Skip to content

Conversation

@gbarbieru
Copy link

Change(s):
- Creating a Sentinel solution for Bitdefender GravityZone. This solution uses a push-based approach using just a DCR, a DCE, custom table and an App registration with credentials to push data to Sentinel. An analytic rule that uses custom ASIM parsers is used to generate Incidents.

Reason for Change(s):

  • New Sentinel solution

Version Updated:

  • No. Version is 3.0.0 is the initial version.

Testing Completed:

  • Yes

Checked that the validations are passing and have addressed any issues that are present:
Before going into this topic I want to disclose that development in my team is done on Linux workstations and the available tooling and guides offered by Microsoft kinda lack in this department. Local YAML testing was eventually achieved, but KQL validation failed. Due to time constraints additional effort in making them work Linux environments was abandoned and testing was eventually done on Microsoft Sentinel accounts via end-to-end testing.

  • KQL: Tested using smoke tests directly on a Microsoft Sentinel account. No issues so far. Failed to test locally.
  • YAML: Some issues are reported on the JSON that was compiled from bicep (data connector deployment template), but no issues were present when actually deploying and using the data connector.
**Notes**
- If/when the PR is approved for merge please hold off for an approval from us. We want the solution to actually go to market with something on our part (GravityZone).

CrashCringle12 and others added 30 commits November 14, 2025 09:28
The azuredeploy.json referred to AbuseIPDB as AuseIPDB.
Previous link was no longer available, use updated img url for logo
3 new playbook to the sentinel soar solution
Added three new playbooks (Http-Trigger-Entity-Analyzer, Incident-Trigger-Entity-Analyzer, Url-Trigger-Entity-Analyzer) to the solution. Updated solution version to 3.0.4, incremented playbook and workbook counts, and included the new package zip. Also updated workbook version and playbook template descriptions to reflect the new release.
- Added 'Informational' severity level with value 3 to SeverityMap
- Updated deployment templates (azuredeploy.json, azuredeploy.bicep)
- Updated function app configuration and data connector metrics
- Updated mainTemplate.json with Informational severity alerts query
- Updated ReleaseNotes.md with version 3.0.3
- Changed publisherId in SolutionMetadata.json to a new identifier.
- Updated logo URL in Solution_Cyera.json and createUiDefinition.json to point to the correct image.
- Modified data collection endpoint ID and workspace resource ID parameters in CyeraDSPM_DCR.json and mainTemplate.json for better resource referencing.
- Corrected spelling of "received" in multiple descriptions for clarity.
- Removed outdated install-pack-v0_7_3.zip file.
- Updated solutionId in mainTemplate.json to reflect the new publisherId.
… enable WebSocket conenction, as per dicussion with PoD engineering team, this is causing data duplication
Fix additional typos in AbuseIPDB Teams playbook
v-dvedak and others added 16 commits December 10, 2025 10:59
3 new playbooks for the sentinel SentinelSOARessentials solution
…-ttk

Fix arm-ttk failures for ProofpointTAP
Fix Azure Firewall template URI casing in deployment
…#13285)

Deleted the 'hidden-SentinelWorkspaceId' tag from azuredeploy.json files in all Microsoft Defender Threat Intelligence playbooks. This streamlines template metadata and removes hardcoded workspace references.
…nformational-severity

Added support of Informational alerts severity
@github-actions
Copy link
Contributor

🔒 Security Approval Required

This fork PR requires manual approval before automated testing can run.

For security, a maintainer must:

  1. 📝 Review the code changes carefully
  2. Verify file types - This PR should only contain .yml, .yaml, or .json files. Check for any executable scripts (.ps1, .py, .sh, .exe, etc.) which are not allowed in this context.
  3. 🏷️ Add the SafeToRun label if the changes are safe to execute

Note: If new commits are added later, simply remove and re-add the SafeToRun label.


🤖 Automated security check • Created: 2025-12-11T13:23:47.021Z
Learn more: GitHub Security Lab - Preventing PWN Requests

@github-actions
Copy link
Contributor

🔒 Security Approval Required

This fork PR requires manual approval before automated testing can run.

For security, a maintainer must:

  1. 📝 Review the code changes carefully
  2. Verify file types - This PR should only contain .yml, .yaml, or .json files. Check for any executable scripts (.ps1, .py, .sh, .exe, etc.) which are not allowed in this context.
  3. 🏷️ Add the SafeToRun label if the changes are safe to execute

Note: If new commits are added later, simply remove and re-add the SafeToRun label.


🤖 Automated security check • Created: 2025-12-11T13:31:55.590Z
Learn more: GitHub Security Lab - Preventing PWN Requests

@gbarbieru gbarbieru requested review from a team as code owners December 11, 2025 13:34
@github-actions
Copy link
Contributor

🔒 Security Approval Required

This fork PR requires manual approval before automated testing can run.

For security, a maintainer must:

  1. 📝 Review the code changes carefully
  2. Verify file types - This PR should only contain .yml, .yaml, or .json files. Check for any executable scripts (.ps1, .py, .sh, .exe, etc.) which are not allowed in this context.
  3. 🏷️ Add the SafeToRun label if the changes are safe to execute

Note: If new commits are added later, simply remove and re-add the SafeToRun label.


🤖 Automated security check • Created: 2025-12-11T13:34:23.033Z
Learn more: GitHub Security Lab - Preventing PWN Requests

@ashantyk
Copy link

just did a rebase and it seems github just went crazy with this PR. i'll have to delete the branch and PR and start over.

on the topic of keeping the ASIM modification separate. how important is it for the first release?
we are using a private repo for the actual code and the CI/CD pipeline just creates a branch on the forked repo on an action.
in order to alter it to make detections/decisions and create separate PRs would take time and i'm not sure the time is justified if we just keep an eye out for next PRs just to be punctual

@gbarbieru
Copy link
Author

new PR: #13299

@gbarbieru gbarbieru closed this Dec 11, 2025
@gbarbieru gbarbieru deleted the gravityzone-solution-v3.0.0 branch December 11, 2025 14:01
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

ASIM New Solution For new Solutions which are new to Microsoft Sentinel

Projects

None yet

Development

Successfully merging this pull request may close these issues.