|
49 | 49 | |
50 | 50 | "_email": "[variables('email')]", |
51 | 51 | "_solutionName": "Global Secure Access", |
52 | | - "_solutionVersion": "3.0.0", |
| 52 | + "_solutionVersion": "3.0.1", |
53 | 53 | "solutionId": "azuresentinel.azure-sentinel-solution-globalsecureaccess", |
54 | 54 | "_solutionId": "[variables('solutionId')]", |
55 | 55 | "workbookVersion1": "1.0.1", |
|
80 | 80 | "_analyticRulecontentProductId2": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-','e3b6a9e7-4c3a-45e6-8baf-1d3bfa8e0c2b','-', '1.0.2')))]" |
81 | 81 | }, |
82 | 82 | "analyticRuleObject3": { |
83 | | - "analyticRuleVersion3": "1.0.2", |
| 83 | + "analyticRuleVersion3": "1.0.3", |
84 | 84 | "_analyticRulecontentId3": "f6a8d6a5-3e9f-47c8-a8d5-1b2b9d3b7d6a", |
85 | 85 | "analyticRuleId3": "[resourceId('Microsoft.SecurityInsights/AlertRuleTemplates', 'f6a8d6a5-3e9f-47c8-a8d5-1b2b9d3b7d6a')]", |
86 | 86 | "analyticRuleTemplateSpecName3": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-ar-',uniquestring('f6a8d6a5-3e9f-47c8-a8d5-1b2b9d3b7d6a')))]", |
87 | | - "_analyticRulecontentProductId3": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-','f6a8d6a5-3e9f-47c8-a8d5-1b2b9d3b7d6a','-', '1.0.2')))]" |
| 87 | + "_analyticRulecontentProductId3": "[concat(take(variables('_solutionId'),50),'-','ar','-', uniqueString(concat(variables('_solutionId'),'-','AnalyticsRule','-','f6a8d6a5-3e9f-47c8-a8d5-1b2b9d3b7d6a','-', '1.0.3')))]" |
88 | 88 | }, |
89 | 89 | "analyticRuleObject4": { |
90 | 90 | "analyticRuleVersion4": "1.0.2", |
|
105 | 105 | "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" |
106 | 106 | ], |
107 | 107 | "properties": { |
108 | | - "description": "GSAM365EnrichedEvents Workbook with template version 3.0.0", |
| 108 | + "description": "GSAM365EnrichedEvents Workbook with template version 3.0.1", |
109 | 109 | "mainTemplate": { |
110 | 110 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", |
111 | 111 | "contentVersion": "[variables('workbookVersion1')]", |
|
189 | 189 | "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" |
190 | 190 | ], |
191 | 191 | "properties": { |
192 | | - "description": "GSANetworkTraffic Workbook with template version 3.0.0", |
| 192 | + "description": "GSANetworkTraffic Workbook with template version 3.0.1", |
193 | 193 | "mainTemplate": { |
194 | 194 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", |
195 | 195 | "contentVersion": "[variables('workbookVersion2')]", |
|
273 | 273 | "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" |
274 | 274 | ], |
275 | 275 | "properties": { |
276 | | - "description": "Identity - AfterHoursActivity_AnalyticalRules Analytics Rule with template version 3.0.0", |
| 276 | + "description": "Identity - AfterHoursActivity_AnalyticalRules Analytics Rule with template version 3.0.1", |
277 | 277 | "mainTemplate": { |
278 | 278 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", |
279 | 279 | "contentVersion": "[variables('analyticRuleObject1').analyticRuleVersion1]", |
|
301 | 301 | "status": "Available", |
302 | 302 | "requiredDataConnectors": [ |
303 | 303 | { |
304 | | - "connectorId": "AzureActiveDirectory", |
305 | 304 | "dataTypes": [ |
306 | 305 | "NetworkAccessTrafficLogs" |
307 | | - ] |
| 306 | + ], |
| 307 | + "connectorId": "AzureActiveDirectory" |
308 | 308 | } |
309 | 309 | ], |
310 | 310 | "tactics": [ |
|
387 | 387 | "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" |
388 | 388 | ], |
389 | 389 | "properties": { |
390 | | - "description": "SWG - Abnormal Deny Rate_AnalyticalRules Analytics Rule with template version 3.0.0", |
| 390 | + "description": "SWG - Abnormal Deny Rate_AnalyticalRules Analytics Rule with template version 3.0.1", |
391 | 391 | "mainTemplate": { |
392 | 392 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", |
393 | 393 | "contentVersion": "[variables('analyticRuleObject2').analyticRuleVersion2]", |
|
415 | 415 | "status": "Available", |
416 | 416 | "requiredDataConnectors": [ |
417 | 417 | { |
418 | | - "connectorId": "AzureActiveDirectory", |
419 | 418 | "dataTypes": [ |
420 | 419 | "NetworkAccessTrafficLogs" |
421 | | - ] |
| 420 | + ], |
| 421 | + "connectorId": "AzureActiveDirectory" |
422 | 422 | } |
423 | 423 | ], |
424 | 424 | "tactics": [ |
|
499 | 499 | "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" |
500 | 500 | ], |
501 | 501 | "properties": { |
502 | | - "description": "SWG - Abnormal Port to Protocol_AnalyticalRules Analytics Rule with template version 3.0.0", |
| 502 | + "description": "SWG - Abnormal Port to Protocol_AnalyticalRules Analytics Rule with template version 3.0.1", |
503 | 503 | "mainTemplate": { |
504 | 504 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", |
505 | 505 | "contentVersion": "[variables('analyticRuleObject3').analyticRuleVersion3]", |
|
516 | 516 | "description": "Identifies changes in the protocol used for specific destination ports, comparing the current runtime with a learned baseline.\nThis can indicate potential protocol misuse or configuration changes.\nConfigurable Parameters:\n- Learning period: The time range to establish the baseline. Default is set to 7 days.\n- Run time: The time range for current analysis. Default is set to 1 day.", |
517 | 517 | "displayName": "GSA - Detect Protocol Changes for Destination Ports", |
518 | 518 | "enabled": false, |
519 | | - "query": "let LearningPeriod = 7d;\nlet RunTime = 1d;\nlet StartLearningPeriod = ago(LearningPeriod + RunTime);\nlet EndRunTime = ago(RunTime);\nlet LearningPortToProtocol = \n NetworkAccessTraffic\n | where TimeGenerated between (StartLearningPeriod .. EndRunTime)\n | where isnotempty(DestinationPort)\n | summarize LearningTimeCount = count() by LearningTimeDstPort = DestinationPort, LearningTimeProtocol = TransportProtocol, SourceIp, DestinationFqdn;\nlet AlertTimePortToProtocol = \n NetworkAccessTraffic\n | where TimeGenerated between (EndRunTime .. now())\n | where isnotempty(DestinationPort)\n | summarize AlertTimeCount = count() by AlertTimeDstPort = DestinationPort, AlertTimeProtocol = TransportProtocol, SourceIp, DestinationFqdn;\nAlertTimePortToProtocol\n | join kind=leftouter (LearningPortToProtocol) on $left.AlertTimeDstPort == $right.LearningTimeDstPort and $left.SourceIp == $right.SourceIp and $left.DestinationFqdn == $right.DestinationFqdn\n | where isnull(LearningTimeProtocol) or LearningTimeProtocol != AlertTimeProtocol\n | project AlertTimeDstPort, AlertTimeProtocol, LearningTimeProtocol, SourceIp, DestinationFqdn\n | extend IPCustomEntity = SourceIp, FqdnCustomEntity = DestinationFqdn\n", |
| 519 | + "query": "let LearningPeriod = 7d;\nlet RunTime = 1d;\nlet StartLearningPeriod = ago(LearningPeriod + RunTime);\nlet EndRunTime = ago(RunTime);\nlet LearningPortToProtocol = \n NetworkAccessTraffic\n | where TimeGenerated between (StartLearningPeriod .. EndRunTime)\n | where isnotempty(DestinationPort)\n | summarize LearningTimeCount = count() by LearningTimeDstPort = DestinationPort, LearningTimeProtocol = TransportProtocol, SourceIp, DestinationFqdn;\nlet AlertTimePortToProtocol = \n NetworkAccessTraffic\n | where TimeGenerated between (EndRunTime .. now())\n | where isnotempty(DestinationPort)\n | summarize AlertTimeCount = count() by AlertTimeDstPort = DestinationPort, AlertTimeProtocol = TransportProtocol, SourceIp, DestinationFqdn;\nAlertTimePortToProtocol\n | join kind=leftouter (LearningPortToProtocol) on $left.AlertTimeDstPort == $right.LearningTimeDstPort and $left.SourceIp == $right.SourceIp and $left.DestinationFqdn == $right.DestinationFqdn\n | where LearningTimeProtocol != \"\" and AlertTimeProtocol != \"\" and LearningTimeProtocol != AlertTimeProtocol\n | project AlertTimeDstPort, AlertTimeProtocol, LearningTimeProtocol, SourceIp, DestinationFqdn\n | extend IPCustomEntity = SourceIp, FqdnCustomEntity = DestinationFqdn\n", |
520 | 520 | "queryFrequency": "PT1H", |
521 | 521 | "queryPeriod": "P8D", |
522 | 522 | "severity": "Medium", |
|
527 | 527 | "status": "Available", |
528 | 528 | "requiredDataConnectors": [ |
529 | 529 | { |
530 | | - "connectorId": "AzureActiveDirectory", |
531 | 530 | "dataTypes": [ |
532 | 531 | "NetworkAccessTrafficLogs" |
533 | | - ] |
| 532 | + ], |
| 533 | + "connectorId": "AzureActiveDirectory" |
534 | 534 | } |
535 | 535 | ], |
536 | 536 | "tactics": [ |
|
611 | 611 | "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" |
612 | 612 | ], |
613 | 613 | "properties": { |
614 | | - "description": "SWG - Source IP Port Scan_AnalyticalRules Analytics Rule with template version 3.0.0", |
| 614 | + "description": "SWG - Source IP Port Scan_AnalyticalRules Analytics Rule with template version 3.0.1", |
615 | 615 | "mainTemplate": { |
616 | 616 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", |
617 | 617 | "contentVersion": "[variables('analyticRuleObject4').analyticRuleVersion4]", |
|
639 | 639 | "status": "Available", |
640 | 640 | "requiredDataConnectors": [ |
641 | 641 | { |
642 | | - "connectorId": "AzureActiveDirectory", |
643 | 642 | "dataTypes": [ |
644 | 643 | "NetworkAccessTrafficLogs" |
645 | | - ] |
| 644 | + ], |
| 645 | + "connectorId": "AzureActiveDirectory" |
646 | 646 | } |
647 | 647 | ], |
648 | 648 | "tactics": [ |
|
720 | 720 | "apiVersion": "2023-04-01-preview", |
721 | 721 | "location": "[parameters('workspace-location')]", |
722 | 722 | "properties": { |
723 | | - "version": "3.0.0", |
| 723 | + "version": "3.0.1", |
724 | 724 | "kind": "Solution", |
725 | 725 | "contentSchemaVersion": "3.0.0", |
726 | 726 | "displayName": "Global Secure Access", |
|
0 commit comments