Renamed all references of Azure to Microsoft
This commit is contained in:
Родитель
c59861fe83
Коммит
169db0f2e0
|
@ -1,8 +1,8 @@
|
|||
{
|
||||
"id": "MicrosoftAzurePurview",
|
||||
"title": "Azure Purview",
|
||||
"title": "Microsoft Purview",
|
||||
"publisher": "Microsoft",
|
||||
"descriptionMarkdown": "Connect to Azure Purview to enable data sensitivity enrichment of Microsoft Sentinel. Data classification and sensitivity label logs from Azure Purview scans can be ingested and visualized through workbooks, analytical rules, and more.",
|
||||
"descriptionMarkdown": "Connect to Microsoft Purview to enable data sensitivity enrichment of Microsoft Sentinel. Data classification and sensitivity label logs from Microsoft Purview scans can be ingested and visualized through workbooks, analytical rules, and more.",
|
||||
"graphQueries": [
|
||||
{
|
||||
"metricName": "Total data received",
|
||||
|
@ -38,7 +38,7 @@
|
|||
"resourceProvider": [
|
||||
{
|
||||
"provider": "Microsoft.OperationalInsights/workspaces",
|
||||
"permissionsDisplayText": "Azure Purview account Owner or Contributor role to set up Diagnostic Settings. Microsoft Contributor role with write permissions to enable data connector, view workbook, and create analytic rules.",
|
||||
"permissionsDisplayText": "Microsoft Purview account Owner or Contributor role to set up Diagnostic Settings. Microsoft Contributor role with write permissions to enable data connector, view workbook, and create analytic rules.",
|
||||
"providerDisplayName": "Workspace",
|
||||
"scope": "Workspace",
|
||||
"requiredPermissions": {
|
||||
|
@ -50,8 +50,8 @@
|
|||
},
|
||||
"instructionSteps": [
|
||||
{
|
||||
"title": "Connect Azure Purview to Azure Sentinel",
|
||||
"description": "Within the Azure Portal, navigate to your Purview resource:\n 1. In the search bar, search for **Purview accounts.**\n 2. Select the specific account that you would like to be set up with Sentinel.\n\nInside your Azure Purview resource:\n 3. Select **Diagnostic Settings.**\n 4. Select **+ Add diagnostic setting.**\n 5. In the **Diagnostic setting** blade:\n - Select the Log Category as **DataSensitivityLogEvent**.\n - Select **Send to Log Analytics**.\n - Chose the log destination workspace. This should be the same workspace that is used by **Azure Sentinel.**\n - Click **Save**.",
|
||||
"title": "Connect Microsoft Purview to Microsoft Sentinel",
|
||||
"description": "Within the Azure Portal, navigate to your Purview resource:\n 1. In the search bar, search for **Purview accounts.**\n 2. Select the specific account that you would like to be set up with Sentinel.\n\nInside your Microsoft Purview resource:\n 3. Select **Diagnostic Settings.**\n 4. Select **+ Add diagnostic setting.**\n 5. In the **Diagnostic setting** blade:\n - Select the Log Category as **DataSensitivityLogEvent**.\n - Select **Send to Log Analytics**.\n - Chose the log destination workspace. This should be the same workspace that is used by **Microsoft Sentinel.**\n - Click **Save**.",
|
||||
"instructions": []
|
||||
}
|
||||
]
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
{
|
||||
"id": "MicrosoftAzurePurview",
|
||||
"title": "Azure Purview",
|
||||
"title": "Microsoft Purview",
|
||||
"publisher": "Microsoft",
|
||||
"descriptionMarkdown": "Connect to Azure Purview to enable data sensitivity enrichment of Microsoft Sentinel. Data classification and sensitivity label logs from Azure Purview scans can be ingested and visualized through workbooks, analytical rules, and more.",
|
||||
"descriptionMarkdown": "Connect to Microsoft Purview to enable data sensitivity enrichment of Microsoft Sentinel. Data classification and sensitivity label logs from Microsoft Purview scans can be ingested and visualized through workbooks, analytical rules, and more.",
|
||||
"graphQueries": [
|
||||
{
|
||||
"metricName": "Total data received",
|
||||
|
@ -38,7 +38,7 @@
|
|||
"resourceProvider": [
|
||||
{
|
||||
"provider": "Microsoft.OperationalInsights/workspaces",
|
||||
"permissionsDisplayText": "Azure Purview account Owner or Contributor role to set up Diagnostic Settings. Microsoft Contributor role with write permissions to enable data connector, view workbook, and create analytic rules.",
|
||||
"permissionsDisplayText": "Microsoft Purview account Owner or Contributor role to set up Diagnostic Settings. Microsoft Contributor role with write permissions to enable data connector, view workbook, and create analytic rules.",
|
||||
"providerDisplayName": "Workspace",
|
||||
"scope": "Workspace",
|
||||
"requiredPermissions": {
|
||||
|
@ -51,8 +51,8 @@
|
|||
},
|
||||
"instructionSteps": [
|
||||
{
|
||||
"title": "Connect Azure Purview to Azure Sentinel",
|
||||
"description": "Within the Azure Portal, navigate to your Purview resource:\n 1. In the search bar, search for **Purview accounts.**\n 2. Select the specific account that you would like to be set up with Sentinel.\n\nInside your Azure Purview resource:\n 3. Select **Diagnostic Settings.**\n 4. Select **+ Add diagnostic setting.**\n 5. In the **Diagnostic setting** blade:\n - Select the Log Category as **DataSensitivityLogEvent**.\n - Select **Send to Log Analytics**.\n - Chose the log destination workspace. This should be the same workspace that is used by **Azure Sentinel.**\n - Click **Save**.",
|
||||
"title": "Connect Microsoft Purview to Microsoft Sentinel",
|
||||
"description": "Within the Azure Portal, navigate to your Purview resource:\n 1. In the search bar, search for **Purview accounts.**\n 2. Select the specific account that you would like to be set up with Sentinel.\n\nInside your Microsoft Purview resource:\n 3. Select **Diagnostic Settings.**\n 4. Select **+ Add diagnostic setting.**\n 5. In the **Diagnostic setting** blade:\n - Select the Log Category as **DataSensitivityLogEvent**.\n - Select **Send to Log Analytics**.\n - Chose the log destination workspace. This should be the same workspace that is used by **Microsoft Sentinel.**\n - Click **Save**.",
|
||||
"instructions": []
|
||||
}
|
||||
]
|
||||
|
|
|
@ -1,8 +1,8 @@
|
|||
{
|
||||
"id": "MicrosoftAzurePurview",
|
||||
"title": "Azure Purview",
|
||||
"title": "Microsoft Purview",
|
||||
"publisher": "Microsoft",
|
||||
"descriptionMarkdown": "Connect to Azure Purview. Azure Purview is a unified data governance service that helps you manage and govern your on-premises, multicloud, and software-as-a-service (SaaS) data. It creates a holistic, up-to-date map of your data landscape with automated data discovery, sensitive data classification, and end-to-end data lineage that empowers you to find valuable and trustworthy data.",
|
||||
"descriptionMarkdown": "Connect to Microsoft Purview. Microsoft Purview is a unified data governance service that helps you manage and govern your on-premises, multicloud, and software-as-a-service (SaaS) data. It creates a holistic, up-to-date map of your data landscape with automated data discovery, sensitive data classification, and end-to-end data lineage that empowers you to find valuable and trustworthy data.",
|
||||
"graphQueries": [
|
||||
{
|
||||
"metricName": "Total data received",
|
||||
|
@ -51,8 +51,8 @@
|
|||
},
|
||||
"instructionSteps": [
|
||||
{
|
||||
"title": "Connect Azure Purview to Azure Sentinel",
|
||||
"description": "Within the Azure Portal, navigate to your Purview resource:\n 1. In the search bar, search for **Purview accounts.**\n 2. Select the specific account that you would like to be set up with Sentinel.\n\nInside your Azure Purview resource:\n 3. Select **Diagnostic Settings.**\n 4. Select **+ Add diagnostic setting.**\n 5. In the **Diagnostic setting** blade:\n - Select the Log Category as **DataSensitivityLogEvent**.\n - Select **Send to Log Analytics**.\n - Chose the log destination workspace. This should be the same workspace that is used by **Azure Sentinel.**\n - Click **Save**.",
|
||||
"title": "Connect Microsoft Purview to Microsoft Sentinel",
|
||||
"description": "Within the Azure Portal, navigate to your Purview resource:\n 1. In the search bar, search for **Purview accounts.**\n 2. Select the specific account that you would like to be set up with Sentinel.\n\nInside your Microsoft Purview resource:\n 3. Select **Diagnostic Settings.**\n 4. Select **+ Add diagnostic setting.**\n 5. In the **Diagnostic setting** blade:\n - Select the Log Category as **DataSensitivityLogEvent**.\n - Select **Send to Log Analytics**.\n - Chose the log destination workspace. This should be the same workspace that is used by **Microsoft Sentinel.**\n - Click **Save**.",
|
||||
"instructions": []
|
||||
}
|
||||
]
|
||||
|
|
|
@ -1,19 +0,0 @@
|
|||
{
|
||||
"Name": "Azure Purview",
|
||||
"Author": "Nikhil Tripathi - v-ntripathi@microsoft.com",
|
||||
"Logo": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/Azure%20Purview/Data%20Connectors/Logo/AzurePurview.svg\"width=\"75px\"height=\"75px\">",
|
||||
"Description": "The Azure Purview Solution enables data sensitivity enrichment of Microsoft Sentinel. Data classification and sensitivity label logs from Azure Purview scans are ingested and visualized through workbooks, analytical rules, and more.",
|
||||
"Data Connectors": [
|
||||
"Data Connectors/AzurePurview.json"
|
||||
],
|
||||
"Workbooks": [
|
||||
"Workbooks/AzurePurview.json"
|
||||
],
|
||||
"Analytic Rules": [
|
||||
"Analytic Rules/AzurePurviewSensitiveDataDiscovered.yaml",
|
||||
"Analytic Rules/AzurePurviewSensitiveDataDiscoveredCustom.yaml"
|
||||
],
|
||||
"Metadata": "SolutionMetadata.json",
|
||||
"BasePath": "C:\\GitHub\\azure\\Solutions\\Azure Purview",
|
||||
"Version": "1.0.3"
|
||||
}
|
|
@ -1,7 +1,7 @@
|
|||
id: 7ae7e8b0-07e9-43cb-b783-b04082f09060
|
||||
name: Sensitive Data Discovered in the Last 24 Hours
|
||||
description: |
|
||||
'Identifies all classifications that have been detected on assets during a scan by Azure Purview within the last 24 hours.'
|
||||
'Identifies all classifications that have been detected on assets during a scan by Microsoft Purview within the last 24 hours.'
|
||||
severity: Informational
|
||||
requiredDataConnectors:
|
||||
- connectorId: MicrosoftAzurePurview
|
||||
|
@ -40,7 +40,7 @@ customDetails:
|
|||
PurviewAccount: PurviewAccountName
|
||||
LastScanTime: AssetLastScanTime
|
||||
alertDetailsOverride:
|
||||
alertDisplayNameFormat: 'Sensitive Data Discovered in the Last 24 Hours by Azure Purview'
|
||||
alertDescriptionFormat: 'Within the last 24 hours, Azure Purview scanned assets that contained classifications. The classifications discovered include {{Classification}}.'
|
||||
alertDisplayNameFormat: 'Sensitive Data Discovered in the Last 24 Hours by Microsoft Purview'
|
||||
alertDescriptionFormat: 'Within the last 24 hours, Microsoft Purview scanned assets that contained classifications. The classifications discovered include {{Classification}}.'
|
||||
version: 1.0.1
|
||||
kind: Scheduled
|
|
@ -1,7 +1,7 @@
|
|||
id: 79f296d9-e6e4-45dc-9ca7-1770955435fa
|
||||
name: Sensitive Data Discovered in the Last 24 Hours - Customized
|
||||
description: |
|
||||
'Customized query used to identify specific classifications and parameters that have been discovered on assets in the last 24 hours by Azure Purview. By default, the query identifies Social Security Numbers detected, but the specific classification monitored along with other data fields can be adjusted. A list of supported Azure Purview classifications can be found here: https://docs.microsoft.com/azure/purview/supported-classifications'
|
||||
'Customized query used to identify specific classifications and parameters that have been discovered on assets in the last 24 hours by Microsoft Purview. By default, the query identifies Social Security Numbers detected, but the specific classification monitored along with other data fields can be adjusted. A list of supported Microsoft Purview classifications can be found here: https://docs.microsoft.com/azure/purview/supported-classifications'
|
||||
severity: Informational
|
||||
requiredDataConnectors:
|
||||
- connectorId: MicrosoftAzurePurview
|
||||
|
@ -42,7 +42,7 @@ customDetails:
|
|||
PurviewAccount: PurviewAccountName
|
||||
LastScanTime: AssetLastScanTime
|
||||
alertDetailsOverride:
|
||||
alertDisplayNameFormat: 'Sensitive Data Discovered in the Last 24 Hours by Azure Purview'
|
||||
alertDescriptionFormat: 'Within the last 24 hours, Azure Purview scanned assets that contained classifications. The classifications discovered include {{Classification}}.'
|
||||
alertDisplayNameFormat: 'Sensitive Data Discovered in the Last 24 Hours by Microsoft Purview'
|
||||
alertDescriptionFormat: 'Within the last 24 hours, Microsoft Purview scanned assets that contained classifications. The classifications discovered include {{Classification}}.'
|
||||
version: 1.0.1
|
||||
kind: Scheduled
|
До Ширина: | Высота: | Размер: 3.9 KiB После Ширина: | Высота: | Размер: 3.9 KiB |
|
@ -1,8 +1,8 @@
|
|||
{
|
||||
"id": "MicrosoftAzurePurview",
|
||||
"title": "Azure Purview",
|
||||
"title": "Microsoft Purview",
|
||||
"publisher": "Microsoft",
|
||||
"descriptionMarkdown": "Connect to Azure Purview to enable data sensitivity enrichment of Microsoft Sentinel. Data classification and sensitivity label logs from Azure Purview scans can be ingested and visualized through workbooks, analytical rules, and more.",
|
||||
"descriptionMarkdown": "Connect to Microsoft Purview to enable data sensitivity enrichment of Microsoft Sentinel. Data classification and sensitivity label logs from Microsoft Purview scans can be ingested and visualized through workbooks, analytical rules, and more.",
|
||||
"graphQueries": [
|
||||
{
|
||||
"metricName": "Total data received",
|
||||
|
@ -38,7 +38,7 @@
|
|||
"resourceProvider": [
|
||||
{
|
||||
"provider": "Microsoft.OperationalInsights/workspaces",
|
||||
"permissionsDisplayText": "Azure Purview account Owner or Contributor role to set up Diagnostic Settings. Microsoft Contributor role with write permissions to enable data connector, view workbook, and create analytic rules.",
|
||||
"permissionsDisplayText": "Microsoft Purview account Owner or Contributor role to set up Diagnostic Settings. Microsoft Contributor role with write permissions to enable data connector, view workbook, and create analytic rules.",
|
||||
"providerDisplayName": "Workspace",
|
||||
"scope": "Workspace",
|
||||
"requiredPermissions": {
|
||||
|
@ -51,8 +51,8 @@
|
|||
},
|
||||
"instructionSteps": [
|
||||
{
|
||||
"title": "Connect Azure Purview to Azure Sentinel",
|
||||
"description": "Within the Azure Portal, navigate to your Purview resource:\n 1. In the search bar, search for **Purview accounts.**\n 2. Select the specific account that you would like to be set up with Sentinel.\n\nInside your Azure Purview resource:\n 3. Select **Diagnostic Settings.**\n 4. Select **+ Add diagnostic setting.**\n 5. In the **Diagnostic setting** blade:\n - Select the Log Category as **DataSensitivityLogEvent**.\n - Select **Send to Log Analytics**.\n - Chose the log destination workspace. This should be the same workspace that is used by **Azure Sentinel.**\n - Click **Save**.",
|
||||
"title": "Connect Microsoft Purview to Microsoft Sentinel",
|
||||
"description": "Within the Azure Portal, navigate to your Purview resource:\n 1. In the search bar, search for **Purview accounts.**\n 2. Select the specific account that you would like to be set up with Sentinel.\n\nInside your Microsoft Purview resource:\n 3. Select **Diagnostic Settings.**\n 4. Select **+ Add diagnostic setting.**\n 5. In the **Diagnostic setting** blade:\n - Select the Log Category as **DataSensitivityLogEvent**.\n - Select **Send to Log Analytics**.\n - Chose the log destination workspace. This should be the same workspace that is used by **Microsoft Sentinel.**\n - Click **Save**.",
|
||||
"instructions": []
|
||||
}
|
||||
]
|
|
@ -0,0 +1,19 @@
|
|||
{
|
||||
"Name": "Microsoft Purview",
|
||||
"Author": "Microsoft - support@microsoft.com",
|
||||
"Logo": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/Microsoft%20Purview/Data%20Connectors/Logo/MicrosoftPurview.svg\"width=\"75px\"height=\"75px\">",
|
||||
"Description": "The Microsoft Purview Solution enables data sensitivity enrichment of Microsoft Sentinel. Data classification and sensitivity label logs from Microsoft Purview scans are ingested and visualized through workbooks, analytical rules, and more.",
|
||||
"Data Connectors": [
|
||||
"Data Connectors/MicrosoftPurview.json"
|
||||
],
|
||||
"Workbooks": [
|
||||
"Workbooks/MicrosoftPurview.json"
|
||||
],
|
||||
"Analytic Rules": [
|
||||
"Analytic Rules/MicrosoftPurviewSensitiveDataDiscovered.yaml",
|
||||
"Analytic Rules/MicrosoftPurviewSensitiveDataDiscoveredCustom.yaml"
|
||||
],
|
||||
"Metadata": "SolutionMetadata.json",
|
||||
"BasePath": "C:\\GitHub\\azure\\Solutions\\Microsoft Purview",
|
||||
"Version": "1.0.3"
|
||||
}
|
|
@ -6,7 +6,7 @@
|
|||
"config": {
|
||||
"isWizard": false,
|
||||
"basics": {
|
||||
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/Azure%20Purview/Data%20Connectors/Logo/AzurePurview.svg\"width=\"75px\"height=\"75px\">\n\n**Important:** _This Microsoft Sentinel Solution is currently in public preview. This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/)._\n\n**Note:** _There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing._\n\nThe Azure Purview Solution enables data sensitivity enrichment of Microsoft Sentinel. Data classification and sensitivity label logs from Azure Purview scans are ingested and visualized through workbooks, analytical rules, and more.\n\nMicrosoft Sentinel Solutions provide a consolidated way to acquire Microsoft Sentinel content like data connectors, workbooks, analytics, and automations in your workspace with a single deployment step.\n\n**Data Connectors:** 1, **Workbooks:** 1, **Analytic Rules:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
|
||||
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/Azure%20Purview/Data%20Connectors/Logo/AzurePurview.svg\"width=\"75px\"height=\"75px\">\n\n**Important:** _This Microsoft Sentinel Solution is currently in public preview. This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/)._\n\n**Note:** _There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing._\n\nThe Microsoft Purview Solution enables data sensitivity enrichment of Microsoft Sentinel. Data classification and sensitivity label logs from Microsoft Purview scans are ingested and visualized through workbooks, analytical rules, and more.\n\nMicrosoft Sentinel Solutions provide a consolidated way to acquire Microsoft Sentinel content like data connectors, workbooks, analytics, and automations in your workspace with a single deployment step.\n\n**Data Connectors:** 1, **Workbooks:** 1, **Analytic Rules:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
|
||||
"subscription": {
|
||||
"resourceProviders": [
|
||||
"Microsoft.OperationsManagement/solutions",
|
||||
|
@ -60,7 +60,7 @@
|
|||
"name": "dataconnectors1-text",
|
||||
"type": "Microsoft.Common.TextBlock",
|
||||
"options": {
|
||||
"text": "This Solution installs the data connector for Azure Purview. You can get Azure Purview custom log data in your Azure Sentinel workspace. Configure and enable this data connector in the Data Connector gallery after this Solution deploys. This data connector creates custom log table(s) AzureDiagnostics (PurviewDataSensitivityLogs) in your Azure Sentinel / Azure Log Analytics workspace."
|
||||
"text": "This Solution installs the data connector for Microsoft Purview. You can get Microsoft Purview custom log data in your Azure Sentinel workspace. Configure and enable this data connector in the Data Connector gallery after this Solution deploys. This data connector creates custom log table(s) AzureDiagnostics (PurviewDataSensitivityLogs) in your Azure Sentinel / Azure Log Analytics workspace."
|
||||
}
|
||||
},
|
||||
{
|
||||
|
@ -108,7 +108,7 @@
|
|||
{
|
||||
"name": "workbook1",
|
||||
"type": "Microsoft.Common.Section",
|
||||
"label": "Azure Purview",
|
||||
"label": "Microsoft Purview",
|
||||
"elements": [
|
||||
{
|
||||
"name": "workbook1-text",
|
||||
|
@ -118,7 +118,7 @@
|
|||
"name": "workbook1-name",
|
||||
"type": "Microsoft.Common.TextBox",
|
||||
"label": "Display Name",
|
||||
"defaultValue": "Azure Purview",
|
||||
"defaultValue": "Microsoft Purview",
|
||||
"toolTip": "Display name for the workbook.",
|
||||
"constraints": {
|
||||
"required": true,
|
||||
|
@ -143,7 +143,7 @@
|
|||
"name": "analytics-text",
|
||||
"type": "Microsoft.Common.TextBlock",
|
||||
"options": {
|
||||
"text": "This Azure Sentinel Solution installs analytic rules for Azure Purview that you can enable for custom alert generation in Azure Sentinel. These analytic rules will be deployed in disabled mode in the analytics rules gallery of your Azure Sentinel workspace. Configure and enable these rules in the analytic rules gallery after this Solution deploys.",
|
||||
"text": "This Azure Sentinel Solution installs analytic rules for Microsoft Purview that you can enable for custom alert generation in Azure Sentinel. These analytic rules will be deployed in disabled mode in the analytics rules gallery of your Azure Sentinel workspace. Configure and enable these rules in the analytic rules gallery after this Solution deploys.",
|
||||
"link": {
|
||||
"label": "Learn more",
|
||||
"uri": "https://docs.microsoft.com/azure/sentinel/tutorial-detect-threats-custom?WT.mc_id=Portal-Microsoft_Azure_CreateUIDef"
|
||||
|
@ -159,7 +159,7 @@
|
|||
"name": "analytic1-text",
|
||||
"type": "Microsoft.Common.TextBlock",
|
||||
"options": {
|
||||
"text": "Identifies all classifications that have been detected on assets during a scan by Azure Purview within the last 24 hours."
|
||||
"text": "Identifies all classifications that have been detected on assets during a scan by Microsoft Purview within the last 24 hours."
|
||||
}
|
||||
}
|
||||
]
|
||||
|
@ -173,7 +173,7 @@
|
|||
"name": "analytic2-text",
|
||||
"type": "Microsoft.Common.TextBlock",
|
||||
"options": {
|
||||
"text": "Customized query used to identify specific classifications and parameters that have been discovered on assets in the last 24 hours by Azure Purview. By default, the query identifies Social Security Numbers detected, but the specific classification monitored along with other data fields can be adjusted. A list of supported Azure Purview classifications can be found here: https://docs.microsoft.com/azure/purview/supported-classifications"
|
||||
"text": "Customized query used to identify specific classifications and parameters that have been discovered on assets in the last 24 hours by Microsoft Purview. By default, the query identifies Social Security Numbers detected, but the specific classification monitored along with other data fields can be adjusted. A list of supported Microsoft Purview classifications can be found here: https://docs.microsoft.com/azure/purview/supported-classifications"
|
||||
}
|
||||
}
|
||||
]
|
|
@ -3,7 +3,7 @@
|
|||
"contentVersion": "1.0.0.0",
|
||||
"metadata": {
|
||||
"author": "Nikhil Tripathi - v-ntripathi@microsoft.com",
|
||||
"comments": "Solution template for Azure Purview"
|
||||
"comments": "Solution template for Microsoft Purview"
|
||||
},
|
||||
"parameters": {
|
||||
"location": {
|
||||
|
@ -49,7 +49,7 @@
|
|||
},
|
||||
"workbook1-name": {
|
||||
"type": "string",
|
||||
"defaultValue": "Azure Purview",
|
||||
"defaultValue": "Microsoft Purview",
|
||||
"minLength": 1,
|
||||
"metadata": {
|
||||
"description": "Name for the workbook"
|
|
@ -4,7 +4,7 @@
|
|||
"firstPublishDate": "2021-11-23",
|
||||
"providers": ["Microsoft"],
|
||||
"categories": {
|
||||
"domains" : ["Security – Cloud Security", "Security - Threat Protection"]
|
||||
"domains" : ["Security - Cloud Security", "Security - Threat Protection"]
|
||||
},
|
||||
"support": {
|
||||
"name": "Microsoft Corporation",
|
|
@ -122,7 +122,7 @@
|
|||
{
|
||||
"type": 1,
|
||||
"content": {
|
||||
"json": "## Azure Purview"
|
||||
"json": "## Microsoft Purview"
|
||||
},
|
||||
"name": "text - 16"
|
||||
},
|
||||
|
@ -639,7 +639,7 @@
|
|||
{
|
||||
"type": 1,
|
||||
"content": {
|
||||
"json": "__Classifications__\r\n\r\nClassifications within Azure Purview display which sensitive information resides within your organization. A list of supported classifications can be found at <a href='https://docs.microsoft.com/microsoft-365/compliance/sensitive-information-type-entity-definitions?view=o365-worldwide' target='_blank'>Sensitive Information Type Entity Definitions.</a> \r\n\r\n",
|
||||
"json": "__Classifications__\r\n\r\nClassifications within Microsoft Purview display which sensitive information resides within your organization. A list of supported classifications can be found at <a href='https://docs.microsoft.com/microsoft-365/compliance/sensitive-information-type-entity-definitions?view=o365-worldwide' target='_blank'>Sensitive Information Type Entity Definitions.</a> \r\n\r\n",
|
||||
"style": "info"
|
||||
},
|
||||
"conditionalVisibility": {
|
||||
|
@ -1025,7 +1025,7 @@
|
|||
{
|
||||
"type": 1,
|
||||
"content": {
|
||||
"json": "__Sensitivity Labels__\r\n\r\nSensitivity Labels let you classify your organization's data in order to highlight which resources contain sensitive information. Labels can be set up through Security and Compliance Center and applied in Azure Purview. <a href='https://docs.microsoft.com/azure/purview/create-sensitivity-label' target='_blank'>Learn More</a> ",
|
||||
"json": "__Sensitivity Labels__\r\n\r\nSensitivity Labels let you classify your organization's data in order to highlight which resources contain sensitive information. Labels can be set up through Security and Compliance Center and applied in Microsoft Purview. <a href='https://docs.microsoft.com/azure/purview/create-sensitivity-label' target='_blank'>Learn More</a> ",
|
||||
"style": "info"
|
||||
},
|
||||
"conditionalVisibility": {
|
||||
|
@ -1498,6 +1498,6 @@
|
|||
}
|
||||
],
|
||||
"fallbackResourceIds": [],
|
||||
"fromTemplateId": "sentinel-AzurePurview",
|
||||
"fromTemplateId": "sentinel-MicrosoftPurview",
|
||||
"$schema": "https://github.com/Microsoft/Application-Insights-Workbooks/blob/master/schema/workbook.json"
|
||||
}
|
Загрузка…
Ссылка в новой задаче