Skip to content

Commit 9921c3a

Browse files
committed
fix: Stabilize Cyren V3 packaging inputs
1 parent 485b7b1 commit 9921c3a

File tree

5 files changed

+36
-35
lines changed

5 files changed

+36
-35
lines changed

Solutions/CyrenThreatIntelligence/Data/Solution_Cyren.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
"Workbooks": [
1515
"Workbooks/CyrenThreatIntelligenceDashboard.json"
1616
],
17-
"WorkbookDescription": ["This workbook provides visualization and monitoring for Cyren threat intelligence indicators including IP reputation and malware URLs."],
17+
"WorkbookDescription": "This workbook provides visualization and monitoring for Cyren threat intelligence indicators including IP reputation and malware URLs.",
1818
"Metadata": "SolutionMetadata.json",
1919
"BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions\\CyrenThreatIntelligence",
2020
"Version": "3.0.0",
-1.91 KB
Binary file not shown.

Solutions/CyrenThreatIntelligence/Package/createUiDefinition.json

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -104,13 +104,13 @@
104104
{
105105
"name": "workbook1",
106106
"type": "Microsoft.Common.Section",
107-
"label": "Cyren Threat Intelligence Workbook",
107+
"label": "CyrenThreatIntelligenceDashboardWorkbook",
108108
"elements": [
109109
{
110110
"name": "workbook1-text",
111111
"type": "Microsoft.Common.TextBlock",
112112
"options": {
113-
"text": "This workbook provides visualization and monitoring for Cyren threat intelligence indicators."
113+
"text": "This workbook provides visualization and monitoring."
114114
}
115115
}
116116
]
@@ -195,3 +195,4 @@
195195
}
196196
}
197197
}
198+

Solutions/CyrenThreatIntelligence/Package/mainTemplate.json

Lines changed: 31 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@
4444
},
4545
"workbook1-name": {
4646
"type": "string",
47-
"defaultValue": "Cyren Threat Intelligence Workbook",
47+
"defaultValue": "CyrenThreatIntelligenceDashboardWorkbook",
4848
"minLength": 1,
4949
"metadata": {
5050
"description": "Name for the workbook"
@@ -779,10 +779,10 @@
779779
"status": "Available",
780780
"requiredDataConnectors": [
781781
{
782+
"connectorId": "CyrenThreatIntel",
782783
"dataTypes": [
783784
"Cyren_Indicators_CL"
784-
],
785-
"connectorId": "CyrenThreatIntel"
785+
]
786786
}
787787
],
788788
"tactics": [
@@ -795,35 +795,35 @@
795795
],
796796
"entityMappings": [
797797
{
798+
"entityType": "IP",
798799
"fieldMappings": [
799800
{
800801
"columnName": "IPAddress",
801802
"identifier": "Address"
802803
}
803-
],
804-
"entityType": "IP"
804+
]
805805
}
806806
],
807807
"eventGroupingSettings": {
808808
"aggregationKind": "AlertPerResult"
809809
},
810810
"customDetails": {
811-
"DetectionCount": "DetectionCount",
812811
"Source": "Source",
812+
"DetectionCount": "DetectionCount",
813813
"Categories": "ThreatCategories",
814814
"RiskScore": "MaxRisk"
815815
},
816816
"incidentConfiguration": {
817-
"createIncident": true,
818817
"groupingConfiguration": {
818+
"enabled": true,
819819
"groupByEntities": [
820820
"IP"
821821
],
822-
"lookbackDuration": "1d",
822+
"reopenClosedIncident": false,
823823
"matchingMethod": "Selected",
824-
"enabled": true,
825-
"reopenClosedIncident": false
826-
}
824+
"lookbackDuration": "1d"
825+
},
826+
"createIncident": true
827827
}
828828
}
829829
},
@@ -906,10 +906,10 @@
906906
"status": "Available",
907907
"requiredDataConnectors": [
908908
{
909+
"connectorId": "CyrenThreatIntel",
909910
"dataTypes": [
910911
"Cyren_Indicators_CL"
911-
],
912-
"connectorId": "CyrenThreatIntel"
912+
]
913913
}
914914
],
915915
"tactics": [
@@ -922,36 +922,36 @@
922922
],
923923
"entityMappings": [
924924
{
925+
"entityType": "URL",
925926
"fieldMappings": [
926927
{
927928
"columnName": "MaliciousURL",
928929
"identifier": "Url"
929930
}
930-
],
931-
"entityType": "URL"
931+
]
932932
}
933933
],
934934
"eventGroupingSettings": {
935935
"aggregationKind": "AlertPerResult"
936936
},
937937
"customDetails": {
938-
"DetectionCount": "DetectionCount",
939938
"Source": "Source",
940-
"Categories": "ThreatCategories",
941939
"Domain": "Domain",
940+
"DetectionCount": "DetectionCount",
941+
"Categories": "ThreatCategories",
942942
"RiskScore": "MaxRisk"
943943
},
944944
"incidentConfiguration": {
945-
"createIncident": true,
946945
"groupingConfiguration": {
946+
"enabled": true,
947947
"groupByEntities": [
948948
"URL"
949949
],
950-
"lookbackDuration": "1d",
950+
"reopenClosedIncident": false,
951951
"matchingMethod": "Selected",
952-
"enabled": true,
953-
"reopenClosedIncident": false
954-
}
952+
"lookbackDuration": "1d"
953+
},
954+
"createIncident": true
955955
}
956956
}
957957
},
@@ -1034,10 +1034,10 @@
10341034
"status": "Available",
10351035
"requiredDataConnectors": [
10361036
{
1037+
"connectorId": "CyrenThreatIntel",
10371038
"dataTypes": [
10381039
"Cyren_Indicators_CL"
1039-
],
1040-
"connectorId": "CyrenThreatIntel"
1040+
]
10411041
}
10421042
],
10431043
"tactics": [
@@ -1050,18 +1050,18 @@
10501050
"aggregationKind": "SingleAlert"
10511051
},
10521052
"customDetails": {
1053+
"HoursSinceLastEvent": "HoursSinceLastEvent",
10531054
"LatestEventTime": "LatestEventTime",
1054-
"TotalEventsLast24h": "TotalEventsLast24h",
1055-
"HoursSinceLastEvent": "HoursSinceLastEvent"
1055+
"TotalEventsLast24h": "TotalEventsLast24h"
10561056
},
10571057
"incidentConfiguration": {
1058-
"createIncident": true,
10591058
"groupingConfiguration": {
1060-
"lookbackDuration": "1d",
1061-
"matchingMethod": "Selected",
10621059
"enabled": false,
1063-
"reopenClosedIncident": false
1064-
}
1060+
"reopenClosedIncident": false,
1061+
"matchingMethod": "Selected",
1062+
"lookbackDuration": "1d"
1063+
},
1064+
"createIncident": true
10651065
}
10661066
}
10671067
},

Solutions/CyrenThreatIntelligence/Package/testParameters.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@
3737
},
3838
"workbook1-name": {
3939
"type": "string",
40-
"defaultValue": "Cyren Threat Intelligence Workbook",
40+
"defaultValue": "CyrenThreatIntelligenceDashboardWorkbook",
4141
"minLength": 1,
4242
"metadata": {
4343
"description": "Name for the workbook"

0 commit comments

Comments
 (0)