This reverts commit c41c899b2c.
This commit is contained in:
NCsteven 2023-07-03 13:42:28 +02:00
Родитель 0d810186dc
Коммит 1bc719c26e
4 изменённых файлов: 53 добавлений и 0 удалений

Двоичные данные
Solutions/NetClean ProActive/Package/1.0.0.zip

Двоичный файл не отображается.

Двоичные данные
Solutions/NetClean ProActive/Package/2.0.0.zip

Двоичный файл не отображается.

Просмотреть файл

@ -0,0 +1,30 @@
{
"Name": "Microsoft Exchange Security - Exchange On-Premises",
"Author": "Microsoft - support@microsoft.com",
"Logo": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Azure_Sentinel.svg\"width=\"75px\"height=\"75px\">",
"Description": "The Exchange Security Audit and Configuration Insight solution analyze Exchange On-Premises configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Windows Event logs collection, including MS Exchange Management Event logs](https://learn.microsoft.com/azure/azure-monitor/agents/data-sources-windows-events)\n\nb. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)",
"Data Connectors": [
"Data Connectors/ESI-ExchangeAdminAuditLogEvents.json",
"Data Connectors/ESI-ExchangeOnPremisesCollector.json"
],
"Parsers": [
"Parsers/ExchangeAdminAuditLogs.txt",
"Parsers/ExchangeConfiguration.txt",
"Parsers/ExchangeEnvironmentList.txt"
],
"Workbooks": [
"Workbooks/Microsoft Exchange Least Privilege with RBAC.json",
"Workbooks/Microsoft Exchange Search AdminAuditLog.json",
"Workbooks/Microsoft Exchange Admin Activity.json",
"Workbooks/Microsoft Exchange Security Review.json"
],
"Analytic Rules": [
"Analytic Rules/CriticalCmdletsUsageDetection.yaml",
"Analytic Rules/ServerOrientedWithUserOrientedAdministration.yaml"
],
"BasePath": "C:\\Git Repositories\\Azure-Sentinel\\Solutions\\Microsoft Exchange Security - Exchange On-Premises\\",
"Version": "2.0.0",
"Metadata": "SolutionMetadata.json",
"TemplateSpec": true,
"Is1Pconnector": false
}

Просмотреть файл

@ -0,0 +1,23 @@
{
"Name": "Microsoft Exchange Security - Exchange Online",
"Author": "Microsoft - support@microsoft.com",
"Logo": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Azure_Sentinel.svg\"width=\"75px\"height=\"75px\">",
"Description": "The Exchange Security Audit and Configuration Insight solution analyze Exchange Online configuration and logs from a security lens to provide insights and alerts.\n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Custom logs ingestion via Data Collector REST API](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/data-collector-api?tabs=powershell)",
"Data Connectors": [
"Data Connectors/ESI-ExchangeOnlineCollector.json"
],
"Parsers": [
"Parsers/ExchangeConfiguration.txt",
"Parsers/ExchangeEnvironmentList.txt"
],
"Workbooks": [
"Workbooks/Microsoft Exchange Least Privilege with RBAC - Online.json",
"Workbooks/Microsoft Exchange Security Review - Online.json"
],
"Analytic Rules": [],
"BasePath": "C:\\Git Repositories\\Azure-Sentinel\\Solutions\\Microsoft Exchange Security - Exchange Online",
"Version": "2.0.0",
"Metadata": "SolutionMetadata.json",
"TemplateSpec": true,
"Is1Pconnector": false
}