Skip to content

Commit d9d11f3

Browse files
authored
Merge pull request Azure#13086 from lVlayhem/feature/acronis-fix
Fix Acronis publisherId - acronisinternationalgmbh
2 parents c7d1b63 + 2f3620a commit d9d11f3

File tree

6 files changed

+33
-33
lines changed

6 files changed

+33
-33
lines changed

Solutions/Acronis Cyber Protect Cloud/Data/Solution_AcronisCyberProtectCloud.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"Name": "Acronis Cyber Protect Cloud",
33
"Author": "Acronis - [email protected]",
44
"Logo": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Acronis.svg\" width=\"75px\" height=\"75px\">",
5-
"Description": "The Acronis Cyber Protect Cloud solution for Microsoft Sentinel enables companies to ingest Acronis alerts, events, and activities into Microsoft Sentinel. The data is initially stored on a device on the company network (https://www.acronis.com/en-us/support/documentation/CyberProtectionService/index.html#siem-plans.html) using the Acronis agent as a writer. The integration includes custom Acronis detection rules and hunting queries to help companies proactively hunt for threats.",
5+
"Description": "The Acronis Cyber Protect Cloud solution for Microsoft Sentinel enables companies to ingest Acronis alerts, events, and activities into Microsoft Sentinel. The data is initially stored on a device on the company network using the Acronis agent as a writer. [See Acronis SIEM Connector documentation here](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/index.html#siem-plans.html) The integration includes custom Acronis detection rules and hunting queries to help companies proactively hunt for threats.",
66
"Data Connectors": [],
77
"Workbooks": [],
88
"Analytic Rules": [
29 Bytes
Binary file not shown.

Solutions/Acronis Cyber Protect Cloud/Package/createUiDefinition.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
"config": {
77
"isWizard": false,
88
"basics": {
9-
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Acronis.svg\" width=\"75px\" height=\"75px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Acronis%20Cyber%20Protect%20Cloud/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe Acronis Cyber Protect Cloud solution for Microsoft Sentinel enables companies to ingest Acronis alerts, events, and activities into Microsoft Sentinel. The data is initially stored on a device on the company network (https://www.acronis.com/en-us/support/documentation/CyberProtectionService/index.html#siem-plans.html) using the Acronis agent as a writer. The integration includes custom Acronis detection rules and hunting queries to help companies proactively hunt for threats.\n\n**Analytic Rules:** 4, **Hunting Queries:** 13\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
9+
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Acronis.svg\" width=\"75px\" height=\"75px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Acronis%20Cyber%20Protect%20Cloud/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe Acronis Cyber Protect Cloud solution for Microsoft Sentinel enables companies to ingest Acronis alerts, events, and activities into Microsoft Sentinel. The data is initially stored on a device on the company network using the Acronis agent as a writer. [See Acronis SIEM Connector documentation here](https://www.acronis.com/en-us/support/documentation/CyberProtectionService/index.html#siem-plans.html) The integration includes custom Acronis detection rules and hunting queries to help companies proactively hunt for threats.\n\n**Analytic Rules:** 4, **Hunting Queries:** 13\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
1010
"subscription": {
1111
"resourceProviders": [
1212
"Microsoft.OperationsManagement/solutions",

Solutions/Acronis Cyber Protect Cloud/Package/mainTemplate.json

Lines changed: 29 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@
3434
"_email": "[variables('email')]",
3535
"_solutionName": "Acronis Cyber Protect Cloud",
3636
"_solutionVersion": "3.0.0",
37-
"solutionId": "91996410.azure-sentinel-solution-acronis-cyber-protect",
37+
"solutionId": "acronisinternationalgmbh.azure-sentinel-solution-acronis-cyber-protect",
3838
"_solutionId": "[variables('solutionId')]",
3939
"analyticRuleObject1": {
4040
"analyticRuleVersion1": "1.0.0",
@@ -177,8 +177,8 @@
177177
{
178178
"fieldMappings": [
179179
{
180-
"identifier": "Address",
181-
"columnName": "initiator_ip"
180+
"columnName": "initiator_ip",
181+
"identifier": "Address"
182182
}
183183
],
184184
"entityType": "IP"
@@ -192,16 +192,16 @@
192192
"alertDisplayNameFormat": "Acronis - Login from Abnormal IP ({{initiator_ip}}) - Low Occurrence ({{LoginCount}})"
193193
},
194194
"incidentConfiguration": {
195-
"createIncident": true,
196195
"groupingConfiguration": {
197-
"matchingMethod": "Selected",
198-
"enabled": true,
199-
"reopenClosedIncident": true,
200-
"lookbackDuration": "P7D",
201196
"groupByEntities": [
202197
"IP"
203-
]
204-
}
198+
],
199+
"reopenClosedIncident": true,
200+
"enabled": true,
201+
"matchingMethod": "Selected",
202+
"lookbackDuration": "P7D"
203+
},
204+
"createIncident": true
205205
}
206206
}
207207
},
@@ -295,8 +295,8 @@
295295
{
296296
"fieldMappings": [
297297
{
298-
"identifier": "HostName",
299-
"columnName": "DeviceName"
298+
"columnName": "DeviceName",
299+
"identifier": "HostName"
300300
}
301301
],
302302
"entityType": "Host"
@@ -309,13 +309,13 @@
309309
"DeviceName": "DeviceName"
310310
},
311311
"incidentConfiguration": {
312-
"createIncident": true,
313312
"groupingConfiguration": {
314-
"matchingMethod": "AnyAlert",
315-
"enabled": true,
316313
"reopenClosedIncident": true,
314+
"enabled": true,
315+
"matchingMethod": "AnyAlert",
317316
"lookbackDuration": "P1D"
318-
}
317+
},
318+
"createIncident": true
319319
}
320320
}
321321
},
@@ -406,8 +406,8 @@
406406
{
407407
"fieldMappings": [
408408
{
409-
"identifier": "HostName",
410-
"columnName": "DeviceName"
409+
"columnName": "DeviceName",
410+
"identifier": "HostName"
411411
}
412412
],
413413
"entityType": "Host"
@@ -420,13 +420,13 @@
420420
"DeviceName": "DeviceName"
421421
},
422422
"incidentConfiguration": {
423-
"createIncident": true,
424423
"groupingConfiguration": {
425-
"matchingMethod": "AnyAlert",
426-
"enabled": true,
427424
"reopenClosedIncident": true,
425+
"enabled": true,
426+
"matchingMethod": "AnyAlert",
428427
"lookbackDuration": "P1D"
429-
}
428+
},
429+
"createIncident": true
430430
}
431431
}
432432
},
@@ -522,8 +522,8 @@
522522
{
523523
"fieldMappings": [
524524
{
525-
"identifier": "HostName",
526-
"columnName": "DeviceName"
525+
"columnName": "DeviceName",
526+
"identifier": "HostName"
527527
}
528528
],
529529
"entityType": "Host"
@@ -536,13 +536,13 @@
536536
"DeviceName": "DeviceName"
537537
},
538538
"incidentConfiguration": {
539-
"createIncident": true,
540539
"groupingConfiguration": {
541-
"matchingMethod": "AnyAlert",
542-
"enabled": true,
543540
"reopenClosedIncident": true,
541+
"enabled": true,
542+
"matchingMethod": "AnyAlert",
544543
"lookbackDuration": "P1D"
545-
}
544+
},
545+
"createIncident": true
546546
}
547547
}
548548
},
@@ -1639,7 +1639,7 @@
16391639
"contentSchemaVersion": "3.0.0",
16401640
"displayName": "Acronis Cyber Protect Cloud",
16411641
"publisherDisplayName": "Acronis International GmbH",
1642-
"descriptionHtml": "<p><strong>Note:</strong> Please refer to the following before installing the solution:</p>\n<p>• Review the solution <a href=\"https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Acronis%20Cyber%20Protect%20Cloud/ReleaseNotes.md\">Release Notes</a></p>\n<p>• There may be <a href=\"https://aka.ms/sentinelsolutionsknownissues\">known issues</a> pertaining to this Solution, please refer to them before installing.</p>\n<p>The Acronis Cyber Protect Cloud solution for Microsoft Sentinel enables companies to ingest Acronis alerts, events, and activities into Microsoft Sentinel. The data is initially stored on a device on the company network (<a href=\"https://www.acronis.com/en-us/support/documentation/CyberProtectionService/index.html#siem-plans.html\">https://www.acronis.com/en-us/support/documentation/CyberProtectionService/index.html#siem-plans.html</a>) using the Acronis agent as a writer. The integration includes custom Acronis detection rules and hunting queries to help companies proactively hunt for threats.</p>\n<p><strong>Analytic Rules:</strong> 4, <strong>Hunting Queries:</strong> 13</p>\n<p><a href=\"https://aka.ms/azuresentinel\">Learn more about Microsoft Sentinel</a> | <a href=\"https://aka.ms/azuresentinelsolutionsdoc\">Learn more about Solutions</a></p>\n",
1642+
"descriptionHtml": "<p><strong>Note:</strong> Please refer to the following before installing the solution:</p>\n<p>• Review the solution <a href=\"https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Acronis%20Cyber%20Protect%20Cloud/ReleaseNotes.md\">Release Notes</a></p>\n<p>• There may be <a href=\"https://aka.ms/sentinelsolutionsknownissues\">known issues</a> pertaining to this Solution, please refer to them before installing.</p>\n<p>The Acronis Cyber Protect Cloud solution for Microsoft Sentinel enables companies to ingest Acronis alerts, events, and activities into Microsoft Sentinel. The data is initially stored on a device on the company network using the Acronis agent as a writer. <a href=\"https://www.acronis.com/en-us/support/documentation/CyberProtectionService/index.html#siem-plans.html\">See Acronis SIEM Connector documentation here</a> The integration includes custom Acronis detection rules and hunting queries to help companies proactively hunt for threats.</p>\n<p><strong>Analytic Rules:</strong> 4, <strong>Hunting Queries:</strong> 13</p>\n<p><a href=\"https://aka.ms/azuresentinel\">Learn more about Microsoft Sentinel</a> | <a href=\"https://aka.ms/azuresentinelsolutionsdoc\">Learn more about Solutions</a></p>\n",
16431643
"contentKind": "Solution",
16441644
"contentProductId": "[variables('_solutioncontentProductId')]",
16451645
"id": "[variables('_solutioncontentProductId')]",
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
11
| **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** |
22
|-------------|--------------------------------|--------------------------------------------------------------------|
3-
| 3.0.0 | 28-10-2025 | Initial Solution Release |
3+
| 3.0.0 | 11-11-2025 | Initial Solution Release. <br> publisherId has been Updated updated|

Solutions/Acronis Cyber Protect Cloud/SolutionMetadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"publisherId": "91996410",
2+
"publisherId": "acronisinternationalgmbh",
33
"offerId": "azure-sentinel-solution-acronis-cyber-protect",
44
"firstPublishDate": "2025-10-28",
55
"lastPublishDate": "2025-10-28",

0 commit comments

Comments
 (0)