|
92 | 92 | "connectorUiConfig": { |
93 | 93 | "id": "IllumioInsightsDefinition", |
94 | 94 | "title": "Illumio Insights", |
95 | | - "descriptionMarkdown": "Illumio Insights Connector sends workload and security graph data from Illumio Insights into the Azure Sentinel Data Lake, providing deep context for threat detection, lateral movement analysis, and real-time investigation.", |
| 95 | + "descriptionMarkdown": "Illumio Insights Connector sends workload and security graph data from Illumio Insights into the Azure Microsoft Sentinel Data Lake, providing deep context for threat detection, lateral movement analysis, and real-time investigation.", |
96 | 96 | "publisher": "Microsoft", |
97 | 97 | "graphQueries": [ |
98 | 98 | { |
99 | 99 | "metricName": "Total incident logs received", |
100 | 100 | "legend": "Illumio Insights incident Logs", |
101 | | - "baseQuery": "IllumioInsights" |
| 101 | + "baseQuery": "IllumioInsights_CL" |
102 | 102 | } |
103 | 103 | ], |
104 | 104 | "sampleQueries": [ |
105 | 105 | { |
106 | 106 | "description": "Get Sample of Illumio Insights logs", |
107 | | - "query": "IllumioInsights| take 10" |
| 107 | + "query": "IllumioInsights_CL| take 10" |
108 | 108 | } |
109 | 109 | ], |
110 | 110 | "dataTypes": [ |
111 | 111 | { |
112 | | - "name": "IllumioInsights", |
113 | | - "lastDataReceivedQuery": "IllumioInsights\n | where TimeGenerated > ago(12h) | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" |
| 112 | + "name": "IllumioInsights_CL", |
| 113 | + "lastDataReceivedQuery": "IllumioInsights_CL\n | where TimeGenerated > ago(12h) | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" |
114 | 114 | } |
115 | 115 | ], |
116 | 116 | "connectivityCriteria": [ |
|
336 | 336 | "connectorUiConfig": { |
337 | 337 | "id": "IllumioInsightsDefinition", |
338 | 338 | "title": "Illumio Insights", |
339 | | - "descriptionMarkdown": "Illumio Insights Connector sends workload and security graph data from Illumio Insights into the Azure Sentinel Data Lake, providing deep context for threat detection, lateral movement analysis, and real-time investigation.", |
| 339 | + "descriptionMarkdown": "Illumio Insights Connector sends workload and security graph data from Illumio Insights into the Azure Microsoft Sentinel Data Lake, providing deep context for threat detection, lateral movement analysis, and real-time investigation.", |
340 | 340 | "publisher": "Microsoft", |
341 | 341 | "graphQueries": [ |
342 | 342 | { |
343 | 343 | "metricName": "Total incident logs received", |
344 | 344 | "legend": "Illumio Insights incident Logs", |
345 | | - "baseQuery": "IllumioInsights" |
| 345 | + "baseQuery": "IllumioInsights_CL" |
346 | 346 | } |
347 | 347 | ], |
348 | 348 | "sampleQueries": [ |
349 | 349 | { |
350 | 350 | "description": "Get Sample of Illumio Insights logs", |
351 | | - "query": "IllumioInsights| take 10" |
| 351 | + "query": "IllumioInsights_CL| take 10" |
352 | 352 | } |
353 | 353 | ], |
354 | 354 | "dataTypes": [ |
355 | 355 | { |
356 | | - "name": "IllumioInsights", |
357 | | - "lastDataReceivedQuery": "IllumioInsights\n | where TimeGenerated > ago(12h) | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" |
| 356 | + "name": "IllumioInsights_CL", |
| 357 | + "lastDataReceivedQuery": "IllumioInsights_CL\n | where TimeGenerated > ago(12h) | summarize Time = max(TimeGenerated)\n | where isnotempty(Time)" |
358 | 358 | } |
359 | 359 | ], |
360 | 360 | "connectivityCriteria": [ |
|
0 commit comments