Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -76,6 +76,7 @@
"DNS",
"Darktrace",
"DarktraceRESTConnector",
"DarktraceActiveAISecurityPlatform",
"DataminrPulseAlerts",
"Dataverse",
"DigitalGuardianDLP",
Expand Down
4 changes: 3 additions & 1 deletion Logos/Darktrace.svg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
78 changes: 0 additions & 78 deletions Solutions/Darktrace/Analytic Rules/CreateAlertFromModelBreach.yaml

This file was deleted.

This file was deleted.

This file was deleted.

Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@
],
"sampleQueries": [
{
"description" : "One-line title for your sample query 1",
"description" : "Last 10 Model Alerts",
"query": "DarktraceModelAlerts_CL\n | take 10"
}
],
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,18 +4,18 @@
"Logo": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Darktrace.svg\" width=\"75px\" height=\"75px\">",
"Description": "The [Darktrace](https://darktrace.com/) Sentinel Solution lets users connect Darktrace AI-based alerting in real-time with Microsoft Sentinel, allowing creation of custom Dashboards, Workbooks, Notebooks and Custom Alerts to improve investigation. Microsoft Sentinel's enhanced visibility into Darktrace logs enables monitoring and mitigation of security threats. \n\n**Underlying Microsoft Technologies used:**\n\n This solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs: \n\na. [Microsoft Sentinel Data Collector API](https://docs.microsoft.com/azure/sentinel/connect-rest-api-template)\n\n For more details about this solution refer to https://www.darktrace.com/microsoft/sentinel/",
"Workbooks": [
"Workbooks/DarktraceWorkbook.json"
"Workbooks/DarktraceActiveAISecurityPlatform.json"
],
"Analytic Rules": [
"Analytic Rules/CreateAlertFromModelBreach.yaml",
"Analytic Rules/CreateIncidentFromAIAnalystIncident.yaml",
"Analytic Rules/CreateAlertFromSystemStatus.yaml"
"Analytic Rules/DarktraceIncidentEvent.yaml",
"Analytic Rules/DarktraceModelAlert.yaml"
],
"Data Connectors": [
"Data Connectors/DarktraceConnectorRESTAPI.json"
"Data Connectors/DarktraceConnectorRESTAPI.json",
"Data Connectors/DarktraceActiveAISecurityPlatform_Template.json"
],
"BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions\\Darktrace",
"Version": "2.0.1",
"Version": "3.0.0",
"Metadata": "SolutionMetadata.json",
"TemplateSpec": true,
"Is1PConnector": false
Expand Down
Loading
Loading