Skip to content

Commit 0909ff6

Browse files
committed
Solution packaged
1 parent 170600b commit 0909ff6

File tree

4 files changed

+1087
-921
lines changed

4 files changed

+1087
-921
lines changed

Solutions/Threat Intelligence/Data/Solution_ThreatIntelligenceTemplateSpec.json

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,8 @@
7272
"Analytic Rules/EmailEntity_CloudAppEvents.yaml",
7373
"Analytic Rules/FileHashEntity_CloudAppEvents.yaml",
7474
"Analytic Rules/IPEntity_CloudAppEvents.yaml",
75-
"Analytic Rules/URLEntity_CloudAppEvents.yaml"
75+
"Analytic Rules/URLEntity_CloudAppEvents.yaml",
76+
"Analytic Rules/IPEntity_Workday.yaml"
7677
],
7778
"Metadata": "SolutionMetadata.json",
7879
"BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions\\Threat Intelligence\\",
720 Bytes
Binary file not shown.

Solutions/Threat Intelligence/Package/createUiDefinition.json

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
"config": {
77
"isWizard": false,
88
"basics": {
9-
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Azure_Sentinel.svg\"width=\"75px\" height=\"75px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Threat%20Intelligence/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe Threat Intelligence solution contains data connectors for import of supported STIX objects into Microsoft Sentinel, analytic rules for matching TI data with event data, workbook, and hunting queries. Threat indicators can be malicious IP's, URL's, filehashes, domains, email addresses etc.\n\n**Data Connectors:** 5, **Workbooks:** 1, **Analytic Rules:** 52, **Hunting Queries:** 5\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
9+
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Azure_Sentinel.svg\"width=\"75px\" height=\"75px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Threat%20Intelligence/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe Threat Intelligence solution contains data connectors for import of supported STIX objects into Microsoft Sentinel, analytic rules for matching TI data with event data, workbook, and hunting queries. Threat indicators can be malicious IP's, URL's, filehashes, domains, email addresses etc.\n\n**Data Connectors:** 5, **Workbooks:** 1, **Analytic Rules:** 53, **Hunting Queries:** 5\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
1010
"subscription": {
1111
"resourceProviders": [
1212
"Microsoft.OperationsManagement/solutions",
@@ -954,6 +954,20 @@
954954
}
955955
}
956956
]
957+
},
958+
{
959+
"name": "analytic53",
960+
"type": "Microsoft.Common.Section",
961+
"label": "TI map IP entity to Workday(ASimAuditEventLogs)",
962+
"elements": [
963+
{
964+
"name": "analytic53-text",
965+
"type": "Microsoft.Common.TextBlock",
966+
"options": {
967+
"text": "Detects a match in Workday activity from any IP Indicator of Compromise (IOC) provided by Threat Intelligence (TI)."
968+
}
969+
}
970+
]
957971
}
958972
]
959973
},
@@ -1058,4 +1072,4 @@
10581072
"workspace": "[basics('workspace')]"
10591073
}
10601074
}
1061-
}
1075+
}

0 commit comments

Comments
 (0)