Cloud-native SIEM for intelligent security analytics for your entire enterprise.
Перейти к файлу
Offir Shvartz 11ec709397 fix tests 2020-09-10 16:13:11 +03:00
.azure-pipelines move 2020-09-07 15:52:58 +03:00
.github c 2020-09-07 15:47:40 +03:00
.script fix tests 2020-09-10 16:13:11 +03:00
.vscode Added handling for templates not named azuredeploy 2020-08-20 09:11:10 -05:00
BYOML Updated library version. 2019-11-08 10:20:57 -08:00
Dashboards Revert "Revert "CyberArk 31Jul"" (#975) 2020-08-14 15:20:38 -07:00
DataConnectors make rsyslog regex more specific 2020-09-09 12:27:35 +03:00
Detections fix tests 2020-09-10 16:13:11 +03:00
Exploration Queries Fix | Exploration Queries Enhancements 2020-08-20 14:44:58 +03:00
Functions Functions to check if daylight savings in US/EU 2020-04-08 11:36:45 -07:00
Hunting Queries correct Tactics typos 2020-09-08 09:29:59 -07:00
Logos Use unique ids for orca security logo (#998) 2020-08-21 18:54:33 -07:00
Notebooks@7e51374d2d Update notebooks submodule 2020-08-03 08:59:27 -07:00
Parsers Added AdditionalFields property to the networking schema 2020-09-07 13:43:45 +03:00
Playbooks Update readme.md 2020-09-07 16:57:00 +10:00
QueryLanguageSamples Adding current items (#11) 2019-01-18 14:20:01 +00:00
Sample Data Indicator publish: 9/8/2020 5:09:54 AM 2020-09-07 22:10:01 -07:00
Tools Merge pull request #982 from richlilly2004/ImportPlaybooks 2020-09-04 08:51:56 -07:00
Workbooks Workbook validation fixes (#1047) 2020-09-09 09:09:16 -07:00
docs Add files via upload 2019-02-28 02:08:02 -08:00
.gitignore Merge branch 'master' into master 2020-06-28 22:10:54 -07:00
.gitmodules Adding Azure-Sentinel-Notebooks as submodule of Azure-Sentinel 2020-04-30 10:47:38 -07:00
CODEOWNERS Update CODEOWNERS 2020-08-31 14:33:44 -07:00
LICENSE Initial commit 2018-08-17 19:25:18 -07:00
README.md readme 2020-09-07 16:06:29 +03:00
azure-pipelines.yml try add tests 2020-09-06 18:01:21 +03:00
package-lock.json add schema validation for workbooksMetadata 2020-08-20 11:48:43 -07:00
package.json add schema validation for workbooksMetadata 2020-08-20 11:48:43 -07:00
tsconfig.json fix tsconfig.json file (#416) 2019-12-19 02:36:56 +02:00

README.md

Azure Sentinel

Welcome to the Azure Sentinel repository! This repository contains out of the box detections, exploration queries, hunting queries, workbooks, playbooks and much more to help you get ramped up with Azure Sentinel and provide you security content to secure your environment and hunt for threats. You can also submit to issues for any samples or resources you would like to see here as you onboard to Azure Sentinel. This repository welcomes contributions and refer to this repository's wiki to get started. For questions and feedback, please contact AzureSentinel@microsoft.com

Resources

We value your feedback. Here are some channels to help surface your questions or feedback:

  1. General product specific Q&A <20> Join in the Azure Sentinel Tech Community conversations
  2. Product specific feature requests <20> Upvote or post new on Azure Sentinel feedback forums
  3. Report product or contribution bugs <20> File a GitHub Issue using Bug template
  4. General feedback on community and contribution process <20> File a GitHub Issue using Feature Request template

Contributing

This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.microsoft.com.

Add in your new or updated contributions to GitHub

Note: If you are a first time contributor to this repository, Fork the repo before cloning.

Brand new or update to a contribution via these methods:

Pull Request

  • After you push your changes, you will need to submit the Pull Request (PR)
  • After submission, check the Pull Request for comments
  • Make changes as suggested and update your branch or explain why no change is needed. Resolve the comment when done.

Pull Request Kql Validation Check

As part of the PR checks we run kql validation on the queries that are defined in the template. If this check fails go to Azure Pipeline (by pressing on the errors link on the checks tab in your PR) Azurepipeline In the pipeline you can see which test fail and what is the cause: Pipeline Tests Tab If you are using custom logs table (a table which is not defined on all workspaces by default) you should verify your table schema is defined in json file in the folder Azure-Sentinel\.script\tests\KqlvalidationsTests\CustomTables

Example for table tablexyz.json

{
  "Name": "tablexyz",
  "Properties": [
    {
      "Name": "SomeDateTimeColumn",
      "Type": "DateTime"
    },
    {
      "Name": "SomeStringColumn",
      "Type": "String"
    },
    {
      "Name": "SomeDynamicColumn",
      "Type": "Dynamic"
    }
  ]
}

When you submit a pull request, a CLA-bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., label, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact opencode@microsoft.com with any additional questions or comments.

For information on what you can contribute and further details, refer to the "get started" section on the project's wiki.