Skip to content

Commit

Permalink
Merge pull request Azure#10570 from Azure/v-shukore/LegacyIOCBasedThr…
Browse files Browse the repository at this point in the history
…eatProtection

Added mising DC reference in Analytic Rule for LigecyIOCBasedThreatIntelligence Solution
  • Loading branch information
v-atulyadav authored Jun 5, 2024
2 parents 50ceca4 + 97eb547 commit 9ca0681
Show file tree
Hide file tree
Showing 6 changed files with 24 additions and 20 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@
"Solutions/Legacy IOC based Threat Protection/Hunting Queries/ForestBlizzard_IOC_RetroHunt.yaml"
],
"BasePath": "C:\\One\\Azure\\Azure-Sentinel",
"Version": "3.0.2",
"Version": "3.0.5",
"TemplateSpec": true,
"Is1PConnector": true,
"Metadata": "SolutionMetadata.json"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,9 @@ requiredDataConnectors:
- connectorId: CiscoASA
dataTypes:
- CommonSecurityLog
- connectorId: CiscoAsaAma
dataTypes:
- CommonSecurityLog
- connectorId: PaloAltoNetworks
dataTypes:
- CommonSecurityLog
Expand Down Expand Up @@ -40,4 +43,4 @@ query: |
)
)
| extend timestamp = TimeGenerated
version: 1.0.2
version: 1.0.3
Binary file not shown.
Original file line number Diff line number Diff line change
Expand Up @@ -208,7 +208,7 @@
"name": "huntingquery10-text",
"type": "Microsoft.Common.TextBlock",
"options": {
"text": "Matches domain name IOCs related to Forest Blizzard group activity with CommonSecurityLog and SecurityAlert dataTypes.\nThe query is scoped in the time window that these IOCs were active. This hunting query depends on CiscoASA PaloAltoNetworks AzureSecurityCenter data connector (CommonSecurityLog CommonSecurityLog SecurityAlert Parser or Table)"
"text": "Matches domain name IOCs related to Forest Blizzard group activity with CommonSecurityLog and SecurityAlert dataTypes.\nThe query is scoped in the time window that these IOCs were active. This hunting query depends on CiscoASA CiscoAsaAma PaloAltoNetworks AzureSecurityCenter data connector (CommonSecurityLog CommonSecurityLog CommonSecurityLog SecurityAlert Parser or Table)"
}
}
]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@
"email": "[email protected]",
"_email": "[variables('email')]",
"_solutionName": "Legacy IOC based Threat Protection",
"_solutionVersion": "3.0.4",
"_solutionVersion": "3.0.5",
"solutionId": "azuresentinel.azure-sentinel-solution-ioclegacy",
"_solutionId": "[variables('solutionId')]",
"huntingQueryObject1": {
Expand Down Expand Up @@ -82,7 +82,7 @@
"huntingQueryTemplateSpecName9": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-hq-',uniquestring('278592b5-612b-48a4-bb38-4c01ff8ee2a5')))]"
},
"huntingQueryObject10": {
"huntingQueryVersion10": "1.0.2",
"huntingQueryVersion10": "1.0.3",
"_huntingQuerycontentId10": "b8b7574f-1cd6-4308-822a-ab07256106f8",
"huntingQueryTemplateSpecName10": "[concat(parameters('workspace'),'/Microsoft.SecurityInsights/',concat(parameters('workspace'),'-hq-',uniquestring('b8b7574f-1cd6-4308-822a-ab07256106f8')))]"
},
Expand All @@ -98,7 +98,7 @@
"[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]"
],
"properties": {
"description": "Dev-0056CommandLineActivityNovember2021_HuntingQueries Hunting Query with template version 3.0.4",
"description": "Dev-0056CommandLineActivityNovember2021_HuntingQueries Hunting Query with template version 3.0.5",
"mainTemplate": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "[variables('huntingQueryObject1').huntingQueryVersion1]",
Expand Down Expand Up @@ -183,7 +183,7 @@
"[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]"
],
"properties": {
"description": "Dev-0322CommandLineActivityNovember2021(ASIMVersion)_HuntingQueries Hunting Query with template version 3.0.4",
"description": "Dev-0322CommandLineActivityNovember2021(ASIMVersion)_HuntingQueries Hunting Query with template version 3.0.5",
"mainTemplate": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "[variables('huntingQueryObject2').huntingQueryVersion2]",
Expand Down Expand Up @@ -268,7 +268,7 @@
"[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]"
],
"properties": {
"description": "Dev-0322CommandLineActivityNovember2021_HuntingQueries Hunting Query with template version 3.0.4",
"description": "Dev-0322CommandLineActivityNovember2021_HuntingQueries Hunting Query with template version 3.0.5",
"mainTemplate": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "[variables('huntingQueryObject3').huntingQueryVersion3]",
Expand Down Expand Up @@ -353,7 +353,7 @@
"[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]"
],
"properties": {
"description": "Dev-0322FileDropActivityNovember2021(ASIMVersion)_HuntingQueries Hunting Query with template version 3.0.4",
"description": "Dev-0322FileDropActivityNovember2021(ASIMVersion)_HuntingQueries Hunting Query with template version 3.0.5",
"mainTemplate": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "[variables('huntingQueryObject4').huntingQueryVersion4]",
Expand Down Expand Up @@ -438,7 +438,7 @@
"[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]"
],
"properties": {
"description": "Dev-0322FileDropActivityNovember2021_HuntingQueries Hunting Query with template version 3.0.4",
"description": "Dev-0322FileDropActivityNovember2021_HuntingQueries Hunting Query with template version 3.0.5",
"mainTemplate": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "[variables('huntingQueryObject5').huntingQueryVersion5]",
Expand Down Expand Up @@ -523,7 +523,7 @@
"[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]"
],
"properties": {
"description": "NetworkConnectiontoOMIPorts_HuntingQueries Hunting Query with template version 3.0.4",
"description": "NetworkConnectiontoOMIPorts_HuntingQueries Hunting Query with template version 3.0.5",
"mainTemplate": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "[variables('huntingQueryObject6').huntingQueryVersion6]",
Expand Down Expand Up @@ -608,7 +608,7 @@
"[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]"
],
"properties": {
"description": "NylonTyphoonCommandLineActivity-Nov2021_HuntingQueries Hunting Query with template version 3.0.4",
"description": "NylonTyphoonCommandLineActivity-Nov2021_HuntingQueries Hunting Query with template version 3.0.5",
"mainTemplate": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "[variables('huntingQueryObject7').huntingQueryVersion7]",
Expand Down Expand Up @@ -693,7 +693,7 @@
"[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]"
],
"properties": {
"description": "NylonTyphoonRegIOCPatterns_HuntingQueries Hunting Query with template version 3.0.4",
"description": "NylonTyphoonRegIOCPatterns_HuntingQueries Hunting Query with template version 3.0.5",
"mainTemplate": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "[variables('huntingQueryObject8').huntingQueryVersion8]",
Expand Down Expand Up @@ -778,7 +778,7 @@
"[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]"
],
"properties": {
"description": "SolarWindsInventory_HuntingQueries Hunting Query with template version 3.0.4",
"description": "SolarWindsInventory_HuntingQueries Hunting Query with template version 3.0.5",
"mainTemplate": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "[variables('huntingQueryObject9').huntingQueryVersion9]",
Expand Down Expand Up @@ -863,7 +863,7 @@
"[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]"
],
"properties": {
"description": "ForestBlizzard_IOC_RetroHunt_HuntingQueries Hunting Query with template version 3.0.4",
"description": "ForestBlizzard_IOC_RetroHunt_HuntingQueries Hunting Query with template version 3.0.5",
"mainTemplate": {
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
"contentVersion": "[variables('huntingQueryObject10').huntingQueryVersion10]",
Expand Down Expand Up @@ -934,22 +934,22 @@
"contentId": "[variables('huntingQueryObject10')._huntingQuerycontentId10]",
"contentKind": "HuntingQuery",
"displayName": "Retrospective hunt for Forest Blizzard IP IOCs",
"contentProductId": "[concat(take(variables('_solutionId'),50),'-','hq','-', uniqueString(concat(variables('_solutionId'),'-','HuntingQuery','-',variables('huntingQueryObject10')._huntingQuerycontentId10,'-', '1.0.2')))]",
"id": "[concat(take(variables('_solutionId'),50),'-','hq','-', uniqueString(concat(variables('_solutionId'),'-','HuntingQuery','-',variables('huntingQueryObject10')._huntingQuerycontentId10,'-', '1.0.2')))]",
"version": "1.0.2"
"contentProductId": "[concat(take(variables('_solutionId'),50),'-','hq','-', uniqueString(concat(variables('_solutionId'),'-','HuntingQuery','-',variables('huntingQueryObject10')._huntingQuerycontentId10,'-', '1.0.3')))]",
"id": "[concat(take(variables('_solutionId'),50),'-','hq','-', uniqueString(concat(variables('_solutionId'),'-','HuntingQuery','-',variables('huntingQueryObject10')._huntingQuerycontentId10,'-', '1.0.3')))]",
"version": "1.0.3"
}
},
{
"type": "Microsoft.OperationalInsights/workspaces/providers/contentPackages",
"apiVersion": "2023-04-01-preview",
"location": "[parameters('workspace-location')]",
"properties": {
"version": "3.0.4",
"version": "3.0.5",
"kind": "Solution",
"contentSchemaVersion": "3.0.0",
"displayName": "Legacy IOC based Threat Protection",
"publisherDisplayName": "Microsoft Sentinel, Microsoft Corporation",
"descriptionHtml": "<p><strong>Note:</strong> <p>• There may be <a href=\"https://aka.ms/sentinelsolutionsknownissues\">known issues</a> pertaining to this Solution, please refer to them before installing.</p>\n<p>Microsoft Security Research, based on ongoing trends and exploits creates content that help identify existence of known IOCs based on known prevalent attacks and threat actor tactics/techniques, such as Nobelium, Gallium, Solorigate, etc. This solution contains packaged content written on some legacy IOCs that have been prevalent in the past but may still be relevant.</p>\n<p><strong>Pre-requisites:</strong></p>\n<p>This is a <a href=\"https://learn.microsoft.com/azure/sentinel/sentinel-solutions-catalog#domain-solutions\">domain solution</a> and does not include any data connectors. The content in this solution supports the connectors listed below. Install one or more of the listed solutions, to unlock the value provided by this solution.</p>\n<ol>\n<li><p>Squid Proxy</p>\n</li>\n<li><p>Windows Server DNS</p>\n</li>\n<li><p>Cisco ASA</p>\n</li>\n<li><p>Palo Alto Networks</p>\n</li>\n<li><p>Microsoft Defender XDR</p>\n</li>\n<li><p>Azure Firewall</p>\n</li>\n<li><p>ZScaler Internet Access</p>\n</li>\n<li><p>Infoblox NIOS</p>\n</li>\n<li><p>Google Cloud Platform DNS</p>\n</li>\n<li><p>NXLog DNS</p>\n</li>\n<li><p>Cisco Umbrella</p>\n</li>\n<li><p>Corelight</p>\n</li>\n<li><p>Amazon Web Services</p>\n</li>\n<li><p>Windows Forwarded Events</p>\n</li>\n<li><p>Sysmon for Linux</p>\n</li>\n<li><p>Microsoft 365</p>\n</li>\n<li><p>Windows Security Events</p>\n</li>\n<li><p>Microsoft Entra ID</p>\n</li>\n<li><p>Azure Activity</p>\n</li>\n<li><p>F5 Advanced WAF</p>\n</li>\n<li><p>Fortinet FortiGate</p>\n</li>\n<li><p>Check Point</p>\n</li>\n<li><p>Common Event Format</p>\n</li>\n<li><p>Windows Firewall</p>\n</li>\n</ol>\n<p><strong>Hunting Queries:</strong> 10</p>\n<p><a href=\"https://aka.ms/azuresentinel\">Learn more about Microsoft Sentinel</a> | <a href=\"https://aka.ms/azuresentinelsolutionsdoc\">Learn more about Solutions</a></p>\n",
"descriptionHtml": "<p><strong>Note:</strong> Please refer to the following before installing the solution:</p>\n<p>• Review the solution <a href=\"https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/Legacy%20IOC%20based%20Threat%20Protection/ReleaseNotes.md\">Release Notes</a></p>\n<p>• There may be <a href=\"https://aka.ms/sentinelsolutionsknownissues\">known issues</a> pertaining to this Solution, please refer to them before installing.</p>\n<p>Microsoft Security Research, based on ongoing trends and exploits creates content that help identify existence of known IOCs based on known prevalent attacks and threat actor tactics/techniques, such as Nobelium, Gallium, Solorigate, etc. This solution contains packaged content written on some legacy IOCs that have been prevalent in the past but may still be relevant.</p>\n<p><strong>Pre-requisites:</strong></p>\n<p>This is a <a href=\"https://learn.microsoft.com/azure/sentinel/sentinel-solutions-catalog#domain-solutions\">domain solution</a> and does not include any data connectors. The content in this solution supports the connectors listed below. Install one or more of the listed solutions, to unlock the value provided by this solution.</p>\n<ol>\n<li><p>Squid Proxy</p>\n</li>\n<li><p>Windows Server DNS</p>\n</li>\n<li><p>Cisco ASA</p>\n</li>\n<li><p>Palo Alto Networks</p>\n</li>\n<li><p>Microsoft Defender XDR</p>\n</li>\n<li><p>Azure Firewall</p>\n</li>\n<li><p>ZScaler Internet Access</p>\n</li>\n<li><p>Infoblox NIOS</p>\n</li>\n<li><p>Google Cloud Platform DNS</p>\n</li>\n<li><p>NXLog DNS</p>\n</li>\n<li><p>Cisco Umbrella</p>\n</li>\n<li><p>Corelight</p>\n</li>\n<li><p>Amazon Web Services</p>\n</li>\n<li><p>Windows Forwarded Events</p>\n</li>\n<li><p>Sysmon for Linux</p>\n</li>\n<li><p>Microsoft 365</p>\n</li>\n<li><p>Windows Security Events</p>\n</li>\n<li><p>Microsoft Entra ID</p>\n</li>\n<li><p>Azure Activity</p>\n</li>\n<li><p>F5 Advanced WAF</p>\n</li>\n<li><p>Fortinet FortiGate</p>\n</li>\n<li><p>Check Point</p>\n</li>\n<li><p>Common Event Format</p>\n</li>\n<li><p>Windows Firewall</p>\n</li>\n</ol>\n<p><strong>Hunting Queries:</strong> 10</p>\n<p><a href=\"https://aka.ms/azuresentinel\">Learn more about Microsoft Sentinel</a> | <a href=\"https://aka.ms/azuresentinelsolutionsdoc\">Learn more about Solutions</a></p>\n",
"contentKind": "Solution",
"contentProductId": "[variables('_solutioncontentProductId')]",
"id": "[variables('_solutioncontentProductId')]",
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,6 @@
| **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** |
|-------------|--------------------------------|--------------------------------------------------------------------------------|
| 3.0.5 | 03-06-2024 | Added missing AMA **Data Connector** reference in **Hunting Query** |
| 3.0.4 | 22-02-2024 | Tagged for dependent solutions for deployment |
| 3.0.3 | 19-12-2023 | Corrected typo mistake *Microsoft Windows DNS* to *Windows Server DNS* |
| 3.0.2 | 12-12-2023 | Removed deprecated **Analytical Rules** |
Expand Down

0 comments on commit 9ca0681

Please sign in to comment.