Skip to content

Commit 5fab2ae

Browse files
authored
Merge pull request #12402 from Azure/v-prasadboke-crowd
Crowdstrike Solution description updated
2 parents cd1a640 + 23fb4dc commit 5fab2ae

File tree

11 files changed

+85
-123
lines changed

11 files changed

+85
-123
lines changed

Solutions/Cisco Secure Endpoint/Data Connectors/CiscoSecureEndpointLogs_ccp/CiscoSecureEndpointLogs_ConnectorDefinition.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
"properties": {
88
"connectorUiConfig": {
99
"id": "CiscoSecureEndpointLogsCCPDefinition",
10-
"title": "Cisco Secure Endpoint (via Codeless Connector Framework)",
10+
"title": "Cisco Secure Endpoint (via Codeless Connector Framework) (Preview)",
1111
"publisher": "Microsoft",
1212
"descriptionMarkdown": "The Cisco Secure Endpoint (formerly AMP for Endpoints) data connector provides the capability to ingest Cisco Secure Endpoint [audit logs](https://developer.cisco.com/docs/secure-endpoint/auditlog/) and [events](https://developer.cisco.com/docs/secure-endpoint/v1-api-reference-event/) into Microsoft Sentinel.",
1313
"graphQueries": [
128 Bytes
Binary file not shown.

Solutions/Cisco Secure Endpoint/Package/createUiDefinition.json

Lines changed: 0 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -63,23 +63,6 @@
6363
"text": "This Solution installs the data connector for Cisco Secure Endpoint. You can get Cisco Secure Endpoint data in your Microsoft Sentinel workspace. After installing the solution, configure and enable this data connector by following guidance in Manage solution view."
6464
}
6565
},
66-
{
67-
"name": "dataconnectors-link1",
68-
"type": "Microsoft.Common.TextBlock",
69-
"options": {
70-
"link": {
71-
"label": "Learn more about connecting data sources",
72-
"uri": "https://docs.microsoft.com/azure/sentinel/connect-data-sources"
73-
}
74-
}
75-
},
76-
{
77-
"name": "dataconnectors2-text",
78-
"type": "Microsoft.Common.TextBlock",
79-
"options": {
80-
"text": "This Solution installs the data connector for Cisco Secure Endpoint. You can get Cisco Secure Endpoint custom log data in your Microsoft Sentinel workspace. After installing the solution, configure and enable this data connector by following guidance in Manage solution view."
81-
}
82-
},
8366
{
8467
"name": "dataconnectors-parser-text",
8568
"type": "Microsoft.Common.TextBlock",

Solutions/Cisco Secure Endpoint/Package/mainTemplate.json

Lines changed: 18 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1298,7 +1298,7 @@
12981298
],
12991299
"properties": {
13001300
"contentId": "[variables('_dataConnectorContentIdConnectorDefinition1')]",
1301-
"displayName": "Cisco Secure Endpoint (via Codeless Connector Framework)",
1301+
"displayName": "Cisco Secure Endpoint (via Codeless Connector Framework) (Preview)",
13021302
"contentKind": "DataConnector",
13031303
"mainTemplate": {
13041304
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
@@ -1315,7 +1315,7 @@
13151315
"properties": {
13161316
"connectorUiConfig": {
13171317
"id": "CiscoSecureEndpointLogsCCPDefinition",
1318-
"title": "Cisco Secure Endpoint (via Codeless Connector Framework)",
1318+
"title": "Cisco Secure Endpoint (via Codeless Connector Framework) (Preview)",
13191319
"publisher": "Microsoft",
13201320
"descriptionMarkdown": "The Cisco Secure Endpoint (formerly AMP for Endpoints) data connector provides the capability to ingest Cisco Secure Endpoint [audit logs](https://developer.cisco.com/docs/secure-endpoint/auditlog/) and [events](https://developer.cisco.com/docs/secure-endpoint/v1-api-reference-event/) into Microsoft Sentinel.",
13211321
"graphQueries": [
@@ -2597,7 +2597,7 @@
25972597
"properties": {
25982598
"connectorUiConfig": {
25992599
"id": "CiscoSecureEndpointLogsCCPDefinition",
2600-
"title": "Cisco Secure Endpoint (via Codeless Connector Framework)",
2600+
"title": "Cisco Secure Endpoint (via Codeless Connector Framework) (Preview)",
26012601
"publisher": "Microsoft",
26022602
"descriptionMarkdown": "The Cisco Secure Endpoint (formerly AMP for Endpoints) data connector provides the capability to ingest Cisco Secure Endpoint [audit logs](https://developer.cisco.com/docs/secure-endpoint/auditlog/) and [events](https://developer.cisco.com/docs/secure-endpoint/v1-api-reference-event/) into Microsoft Sentinel.",
26032603
"graphQueries": [
@@ -2807,7 +2807,7 @@
28072807
],
28082808
"properties": {
28092809
"contentId": "[variables('_dataConnectorContentIdConnections1')]",
2810-
"displayName": "Cisco Secure Endpoint (via Codeless Connector Framework)",
2810+
"displayName": "Cisco Secure Endpoint (via Codeless Connector Framework) (Preview)",
28112811
"contentKind": "ResourcesDataConnector",
28122812
"mainTemplate": {
28132813
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
@@ -2822,7 +2822,7 @@
28222822
"type": "securestring"
28232823
},
28242824
"connectorDefinitionName": {
2825-
"defaultValue": "Cisco Secure Endpoint (via Codeless Connector Framework)",
2825+
"defaultValue": "Cisco Secure Endpoint (via Codeless Connector Framework) (Preview)",
28262826
"type": "securestring",
28272827
"minLength": 1
28282828
},
@@ -3231,19 +3231,15 @@
32313231
"title": "[DEPRECATED] Cisco Secure Endpoint (AMP) (using Azure Functions)",
32323232
"publisher": "Cisco",
32333233
"descriptionMarkdown": "The Cisco Secure Endpoint (formerly AMP for Endpoints) data connector provides the capability to ingest Cisco Secure Endpoint [audit logs](https://api-docs.amp.cisco.com/api_resources/AuditLog?api_host=api.amp.cisco.com&api_version=v1) and [events](https://api-docs.amp.cisco.com/api_actions/details?api_action=GET+%2Fv1%2Fevents&api_host=api.amp.cisco.com&api_resource=Event&api_version=v1) into Microsoft Sentinel.\n\n<p><span style='color:red; font-weight:bold;'>NOTE</span>: This data connector has been deprecated, consider moving to the CCF data connector available in the solution which replaces ingestion via the <a href='https://learn.microsoft.com/en-us/azure/azure-monitor/logs/custom-logs-migrate' style='color:#1890F1;'>deprecated HTTP Data Collector API</a>.</p>",
3234-
"graphQueries": [
3235-
{
3236-
"metricName": "Cisco Secure Endpoint logs",
3237-
"legend": "CiscoSecureEndpoint_CL",
3238-
"baseQuery": "CiscoSecureEndpoint_CL"
3239-
}
3240-
],
3241-
"dataTypes": [
3242-
{
3243-
"name": "CiscoSecureEndpoint_CL",
3244-
"lastDataReceivedQuery": "CiscoSecureEndpoint_CL\n | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)"
3245-
}
3246-
],
3234+
"graphQueries": {
3235+
"metricName": "Cisco Secure Endpoint logs",
3236+
"legend": "CiscoSecureEndpoint_CL",
3237+
"baseQuery": "CiscoSecureEndpoint_CL"
3238+
},
3239+
"dataTypes": {
3240+
"name": "CiscoSecureEndpoint_CL",
3241+
"lastDataReceivedQuery": "CiscoSecureEndpoint_CL\n | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)"
3242+
},
32473243
"connectivityCriterias": [
32483244
{
32493245
"type": "IsConnectedQuery",
@@ -3252,12 +3248,10 @@
32523248
]
32533249
}
32543250
],
3255-
"sampleQueries": [
3256-
{
3257-
"description": "All Cisco Secure Endpoint logs",
3258-
"query": "CiscoSecureEndpoint_CL\n| sort by TimeGenerated desc"
3259-
}
3260-
],
3251+
"sampleQueries": {
3252+
"description": "All Cisco Secure Endpoint logs",
3253+
"query": "CiscoSecureEndpoint_CL\n| sort by TimeGenerated desc"
3254+
},
32613255
"availability": {
32623256
"status": 1,
32633257
"isPreview": false
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
11
| **Version** | **Date Modified (DD-MM-YYYY)**| **ChangeHistory** |
22
|-------------|-------------------------------|-----------------------------------------------|
3-
| 3.0.1 | 23-06-2025 | Adding a new **CCF Data Connector** - *Cisco Secure Endpoint* and updates the **Parser** to handle the newly introduced table. |
3+
| 3.0.1 | 23-06-2025 | Adding a new **CCF Data Connector** - *Cisco Secure Endpoint* and updated the **Parser** to handle the newly introduced table. |
44
| 3.0.0 | 28-08-2024 | Updated the python runtime version to 3.11. |

Solutions/CrowdStrike Falcon Endpoint Protection/Data Connectors/CrowdstrikeReplicatorCLv2/CrowdstrikeReplicatorV2_ConnectorUI.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"id": "CrowdstrikeReplicatorv2",
3-
"title": "[DEPRECATED] Crowdstrike Falcon Data Replicator V2",
3+
"title": "Crowdstrike Falcon Data Replicator V2",
44
"publisher": "Crowdstrike",
55
"descriptionMarkdown": "The [Crowdstrike](https://www.crowdstrike.com/) Falcon Data Replicator connector provides the capability to ingest raw event data from the [Falcon Platform](https://www.crowdstrike.com/blog/tech-center/intro-to-falcon-data-replicator/) events into Microsoft Sentinel. The connector provides ability to get events from Falcon Agents which helps to examine potential security risks, analyze your team's use of collaboration, diagnose configuration problems and more.<p><span style='color:red; font-weight:bold;'>NOTE:</span> This data connector has been deprecated, consider moving to the CCP data connector available in the solution which replaces ingestion via the <a href='https://learn.microsoft.com/en-us/azure/azure-monitor/logs/custom-logs-migrate' style='color:#1890F1;'>deprecated HTTP Data Collector API</a>.</p>",
66
"additionalRequirementBanner": "These queries and workbooks are dependent on a parser based on Kusto to work as expected. Follow the steps to use this Kusto functions alias **CrowdstrikeReplicator** in queries and workbooks [Follow steps to get this Kusto functions>](https://aka.ms/sentinel-crowdstrikereplicator-parser).",

Solutions/CrowdStrike Falcon Endpoint Protection/Data/Solution_CrowdStrike.json

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,9 @@
22
"Name": "CrowdStrike Falcon Endpoint Protection",
33
"Author": "Microsoft - support@microsoft.com",
44
"Logo": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/CrowdStrike%20Falcon%20Endpoint%20Protection/Data%20Connectors/Logo/crowdstrike.svg\" width=\"75px\" height=\"75px\">",
5-
"Description": "The [CrowdStrike Falcon Endpoint Protection](https://www.crowdstrike.com/products/) solution allows you to easily connect your CrowdStrike Falcon Event Stream with Microsoft Sentinel, to create custom dashboards, alerts, and improve investigation. This gives you more insight into your organization's endpoints and improves your security operation capabilities. \n\nThis solution is dependent on the Common Event Format solution containing the CEF via AMA connector to collect the logs. The CEF solution will be installed as part of this solution installation.\n\n<p><span style='color:red; font-weight:bold;'>NOTE:</span>For ingestion of CEF-formatted logs from CrowdStrike, Microsoft recommends installing the CEF via AMA Connector.</p> <p><span style='color:red; font-weight:bold;'>NOTE:</span> Microsoft recommends installation of CrowdStrike Falcon Data Replicator (S3 Polling via Codeless Connector Platform). This connector is build on the Codeless Connector Platform (CCP), which uses the Log Ingestion API, which replaces ingestion via the <a href='https://learn.microsoft.com/en-us/azure/azure-monitor/logs/custom-logs-migrate' style='color:#1890F1;'>deprecated HTTP Data Collector API</a>. CCP-based data connectors also support <a href='https://learn.microsoft.com/en-us/azure/azure-monitor/essentials/data-collection-rule-overview' style='color:#1890F1;'>Data Collection Rules</a> (DCRs) offering transformations and enrichment.</p> <p><span style='color:red; font-weight:bold;'>Important:</span> While the updated connector(s) can coexist with their legacy versions, running them together will result in duplicated data ingestion. You can disable the legacy versions of these connectors to avoid duplication of data.</p>",
5+
"Description": "The [CrowdStrike Falcon Endpoint Protection](https://www.crowdstrike.com/products/) solution allows you to easily connect your CrowdStrike Falcon Event Stream with Microsoft Sentinel, to create custom dashboards, alerts, and improve investigation. This gives you more insight into your organization's endpoints and improves your security operation capabilities. \n\n<p><span style='color:red; font-weight:bold;'>NOTE:</span> Microsoft recommends using Codeless Connector Framework based connector wherever possible. These connectors use the Log Ingestion API, which replaces ingestion via the <a href='https://learn.microsoft.com/en-us/azure/azure-monitor/logs/custom-logs-migrate' style='color:#1890F1;'>deprecated HTTP Data Collector API</a>. CCF-based data connectors also support <a href='https://learn.microsoft.com/en-us/azure/azure-monitor/essentials/data-collection-rule-overview' style='color:#1890F1;'>Data Collection Rules</a> (DCRs) offering transformations and enrichment. If required, for ingestion of CEF-formatted logs from CrowdStrike, configure the CEF via AMA Connector available as a part of the CEF solution which will be installed as part of this solution installation.</p> <p><span style='color:red; font-weight:bold;'>Important:</span> While multiple connectors available as a part of this solution can run in parallel, running them together may result in duplicated data ingestion. Carefully review the capabilities of each connector and select the most relevant connector based on specific organizational requirements.</p>",
6+
7+
68
"Data Connectors": [
79
"Data Connectors/CrowdstrikeReplicator/CrowdstrikeReplicator_API_FunctionApp.json",
810
"Data Connectors/CrowdstrikeReplicatorCLv2/CrowdstrikeReplicatorV2_ConnectorUI.json",
Binary file not shown.

Solutions/CrowdStrike Falcon Endpoint Protection/Package/createUiDefinition.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
"config": {
77
"isWizard": false,
88
"basics": {
9-
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/CrowdStrike%20Falcon%20Endpoint%20Protection/Data%20Connectors/Logo/crowdstrike.svg\" width=\"75px\" height=\"75px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/CrowdStrike%20Falcon%20Endpoint%20Protection/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe [CrowdStrike Falcon Endpoint Protection](https://www.crowdstrike.com/products/) solution allows you to easily connect your CrowdStrike Falcon Event Stream with Microsoft Sentinel, to create custom dashboards, alerts, and improve investigation. This gives you more insight into your organization's endpoints and improves your security operation capabilities. \n\nThis solution is dependent on the Common Event Format solution containing the CEF via AMA connector to collect the logs. The CEF solution will be installed as part of this solution installation.\n\n<p><span style='color:red; font-weight:bold;'>NOTE:</span>For ingestion of CEF-formatted logs from CrowdStrike, Microsoft recommends installing the CEF via AMA Connector.</p> <p><span style='color:red; font-weight:bold;'>NOTE:</span> Microsoft recommends installation of CrowdStrike Falcon Data Replicator (S3 Polling via Codeless Connector Platform). This connector is build on the Codeless Connector Platform (CCP), which uses the Log Ingestion API, which replaces ingestion via the <a href='https://learn.microsoft.com/en-us/azure/azure-monitor/logs/custom-logs-migrate' style='color:#1890F1;'>deprecated HTTP Data Collector API</a>. CCP-based data connectors also support <a href='https://learn.microsoft.com/en-us/azure/azure-monitor/essentials/data-collection-rule-overview' style='color:#1890F1;'>Data Collection Rules</a> (DCRs) offering transformations and enrichment.</p> <p><span style='color:red; font-weight:bold;'>Important:</span> While the updated connector(s) can coexist with their legacy versions, running them together will result in duplicated data ingestion. You can disable the legacy versions of these connectors to avoid duplication of data.</p>\n\n**Data Connectors:** 4, **Parsers:** 3, **Workbooks:** 1, **Analytic Rules:** 2, **Playbooks:** 3\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
9+
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/CrowdStrike%20Falcon%20Endpoint%20Protection/Data%20Connectors/Logo/crowdstrike.svg\" width=\"75px\" height=\"75px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/CrowdStrike%20Falcon%20Endpoint%20Protection/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe [CrowdStrike Falcon Endpoint Protection](https://www.crowdstrike.com/products/) solution allows you to easily connect your CrowdStrike Falcon Event Stream with Microsoft Sentinel, to create custom dashboards, alerts, and improve investigation. This gives you more insight into your organization's endpoints and improves your security operation capabilities. \n\n<p><span style='color:red; font-weight:bold;'>NOTE:</span> Microsoft recommends using Codeless Connector Framework based connector wherever possible. These connectors use the Log Ingestion API, which replaces ingestion via the <a href='https://learn.microsoft.com/en-us/azure/azure-monitor/logs/custom-logs-migrate' style='color:#1890F1;'>deprecated HTTP Data Collector API</a>. CCF-based data connectors also support <a href='https://learn.microsoft.com/en-us/azure/azure-monitor/essentials/data-collection-rule-overview' style='color:#1890F1;'>Data Collection Rules</a> (DCRs) offering transformations and enrichment. If required, for ingestion of CEF-formatted logs from CrowdStrike, configure the CEF via AMA Connector available as a part of the CEF solution which will be installed as part of this solution installation.</p> <p><span style='color:red; font-weight:bold;'>Important:</span> While multiple connectors available as a part of this solution can run in parallel, running them together may result in duplicated data ingestion. Carefully review the capabilities of each connector and select the most relevant connector based on specific organizational requirements.</p>\n\n**Data Connectors:** 4, **Parsers:** 3, **Workbooks:** 1, **Analytic Rules:** 2, **Playbooks:** 3\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
1010
"subscription": {
1111
"resourceProviders": [
1212
"Microsoft.OperationsManagement/solutions",

0 commit comments

Comments
 (0)