++ b/Solutions/AristaAwakeSecurity/Package/createUiDefinition.json @@ -6,7 +6,7 @@ "config": { "isWizard": false, "basics": { - "description": "\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/AristaAwakeSecurity/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe [Awake Security Arista Networks solution](https://awakesecurity.com/) for Microsoft Sentinel enable users to send detection model matches from the Awake Security Platform to Microsoft Sentinel.\n\n This solution is dependent on the Common Event Format solution containing the CEF via AMA connector to collect the logs. The CEF solution will be installed as part of this solution installation.\n\n**NOTE:** Microsoft recommends installation of CEF via AMA Connector. Legacy connector uses the Log Analytics agent which is about to be deprecated by Aug 31, 2024, and thus should only be installed where AMA is not supported. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost [more details](https://learn.microsoft.com/en-us/azure/sentinel/ama-migrate).\n\n**Data Connectors:** 1, **Workbooks:** 1, **Analytic Rules:** 3\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", + "description": "\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/AristaAwakeSecurity/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe [Awake Security Arista Networks solution](https://awakesecurity.com/) for Microsoft Sentinel enable users to send detection model matches from the Awake Security Platform to Microsoft Sentinel.\n\n This solution is dependent on the Common Event Format solution containing the CEF via AMA connector to collect the logs. The CEF solution will be installed as part of this solution installation.\n\n**NOTE:** Microsoft recommends installation of CEF via AMA Connector. Legacy connector uses the Log Analytics agent which were deprecated on **Aug 31, 2024**. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost [more details](https://learn.microsoft.com/en-us/azure/sentinel/ama-migrate).\n\n**Workbooks:** 1, **Analytic Rules:** 3\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", "subscription": { "resourceProviders": [ "Microsoft.OperationsManagement/solutions", @@ -51,30 +51,6 @@ } ], "steps": [ - { - "name": "dataconnectors", - "label": "Data Connectors", - "bladeTitle": "Data Connectors", - "elements": [ - { - "name": "dataconnectors1-text", - "type": "Microsoft.Common.TextBlock", - "options": { - "text": "This solution installs the Awake Security CEF connector which allows users to send detection model matches from the Awake Security Platform to Microsoft Sentinel. The connector also enables the creation of network security-focused custom alerts, incidents, workbooks, and notebooks that align with your existing security operations workflows. After installing the solution, configure and enable this data connector by following guidance in Manage solution view." - } - }, - { - "name": "dataconnectors-link2", - "type": "Microsoft.Common.TextBlock", - "options": { - "link": { - "label": "Learn more about connecting data sources", - "uri": "https://docs.microsoft.com/azure/sentinel/connect-data-sources" - } - } - } - ] - }, { "name": "workbooks", "label": "Workbooks", @@ -88,7 +64,7 @@ "name": "workbooks-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "The workbook installed with the Awake Security Arista Networks help’s you gain insights into the telemetry collected in Microsoft Sentinel. After installing the solution, start using the workbook in Manage solution view." + "text": "This solution installs workbook(s) to help you gain insights into the telemetry collected in Microsoft Sentinel. After installing the solution, start using the workbook in Manage solution view." } }, { diff --git a/Solutions/AristaAwakeSecurity/Package/mainTemplate.json b/Solutions/AristaAwakeSecurity/Package/mainTemplate.json index bb47c630b9b..8471695f2e7 100644 --- a/Solutions/AristaAwakeSecurity/Package/mainTemplate.json +++ b/Solutions/AristaAwakeSecurity/Package/mainTemplate.json @@ -41,38 +41,29 @@ "email": "support-security@arista.com", "_email": "[variables('email')]", "_solutionName": "AristaAwakeSecurity", - "_solutionVersion": "3.0.0", + "_solutionVersion": "3.0.1", "solutionId": "arista-networks.awake-security", "_solutionId": "[variables('solutionId')]", - "uiConfigId1": "AristaAwakeSecurity", - "_uiConfigId1": "[variables('uiConfigId1')]", - "dataConnectorContentId1": "AristaAwakeSecurity", - "_dataConnectorContentId1": "[variables('dataConnectorContentId1')]", - "dataConnectorId1": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", - "_dataConnectorId1": "[variables('dataConnectorId1')]", - "dataConnectorTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId1'))))]", - "dataConnectorVersion1": "1.0.0", - "_dataConnectorcontentProductId1": "[concat(take(variables('_solutionId'),50),'-','dc','-', uniqueString(concat(variables('_solutionId'),'-','DataConnector','-',variables('_dataConnectorContentId1'),'-', variables('dataConnectorVersion1'))))]", "analyticRuleObject1": { - "analyticRuleVersion1": "1.0.1", + "analyticRuleVersion1": "1.0.2", "_analyticRulecontentId1": "90b7ac11-dd6c-4ba1-a99b-737061873859", "analyticRuleId1": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', '90b7ac11-dd6c-4ba1-a99b-737061873859')]", "analyticRuleTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring('90b7ac11-dd6c-4ba1-a99b-737061873859')))]", - "_analyticRulecontentProductId1": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-','90b7ac11-dd6c-4ba1-a99b-737061873859','-', '1.0.1')))]" + "_analyticRulecontentProductId1": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-','90b7ac11-dd6c-4ba1-a99b-737061873859','-', '1.0.2')))]" }, "analyticRuleObject2": { - "analyticRuleVersion2": "1.0.1", + "analyticRuleVersion2": "1.0.2", "_analyticRulecontentId2": "d5e012c2-29ba-4a02-a813-37b928aafe2d", "analyticRuleId2": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', 'd5e012c2-29ba-4a02-a813-37b928aafe2d')]", "analyticRuleTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring('d5e012c2-29ba-4a02-a813-37b928aafe2d')))]", - "_analyticRulecontentProductId2": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-','d5e012c2-29ba-4a02-a813-37b928aafe2d','-', '1.0.1')))]" + "_analyticRulecontentProductId2": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-','d5e012c2-29ba-4a02-a813-37b928aafe2d','-', '1.0.2')))]" }, "analyticRuleObject3": { - "analyticRuleVersion3": "1.0.1", + "analyticRuleVersion3": "1.0.2", "_analyticRulecontentId3": "dfa3ec92-bdae-410f-b675-fe1814e4d43e", "analyticRuleId3": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', 'dfa3ec92-bdae-410f-b675-fe1814e4d43e')]", "analyticRuleTemplateSpecName3": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring('dfa3ec92-bdae-410f-b675-fe1814e4d43e')))]", - "_analyticRulecontentProductId3": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-','dfa3ec92-bdae-410f-b675-fe1814e4d43e','-', '1.0.1')))]" + "_analyticRulecontentProductId3": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-','dfa3ec92-bdae-410f-b675-fe1814e4d43e','-', '1.0.2')))]" }, "workbookVersion1": "1.0.0", "workbookContentId1": "arista-networks", @@ -84,365 +75,6 @@ "_solutioncontentProductId": "[concat(take(variables('_solutionId'),50),'-','sl','-', uniqueString(concat(variables('_solutionId'),'-','Solution','-',variables('_solutionId'),'-', variables('_solutionVersion'))))]" }, "resources": [ - { - "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", - "apiVersion": "2023-04-01-preview", - "name": "[variables('dataConnectorTemplateSpecName1')]", - "location": "[parameters('workspace-location')]", - "dependsOn": [ - "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" - ], - "properties": { - "description": "AristaAwakeSecurity data connector with template version 3.0.0", - "mainTemplate": { - "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", - "contentVersion": "[variables('dataConnectorVersion1')]", - "parameters": {}, - "variables": {}, - "resources": [ - { - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',variables('_dataConnectorContentId1'))]", - "apiVersion": "2021-03-01-preview", - "type": "Microsoft.OperationalInsights/workspaces/providers/dataConnectors", - "location": "[parameters('workspace-location')]", - "kind": "GenericUI", - "properties": { - "connectorUiConfig": { - "id": "[variables('_uiConfigId1')]", - "title": "[Deprecated] Awake Security via Legacy Agent", - "publisher": "Arista Networks", - "descriptionMarkdown": "The Awake Security CEF connector allows users to send detection model matches from the Awake Security Platform to Microsoft Sentinel. Remediate threats quickly with the power of network detection and response and speed up investigations with deep visibility especially into unmanaged entities including users, devices and applications on your network. The connector also enables the creation of network security-focused custom alerts, incidents, workbooks and notebooks that align with your existing security operations workflows. ", - "graphQueries": [ - { - "metricName": "Total data received", - "legend": "AwakeSecurity", - "baseQuery": "CommonSecurityLog\n| where DeviceVendor == \"Arista Networks\"\n| where DeviceProduct == \"Awake Security\"" - } - ], - "sampleQueries": [ - { - "description": "Top 5 Adversarial Model Matches by Severity", - "query": "union CommonSecurityLog\n| where DeviceVendor == \"Arista Networks\" and DeviceProduct == \"Awake Security\"\n| summarize TotalActivities=sum(EventCount) by Activity,LogSeverity\n| top 5 by LogSeverity desc" - }, - { - "description": "Top 5 Devices by Device Risk Score", - "query": "CommonSecurityLog\r\n| where DeviceVendor == \"Arista Networks\" and DeviceProduct == \"Awake Security\"\r\n| extend DeviceCustomNumber1 = coalesce(column_ifexists(\"FieldDeviceCustomNumber1\", long(null)), DeviceCustomNumber1, long(null))\r\n| summarize MaxDeviceRiskScore=max(DeviceCustomNumber1),TimesAlerted=count() by SourceHostName=coalesce(SourceHostName,\"Unknown\")\r\n| top 5 by MaxDeviceRiskScore desc" - } - ], - "dataTypes": [ - { - "name": "CommonSecurityLog (AwakeSecurity)", - "lastDataReceivedQuery": "CommonSecurityLog\n| where DeviceVendor == \"Arista Networks\"\n| where DeviceProduct == \"Awake Security\"\n| summarize Time = max(TimeGenerated)\n| where isnotempty(Time)" - } - ], - "connectivityCriterias": [ - { - "type": "IsConnectedQuery", - "value": [ - "CommonSecurityLog\n| where DeviceVendor == \"Arista Networks\"\n| where DeviceProduct == \"Awake Security\"\n| summarize LastLogReceived = max(TimeGenerated)\n| project IsConnected = LastLogReceived > ago(30d)" - ] - } - ], - "availability": { - "status": 1, - "isPreview": false - }, - "permissions": { - "resourceProvider": [ - { - "provider": "Microsoft.OperationalInsights/workspaces", - "permissionsDisplayText": "read and write permissions are required.", - "providerDisplayName": "Workspace", - "scope": "Workspace", - "requiredPermissions": { - "read": true, - "write": true, - "delete": true - } - }, - { - "provider": "Microsoft.OperationalInsights/workspaces/sharedKeys", - "permissionsDisplayText": "read permissions to shared keys for the workspace are required. [See the documentation to learn more about workspace keys](https://docs.microsoft.com/azure/azure-monitor/platform/agent-windows#obtain-workspace-id-and-key).", - "providerDisplayName": "Keys", - "scope": "Workspace", - "requiredPermissions": { - "action": true - } - } - ] - }, - "instructionSteps": [ - { - "description": "Install and configure the Linux agent to collect your Common Event Format (CEF) Syslog messages and forward them to Microsoft Sentinel.\n\n> Notice that the data from all regions will be stored in the selected workspace", - "innerSteps": [ - { - "title": "1.1 Select or create a Linux machine", - "description": "Select or create a Linux machine that Microsoft Sentinel will use as the proxy between your security solution and Microsoft Sentinel this machine can be on your on-prem environment, Azure or other clouds." - }, - { - "title": "1.2 Install the CEF collector on the Linux machine", - "description": "Install the Microsoft Monitoring Agent on your Linux machine and configure the machine to listen on the necessary port and forward messages to your Microsoft Sentinel workspace. The CEF collector collects CEF messages on port 514 TCP.\n\n> 1. Make sure that you have Python on your machine using the following command: python -version.\n\n> 2. You must have elevated permissions (sudo) on your machine.", - "instructions": [ - { - "parameters": { - "fillWith": [ - "WorkspaceId", - "PrimaryKey" - ], - "label": "Run the following command to install and apply the CEF collector:", - "value": "sudo wget -O cef_installer.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_installer.py&&sudo python cef_installer.py {0} {1}" - }, - "type": "CopyableLabel" - } - ] - } - ], - "title": "1. Linux Syslog agent configuration" - }, - { - "description": "Perform the following steps to forward Awake Adversarial Model match results to a CEF collector listening on TCP port **514** at IP **192.168.0.1**:\n- Navigate to the Detection Management Skills page in the Awake UI.\n- Click + Add New Skill.\n- Set the Expression field to,\n>integrations.cef.tcp { destination: \"192.168.0.1\", port: 514, secure: false, severity: Warning }\n- Set the Title field to a descriptive name like,\n>Forward Awake Adversarial Model match result to Microsoft Sentinel.\n- Set the Reference Identifier to something easily discoverable like,\n>integrations.cef.sentinel-forwarder\n- Click Save.\n\nNote: Within a few minutes of saving the definition and other fields the system will begin sending new model match results to the CEF events collector as they are detected.\n\nFor more information, refer to the **Adding a Security Information and Event Management Push Integration** page from the Help Documentation in the Awake UI.", - "title": "2. Forward Awake Adversarial Model match results to a CEF collector." - }, - { - "description": "Follow the instructions to validate your connectivity:\n\nOpen Log Analytics to check if the logs are received using the CommonSecurityLog schema.\n\n>It may take about 20 minutes until the connection streams data to your workspace.\n\nIf the logs are not received, run the following connectivity validation script:\n\n> 1. Make sure that you have Python on your machine using the following command: python -version\n\n>2. You must have elevated permissions (sudo) on your machine", - "instructions": [ - { - "parameters": { - "fillWith": [ - "WorkspaceId" - ], - "label": "Run the following command to validate your connectivity:", - "value": "sudo wget -O cef_troubleshoot.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_troubleshoot.py&&sudo python cef_troubleshoot.py {0}" - }, - "type": "CopyableLabel" - } - ], - "title": "3. Validate connection" - }, - { - "description": "Make sure to configure the machine's security according to your organization's security policy\n\n\n[Learn more >](https://aka.ms/SecureCEF)", - "title": "4. Secure your machine " - } - ], - "metadata": { - "id": "69203ebb-3834-43bf-9cdd-2936c4e6ae79", - "version": "1.0.0", - "kind": "dataConnector", - "source": { - "kind": "solution", - "name": "Awake Security" - }, - "author": { - "name": "Awake Security" - }, - "support": { - "tier": "developer", - "name": "Arista - Awake Security", - "email": "support-security@arista.com", - "link": "https://awakesecurity.com/" - } - } - } - } - }, - { - "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2023-04-01-preview", - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId1'),'/'))))]", - "properties": { - "parentId": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", - "contentId": "[variables('_dataConnectorContentId1')]", - "kind": "DataConnector", - "version": "[variables('dataConnectorVersion1')]", - "source": { - "kind": "Solution", - "name": "AristaAwakeSecurity", - "sourceId": "[variables('_solutionId')]" - }, - "author": { - "name": "Arista Networks", - "email": "[variables('_email')]" - }, - "support": { - "name": "Arista - Awake Security", - "email": "support-security@arista.com", - "tier": "Partner", - "link": "https://awakesecurity.com/" - } - } - } - ] - }, - "packageKind": "Solution", - "packageVersion": "[variables('_solutionVersion')]", - "packageName": "[variables('_solutionName')]", - "packageId": "[variables('_solutionId')]", - "contentSchemaVersion": "3.0.0", - "contentId": "[variables('_dataConnectorContentId1')]", - "contentKind": "DataConnector", - "displayName": "[Deprecated] Awake Security via Legacy Agent", - "contentProductId": "[variables('_dataConnectorcontentProductId1')]", - "id": "[variables('_dataConnectorcontentProductId1')]", - "version": "[variables('dataConnectorVersion1')]" - } - }, - { - "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2023-04-01-preview", - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId1'),'/'))))]", - "dependsOn": [ - "[variables('_dataConnectorId1')]" - ], - "location": "[parameters('workspace-location')]", - "properties": { - "parentId": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", - "contentId": "[variables('_dataConnectorContentId1')]", - "kind": "DataConnector", - "version": "[variables('dataConnectorVersion1')]", - "source": { - "kind": "Solution", - "name": "AristaAwakeSecurity", - "sourceId": "[variables('_solutionId')]" - }, - "author": { - "name": "Arista Networks", - "email": "[variables('_email')]" - }, - "support": { - "name": "Arista - Awake Security", - "email": "support-security@arista.com", - "tier": "Partner", - "link": "https://awakesecurity.com/" - } - } - }, - { - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',variables('_dataConnectorContentId1'))]", - "apiVersion": "2021-03-01-preview", - "type": "Microsoft.OperationalInsights/workspaces/providers/dataConnectors", - "location": "[parameters('workspace-location')]", - "kind": "GenericUI", - "properties": { - "connectorUiConfig": { - "title": "[Deprecated] Awake Security via Legacy Agent", - "publisher": "Arista Networks", - "descriptionMarkdown": "The Awake Security CEF connector allows users to send detection model matches from the Awake Security Platform to Microsoft Sentinel. Remediate threats quickly with the power of network detection and response and speed up investigations with deep visibility especially into unmanaged entities including users, devices and applications on your network. The connector also enables the creation of network security-focused custom alerts, incidents, workbooks and notebooks that align with your existing security operations workflows. ", - "graphQueries": [ - { - "metricName": "Total data received", - "legend": "AwakeSecurity", - "baseQuery": "CommonSecurityLog\n| where DeviceVendor == \"Arista Networks\"\n| where DeviceProduct == \"Awake Security\"" - } - ], - "dataTypes": [ - { - "name": "CommonSecurityLog (AwakeSecurity)", - "lastDataReceivedQuery": "CommonSecurityLog\n| where DeviceVendor == \"Arista Networks\"\n| where DeviceProduct == \"Awake Security\"\n| summarize Time = max(TimeGenerated)\n| where isnotempty(Time)" - } - ], - "connectivityCriterias": [ - { - "type": "IsConnectedQuery", - "value": [ - "CommonSecurityLog\n| where DeviceVendor == \"Arista Networks\"\n| where DeviceProduct == \"Awake Security\"\n| summarize LastLogReceived = max(TimeGenerated)\n| project IsConnected = LastLogReceived > ago(30d)" - ] - } - ], - "sampleQueries": [ - { - "description": "Top 5 Adversarial Model Matches by Severity", - "query": "union CommonSecurityLog\n| where DeviceVendor == \"Arista Networks\" and DeviceProduct == \"Awake Security\"\n| summarize TotalActivities=sum(EventCount) by Activity,LogSeverity\n| top 5 by LogSeverity desc" - }, - { - "description": "Top 5 Devices by Device Risk Score", - "query": "CommonSecurityLog\r\n| where DeviceVendor == \"Arista Networks\" and DeviceProduct == \"Awake Security\"\r\n| extend DeviceCustomNumber1 = coalesce(column_ifexists(\"FieldDeviceCustomNumber1\", long(null)), DeviceCustomNumber1, long(null))\r\n| summarize MaxDeviceRiskScore=max(DeviceCustomNumber1),TimesAlerted=count() by SourceHostName=coalesce(SourceHostName,\"Unknown\")\r\n| top 5 by MaxDeviceRiskScore desc" - } - ], - "availability": { - "status": 1, - "isPreview": false - }, - "permissions": { - "resourceProvider": [ - { - "provider": "Microsoft.OperationalInsights/workspaces", - "permissionsDisplayText": "read and write permissions are required.", - "providerDisplayName": "Workspace", - "scope": "Workspace", - "requiredPermissions": { - "read": true, - "write": true, - "delete": true - } - }, - { - "provider": "Microsoft.OperationalInsights/workspaces/sharedKeys", - "permissionsDisplayText": "read permissions to shared keys for the workspace are required. [See the documentation to learn more about workspace keys](https://docs.microsoft.com/azure/azure-monitor/platform/agent-windows#obtain-workspace-id-and-key).", - "providerDisplayName": "Keys", - "scope": "Workspace", - "requiredPermissions": { - "action": true - } - } - ] - }, - "instructionSteps": [ - { - "description": "Install and configure the Linux agent to collect your Common Event Format (CEF) Syslog messages and forward them to Microsoft Sentinel.\n\n> Notice that the data from all regions will be stored in the selected workspace", - "innerSteps": [ - { - "title": "1.1 Select or create a Linux machine", - "description": "Select or create a Linux machine that Microsoft Sentinel will use as the proxy between your security solution and Microsoft Sentinel this machine can be on your on-prem environment, Azure or other clouds." - }, - { - "title": "1.2 Install the CEF collector on the Linux machine", - "description": "Install the Microsoft Monitoring Agent on your Linux machine and configure the machine to listen on the necessary port and forward messages to your Microsoft Sentinel workspace. The CEF collector collects CEF messages on port 514 TCP.\n\n> 1. Make sure that you have Python on your machine using the following command: python -version.\n\n> 2. You must have elevated permissions (sudo) on your machine.", - "instructions": [ - { - "parameters": { - "fillWith": [ - "WorkspaceId", - "PrimaryKey" - ], - "label": "Run the following command to install and apply the CEF collector:", - "value": "sudo wget -O cef_installer.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_installer.py&&sudo python cef_installer.py {0} {1}" - }, - "type": "CopyableLabel" - } - ] - } - ], - "title": "1. Linux Syslog agent configuration" - }, - { - "description": "Perform the following steps to forward Awake Adversarial Model match results to a CEF collector listening on TCP port **514** at IP **192.168.0.1**:\n- Navigate to the Detection Management Skills page in the Awake UI.\n- Click + Add New Skill.\n- Set the Expression field to,\n>integrations.cef.tcp { destination: \"192.168.0.1\", port: 514, secure: false, severity: Warning }\n- Set the Title field to a descriptive name like,\n>Forward Awake Adversarial Model match result to Microsoft Sentinel.\n- Set the Reference Identifier to something easily discoverable like,\n>integrations.cef.sentinel-forwarder\n- Click Save.\n\nNote: Within a few minutes of saving the definition and other fields the system will begin sending new model match results to the CEF events collector as they are detected.\n\nFor more information, refer to the **Adding a Security Information and Event Management Push Integration** page from the Help Documentation in the Awake UI.", - "title": "2. Forward Awake Adversarial Model match results to a CEF collector." - }, - { - "description": "Follow the instructions to validate your connectivity:\n\nOpen Log Analytics to check if the logs are received using the CommonSecurityLog schema.\n\n>It may take about 20 minutes until the connection streams data to your workspace.\n\nIf the logs are not received, run the following connectivity validation script:\n\n> 1. Make sure that you have Python on your machine using the following command: python -version\n\n>2. You must have elevated permissions (sudo) on your machine", - "instructions": [ - { - "parameters": { - "fillWith": [ - "WorkspaceId" - ], - "label": "Run the following command to validate your connectivity:", - "value": "sudo wget -O cef_troubleshoot.py https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/DataConnectors/CEF/cef_troubleshoot.py&&sudo python cef_troubleshoot.py {0}" - }, - "type": "CopyableLabel" - } - ], - "title": "3. Validate connection" - }, - { - "description": "Make sure to configure the machine's security according to your organization's security policy\n\n\n[Learn more >](https://aka.ms/SecureCEF)", - "title": "4. Secure your machine " - } - ], - "id": "[variables('_uiConfigId1')]" - } - } - }, { "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", "apiVersion": "2023-04-01-preview", @@ -452,7 +84,7 @@ "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "HighMatchCountsByDevice_AnalyticalRules Analytics Rule with template version 3.0.0", + "description": "HighMatchCountsByDevice_AnalyticalRules Analytics Rule with template version 3.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('analyticRuleObject1').analyticRuleVersion1]", @@ -479,12 +111,6 @@ "triggerThreshold": 0, "status": "Available", "requiredDataConnectors": [ - { - "connectorId": "AristaAwakeSecurity", - "dataTypes": [ - "CommonSecurityLog (AwakeSecurity)" - ] - }, { "connectorId": "CefAma", "dataTypes": [ @@ -496,8 +122,8 @@ { "fieldMappings": [ { - "identifier": "HostName", - "columnName": "SourceHostName" + "columnName": "SourceHostName", + "identifier": "HostName" } ], "entityType": "Host" @@ -505,8 +131,8 @@ { "fieldMappings": [ { - "identifier": "Address", - "columnName": "SourceIPs" + "columnName": "SourceIPs", + "identifier": "Address" } ], "entityType": "IP" @@ -516,32 +142,32 @@ "aggregationKind": "AlertPerResult" }, "customDetails": { - "Matches_Max_Severity": "MaxSeverity", - "Device": "SourceHostName", + "Matches_ASP_URLs": "ASPMatchURLs", "Matches_Dest_IPs": "DestinationIPs", - "Matched_Models": "Models", "Matches_Count": "ModelMatchCount", - "Matches_ASP_URLs": "ASPMatchURLs" + "Device": "SourceHostName", + "Matches_Max_Severity": "MaxSeverity", + "Matched_Models": "Models" }, "alertDetailsOverride": { - "alertSeverityColumnName": "SeverityName", "alertDescriptionFormat": "The following Awake model(s):\n\n{{Models}}\n\nmatched {{ModelMatchCount}} activities, an unexpectedly large number. The destination IPs associated with these matches were:\n\n{{DestinationIPs}}", - "alertDisplayNameFormat": "Awake Security - High Model Match Counts On Device {{SourceHostName}}" + "alertDisplayNameFormat": "Awake Security - High Model Match Counts On Device {{SourceHostName}}", + "alertSeverityColumnName": "SeverityName" }, "incidentConfiguration": { - "createIncident": true, "groupingConfiguration": { - "reopenClosedIncident": true, + "enabled": true, "lookbackDuration": "3d", + "groupByEntities": [ + "Host" + ], "matchingMethod": "Selected", - "enabled": true, "groupByCustomDetails": [ "Device" ], - "groupByEntities": [ - "Host" - ] - } + "reopenClosedIncident": true + }, + "createIncident": true } } }, @@ -596,7 +222,7 @@ "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "HighSeverityMatchesByDevice_AnalyticalRules Analytics Rule with template version 3.0.0", + "description": "HighSeverityMatchesByDevice_AnalyticalRules Analytics Rule with template version 3.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('analyticRuleObject2').analyticRuleVersion2]", @@ -623,12 +249,6 @@ "triggerThreshold": 0, "status": "Available", "requiredDataConnectors": [ - { - "connectorId": "AristaAwakeSecurity", - "dataTypes": [ - "CommonSecurityLog (AwakeSecurity)" - ] - }, { "connectorId": "CefAma", "dataTypes": [ @@ -640,8 +260,8 @@ { "fieldMappings": [ { - "identifier": "HostName", - "columnName": "SourceHostName" + "columnName": "SourceHostName", + "identifier": "HostName" } ], "entityType": "Host" @@ -649,8 +269,8 @@ { "fieldMappings": [ { - "identifier": "Address", - "columnName": "SourceIPs" + "columnName": "SourceIPs", + "identifier": "Address" } ], "entityType": "IP" @@ -660,32 +280,32 @@ "aggregationKind": "AlertPerResult" }, "customDetails": { - "Matches_Max_Severity": "MaxSeverity", - "Device": "SourceHostName", + "Matches_ASP_URLs": "ASPMatchURLs", "Matches_Dest_IPs": "DestinationIPs", - "Matched_Models": "Models", "Matches_Count": "ModelMatchCount", - "Matches_ASP_URLs": "ASPMatchURLs" + "Device": "SourceHostName", + "Matches_Max_Severity": "MaxSeverity", + "Matched_Models": "Models" }, "alertDetailsOverride": { - "alertSeverityColumnName": "MaxSeverity", "alertDescriptionFormat": "Device {{SourceHostName}} matched the following high-severity Awake model(s):\n\n{{Models}}\n\nThe destination IPs associated with these matches were:\n\n{{DestinationIPs}}\n", - "alertDisplayNameFormat": "Awake Security - High Severity Matches On Device {{SourceHostName}}" + "alertDisplayNameFormat": "Awake Security - High Severity Matches On Device {{SourceHostName}}", + "alertSeverityColumnName": "MaxSeverity" }, "incidentConfiguration": { - "createIncident": true, "groupingConfiguration": { - "reopenClosedIncident": true, + "enabled": true, "lookbackDuration": "3d", + "groupByEntities": [ + "Host" + ], "matchingMethod": "Selected", - "enabled": true, "groupByCustomDetails": [ "Device" ], - "groupByEntities": [ - "Host" - ] - } + "reopenClosedIncident": true + }, + "createIncident": true } } }, @@ -740,7 +360,7 @@ "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "ModelMatchesWithMultipleDestinationsByDevice_AnalyticalRules Analytics Rule with template version 3.0.0", + "description": "ModelMatchesWithMultipleDestinationsByDevice_AnalyticalRules Analytics Rule with template version 3.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('analyticRuleObject3').analyticRuleVersion3]", @@ -767,12 +387,6 @@ "triggerThreshold": 0, "status": "Available", "requiredDataConnectors": [ - { - "connectorId": "AristaAwakeSecurity", - "dataTypes": [ - "CommonSecurityLog (AwakeSecurity)" - ] - }, { "connectorId": "CefAma", "dataTypes": [ @@ -784,8 +398,8 @@ { "fieldMappings": [ { - "identifier": "HostName", - "columnName": "SourceHostName" + "columnName": "SourceHostName", + "identifier": "HostName" } ], "entityType": "Host" @@ -793,8 +407,8 @@ { "fieldMappings": [ { - "identifier": "Address", - "columnName": "SourceIPs" + "columnName": "SourceIPs", + "identifier": "Address" } ], "entityType": "IP" @@ -804,31 +418,31 @@ "aggregationKind": "AlertPerResult" }, "customDetails": { - "Matches_Max_Severity": "MaxSeverity", - "Device": "SourceHostName", + "Matches_ASP_URLs": "ASPMatchURLs", "Matches_Dest_IPs": "DestinationIPs", - "Matched_Models": "Models", "Matches_Count": "ModelMatchCount", - "Matches_ASP_URLs": "ASPMatchURLs" + "Device": "SourceHostName", + "Matches_Max_Severity": "MaxSeverity", + "Matched_Models": "Models" }, "alertDetailsOverride": { "alertDescriptionFormat": "Device {{SourceHostName}} communicated with multiple possibly malicious destinations. The destination IPs were:\n\n{{DestinationIPs}}\n\nThe associated with Awake model(s) were:\n\n{{Models}}\n", "alertDisplayNameFormat": "Awake Security - Model Matches With Multiple Destinations On Device {{SourceHostName}}" }, "incidentConfiguration": { - "createIncident": true, "groupingConfiguration": { - "reopenClosedIncident": true, + "enabled": true, "lookbackDuration": "3d", + "groupByEntities": [ + "Host" + ], "matchingMethod": "Selected", - "enabled": true, "groupByCustomDetails": [ "Device" ], - "groupByEntities": [ - "Host" - ] - } + "reopenClosedIncident": true + }, + "createIncident": true } } }, @@ -883,7 +497,7 @@ "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "AristaAwakeSecurityWorkbook Workbook with template version 3.0.0", + "description": "AristaAwakeSecurityWorkbook Workbook with template version 3.0.1", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('workbookVersion1')]", @@ -971,12 +585,12 @@ "apiVersion": "2023-04-01-preview", "location": "[parameters('workspace-location')]", "properties": { - "version": "3.0.0", + "version": "3.0.1", "kind": "Solution", "contentSchemaVersion": "3.0.0", "displayName": "AristaAwakeSecurity", "publisherDisplayName": "Arista - Awake Security", - "descriptionHtml": "

Note: Please refer to the following before installing the solution:

\n

• Review the solution Release Notes

\n

• There may be known issues pertaining to this Solution, please refer to them before installing.

\n

The Awake Security Arista Networks solution for Microsoft Sentinel enable users to send detection model matches from the Awake Security Platform to Microsoft Sentinel.

\n

This solution is dependent on the Common Event Format solution containing the CEF via AMA connector to collect the logs. The CEF solution will be installed as part of this solution installation.

\n

NOTE: Microsoft recommends installation of CEF via AMA Connector. Legacy connector uses the Log Analytics agent which is about to be deprecated by Aug 31, 2024, and thus should only be installed where AMA is not supported. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost more details.

\n

Data Connectors: 1, Workbooks: 1, Analytic Rules: 3

\n

Learn more about Microsoft Sentinel | Learn more about Solutions

\n", + "descriptionHtml": "

Note: Please refer to the following before installing the solution:

\n

• Review the solution Release Notes

\n

• There may be known issues pertaining to this Solution, please refer to them before installing.

\n

The Awake Security Arista Networks solution for Microsoft Sentinel enable users to send detection model matches from the Awake Security Platform to Microsoft Sentinel.

\n

This solution is dependent on the Common Event Format solution containing the CEF via AMA connector to collect the logs. The CEF solution will be installed as part of this solution installation.

\n

NOTE: Microsoft recommends installation of CEF via AMA Connector. Legacy connector uses the Log Analytics agent which were deprecated on Aug 31, 2024. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost more details.

\n

Workbooks: 1, Analytic Rules: 3

\n

Learn more about Microsoft Sentinel | Learn more about Solutions

\n", "contentKind": "Solution", "contentProductId": "[variables('_solutioncontentProductId')]", "id": "[variables('_solutioncontentProductId')]", @@ -1000,11 +614,6 @@ }, "dependencies": { "criteria": [ - { - "kind": "DataConnector", - "contentId": "[variables('_dataConnectorContentId1')]", - "version": "[variables('dataConnectorVersion1')]" - }, { "kind": "AnalyticsRule", "contentId": "[variables('analyticRuleObject1')._analyticRulecontentId1]", diff --git a/Solutions/AristaAwakeSecurity/ReleaseNotes.md b/Solutions/AristaAwakeSecurity/ReleaseNotes.md index 0e86091779a..21180f026e0 100644 --- a/Solutions/AristaAwakeSecurity/ReleaseNotes.md +++ b/Solutions/AristaAwakeSecurity/ReleaseNotes.md @@ -1,3 +1,4 @@ | **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** | |-------------|--------------------------------|------------------------------------------------| +| 3.0.1 | 03-01-2025 | Removed Deprecated **Data connector** | | 3.0.0 | 09-07-2024 | Deprecating data connectors. | From b0e0ed2049856559a6ecb7f89b99d4430740fb69 Mon Sep 17 00:00:00 2001 From: v-rusraut Date: Fri, 3 Jan 2025 15:15:23 +0530 Subject: [PATCH 3/3] Repackage - Nasuni --- .../RansomwareAttackDetected.yaml | 5 +- .../RansomwareClientBlocked.yaml | 5 +- Solutions/Nasuni/Data/Solution_Nasuni.json | 7 +- .../Hunting Queries/FileDeleteEvents.yaml | 5 +- Solutions/Nasuni/Package/3.0.3.zip | Bin 0 -> 6756 bytes .../Nasuni/Package/createUiDefinition.json | 28 +- Solutions/Nasuni/Package/mainTemplate.json | 431 ++---------------- Solutions/Nasuni/ReleaseNotes.md | 1 + 8 files changed, 44 insertions(+), 438 deletions(-) create mode 100644 Solutions/Nasuni/Package/3.0.3.zip diff --git a/Solutions/Nasuni/Analytic Rules/RansomwareAttackDetected.yaml b/Solutions/Nasuni/Analytic Rules/RansomwareAttackDetected.yaml index c999b916d40..54bc8395551 100644 --- a/Solutions/Nasuni/Analytic Rules/RansomwareAttackDetected.yaml +++ b/Solutions/Nasuni/Analytic Rules/RansomwareAttackDetected.yaml @@ -4,9 +4,6 @@ description: 'Identifies ransomware attacks detected by the Ransomware Protectio kind: Scheduled severity: High requiredDataConnectors: - - connectorId: NasuniEdgeAppliance - datatypes: - - Syslog - connectorId: SyslogAma datatypes: - Syslog @@ -50,4 +47,4 @@ entityMappings: columnName: pattern suppressionDuration: 5h suppressionEnabled: false -version: 1.0.2 \ No newline at end of file +version: 1.0.3 \ No newline at end of file diff --git a/Solutions/Nasuni/Analytic Rules/RansomwareClientBlocked.yaml b/Solutions/Nasuni/Analytic Rules/RansomwareClientBlocked.yaml index f8f1b03f330..5829b44d92e 100644 --- a/Solutions/Nasuni/Analytic Rules/RansomwareClientBlocked.yaml +++ b/Solutions/Nasuni/Analytic Rules/RansomwareClientBlocked.yaml @@ -4,9 +4,6 @@ description: 'Identifies malicious clients blocked by the Ransomware Protection kind: Scheduled severity: High requiredDataConnectors: - - connectorId: NasuniEdgeAppliance - datatypes: - - Syslog - connectorId: SyslogAma datatypes: - Syslog @@ -47,4 +44,4 @@ entityMappings: columnName: SrcIpAddr suppressionDuration: 5h suppressionEnabled: false -version: 1.0.2 \ No newline at end of file +version: 1.0.3 \ No newline at end of file diff --git a/Solutions/Nasuni/Data/Solution_Nasuni.json b/Solutions/Nasuni/Data/Solution_Nasuni.json index 60a20dceba6..db0105f1161 100644 --- a/Solutions/Nasuni/Data/Solution_Nasuni.json +++ b/Solutions/Nasuni/Data/Solution_Nasuni.json @@ -2,7 +2,7 @@ "Name": "Nasuni", "Author": "Nasuni - support@nasuni.com", "Logo": "", - "Description": "The [Nasuni](https://www.nasuni.com) solution for Microsoft Sentinel allows you to analyze Nasuni audit events and Notifications collected via Syslog. It includes analytics rules to automatically generate Incidents when a ransomware attack is detected and perform appropriate entity mapping. \n\n This solution is dependent on the Syslog solution containing the Syslog via AMA connector to collect the logs. The Syslog solution will be installed as part of this solution installation. \n\n **NOTE**: Microsoft recommends installation of Syslog via AMA Connector. Legacy connector uses the Log Analytics agent which is about to be deprecated by **Aug 31, 2024**. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost [more details](https://learn.microsoft.com/en-us/azure/sentinel/ama-migrate).", + "Description": "The [Nasuni](https://www.nasuni.com) solution for Microsoft Sentinel allows you to analyze Nasuni audit events and Notifications collected via Syslog. It includes analytics rules to automatically generate Incidents when a ransomware attack is detected and perform appropriate entity mapping. \n\n This solution is dependent on the Syslog solution containing the Syslog via AMA connector to collect the logs. The Syslog solution will be installed as part of this solution installation. \n\n **NOTE**: Microsoft recommends installation of Syslog via AMA Connector. Legacy connector uses the Log Analytics agent which were deprecated on **Aug 31, 2024.** Using MMA and AMA on same machine can cause log duplication and extra ingestion cost [more details](https://learn.microsoft.com/en-us/azure/sentinel/ama-migrate).", "Analytic Rules": [ "/Nasuni/Analytic Rules/RansomwareClientBlocked.yaml", "/Nasuni/Analytic Rules/RansomwareAttackDetected.yaml" @@ -10,14 +10,11 @@ "Hunting Queries": [ "/Nasuni/Hunting Queries/FileDeleteEvents.yaml" ], - "Data Connectors": [ - "/Nasuni/Data Connectors/Nasuni Data Connector.json" - ], "dependentDomainSolutionIds": [ "azuresentinel.azure-sentinel-solution-syslog" ], "BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions", - "Version": "3.0.2", + "Version": "3.0.3", "Metadata": "SolutionMetadata.json", "TemplateSpec": true, "Is1PConnector": false diff --git a/Solutions/Nasuni/Hunting Queries/FileDeleteEvents.yaml b/Solutions/Nasuni/Hunting Queries/FileDeleteEvents.yaml index 589887be5c5..b5a9ddadbf3 100644 --- a/Solutions/Nasuni/Hunting Queries/FileDeleteEvents.yaml +++ b/Solutions/Nasuni/Hunting Queries/FileDeleteEvents.yaml @@ -3,9 +3,6 @@ name: Nasuni File Delete Activity description: | 'This query looks for file delete audit events generated by a Nasuni Edge Appliance.' requiredDataConnectors: - - connectorId: NasuniEdgeAppliance - dataTypes: - - Syslog - connectorId: SyslogAma datatypes: - Syslog @@ -71,4 +68,4 @@ entityMappings: columnName: filename - identifier: Directory columnName: directorypath -version: 1.0.1 \ No newline at end of file +version: 1.0.2 \ No newline at end of file diff --git a/Solutions/Nasuni/Package/3.0.3.zip b/Solutions/Nasuni/Package/3.0.3.zip new file mode 100644 index 0000000000000000000000000000000000000000..efa28b713b5654a173505d98c182cd6e1faaff89 GIT binary patch literal 6756 zcmZ{JWl$VYmn;%AxWnM?9wZPv1a}EKI1Dm`!QBG{26qN`4ek&i*x&^B3{D_u@Bo|d zy~y0^~hpSQZYwNz1Gksu)>^XeL_$iWMnWS0_i7EXwe+yn z2PxRvfxsXSkSmzi(cKli@$nc8=pcOt7M#hbnS2y1N%{?*9dPg}TwO6ky#YJ=i%N4d z71*)k9%muA;Ymd$=r=|W4uQ!*QSNlg8b6pFw7&C8?jkw@Bn^9?e!Eg!1-XVPF|SM5 zn%lV8X|SbO4Qcv}WiS#}Uf<`KzLwTf?yzV5@Z1nAIMw`7xgie*>aV>!+BW63;jGoG z3{D#{c!u4*@N+)pib5J0^FBAsFdwU+8&kH_KhIx)-PmIc~GsW7~MTX`|WP6H1N`!{} zsNQBA-E)&6Nuw%_6;*=7gbQXueox#RI(2f&pnsgIY<<~k^Ne&WOsuO?CHyA7lb*Iw z&0!o7Z^PBkfLq;6(clcIwE-~aH;2ic)Xj9xTJ)Gdg4_)2gO@|l@M^rk2A2I|W)YTv zv=m_lgKl3`85)e?D=lMI1A39=*H{i6iOAlH4M=U6bc75h%2QwwRs+?1vybdlgW{5{ zKkX5dY6k+n$_ik86m(=}*JYg&Ii|kl_f(@ZaH9{5wlGj0Ra%Ys$^PQyPh^WGg3!HJ z$%1`^iY#&VSq53@gP$iF0qZ*HglbcPpWMZaQ4z~Fj4U9WtzDhSQ(WBlnx5|`MU2FI zvVVXH0XCXgVa2FP7jW$=V%(9IIBN*(5)c0Bdm>lCK+$=qVt?3RsHt&?!^6eRJputb z#%}3DV|x9$%suSx`cJL(ihYI^JY0PoWfyzL<3nl_D9}u)UdEmVPH*LO=`VvG3ad9P znHB~%O4BAR!)M`!Qbm8+S)+Au z1`g@mIE$%UaT=q>ZwGSYR!^CD>t@N^`+t7Ar>)TlG?PAS#Hz$FJhH9r>y+n~<1b+` z>-En7T7HGX4}OQuaFQ;+LQOlC>7H?ntbmjr)~WZeMxKtu$t9MUE~I(tsDf2Dyc0*r zD+{SCSe;7g)P_+lS&di%2eeIVQU79rX~^75Y4aFAw~h5_^Rfr~x(qz-?=;{V)nEs& zg}vU(j$-$J!u^F~6D=uAdh1V_9ImIPi22%vZ};sunK6t0-!>g{-1i^4M&h+MRj9-h z-Y=k?X!mr^oHdU%@jRK~1wR{8K`c*L+-#dGzGa4lgv9q?*HNn)1x~zJ#fRYyeC&JL*>`-H3<4$TW29r5 zr)H&Y<1EIsmQph;I4ZFUP7M;D6z+r)-1bgUX2o!@qo_#`0%C{gef={)!u#kn5BZyu z<0>FOYBg`ac7}iZJtA7)N#e;BGc2^3(Jf$xfI@)1=kVw6n!bSj+^OzxLMB0P$3Z;1 zO^1DPb+0oi+K}tOX-#-rDH*~m-hpYcq(nsf$l+H1M&=gQBjh^||J25$?hR)0<5m4~ z>RE`|uMe*u+uqCqRBQ3&ik^@tj?AcdOy^cN=cY<5PFvG{F#*va`3pznYbUL9RzLk} zK>NO2G`+&<EcyY=^;x*ZaYe18t@muOr- zJwmT&j-n*uC2k_FNSwz%br*yZ&k0#E$%KU+FU*8g%-- z$*fGJYbj=>l@oNEcg>&2up8Srn-ciO-&wo>o!mkD_Utu0NTT_T?djqOlNi?D)QGTF zmoH3QAklp8QZJ8}{8D{#3k?jiIn-qLC$tqBGB0o1=IS>44Ex*CsqKq)8snVH`(>?R z9&_VzEc-tp^L~ajsjl^W4n=b~Ty66#_|mGJyw8;%gwocy&*Hl#QTy7jarQTON<_TQ zff_vy&lq$9_woGD%Vj;b^+V$rplGr`QzO8g3-FeyZmFT>fx<&6djzv+g`w8Z#4U3h zKj;Nj>%Zv_d-G`)03i}mx-}BgKR|M^1cCKzT|PPgQz8FPdHk0A4OtUQera>uLN4v% zGHNPg9tXN{!s|q*)Vhh;dY6SvJR3AoQxXT?yoX@U(5f%$-*VqNJTk9A@rhDpVj!?_ z+r?}>D4Iwo;3@JHeK6tM3k^eU@WFG0I_Q`Kq#mJkKWDB9^(YrEvlg*!IQ#*;it~K3 zsmj0DEcoX6^V+-n*?`XilsZ9h3R9np#$J2^Xl@5Pxu~E75xw@gVH)?z98|KeUK@G& zbHza{T!12e7mdoV;4Yvn_$pAwH37~SqcH*@awCcaT;YHGaY z=>4R-B*hNcErYcrTqr*A<+T!VE9&3$NVF&$`XF3(fCq&hL!)o0i1CA2y5BKqO$f zTfWBJwa;;#WxxD4W?e%rSWZp@B|TD929nC6i}k#pNJ4D<`Ap(^Bv*Tyam?;Amwb11 z`vEB(w8cjmJl%Kz1$X<~@rpccU=MmTt67)dOGvI5ODSNxI(Xs zYPCE-3uA0YChX=Z{9UIihI#!Ges^wv(9d@(Qex+MuZo`t{ReKm+HSekL>Qrk(UK$m zid|a1w{iErWM5X?Cca-NoNrnV3Wi>(-R=KY{{fcUB7#%DMqe-*3(z}A|DD(hAf^3r z>fGwD+V1RHm;HNo!pSu(EO;vGG9UW6`cQ8Xp)&?bf7RjYVNJ$(_-3s>&ep+Xd>>4g z<>=Z9T1*cn7+TBPR^O?}#V~(VroT zP;@c|4Wv--+}%mLr%#${F9%7{MPjrzJNG$~Y_1`LZ*H^5|J*8WPEGZv-@bxPuK{SN zPi`@s>)Tv&>Y<0R5qEER74YPMBzc|1y5Usf#pgsUc?i0MU|et*>d3d9jB5 zmtFkDE7@9K0Un-(3tn4JXn}TNlH6T)h8u)RSCE!n-pxOrVel5y1= zH+P!YW9nDXNtJUd^XlU^(Xeo3Fm4OyR{>;U0xs2W+=l4JsKW{l2hD!)w84jWP+!5G zQc8cyNSX6#`U)p99Q9Adgev(aSt3DfZH1YsrH4?RcPn+^LK$2g#BxR580P(7Qa@RT z1|8t^omyNE?7In1>sb{(*ZZM$p{S_r>5*TC>4Gs z9&kcy6U>7tMCbDY3;Xz;=!bvC)@m zMP_s2Swj_CB*)Q;unw7^;U1H*z~N$>0K%8tkVLJ$T}fEu*~hq0oE(0>6i{|}yJ!r` zJ4;xRt;o#AJA1Ozhs7Nb7^5Joe0#{HRSV}utEM^m0KUVoZFU8YqibrLtCo} zC0Mz!OW@riM!6fVqMqJXydIrE9a>T(mZX8xX$po8f1Cx##(Ggj&Hrtq41XEv6%L)d z+DP%6(M^w3t|y5XioPcZB{+ODNH40DCr9#=f;#@P=KNsps&=XRC$P5FerCvLLa^nf zs_d6HC91N`0Wp;X)*;6Mae<&Rqr#TAAY;X-?b`ME=g)+V+k;VzxI$#q+Oj}aH=N#7 zoA}H+sd)AXy7k<7wX_h*Q!Ly4#jic zWJDKpWmp#B<3Rry@6E?B&gEg&B}={Wer|b61(X>g`bVcc|FN0*{fmlaFr_= zdq_@YV!v!1=K{;P2yE#)rkFAc*E>cZ#L3}*qOm@~{UFj~79bnf$n!EAcER$>?r`>u zP`h8`=t}Tz2|)lgVYRM-hP~YZFTzjc@I*7)&ALb@c{pd3=#*jG4GEY~rL@}ZFpd{A=6pX}5bp_@Dn4XrtfGf+VQ7JBR@ zTgXjBjB*i_+b`09t~1&49hXY-F;}9Gr~j%aSQ8>QOkW!ZRK&9HZ!mAOoIKJ2d)`5c z8wsMhy(fU5Mms`%Pt+Zwh8Kd|_~+=4GALhulzd~CGVt`Hx{j&p5p_;fNR7o+D)_Fl zWa|mSu*IF3f0wGs$JAUrr9W;mb%Lxwe_Ulyob4PB!e}aC_sH3HHa|#ebgqux#PYrB z^K4bDR@qxx>OIJXDUX5oc1&8N8MygPKz2RuP)9LZwgAMwWyWjjGx_xQ&1&+og zXKwJSwESq+w2ZU8=%LyLg2sDQgK&J=Y1eLEpC`CHjwgWLgbxH9Vc9Mn zNE=bKpMan#Xc%+(0gd(MG%8Z#aJlbNA&QSajrDy~JMe*jjhf3X48_2AYpgHXfFu-0 zzMUEe!fJw>>v^XzFn!V2mOPt(-Vx%|d^*C{rcEFlh!QjI)A&gk8}iNYqu?dtSm$ur zZUGphH{kk9#q+6raBDP{j$hjr`O zh0;IPotZl)VD&PbH8$yj`_@S@mUXNIUdT59I0@}6L$!B?RTy-+?7u193;^cMx2)I_ z#;}n%PXzT(wLQP_wcnB7k`Vjz9P9VZJSYHiumbd6yzlf}sx&WaJ9bK7!!JQXuiDz`a2j9B3Oh@rw_KRAS z9V-rCwhnuwcs>-|1W^L78I}0+jP#=Tzobgj4~@shHnqg`qJLCyz=igKuZTj(D$T^*7Pt31{Smh@WsFihu%2hu)&@(7Uni};^&Azsa@46%HuwGJUbL~JF)HEh%niI2#_ED|`UT_WIJ;#!D#Ul3C`u3l1@^fT zdmYy|h?x{=rj!+yXs=VIe=9@G1Ba5~8laL4$JjVW8W)U|BUSJXqGrxsL_XG6Ok`lx zjfB+&w_AwFN~lB9%LW~P@~YdsQ7hHJ4uK?Hf@QNP+E+}k9i(-uE6|BPvM*;zO<4?W54#M z{p<{U4=H)wX5&QRc9$o#^d37CPoCZJwW`(!!-xrVZejM%!mA^7zfdF+%ohG(PiNIF zKE{>VLZ`#0>9Lg!{p%&asIlDx|8Md`=92^ddW%Ha*E)H!{z3kNxf@&Soi#IG&1r4& z0*B2Tj)3WLHFKQ3uHluvkG{IsqmE0E72cN5))KkZR39&^*>|1toKBo{1Mae8Oj zAH~{hnX+Eo4Xr8EmrwgW0K}mbdvP|-gMtCN%;sSK}c1>D+S$4j&$nC{k> znF^GFrh_4W>0YkB?e^%sM+=cGwn3@L2e#kfb{J0lrg)bmu$Uut*H0lHKEjf8y+dg+jv&RZ!8;BVh=Sl#81I(`llmA#Cvx$wo}L9h7X@WxVilz100z?<3L4ku zk_t%;JLUL4dr8w@YudAI4AV%e>jkdu7r#K_vj@nR49ve^Ym=3fn!EeQ=AkgY3TvDWnX0}QpBS<6cS@02-#AK7+QGQr zxgw^AR>_l{mq~hgl##e92yE*TydCmBVJw!#V<{CB7MJ(RvD7E{)#BIwsU77`m(06- z$SW)!ppxO5EI14-WlG{5ebQ;^}>pWS}ysmN$nJoWvWgrwC$hOi~BrF#ILxZQBjA z+EHnjt1P=T({KcpKEg@Ck\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Nasuni/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe [Nasuni](https://www.nasuni.com) solution for Microsoft Sentinel allows you to analyze Nasuni audit events and Notifications collected via Syslog. It includes analytics rules to automatically generate Incidents when a ransomware attack is detected and perform appropriate entity mapping. \n\n This solution is dependent on the Syslog solution containing the Syslog via AMA connector to collect the logs. The Syslog solution will be installed as part of this solution installation. \n\n **NOTE**: Microsoft recommends installation of Syslog via AMA Connector. Legacy connector uses the Log Analytics agent which is about to be deprecated by **Aug 31, 2024**. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost [more details](https://learn.microsoft.com/en-us/azure/sentinel/ama-migrate).\n\n**Data Connectors:** 1, **Analytic Rules:** 2, **Hunting Queries:** 1\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", + "description": "\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Nasuni/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe [Nasuni](https://www.nasuni.com) solution for Microsoft Sentinel allows you to analyze Nasuni audit events and Notifications collected via Syslog. It includes analytics rules to automatically generate Incidents when a ransomware attack is detected and perform appropriate entity mapping. \n\n This solution is dependent on the Syslog solution containing the Syslog via AMA connector to collect the logs. The Syslog solution will be installed as part of this solution installation. \n\n **NOTE**: Microsoft recommends installation of Syslog via AMA Connector. Legacy connector uses the Log Analytics agent which were deprecated on **Aug 31, 2024.** Using MMA and AMA on same machine can cause log duplication and extra ingestion cost [more details](https://learn.microsoft.com/en-us/azure/sentinel/ama-migrate).\n\n**Analytic Rules:** 2, **Hunting Queries:** 1\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)", "subscription": { "resourceProviders": [ "Microsoft.OperationsManagement/solutions", @@ -51,30 +51,6 @@ } ], "steps": [ - { - "name": "dataconnectors", - "label": "Data Connectors", - "bladeTitle": "Data Connectors", - "elements": [ - { - "name": "dataconnectors1-text", - "type": "Microsoft.Common.TextBlock", - "options": { - "text": "This Solution installs the data connector for Nasuni. You can get Nasuni Syslog data in your Microsoft Sentinel workspace. After installing the solution, configure and enable this data connector by following guidance in Manage solution view." - } - }, - { - "name": "dataconnectors-link2", - "type": "Microsoft.Common.TextBlock", - "options": { - "link": { - "label": "Learn more about connecting data sources", - "uri": "https://docs.microsoft.com/azure/sentinel/connect-data-sources" - } - } - } - ] - }, { "name": "analytics", "label": "Analytics", @@ -162,7 +138,7 @@ "name": "huntingquery1-text", "type": "Microsoft.Common.TextBlock", "options": { - "text": "This query looks for file delete audit events generated by a Nasuni Edge Appliance. This hunting query depends on NasuniEdgeAppliance SyslogAma data connector (Syslog Syslog Parser or Table)" + "text": "This query looks for file delete audit events generated by a Nasuni Edge Appliance. This hunting query depends on SyslogAma data connector (Syslog Parser or Table)" } } ] diff --git a/Solutions/Nasuni/Package/mainTemplate.json b/Solutions/Nasuni/Package/mainTemplate.json index 4b97d08155a..cfb9927b67b 100644 --- a/Solutions/Nasuni/Package/mainTemplate.json +++ b/Solutions/Nasuni/Package/mainTemplate.json @@ -33,37 +33,28 @@ "email": "support@nasuni.com", "_email": "[variables('email')]", "_solutionName": "Nasuni", - "_solutionVersion": "3.0.2", + "_solutionVersion": "3.0.3", "solutionId": "nasunicorporation.nasuni-sentinel", "_solutionId": "[variables('solutionId')]", "analyticRuleObject1": { - "analyticRuleVersion1": "1.0.2", + "analyticRuleVersion1": "1.0.3", "_analyticRulecontentId1": "0c96a5a2-d60d-427d-8399-8df7fe8e6536", "analyticRuleId1": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', '0c96a5a2-d60d-427d-8399-8df7fe8e6536')]", "analyticRuleTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring('0c96a5a2-d60d-427d-8399-8df7fe8e6536')))]", - "_analyticRulecontentProductId1": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-','0c96a5a2-d60d-427d-8399-8df7fe8e6536','-', '1.0.2')))]" + "_analyticRulecontentProductId1": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-','0c96a5a2-d60d-427d-8399-8df7fe8e6536','-', '1.0.3')))]" }, "analyticRuleObject2": { - "analyticRuleVersion2": "1.0.2", + "analyticRuleVersion2": "1.0.3", "_analyticRulecontentId2": "6c8770fb-c854-403e-a64d-0293ba344d5f", "analyticRuleId2": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', '6c8770fb-c854-403e-a64d-0293ba344d5f')]", "analyticRuleTemplateSpecName2": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring('6c8770fb-c854-403e-a64d-0293ba344d5f')))]", - "_analyticRulecontentProductId2": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-','6c8770fb-c854-403e-a64d-0293ba344d5f','-', '1.0.2')))]" + "_analyticRulecontentProductId2": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-','6c8770fb-c854-403e-a64d-0293ba344d5f','-', '1.0.3')))]" }, "huntingQueryObject1": { - "huntingQueryVersion1": "1.0.1", + "huntingQueryVersion1": "1.0.2", "_huntingQuerycontentId1": "64a3477e-d06f-4491-86a5-6f99702e267f", "huntingQueryTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-hq-',uniquestring('64a3477e-d06f-4491-86a5-6f99702e267f')))]" }, - "uiConfigId1": "NasuniEdgeAppliance", - "_uiConfigId1": "[variables('uiConfigId1')]", - "dataConnectorContentId1": "NasuniEdgeAppliance", - "_dataConnectorContentId1": "[variables('dataConnectorContentId1')]", - "dataConnectorId1": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", - "_dataConnectorId1": "[variables('dataConnectorId1')]", - "dataConnectorTemplateSpecName1": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-dc-',uniquestring(variables('_dataConnectorContentId1'))))]", - "dataConnectorVersion1": "1.0.0", - "_dataConnectorcontentProductId1": "[concat(take(variables('_solutionId'),50),'-','dc','-', uniqueString(concat(variables('_solutionId'),'-','DataConnector','-',variables('_dataConnectorContentId1'),'-', variables('dataConnectorVersion1'))))]", "_solutioncontentProductId": "[concat(take(variables('_solutionId'),50),'-','sl','-', uniqueString(concat(variables('_solutionId'),'-','Solution','-',variables('_solutionId'),'-', variables('_solutionVersion'))))]" }, "resources": [ @@ -76,7 +67,7 @@ "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "RansomwareClientBlocked_AnalyticalRules Analytics Rule with template version 3.0.2", + "description": "RansomwareClientBlocked_AnalyticalRules Analytics Rule with template version 3.0.3", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('analyticRuleObject1').analyticRuleVersion1]", @@ -104,16 +95,10 @@ "status": "Available", "requiredDataConnectors": [ { + "connectorId": "SyslogAma", "datatypes": [ "Syslog" - ], - "connectorId": "NasuniEdgeAppliance" - }, - { - "datatypes": [ - "Syslog" - ], - "connectorId": "SyslogAma" + ] } ], "tactics": [ @@ -124,13 +109,13 @@ ], "entityMappings": [ { - "entityType": "IP", "fieldMappings": [ { "columnName": "SrcIpAddr", "identifier": "Address" } - ] + ], + "entityType": "IP" } ], "eventGroupingSettings": { @@ -140,17 +125,17 @@ "VolumeName": "volume_name" }, "alertDetailsOverride": { - "alertnameFormat": "Nasuni: Ransomware Client Blocked", - "alertDescriptionFormat": "Nasuni has blocked a client involved in a ransomware attack from accessing a Nasuni Edge Appliance at {{TimeGenerated}}" + "alertDescriptionFormat": "Nasuni has blocked a client involved in a ransomware attack from accessing a Nasuni Edge Appliance at {{TimeGenerated}}", + "alertnameFormat": "Nasuni: Ransomware Client Blocked" }, "incidentConfiguration": { - "createIncident": true, "groupingConfiguration": { - "reopenClosedIncident": false, "enabled": false, "matchingMethod": "AllEntities", - "lookbackDuration": "PT5H" - } + "lookbackDuration": "PT5H", + "reopenClosedIncident": false + }, + "createIncident": true } } }, @@ -204,7 +189,7 @@ "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "RansomwareAttackDetected_AnalyticalRules Analytics Rule with template version 3.0.2", + "description": "RansomwareAttackDetected_AnalyticalRules Analytics Rule with template version 3.0.3", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('analyticRuleObject2').analyticRuleVersion2]", @@ -232,16 +217,10 @@ "status": "Available", "requiredDataConnectors": [ { + "connectorId": "SyslogAma", "datatypes": [ "Syslog" - ], - "connectorId": "NasuniEdgeAppliance" - }, - { - "datatypes": [ - "Syslog" - ], - "connectorId": "SyslogAma" + ] } ], "tactics": [ @@ -252,13 +231,13 @@ ], "entityMappings": [ { - "entityType": "Malware", "fieldMappings": [ { "columnName": "pattern", "identifier": "Name" } - ] + ], + "entityType": "Malware" } ], "eventGroupingSettings": { @@ -268,23 +247,23 @@ "VolumeName": "volume_name" }, "alertDetailsOverride": { + "alertDescriptionFormat": "Ransomware attack detected by Nasuni at {{TimeGenerated}}.", "alertDynamicProperties": [ { - "alertProperty": "RemediationSteps", - "value": "SyslogMessage" + "value": "SyslogMessage", + "alertProperty": "RemediationSteps" } ], - "alertnameFormat": "Nasuni: Ransomware Attack Detected", - "alertDescriptionFormat": "Ransomware attack detected by Nasuni at {{TimeGenerated}}." + "alertnameFormat": "Nasuni: Ransomware Attack Detected" }, "incidentConfiguration": { - "createIncident": true, "groupingConfiguration": { - "reopenClosedIncident": false, "enabled": false, "matchingMethod": "AllEntities", - "lookbackDuration": "PT5H" - } + "lookbackDuration": "PT5H", + "reopenClosedIncident": false + }, + "createIncident": true } } }, @@ -338,7 +317,7 @@ "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" ], "properties": { - "description": "FileDeleteEvents_HuntingQueries Hunting Query with template version 3.0.2", + "description": "FileDeleteEvents_HuntingQueries Hunting Query with template version 3.0.3", "mainTemplate": { "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", "contentVersion": "[variables('huntingQueryObject1').huntingQueryVersion1]", @@ -408,342 +387,9 @@ "contentId": "[variables('huntingQueryObject1')._huntingQuerycontentId1]", "contentKind": "HuntingQuery", "displayName": "Nasuni File Delete Activity", - "contentProductId": "[concat(take(variables('_solutionId'),50),'-','hq','-', uniqueString(concat(variables('_solutionId'),'-','HuntingQuery','-',variables('huntingQueryObject1')._huntingQuerycontentId1,'-', '1.0.1')))]", - "id": "[concat(take(variables('_solutionId'),50),'-','hq','-', uniqueString(concat(variables('_solutionId'),'-','HuntingQuery','-',variables('huntingQueryObject1')._huntingQuerycontentId1,'-', '1.0.1')))]", - "version": "1.0.1" - } - }, - { - "type": "Microsoft.OperationalInsights/workspaces/providers/contentTemplates", - "apiVersion": "2023-04-01-preview", - "name": "[variables('dataConnectorTemplateSpecName1')]", - "location": "[parameters('workspace-location')]", - "dependsOn": [ - "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" - ], - "properties": { - "description": "Nasuni data connector with template version 3.0.2", - "mainTemplate": { - "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", - "contentVersion": "[variables('dataConnectorVersion1')]", - "parameters": {}, - "variables": {}, - "resources": [ - { - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',variables('_dataConnectorContentId1'))]", - "apiVersion": "2021-03-01-preview", - "type": "Microsoft.OperationalInsights/workspaces/providers/dataConnectors", - "location": "[parameters('workspace-location')]", - "kind": "GenericUI", - "properties": { - "connectorUiConfig": { - "id": "[variables('_uiConfigId1')]", - "title": "[Deprecated] Nasuni Edge Appliance", - "publisher": "Nasuni", - "descriptionMarkdown": "The [Nasuni](https://www.nasuni.com/) connector allows you to easily connect your Nasuni Edge Appliance Notifications and file system audit logs with Microsoft Sentinel. This gives you more insight into activity within your Nasuni infrastructure and improves your security operation capabilities.", - "additionalRequirementBanner": "None", - "graphQueries": [ - { - "metricName": "Total events received", - "legend": "Nasuni", - "baseQuery": "Nasuni" - } - ], - "sampleQueries": [ - { - "description": "Last 1000 generated events", - "query": "Syslog\n | top 1000 by TimeGenerated" - }, - { - "description": "All events by facility except for cron", - "query": "Syslog\n | summarize count() by Facility | where Facility != \"cron\"" - } - ], - "connectivityCriterias": [ - { - "type": "IsConnectedQuery", - "value": [ - "Syslog\n | where TimeGenerated > ago(3d)\n |take 1\n | project IsConnected = true" - ] - } - ], - "dataTypes": [ - { - "name": "Syslog", - "lastDataReceivedQuery": "Syslog\n | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" - } - ], - "availability": { - "status": 1, - "isPreview": false - }, - "permissions": { - "resourceProvider": [ - { - "provider": "Microsoft.OperationalInsights/workspaces", - "permissionsDisplayText": "write permission is required.", - "providerDisplayName": "Workspace", - "scope": "Workspace", - "requiredPermissions": { - "write": true, - "delete": true - } - } - ] - }, - "customers": [ - { - "name": "Nasuni Edge Appliances", - "description": "must be configured to export events via Syslog" - } - ], - "instructionSteps": [ - { - "description": "Typically, you should install the agent on a different computer from the one on which the logs are generated.\n\n> Syslog logs are collected only from **Linux** agents.", - "instructions": [ - { - "parameters": { - "title": "Choose where to install the agent:", - "instructionSteps": [ - { - "title": "Install agent on Azure Linux Virtual Machine", - "description": "Select the machine to install the agent on and then click **Connect**.", - "instructions": [ - { - "parameters": { - "linkType": "InstallAgentOnLinuxVirtualMachine" - }, - "type": "InstallAgent" - } - ] - }, - { - "title": "Install agent on a non-Azure Linux Machine", - "description": "Download the agent on the relevant machine and follow the instructions.", - "instructions": [ - { - "parameters": { - "linkType": "InstallAgentOnLinuxNonAzure" - }, - "type": "InstallAgent" - } - ] - } - ] - }, - "type": "InstructionStepsGroup" - } - ], - "title": "1. Install and onboard the agent for Linux" - }, - { - "description": "Follow the configuration steps below to configure your Linux machine to send Nasuni event information to Microsoft Sentinel. Refer to the [Azure Monitor Agent documenation](https://learn.microsoft.com/en-us/azure/azure-monitor/agents/agents-overview) for additional details on these steps.\nConfigure the facilities you want to collect and their severities.\n1. Select the link below to open your workspace agents configuration, and select the Syslog tab.\n2. Select Add facility and choose from the drop-down list of facilities. Repeat for all the facilities you want to add.\n3. Mark the check boxes for the desired severities for each facility.\n4. Click Apply.\n", - "instructions": [ - { - "parameters": { - "linkType": "OpenSyslogSettings" - }, - "type": "InstallAgent" - } - ], - "title": "2. Configure the logs to be collected" - }, - { - "description": "Follow the instructions in the [Nasuni Management Console Guide](https://view.highspot.com/viewer/629a633ae5b4caaf17018daa?iid=5e6fbfcbc7143309f69fcfcf) to configure Nasuni Edge Appliances to forward syslog events. Use the IP address or hostname of the Linux device running the Azure Monitor Agent in the Servers configuration field for the syslog settings.", - "title": "3. Configure Nasuni Edge Appliance settings" - } - ] - } - } - }, - { - "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2023-04-01-preview", - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId1'),'/'))))]", - "properties": { - "parentId": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", - "contentId": "[variables('_dataConnectorContentId1')]", - "kind": "DataConnector", - "version": "[variables('dataConnectorVersion1')]", - "source": { - "kind": "Solution", - "name": "Nasuni", - "sourceId": "[variables('_solutionId')]" - }, - "author": { - "name": "Nasuni", - "email": "[variables('_email')]" - }, - "support": { - "name": "Nasuni", - "tier": "Partner", - "link": "https://github.com/nasuni-labs/Azure-Sentinel" - } - } - } - ] - }, - "packageKind": "Solution", - "packageVersion": "[variables('_solutionVersion')]", - "packageName": "[variables('_solutionName')]", - "packageId": "[variables('_solutionId')]", - "contentSchemaVersion": "3.0.0", - "contentId": "[variables('_dataConnectorContentId1')]", - "contentKind": "DataConnector", - "displayName": "[Deprecated] Nasuni Edge Appliance", - "contentProductId": "[variables('_dataConnectorcontentProductId1')]", - "id": "[variables('_dataConnectorcontentProductId1')]", - "version": "[variables('dataConnectorVersion1')]" - } - }, - { - "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", - "apiVersion": "2023-04-01-preview", - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat('DataConnector-', last(split(variables('_dataConnectorId1'),'/'))))]", - "dependsOn": [ - "[variables('_dataConnectorId1')]" - ], - "location": "[parameters('workspace-location')]", - "properties": { - "parentId": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_dataConnectorContentId1'))]", - "contentId": "[variables('_dataConnectorContentId1')]", - "kind": "DataConnector", - "version": "[variables('dataConnectorVersion1')]", - "source": { - "kind": "Solution", - "name": "Nasuni", - "sourceId": "[variables('_solutionId')]" - }, - "author": { - "name": "Nasuni", - "email": "[variables('_email')]" - }, - "support": { - "name": "Nasuni", - "tier": "Partner", - "link": "https://github.com/nasuni-labs/Azure-Sentinel" - } - } - }, - { - "name": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',variables('_dataConnectorContentId1'))]", - "apiVersion": "2021-03-01-preview", - "type": "Microsoft.OperationalInsights/workspaces/providers/dataConnectors", - "location": "[parameters('workspace-location')]", - "kind": "GenericUI", - "properties": { - "connectorUiConfig": { - "title": "[Deprecated] Nasuni Edge Appliance", - "publisher": "Nasuni", - "descriptionMarkdown": "The [Nasuni](https://www.nasuni.com/) connector allows you to easily connect your Nasuni Edge Appliance Notifications and file system audit logs with Microsoft Sentinel. This gives you more insight into activity within your Nasuni infrastructure and improves your security operation capabilities.", - "graphQueries": [ - { - "metricName": "Total events received", - "legend": "Nasuni", - "baseQuery": "Nasuni" - } - ], - "dataTypes": [ - { - "name": "Syslog", - "lastDataReceivedQuery": "Syslog\n | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" - } - ], - "connectivityCriterias": [ - { - "type": "IsConnectedQuery", - "value": [ - "Syslog\n | where TimeGenerated > ago(3d)\n |take 1\n | project IsConnected = true" - ] - } - ], - "sampleQueries": [ - { - "description": "Last 1000 generated events", - "query": "Syslog\n | top 1000 by TimeGenerated" - }, - { - "description": "All events by facility except for cron", - "query": "Syslog\n | summarize count() by Facility | where Facility != \"cron\"" - } - ], - "availability": { - "status": 1, - "isPreview": false - }, - "permissions": { - "resourceProvider": [ - { - "provider": "Microsoft.OperationalInsights/workspaces", - "permissionsDisplayText": "write permission is required.", - "providerDisplayName": "Workspace", - "scope": "Workspace", - "requiredPermissions": { - "write": true, - "delete": true - } - } - ] - }, - "instructionSteps": [ - { - "description": "Typically, you should install the agent on a different computer from the one on which the logs are generated.\n\n> Syslog logs are collected only from **Linux** agents.", - "instructions": [ - { - "parameters": { - "title": "Choose where to install the agent:", - "instructionSteps": [ - { - "title": "Install agent on Azure Linux Virtual Machine", - "description": "Select the machine to install the agent on and then click **Connect**.", - "instructions": [ - { - "parameters": { - "linkType": "InstallAgentOnLinuxVirtualMachine" - }, - "type": "InstallAgent" - } - ] - }, - { - "title": "Install agent on a non-Azure Linux Machine", - "description": "Download the agent on the relevant machine and follow the instructions.", - "instructions": [ - { - "parameters": { - "linkType": "InstallAgentOnLinuxNonAzure" - }, - "type": "InstallAgent" - } - ] - } - ] - }, - "type": "InstructionStepsGroup" - } - ], - "title": "1. Install and onboard the agent for Linux" - }, - { - "description": "Follow the configuration steps below to configure your Linux machine to send Nasuni event information to Microsoft Sentinel. Refer to the [Azure Monitor Agent documenation](https://learn.microsoft.com/en-us/azure/azure-monitor/agents/agents-overview) for additional details on these steps.\nConfigure the facilities you want to collect and their severities.\n1. Select the link below to open your workspace agents configuration, and select the Syslog tab.\n2. Select Add facility and choose from the drop-down list of facilities. Repeat for all the facilities you want to add.\n3. Mark the check boxes for the desired severities for each facility.\n4. Click Apply.\n", - "instructions": [ - { - "parameters": { - "linkType": "OpenSyslogSettings" - }, - "type": "InstallAgent" - } - ], - "title": "2. Configure the logs to be collected" - }, - { - "description": "Follow the instructions in the [Nasuni Management Console Guide](https://view.highspot.com/viewer/629a633ae5b4caaf17018daa?iid=5e6fbfcbc7143309f69fcfcf) to configure Nasuni Edge Appliances to forward syslog events. Use the IP address or hostname of the Linux device running the Azure Monitor Agent in the Servers configuration field for the syslog settings.", - "title": "3. Configure Nasuni Edge Appliance settings" - } - ], - "id": "[variables('_uiConfigId1')]", - "additionalRequirementBanner": "None" - } + "contentProductId": "[concat(take(variables('_solutionId'),50),'-','hq','-', uniqueString(concat(variables('_solutionId'),'-','HuntingQuery','-',variables('huntingQueryObject1')._huntingQuerycontentId1,'-', '1.0.2')))]", + "id": "[concat(take(variables('_solutionId'),50),'-','hq','-', uniqueString(concat(variables('_solutionId'),'-','HuntingQuery','-',variables('huntingQueryObject1')._huntingQuerycontentId1,'-', '1.0.2')))]", + "version": "1.0.2" } }, { @@ -751,12 +397,12 @@ "apiVersion": "2023-04-01-preview", "location": "[parameters('workspace-location')]", "properties": { - "version": "3.0.2", + "version": "3.0.3", "kind": "Solution", "contentSchemaVersion": "3.0.0", "displayName": "Nasuni", "publisherDisplayName": "Nasuni", - "descriptionHtml": "

Note: Please refer to the following before installing the solution:

\n

• Review the solution Release Notes

\n

• There may be known issues pertaining to this Solution, please refer to them before installing.

\n

The Nasuni solution for Microsoft Sentinel allows you to analyze Nasuni audit events and Notifications collected via Syslog. It includes analytics rules to automatically generate Incidents when a ransomware attack is detected and perform appropriate entity mapping.

\n

This solution is dependent on the Syslog solution containing the Syslog via AMA connector to collect the logs. The Syslog solution will be installed as part of this solution installation.

\n

NOTE: Microsoft recommends installation of Syslog via AMA Connector. Legacy connector uses the Log Analytics agent which is about to be deprecated by Aug 31, 2024. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost more details.

\n

Data Connectors: 1, Analytic Rules: 2, Hunting Queries: 1

\n

Learn more about Microsoft Sentinel | Learn more about Solutions

\n", + "descriptionHtml": "

Note: Please refer to the following before installing the solution:

\n

• Review the solution Release Notes

\n

• There may be known issues pertaining to this Solution, please refer to them before installing.

\n

The Nasuni solution for Microsoft Sentinel allows you to analyze Nasuni audit events and Notifications collected via Syslog. It includes analytics rules to automatically generate Incidents when a ransomware attack is detected and perform appropriate entity mapping.

\n

This solution is dependent on the Syslog solution containing the Syslog via AMA connector to collect the logs. The Syslog solution will be installed as part of this solution installation.

\n

NOTE: Microsoft recommends installation of Syslog via AMA Connector. Legacy connector uses the Log Analytics agent which were deprecated on Aug 31, 2024. Using MMA and AMA on same machine can cause log duplication and extra ingestion cost more details.

\n

Analytic Rules: 2, Hunting Queries: 1

\n

Learn more about Microsoft Sentinel | Learn more about Solutions

\n", "contentKind": "Solution", "contentProductId": "[variables('_solutioncontentProductId')]", "id": "[variables('_solutioncontentProductId')]", @@ -794,11 +440,6 @@ "contentId": "[variables('huntingQueryObject1')._huntingQuerycontentId1]", "version": "[variables('huntingQueryObject1').huntingQueryVersion1]" }, - { - "kind": "DataConnector", - "contentId": "[variables('_dataConnectorContentId1')]", - "version": "[variables('dataConnectorVersion1')]" - }, { "kind": "Solution", "contentId": "azuresentinel.azure-sentinel-solution-syslog" diff --git a/Solutions/Nasuni/ReleaseNotes.md b/Solutions/Nasuni/ReleaseNotes.md index c009cd81672..a5f610794e8 100644 --- a/Solutions/Nasuni/ReleaseNotes.md +++ b/Solutions/Nasuni/ReleaseNotes.md @@ -1,5 +1,6 @@ | **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** | |-------------|--------------------------------|---------------------------------------------| +| 3.0.3 | 03-01-2025 | Removed Deprecated **Data connector** | | 3.0.2 | 18-07-2024 | Deprecating data connectors | | 3.0.1 | 02-08-2023 | Solution Id and Tier Updated | | 3.0.0 | 14-07-2023 | Initial Solution Release | \ No newline at end of file