This commit is contained in:
v-sabiraj 2022-07-18 21:28:11 +05:30
Родитель e258cbf907
Коммит b33e126388
4 изменённых файлов: 32 добавлений и 30 удалений

Просмотреть файл

@ -1,4 +1,4 @@
id: 0b85a077-8ba5-4cb5-90f7-1e882afe10c4
id: 6bb50582-caac-4a9b-9afb-3fee766ebbf7
name: (Preview) GitHub - A payment method was removed
description: |
'Detect activities when a payment method was removed. This query runs every day and its severity is Medium.'

Просмотреть файл

@ -1,4 +1,4 @@
id: c3237d88-fdc4-4dee-8b90-118ded2c507c
id: f0d30d3c-e6ad-480a-90e8-1bd7cc84881b
name: GitHub First Time Invite Member and Add Member to Repo
description: |
'This hunting query identifies a user that add/invite a member to the organization for the first time. This technique can be leveraged by attackers to add stealth account access to the organization.'

Двоичные данные
Solutions/GitHub/Package/2.0.0.zip

Двоичный файл не отображается.

Просмотреть файл

@ -49,7 +49,7 @@
"_workbookContentId1": "[variables('workbookContentId1')]",
"workspaceResourceId": "[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]",
"analyticRuleVersion1": "1.0.0",
"analyticRulecontentId1": "5ccf0a4b-becb-40d7-b97b-46367475d450",
"analyticRulecontentId1": "6bb50582-caac-4a9b-9afb-3fee766ebbf7",
"_analyticRulecontentId1": "[variables('analyticRulecontentId1')]",
"analyticRuleId1": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId1'))]",
"analyticRuleTemplateSpecName1": "[concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId1')))]",
@ -109,7 +109,7 @@
"analyticRuleId12": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', variables('analyticRulecontentId12'))]",
"analyticRuleTemplateSpecName12": "[concat(parameters('workspace'),'-ar-',uniquestring(variables('_analyticRulecontentId12')))]",
"huntingQueryVersion1": "1.0.0",
"huntingQuerycontentId1": "5ccf0a4b-becb-40d7-b97b-46367475d450",
"huntingQuerycontentId1": "f0d30d3c-e6ad-480a-90e8-1bd7cc84881b",
"_huntingQuerycontentId1": "[variables('huntingQuerycontentId1')]",
"huntingQueryId1": "[resourceId('Microsoft.OperationalInsights/savedSearches', variables('_huntingQuerycontentId1'))]",
"huntingQueryTemplateSpecName1": "[concat(parameters('workspace'),'-hq-',uniquestring(variables('_huntingQuerycontentId1')))]",
@ -353,8 +353,8 @@
{
"fieldMappings": [
{
"columnName": "AccountCustomEntity",
"identifier": "FullName"
"identifier": "FullName",
"columnName": "AccountCustomEntity"
}
],
"entityType": "Account"
@ -453,8 +453,8 @@
{
"fieldMappings": [
{
"columnName": "AccountCustomEntity",
"identifier": "FullName"
"identifier": "FullName",
"columnName": "AccountCustomEntity"
}
],
"entityType": "Account"
@ -553,8 +553,8 @@
{
"fieldMappings": [
{
"columnName": "AccountCustomEntity",
"identifier": "FullName"
"identifier": "FullName",
"columnName": "AccountCustomEntity"
}
],
"entityType": "Account"
@ -653,8 +653,8 @@
{
"fieldMappings": [
{
"columnName": "AccountCustomEntity",
"identifier": "FullName"
"identifier": "FullName",
"columnName": "AccountCustomEntity"
}
],
"entityType": "Account"
@ -753,8 +753,8 @@
{
"fieldMappings": [
{
"columnName": "AccountCustomEntity",
"identifier": "FullName"
"identifier": "FullName",
"columnName": "AccountCustomEntity"
}
],
"entityType": "Account"
@ -853,8 +853,8 @@
{
"fieldMappings": [
{
"columnName": "AccountCustomEntity",
"identifier": "FullName"
"identifier": "FullName",
"columnName": "AccountCustomEntity"
}
],
"entityType": "Account"
@ -953,8 +953,8 @@
{
"fieldMappings": [
{
"columnName": "AccountCustomEntity",
"identifier": "FullName"
"identifier": "FullName",
"columnName": "AccountCustomEntity"
}
],
"entityType": "Account"
@ -1053,8 +1053,8 @@
{
"fieldMappings": [
{
"columnName": "AccountCustomEntity",
"identifier": "FullName"
"identifier": "FullName",
"columnName": "AccountCustomEntity"
}
],
"entityType": "Account"
@ -1153,8 +1153,8 @@
{
"fieldMappings": [
{
"columnName": "AccountCustomEntity",
"identifier": "FullName"
"identifier": "FullName",
"columnName": "AccountCustomEntity"
}
],
"entityType": "Account"
@ -1253,8 +1253,8 @@
{
"fieldMappings": [
{
"columnName": "AccountCustomEntity",
"identifier": "FullName"
"identifier": "FullName",
"columnName": "AccountCustomEntity"
}
],
"entityType": "Account"
@ -1353,8 +1353,8 @@
{
"fieldMappings": [
{
"columnName": "AccountCustomEntity",
"identifier": "FullName"
"identifier": "FullName",
"columnName": "AccountCustomEntity"
}
],
"entityType": "Account"
@ -1453,8 +1453,8 @@
{
"fieldMappings": [
{
"columnName": "AccountCustomEntity",
"identifier": "FullName"
"identifier": "FullName",
"columnName": "AccountCustomEntity"
}
],
"entityType": "Account"
@ -2795,6 +2795,7 @@
"kind": "APIPolling",
"properties": {
"connectorUiConfig": {
"id": "[variables('_uiConfigId1')]",
"title": "GitHub Enterprise Audit Log",
"publisher": "GitHub",
"descriptionMarkdown": "The GitHub audit log connector provides the capability to ingest GitHub logs into Azure Sentinel. By connecting GitHub audit logs into Azure Sentinel, you can view this data in workbooks, use it to create custom alerts, and improve your investigation process. \n\n **Note:** If you are intended to ingest GitHub subscribed events into Microsoft Sentinel , Please refer to GitHub (using Webhooks) Connector from \"**Data Connectors**\" gallery.",
@ -2979,6 +2980,7 @@
"kind": "APIPolling",
"properties": {
"connectorUiConfig": {
"id": "[variables('_uiConfigId1')]",
"title": "GitHub Enterprise Audit Log",
"publisher": "GitHub",
"descriptionMarkdown": "The GitHub audit log connector provides the capability to ingest GitHub logs into Azure Sentinel. By connecting GitHub audit logs into Azure Sentinel, you can view this data in workbooks, use it to create custom alerts, and improve your investigation process. \n\n **Note:** If you are intended to ingest GitHub subscribed events into Microsoft Sentinel , Please refer to GitHub (using Webhooks) Connector from \"**Data Connectors**\" gallery.",
@ -3463,7 +3465,7 @@
"description": "*Now we are done with the github Webhook configuration. Once the github events triggered and after the delay of 20 to 30 mins (As there will be a dealy for LogAnalytics to spin up the resources for the first time), you should be able to see all the transactional events from the Github into LogAnalytics workspace table called \"githubscanaudit_CL\".*\n\n For more details, Click [here](https://aka.ms/sentinel-gitHubwebhooksteps)"
}
],
"id": "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/dataConnectors', variables('_uiConfigId2'))]"
"id": "[variables('_uiConfigId2')]"
}
}
},
@ -3646,4 +3648,4 @@
}
],
"outputs": {}
}
}