forked from Azure/Azure-Sentinel
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathSolution_Commvault Security IQ.json
More file actions
25 lines (25 loc) · 1.17 KB
/
Solution_Commvault Security IQ.json
File metadata and controls
25 lines (25 loc) · 1.17 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
{
"Name": "Commvault Security IQ",
"Author": "svc.cv-securityiq@commvault.com",
"Logo": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Commvault-Logo.svg\" width=\"75px\"height=\"75px\">",
"Description": "This Microsoft Sentinel integration enables Commvault users to ingest alerts and other data into their Microsoft Sentinel instance. With Analytic Rules, Microsoft Sentinel can automatically create Microsoft Sentinel incidents.",
"Analytic Rules": [
"Analytic Rules/CommvaultSecurityIQ_Alert.yaml",
"Analytic Rules/Data_Alert.yaml",
"Analytic Rules/IDP_Alert.yaml",
"Analytic Rules/User_Alert.yaml"
],
"Playbooks": [
"Playbooks/Commvault_Disable_Data_Aging_Logic_App/azuredeploy.json",
"Playbooks/Commvault_Disable_SAML_Provider_Logic_App/azuredeploy.json",
"Playbooks/Commvault_Disable_User_Logic_App/azuredeploy.json"
],
"Data Connectors": [
"Data Connectors/CommvaultSecurityIQ_API_AzureFunctionApp.json"
],
"Metadata": "SolutionMetadata.json",
"BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions\\Commvault Security IQ",
"Version": "3.0.2",
"TemplateSpec": true,
"Is1Pconnector": false
}