Azure purview solution update.
This commit is contained in:
Родитель
15a71d3ff1
Коммит
36ea694117
|
@ -1,7 +1,7 @@
|
|||
{
|
||||
"Name": "Azure Purview Solution",
|
||||
"Name": "Azure Purview",
|
||||
"Author": "Nikhil Tripathi - v-ntripathi@microsoft.com",
|
||||
"Logo": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Workbooks/Images/Logos/Azure_Sentinel.svg\"width=\"75px\"height=\"75px\">",
|
||||
"Logo": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/Azure%20Purview/Data%20Connectors/Logo/AzurePurview.svg\"width=\"75px\"height=\"75px\">",
|
||||
"Description": "The Azure Purview Solution enables data sensitivity enrichment of Microsoft Sentinel. Data classification and sensitivity label logs from Azure Purview scans are ingested and visualized through workbooks, analytical rules, and more.",
|
||||
"Data Connectors": [
|
||||
"Data Connectors/AzurePurview.json"
|
||||
|
@ -15,5 +15,5 @@
|
|||
],
|
||||
"Metadata": "SolutionMetadata.json",
|
||||
"BasePath": "C:\\GitHub\\azure\\Solutions\\Azure Purview",
|
||||
"Version": "1.0.2"
|
||||
"Version": "1.0.3"
|
||||
}
|
Двоичный файл не отображается.
|
@ -6,7 +6,7 @@
|
|||
"config": {
|
||||
"isWizard": false,
|
||||
"basics": {
|
||||
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Workbooks/Images/Logos/Azure_Sentinel.svg\"width=\"75px\"height=\"75px\">\n\n**Important:** _This Microsoft Sentinel Solution is currently in public preview. This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/)._\n\n**Note:** _There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing._\n\nThe Azure Purview Solution enables data sensitivity enrichment of Microsoft Sentinel. Data classification and sensitivity label logs from Azure Purview scans are ingested and visualized through workbooks, analytical rules, and more.\n\nMicrosoft Sentinel Solutions provide a consolidated way to acquire Microsoft Sentinel content like data connectors, workbooks, analytics, and automations in your workspace with a single deployment step.\n\n**Data Connectors:** 1, **Workbooks:** 1, **Analytic Rules:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
|
||||
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/Azure%20Purview/Data%20Connectors/Logo/AzurePurview.svg\"width=\"75px\"height=\"75px\">\n\n**Important:** _This Microsoft Sentinel Solution is currently in public preview. This feature is provided without a service level agreement, and it's not recommended for production workloads. Certain features might not be supported or might have constrained capabilities. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/)._\n\n**Note:** _There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing._\n\nThe Azure Purview Solution enables data sensitivity enrichment of Microsoft Sentinel. Data classification and sensitivity label logs from Azure Purview scans are ingested and visualized through workbooks, analytical rules, and more.\n\nMicrosoft Sentinel Solutions provide a consolidated way to acquire Microsoft Sentinel content like data connectors, workbooks, analytics, and automations in your workspace with a single deployment step.\n\n**Data Connectors:** 1, **Workbooks:** 1, **Analytic Rules:** 2\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
|
||||
"subscription": {
|
||||
"resourceProviders": [
|
||||
"Microsoft.OperationsManagement/solutions",
|
||||
|
@ -60,7 +60,7 @@
|
|||
"name": "dataconnectors1-text",
|
||||
"type": "Microsoft.Common.TextBlock",
|
||||
"options": {
|
||||
"text": "This Solution installs the data connector for Azure Purview Solution. You can get Azure Purview Solution custom log data in your Azure Sentinel workspace. Configure and enable this data connector in the Data Connector gallery after this Solution deploys. This data connector creates custom log table(s) AzureDiagnostics (PurviewDataSensitivityLogs) in your Azure Sentinel / Azure Log Analytics workspace."
|
||||
"text": "This Solution installs the data connector for Azure Purview. You can get Azure Purview custom log data in your Azure Sentinel workspace. Configure and enable this data connector in the Data Connector gallery after this Solution deploys. This data connector creates custom log table(s) AzureDiagnostics (PurviewDataSensitivityLogs) in your Azure Sentinel / Azure Log Analytics workspace."
|
||||
}
|
||||
},
|
||||
{
|
||||
|
@ -108,7 +108,7 @@
|
|||
{
|
||||
"name": "workbook1",
|
||||
"type": "Microsoft.Common.Section",
|
||||
"label": "Azure Purview Solution",
|
||||
"label": "Azure Purview",
|
||||
"elements": [
|
||||
{
|
||||
"name": "workbook1-text",
|
||||
|
@ -118,7 +118,7 @@
|
|||
"name": "workbook1-name",
|
||||
"type": "Microsoft.Common.TextBox",
|
||||
"label": "Display Name",
|
||||
"defaultValue": "Azure Purview Solution",
|
||||
"defaultValue": "Azure Purview",
|
||||
"toolTip": "Display name for the workbook.",
|
||||
"constraints": {
|
||||
"required": true,
|
||||
|
@ -143,7 +143,7 @@
|
|||
"name": "analytics-text",
|
||||
"type": "Microsoft.Common.TextBlock",
|
||||
"options": {
|
||||
"text": "This Azure Sentinel Solution installs analytic rules for Azure Purview Solution that you can enable for custom alert generation in Azure Sentinel. These analytic rules will be deployed in disabled mode in the analytics rules gallery of your Azure Sentinel workspace. Configure and enable these rules in the analytic rules gallery after this Solution deploys.",
|
||||
"text": "This Azure Sentinel Solution installs analytic rules for Azure Purview that you can enable for custom alert generation in Azure Sentinel. These analytic rules will be deployed in disabled mode in the analytics rules gallery of your Azure Sentinel workspace. Configure and enable these rules in the analytic rules gallery after this Solution deploys.",
|
||||
"link": {
|
||||
"label": "Learn more",
|
||||
"uri": "https://docs.microsoft.com/azure/sentinel/tutorial-detect-threats-custom?WT.mc_id=Portal-Microsoft_Azure_CreateUIDef"
|
||||
|
|
Различия файлов скрыты, потому что одна или несколько строк слишком длинны
|
@ -1,43 +0,0 @@
|
|||
{
|
||||
"Name": "Cisco SEG",
|
||||
"Author": "Nikhil Tripathi - v-ntripathi@microsoft.com",
|
||||
"Logo": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/cisco-logo-72px.svg\" width=\"75px\" height=\"75px\">",
|
||||
"Description": "[Cisco Secure Email Gateway (SEG)](https://www.cisco.com/c/en/us/products/security/email-security/index.html) provides the best protection for your email against cyber threats. Secure Email's comprehensive protection for on-premises and cloud-based email stops the most common and damaging cyber threats.",
|
||||
"Analytic Rules" : [
|
||||
"Analytic Rules/CiscoSEGDLPViolation.yaml",
|
||||
"Analytic Rules/CiscoSEGMaliciousAttachmentNotBlocked.yaml",
|
||||
"Analytic Rules/CiscoSEGMultipleLargeEmails.yaml",
|
||||
"Analytic Rules/CiscoSEGMultipleSuspiciousEmails.yaml",
|
||||
"Analytic Rules/CiscoSEGPossibleOutbreak.yaml",
|
||||
"Analytic Rules/CiscoSEGPotentialLinkToMalwareDownload.yaml",
|
||||
"Analytic Rules/CiscoSEGSuspiciousLink.yaml",
|
||||
"Analytic Rules/CiscoSEGSuspiciousSenderDomain.yaml",
|
||||
"Analytic Rules/CiscoSEGUnclassifiedLink.yaml",
|
||||
"Analytic Rules/CiscoSEGUnexpextedAttachment.yaml",
|
||||
"Analytic Rules/CiscoSEGUnscannableAttachment.yaml"
|
||||
],
|
||||
"Hunting Queries" : [
|
||||
"Hunting Queries/CiscoSEGDroppedInMails.yaml",
|
||||
"Hunting Queries/CiscoSEGDroppedOutMails.yaml",
|
||||
"Hunting Queries/CiscoSEGFailedDKIMFailure.yaml",
|
||||
"Hunting Queries/CiscoSEGFailedDMARKFailure.yaml",
|
||||
"Hunting Queries/CiscoSEGFailedSPFFailure.yaml",
|
||||
"Hunting Queries/CiscoSEGFailedTLSIn.yaml",
|
||||
"Hunting Queries/CiscoSEGFailedTLSOut.yaml",
|
||||
"Hunting Queries/CiscoSEGInsecureProtocol.yaml",
|
||||
"Hunting Queries/CiscoSEGSpamMails.yaml",
|
||||
"Hunting Queries/CiscoSEGUsersReceivedSpam.yaml"
|
||||
],
|
||||
"Parsers": [
|
||||
"Parsers/CiscoSEGEvent.txt"
|
||||
],
|
||||
"Data Connectors": [
|
||||
"Data Connectors/Connector_Cisco_SEG_CEF.json"
|
||||
],
|
||||
"Workbooks" : [
|
||||
"Workbooks/CiscoSEG.json"
|
||||
],
|
||||
"Metadata": "SolutionMetadata.json",
|
||||
"BasePath": "C:\\GitHub\\azure\\Solutions\\CiscoSEG",
|
||||
"Version": "1.0.3"
|
||||
}
|
Загрузка…
Ссылка в новой задаче