393 строки
24 KiB
JSON
393 строки
24 KiB
JSON
[
|
||
{
|
||
"dashboardKey": "AzureActivityDashboard",
|
||
"logoFileName": "azureactivity_logo.svg",
|
||
"description": "Gain extensive insight into your organization's Azure Activity by analyzing, and correlating all user operations and events.\nYou can learn about all user operations, trends, and anomalous changes over time.nThis dashboard gives you the ability to drill down into caller activities and summarize detected failure and warning events.",
|
||
"dataTypesDependencies": [ "AzureActivity" ],
|
||
"datasourceCardKeysDependencies": ["AzureActivity"],
|
||
"previewImagesFileNames": [ "AzureActivityWhite1.png", "AzureActivityBlack1.png", "AzureActivityWhite2.png", "AzureActivityBlack2.png" ],
|
||
"version": "1.2",
|
||
"title": "Azure Activity",
|
||
"templateRelativePath": "Azure_Activity.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "CiscoDashboard",
|
||
"logoFileName": "cisco_logo.svg",
|
||
"description": "Gain insight into your Cisco ASA firewalls by analyzing traffic, events, and firewall operations.\nThis dashboard analyzes Cisco ASA threat events and identifies suspicious ports, users, protocols and IP addresses.\nYou can learn about trends across user and data traffic directions, and drill down into the Cisco filter results.\nEasily detect attacks on your organization by monitoring management operations, such as configuration and logins.",
|
||
"dataTypesDependencies": [ "CommonSecurityLog" ],
|
||
"datasourceCardKeysDependencies": [ "Cisco" ],
|
||
"previewImagesFileNames": [ "CiscoWhite1.png", "CiscoBlack1.png" ],
|
||
"version": "1.2",
|
||
"title": "Cisco",
|
||
"templateRelativePath": "Cisco.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "DnsDashboard",
|
||
"logoFileName": "dns_logo.svg",
|
||
"description": "Gain extensive insight into your organization's DNS by analyzing, collecting and correlating all DNS events.\nThis dashboard exposes a variety of information about suspicious queries, malicious IP addresses and domain operations.",
|
||
"dataTypesDependencies": [ "DnsInventory", "DnsEvents" ],
|
||
"datasourceCardKeysDependencies": [ "DNS" ],
|
||
"previewImagesFileNames": [],
|
||
"version": "1.2",
|
||
"title": "DNS",
|
||
"templateRelativePath": "DNS.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "ExchangeOnlineDashboard",
|
||
"logoFileName": "office365_logo.svg",
|
||
"description": "Gain insights into Microsoft Exchange online by tracing and analyzing all Exchange operations and user activities.\nThis dashboard let you monitor user activities, including logins, account operations, permission changes, and mailbox creations to discover suspicious trends among them.",
|
||
"dataTypesDependencies": [ "OfficeActivity" ],
|
||
"datasourceCardKeysDependencies": ["Office365"],
|
||
"previewImagesFileNames": [ "ExchangeOnlineWhite1.png", "ExchangeOnlineBlack1.png", "ExchangeOnlineWhite2.png", "ExchangeOnlineBlack2.png" ],
|
||
"version": "1.2",
|
||
"title": "Exchange Online",
|
||
"templateRelativePath": "Exchange_Online.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "FortiGateDashboard",
|
||
"logoFileName": "fortinet_logo.svg",
|
||
"description": "Gain insight into Fortigate firewalls by analyzing traffic and activities.\nThis dashboard finds correlations in Fortigate threat events and identifies suspicious ports, users, protocols and IP addresses.\nYou can learn about trends across user and data traffic, and drill down into the Fortigate filter results.\nEasily detect attacks on your organization by monitoring management operations such as configuration and logins.",
|
||
"dataTypesDependencies": [ "CommonSecurityLog" ],
|
||
"datasourceCardKeysDependencies": [ "Fortinet" ],
|
||
"previewImagesFileNames": [ "FortiGateWhite1.png", "FortiGateBlack1.png", "FortiGateWhite2.png", "FortiGateBlack2.png" ],
|
||
"version": "1.2",
|
||
"title": "FortiGate",
|
||
"templateRelativePath": "FortiGate.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "IdentityAndAccessDashboard",
|
||
"logoFileName": "",
|
||
"description": "Gain insights into Identity and access operations by collecting and analyzing security logs, using the audit and sign-in logs to gather insights into use of Microsoft products.\nYou can view anomalies and trends across login events from all users and machines. This dashboard also identifies suspicious entities from login and access events.",
|
||
"dataTypesDependencies": [ "SecurityEvent" ],
|
||
"datasourceCardKeysDependencies": [ "SecurityEvent" ],
|
||
"previewImagesFileNames": [ "IdentityAndAccessWhite1.png", "IdentityAndAccessBlack1.png", "IdentityAndAccessWhite2.png", "IdentityAndAccessBlack2.png" ],
|
||
"version": "1.2",
|
||
"title": "Identity & Access",
|
||
"templateRelativePath": "Identity_and_Access.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "InsecureProtocolsDashboard",
|
||
"logoFileName": "",
|
||
"description": "Gain insights into Insecure protocol traffic by collecting and analyzing security events from Microsoft products.\nYou can view analytics and quickly identify use of weak authentication as well as sources of legacy protocol traffic, like NTLM and SMBv1.\nYou will also have the ability to monitor use of weak ciphers, allowing you to find weak spots in your organization's security.",
|
||
"dataTypesDependencies": [ "SecurityEvent", "Event" , "SigninLogs" ],
|
||
"datasourceCardKeysDependencies": [ "SecurityEvent" ],
|
||
"previewImagesFileNames": ["Insecure_Protocol_White2.png", "Insecure_Protocols_Black1.png", "Insecure_Protocols_Black2.png", "Insecure_Protocols_White1.png"],
|
||
"version": "1.5",
|
||
"title": "Insecure Protocols",
|
||
"templateRelativePath": "Insecure_Protocols.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "JuniperDashboard",
|
||
"logoFileName": "",
|
||
"description": "Gain insight into Juniper firewalls by analyzing security events and firewall activities.\nYou can find correlations between inbound and outbound traffic by IP addresses, learn about trends across sessions, and processes and identify interesting ports.\nWith this dashboard you can detect attacks on your organization by monitoring management operations, such as configuration and logins.",
|
||
"dataTypesDependencies": [ "Syslog" ],
|
||
"datasourceCardKeysDependencies": [ "Syslog" ],
|
||
"previewImagesFileNames": [],
|
||
"version": "1.2",
|
||
"title": "Juniper",
|
||
"templateRelativePath": "Juniper.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "Office365Dashboard",
|
||
"logoFileName": "office365_logo.svg",
|
||
"description": "Gain insights into Office 365 by tracing and analyzing all operations and activities. You can drill down into your SharePoint, OneDrive, and Exchange.\nThis dashboard lets you find usage trends across users, files, folders, and mailboxes, making it easier to identify anomalies in your network.",
|
||
"dataTypesDependencies": [ "OfficeActivity" ],
|
||
"datasourceCardKeysDependencies": ["Office365"],
|
||
"previewImagesFileNames": [ "Office365White1.png", "Office365Black1.png", "Office365White2.png", "Office365Black2.png", "Office365White3.png", "Office365Black3.png" ],
|
||
"version": "1.3",
|
||
"title": "Office 365",
|
||
"templateRelativePath": "Office_365.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "PaloAltoDashboard",
|
||
"logoFileName": "paloalto_logo.svg",
|
||
"description": "Gain insight and comprehensive monitoring into Palo Alto firewalls by analyzing traffic and activities.\nThis dashboard correlates all Palo Alto data with threat events to identify suspicious entities and relationships.\nYou can learn about trends across user and data traffic, and drill down into Palo Alto Wildfire and filter results.",
|
||
"dataTypesDependencies": [ "CommonSecurityLog" ],
|
||
"datasourceCardKeysDependencies": [ "PaloAlto" ],
|
||
"previewImagesFileNames": [ "PaloAltoWhite1.png", "PaloAltoBlack1.png" ],
|
||
"version": "1.3",
|
||
"title": "Palo Alto Networks",
|
||
"templateRelativePath": "Palo_Alto.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "PaloAltoThreatDashboard",
|
||
"logoFileName": "paloalto_logo.svg",
|
||
"description": "Gain insight into Palo Alto network threats by analyzing traffic and threat events.\nYou can extract meaningful security information by correlating data between threats, applications, and time.\nThis dashboard makes it easy to track malware, vulnerability, and virus log events.",
|
||
"dataTypesDependencies": [ "CommonSecurityLog" ],
|
||
"datasourceCardKeysDependencies": [ "PaloAlto" ],
|
||
"previewImagesFileNames": ["Palo_Alto_network_threats_Black1.png", "Palo_Alto_network_threats_White1.png"],
|
||
"version": "1.4",
|
||
"title": "Palo Alto Networks Threat",
|
||
"templateRelativePath": "Palo_Alto_Networks_Threat_Dashboard.json",
|
||
"subtitle": "",
|
||
"provider": "Palo Alto Networks"
|
||
},
|
||
{
|
||
"dashboardKey": "SharePointAndOneDriveDashboard",
|
||
"logoFileName": "office365_logo.svg",
|
||
"description": "Gain insights into SharePoint and OneDrive by tracing and analyzing all operations and activities.\nYou can view trends across user operation, find correlations between users and files, and identify interesting information such as user IP addresses.",
|
||
"dataTypesDependencies": [ "OfficeActivity" ],
|
||
"datasourceCardKeysDependencies": ["Office365"],
|
||
"previewImagesFileNames": [ "SharePointAndOneDriveWhite1.png", "SharePointAndOneDriveBlack1.png", "SharePointAndOneDriveWhite2.png", "SharePointAndOneDriveBlack2.png" ],
|
||
"version": "1.2",
|
||
"title": "SharePoint & OneDrive",
|
||
"templateRelativePath": "SharePoint_and_OneDrive.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "AzureNetworkWatcherDashboard",
|
||
"logoFileName": "networkwatcher_logo.svg",
|
||
"description": "Gain deeper understanding of your organization's Azure network traffic by analyzing, and correlating Network Security Group flow logs. \nYou can trace malicious traffic flows, and drill down into their protocols, source and destination IP addresses, machines, countries, and subnets. \nThis dashboard also helps you protect your network by identifying weak NSG rules.",
|
||
"dataTypesDependencies": [ "AzureNetworkAnalytics_CL" ],
|
||
"datasourceCardKeysDependencies": [],
|
||
"previewImagesFileNames": ["NetworkWatcherWhite1.png", "NetworkWatcherWhite2.png", "NetworkWatcherBlack1.png", "NetworkWatcherBlack2.png"],
|
||
"version": "1.2",
|
||
"title": "Azure Network Watcher",
|
||
"templateRelativePath": "AzureNetworkWatcher.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "AzureADSigninLogsDashboard",
|
||
"logoFileName": "azureactivedirectory_logo.svg",
|
||
"description": "Gain insights into Azure Active Directory by connecting Azure Sentinel and using the sign-in logs to gather insights around Azure AD scenarios. \nYou can learn about sign-in operations, such as user sign-ins and locations, email addresses, and IP addresses of your users, as well as failed activities and the errors that triggered the failures.",
|
||
"dataTypesDependencies": [ "SigninLogs" ],
|
||
"datasourceCardKeysDependencies": ["AAD"],
|
||
"previewImagesFileNames": [ "AADsigninBlack1.png", "AADsigninBlack2.png", "AADsigninWhite1.png", "AADsigninWhite2.png" ],
|
||
"version": "1.2",
|
||
"title": "Azure AD Sign-in logs",
|
||
"templateRelativePath": "Azure_AD_Signins.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "LinuxMachinesDashboard",
|
||
"logoFileName": "azurevirtualmachine_logo.svg",
|
||
"description": "Gain insights into your workspaces' Linux machines by connecting Azure Sentinel and using the logs to gather insights around Linux events and errors.",
|
||
"dataTypesDependencies": [ "Syslog" ],
|
||
"datasourceCardKeysDependencies": [ ],
|
||
"previewImagesFileNames": [ "Linux_machinesBlack1.png", "Linux_machinesWhite1.png" ],
|
||
"version": "1.1",
|
||
"title": "Linux machines",
|
||
"templateRelativePath": "Linux_machines.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "AzureWebApplicationFirewallDashboard",
|
||
"logoFileName": "waf_logo.svg",
|
||
"description": "Gain insight into your organization's Azure web application firewall (WAF). You will get visibility in to your application gateway firewall and application gateway access events. You can view anomalies and trends across ports, URL addresses, IP addresses, protocols ,and more.",
|
||
"dataTypesDependencies": [ "AzureDiagnostics" ],
|
||
"datasourceCardKeysDependencies": [ "WAF" ],
|
||
"previewImagesFileNames": [ "MicrosoftWAFBlack1.png", "MicrosoftWAFBlack2.png", "MicrosoftWAFBlack3.png", "MicrosoftWAFWhite1.png", "MicrosoftWAFWhite2.png", "MicrosoftWAFWhite3.png" ],
|
||
"version": "1.1",
|
||
"title": "Microsoft Web Application Firewall (WAF)",
|
||
"templateRelativePath": "Microsoft_WAF.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "VMInsightsDashboard",
|
||
"logoFileName": "azurevirtualmachine_logo.svg",
|
||
"description": "Gain rich insight into your organization's virtual machines from Azure Monitor, which analyzes and correlates data in your VM network. \nYou will get visibility on your VM parameters and behavior, and will be able to trace sent and received data. \nIdentify malicious attackers and their targets, and drill down into the protocols, source and destination IP addresses, countries, and ports the attacks occur across.",
|
||
"dataTypesDependencies": [ "VMConnection", "ServiceMapComputer_CL", "ServiceMapProcess_CL" ],
|
||
"datasourceCardKeysDependencies": [ ],
|
||
"previewImagesFileNames": [ "VMInsightBlack1.png", "VMInsightBlack2.png", "VMInsightWhite1.png", "VMInsightWhite2.png" ],
|
||
"version": "1.1",
|
||
"title": "VM insights",
|
||
"templateRelativePath": "VM_Insights.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "AzureADAuditLogsDashboard",
|
||
"logoFileName": "azureactivedirectory_logo.svg",
|
||
"description": "Gain insights into Azure Active Directory by connecting Azure Sentinel and using the audit logs to gather insights around Azure AD scenarios. \nYou can learn about user operations, including password and group management, device activities, and top active users and apps.",
|
||
"dataTypesDependencies": [ "AuditLogs" ],
|
||
"datasourceCardKeysDependencies": ["AAD"],
|
||
"previewImagesFileNames": [ "AzureADAuditLogsBlack1.png", "AzureADAuditLogsBlack2.png", "AzureADAuditLogsWhite1.png", "AzureADAuditLogsWhite2.png" ],
|
||
"version": "1.1",
|
||
"title": "Azure AD Audit logs",
|
||
"templateRelativePath": "Azure_AD_Audit_Logs.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "SymantecFileThreatsOverviewDashboard",
|
||
"logoFileName": "symantec.svg",
|
||
"description": "Gain insights into Symantec file events by connecting Azure Sentinel and using the file threats overview dashboard to gather insights around file threat scenarios.",
|
||
"dataTypesDependencies": [ "SymantecICDx_CL" ],
|
||
"datasourceCardKeysDependencies": [ "Symantec" ],
|
||
"previewImagesFileNames": [ "Symantec_file_threats_overview_Black1.png", "Symantec_file_threats_overview_White1.png" ],
|
||
"version": "1.4",
|
||
"title": "Symantec File Threats",
|
||
"templateRelativePath": "Symantec_file_threats_overview_dashboard.json",
|
||
"subtitle": "",
|
||
"provider": "Symantec."
|
||
},
|
||
{
|
||
"dashboardKey": "SymantecSecurityOverviewDashboard",
|
||
"logoFileName": "symantec.svg",
|
||
"description": "Gain insights into Symantec events by connecting Azure Sentinel and using the security overview dashboard to gather insights around Symantec security appliance activities.",
|
||
"dataTypesDependencies": [ "SymantecICDx_CL" ],
|
||
"datasourceCardKeysDependencies": [ "Symantec" ],
|
||
"previewImagesFileNames": [ "Symantec_Security_Overview_Black1.png", "Symantec_Security_Overview_White1.png" ],
|
||
"version": "1.3",
|
||
"title": "Symantec Security",
|
||
"templateRelativePath": "Symantec_Security_Overview_Dashboard.json",
|
||
"subtitle": "",
|
||
"provider": "Symantec."
|
||
},
|
||
{
|
||
"dashboardKey": "SymantecThreatsOverviewDashboard",
|
||
"logoFileName": "symantec.svg",
|
||
"description": "Gain insights into Symantec events by connecting Azure Sentinel and using the threats overview dashboard to gather insights around top threat scenarios. \nYou can get a birds-eye-view over all your top threats, including top malicious files, sources, endpoints and users, as well as threat details.",
|
||
"dataTypesDependencies": [ "SymantecICDx_CL" ],
|
||
"datasourceCardKeysDependencies": [ "Symantec" ],
|
||
"previewImagesFileNames": [ "Symantec_threats_overview_Black1.png", "Symantec_threats_overview_White1.png" ],
|
||
"version": "1.5",
|
||
"title": "Symantec Threats",
|
||
"templateRelativePath": "Symantec_threats_overview_dashboard.json",
|
||
"subtitle": "",
|
||
"provider": "Symantec."
|
||
},
|
||
{
|
||
"dashboardKey": "SymantecURLThreatsOverviewDashboard",
|
||
"logoFileName": "symantec.svg",
|
||
"description": "Gain insights into Symantec events by connecting Azure Sentinel and using the URL threats overview dashboard to gather insights around URL threat scenarios. \nYou can get a birds-eye-view over all your URL events, top threats, and URL event trends.",
|
||
"dataTypesDependencies": [ "SymantecICDx_CL" ],
|
||
"datasourceCardKeysDependencies": [ "Symantec" ],
|
||
"previewImagesFileNames": [ "Symantec_URL_threats_overview_Black1.png", "Symantec_URL_threats_overview_White1.png" ],
|
||
"version": "1.3",
|
||
"title": "Symantec URL Threats",
|
||
"templateRelativePath": "Symantec_URL_threats_overview_dashboard.json",
|
||
"subtitle": "",
|
||
"provider": "Symantec."
|
||
},
|
||
{
|
||
"dashboardKey": "AmazonWebServicesNetwotkActivities",
|
||
"logoFileName": "amazon_web_services_Logo.svg",
|
||
"description": "Gain insights into AWS network related resource activities, including the creation, update, and deletions of security groups, network ACLs and routes, gateways, elastic load balancers, VPCs, subnets, and network interfaces.",
|
||
"dataTypesDependencies": [ "AWSCloudTrail" ],
|
||
"datasourceCardKeysDependencies": [ "AWS" ],
|
||
"previewImagesFileNames": [ "AWS_network_Activities_Black1.png", "AWS_network_activities_White1.png" ],
|
||
"version": "1.1",
|
||
"title": "AWS Network Activities",
|
||
"templateRelativePath": "AWS_network_activities.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "AmazonWebServicesUserActivities",
|
||
"logoFileName": "amazon_web_services_Logo.svg",
|
||
"description": "Gain insights into AWS user activities, including failed sign-in attempts, IP addresses, regions, user agents, and identity types, as well as potential malicious user activities with assumed roles.",
|
||
"dataTypesDependencies": [ "AWSCloudTrail" ],
|
||
"datasourceCardKeysDependencies": [ "AWS" ],
|
||
"previewImagesFileNames": [ "AWS_user_activities_Black1.png", "AWS_user_activities_White1.png" ],
|
||
"version": "1.1",
|
||
"title": "AWS User Activities",
|
||
"templateRelativePath": "AWS_user_activities.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "CheckPointDashboard",
|
||
"logoFileName": "",
|
||
"description": "Gain insights into Check Point network activities, including number of gateways and servers, security incidents, and identify infected hosts.",
|
||
"dataTypesDependencies": [ "CommonSecurityLog" ],
|
||
"datasourceCardKeysDependencies": [ "CheckPoint" ],
|
||
"previewImagesFileNames": [ "Check_Point_Software_Technologies_Black1.png", "Check_Point_Software_Technologies_White1.png" ],
|
||
"version": "1.2",
|
||
"title": "Check Point Software Technologies",
|
||
"templateRelativePath": "Check_Point_Software_Technologies.json",
|
||
"subtitle": "",
|
||
"provider": "Check Point"
|
||
},
|
||
{
|
||
"dashboardKey": "F5ASMDashboard",
|
||
"logoFileName": "f5_logo.svg",
|
||
"description": "Gain insight into F5 BIG-IP Application Security Manager, (ASM) by analyzing traffic and activities. This dashboard provides insight into F5’s web application firewall events and identifies attack traffic patterns across multiple ASM instances as well as overall BIG-IP health.",
|
||
"dataTypesDependencies": [ "F5Telemetry_system_CL" , "F5Telemetry_LTM_CL" , "F5Telemetry_ASM_CL" ],
|
||
"datasourceCardKeysDependencies": [ ],
|
||
"previewImagesFileNames": [ "F5_BIGIP_ASM_Black1.png", "F5_BIGIP_ASM_White.png" ],
|
||
"version": "1.2",
|
||
"title": "F5 BIG-IP ASM",
|
||
"templateRelativePath": "F5NetworksDashboard.json",
|
||
"subtitle": "",
|
||
"provider": "F5"
|
||
},
|
||
{
|
||
"dashboardKey": "ThreatIntelligenceDashboard",
|
||
"logoFileName": "",
|
||
"description": "Gain insights into threat indicators, including type and severity of threats, threat activity over time, and correlation with other data sources, including Office 365 and firewalls.",
|
||
"dataTypesDependencies": [ "ThreatIntelligenceIndicator" ],
|
||
"datasourceCardKeysDependencies": [ "TIP" ],
|
||
"previewImagesFileNames": [ "Threat_Intelligence_Dashboard_Black1.png", "Threat_Intelligence_Dashboard_White1.png" ],
|
||
"version": "1.2",
|
||
"title": "Threat Intelligence",
|
||
"templateRelativePath": "Threat_Intelligence_Dashboard.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "AzureFirewall",
|
||
"logoFileName": "",
|
||
"description": "Gain insights into Azure Firewall events. You can get learn about your application and network rules, see statistics for firewall activities across URLs, ports, and addresses.",
|
||
"dataTypesDependencies": [ "AzureDiagnostics" ],
|
||
"datasourceCardKeysDependencies": [ ],
|
||
"previewImagesFileNames": [ "Azure_firewall_Black1.png", "Azure_Firewall_White1.png" ],
|
||
"version": "1.1",
|
||
"title": "Azure Firewall",
|
||
"templateRelativePath": "Azure_Firewall.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "AIPUsageReport",
|
||
"logoFileName": "informationProtection.svg",
|
||
"description": "The Azure Information Protection Usage report dashboard provides information on the volume labeled and protected documents and emails over time, label distribution of files by label type, along with where the label was applied.",
|
||
"dataTypesDependencies": [ "InformationProtectionLogs_CL" ],
|
||
"datasourceCardKeysDependencies": [ "AIP" ],
|
||
"previewImagesFileNames": [ "aip_usage_White1.png" ],
|
||
"version": "1.0",
|
||
"title": "Azure Information Protecton - Usage Report",
|
||
"templateRelativePath": "Azure_Information_Protection_Usage.json",
|
||
"subtitle": "",
|
||
"provider": "Microsoft"
|
||
},
|
||
{
|
||
"dashboardKey": "CyberArkDashboard",
|
||
"logoFileName": "CyberArk_Logo.svg",
|
||
"description": "Gain extensive insight and monitoring Syslog messagess from CyberArk’s Digital Vault. Get a comprehensive view of all actions performed across your Digital Vault to improve your security posture, including privileged accounts access, and commands run during monitored sessions. To use this download the CyberArk parsers from the Azure Sentinel GitHub repository.",
|
||
"dataTypesDependencies": [ "Syslog" ],
|
||
"datasourceCardKeysDependencies": [ "CyberArk" ],
|
||
"previewImagesFileNames": [ "CyberArk_Black1.png", "CyberArk_White1.png" ],
|
||
"version": "1.0",
|
||
"title": "CyberArk Privileged Access Security",
|
||
"templateRelativePath": "CyberArk_Dashboard.json",
|
||
"subtitle": "",
|
||
"provider": "CyberArk"
|
||
}
|
||
]
|