Skip to content

Commit

Permalink
Updated based on feedback
Browse files Browse the repository at this point in the history
  • Loading branch information
FrankGasparovic committed Sep 23, 2024
1 parent 43133aa commit 18bc5ac
Show file tree
Hide file tree
Showing 5 changed files with 711 additions and 2 deletions.
7 changes: 7 additions & 0 deletions Solutions/Silverfort/Data/Solution_Silverfort.json
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,13 @@
"Data Connectors": [
"Data Connectors/SilverfortAma.json"
],
"Workbooks": ["Solutions/Silverfort/Workbooks/SilverfortWorkbook.json"],
"Analytic Rules": [
"Solutions/Silverfort/Analytic Rules/Certifried.yaml",
"Solutions/Silverfort/Analytic Rules/Log4Shell.yaml",
"Solutions/Silverfort/Analytic Rules/NoPac_Breach.yaml",
"Solutions/Silverfort/Analytic Rules/User_Brute_Force.yaml"
],
"BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions\\Silverfort",
"Version": "1.0.0",
"Metadata": "SolutionMetadata.json",
Expand Down
Binary file modified Solutions/Silverfort/Package/3.0.0.zip
Binary file not shown.
128 changes: 127 additions & 1 deletion Solutions/Silverfort/Package/createUiDefinition.json
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
"config": {
"isWizard": false,
"basics": {
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/silverfort-logo.svg\" width=\"168px\" height=\"168px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Silverfort/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe [Silverfort](https://silverfort.com) ITDR Admin Console connector solution allows ingestion of Silverfort events and logging into Microsoft Sentinel.\n Silverfort provides syslog based events and logging using Common Event Format (CEF). By forwarding your Silverfort ITDR Admin Console CEF data into Microsoft Sentinel, you can take advantage of Sentinels's search & correlation, alerting, and threat intelligence enrichment on Silverfort data. \n Please contact Silverfort or consult the Silverfort documentation for more information.\n\n**Data Connectors:** 1\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/silverfort-logo.svg\" width=\"168px\" height=\"168px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Silverfort/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe [Silverfort](https://silverfort.com) ITDR Admin Console connector solution allows ingestion of Silverfort events and logging into Microsoft Sentinel.\n Silverfort provides syslog based events and logging using Common Event Format (CEF). By forwarding your Silverfort ITDR Admin Console CEF data into Microsoft Sentinel, you can take advantage of Sentinels's search & correlation, alerting, and threat intelligence enrichment on Silverfort data. \n Please contact Silverfort or consult the Silverfort documentation for more information.\n\n**Data Connectors:** 1, **Workbooks:** 1, **Analytic Rules:** 4\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
"subscription": {
"resourceProviders": [
"Microsoft.OperationsManagement/solutions",
Expand Down Expand Up @@ -74,6 +74,132 @@
}
}
]
},
{
"name": "workbooks",
"label": "Workbooks",
"subLabel": {
"preValidation": "Configure the workbooks",
"postValidation": "Done"
},
"bladeTitle": "Workbooks",
"elements": [
{
"name": "workbooks-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "This solution installs workbook(s) to help you gain insights into the telemetry collected in Microsoft Sentinel. After installing the solution, start using the workbook in Manage solution view."
}
},
{
"name": "workbooks-link",
"type": "Microsoft.Common.TextBlock",
"options": {
"link": {
"label": "Learn more",
"uri": "https://docs.microsoft.com/azure/sentinel/tutorial-monitor-your-data"
}
}
},
{
"name": "workbook1",
"type": "Microsoft.Common.Section",
"label": "Silverfort Admin Console",
"elements": [
{
"name": "workbook1-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "The [Silverfort](https://silverfort.com) ITDR Admin Console connector solution allows ingestion of Silverfort events and logging into Microsoft Sentinel.\n Silverfort provides syslog based events and logging using Common Event Format (CEF). By forwarding your Silverfort ITDR Admin Console CEF data into Microsoft Sentinel, you can take advantage of Sentinels's search & correlation, alerting, and threat intelligence enrichment on Silverfort data. \n Please contact Silverfort or consult the Silverfort documentation for more information."
}
}
]
}
]
},
{
"name": "analytics",
"label": "Analytics",
"subLabel": {
"preValidation": "Configure the analytics",
"postValidation": "Done"
},
"bladeTitle": "Analytics",
"elements": [
{
"name": "analytics-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "This solution installs the following analytic rule templates. After installing the solution, create and enable analytic rules in Manage solution view."
}
},
{
"name": "analytics-link",
"type": "Microsoft.Common.TextBlock",
"options": {
"link": {
"label": "Learn more",
"uri": "https://docs.microsoft.com/azure/sentinel/tutorial-detect-threats-custom?WT.mc_id=Portal-Microsoft_Azure_CreateUIDef"
}
}
},
{
"name": "analytic1",
"type": "Microsoft.Common.Section",
"label": "Silverfort - Certifried Incident",
"elements": [
{
"name": "analytic1-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "An Active Directory domain privilege escalation vulnerability that enables a privileged user to access the Domain Controller by abusing Active Directory Certificate Service"
}
}
]
},
{
"name": "analytic2",
"type": "Microsoft.Common.Section",
"label": "Silverfort - Log4Shell Incident",
"elements": [
{
"name": "analytic2-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "Vulnerability allows attackers to execute arbitrary code on affected systems by exploiting a flaw in the way Log4j handles log messages containing specially crafted strings"
}
}
]
},
{
"name": "analytic3",
"type": "Microsoft.Common.Section",
"label": "Silverfort - NoPacBreach Incident",
"elements": [
{
"name": "analytic3-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "The NoPac vulnerability involves privilege escalation, allowing attackers to gain unauthorized access and potentially take control of an entire Active Directory domain"
}
}
]
},
{
"name": "analytic4",
"type": "Microsoft.Common.Section",
"label": "Silverfort - UserBruteForce Incident",
"elements": [
{
"name": "analytic4-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "A security weakness that allows attackers to gain unauthorized access to user accounts by systematically guessing the username and password combinations."
}
}
]
}
]
}
],
"outputs": {
Expand Down
570 changes: 569 additions & 1 deletion Solutions/Silverfort/Package/mainTemplate.json

Large diffs are not rendered by default.

8 changes: 8 additions & 0 deletions Solutions/Silverfort/Package/testParameters.json
Original file line number Diff line number Diff line change
Expand Up @@ -20,5 +20,13 @@
"metadata": {
"description": "Workspace name for Log Analytics where Microsoft Sentinel is setup"
}
},
"workbook1-name": {
"type": "string",
"defaultValue": "Silverfort Admin Console",
"minLength": 1,
"metadata": {
"description": "Name for the workbook"
}
}
}

0 comments on commit 18bc5ac

Please sign in to comment.