Skip to content

Commit 69a90a4

Browse files
committed
Updated package
1 parent 43d10b6 commit 69a90a4

3 files changed

Lines changed: 87 additions & 87 deletions

File tree

674 Bytes
Binary file not shown.

Solutions/ValimailEnforce/Package/createUiDefinition.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
"config": {
77
"isWizard": false,
88
"basics": {
9-
"description": "<img src=\"https://www.valimail.com/wp-content/uploads/2024/03/valimail-digicert-company-white_TEST.svg\" style=\"background-color: #1a2b5e;\" width=\"100px\" height=\"100px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/ValimailEnforce/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe [Valimail API](https://support.valimail.com/en/articles/10911206-api-overview) solution provides ability to bring the Valimail Configuration events to your Microsoft Sentinel Workspace to inform and to examine potential security risks, analyze your team's use of collaboration, diagnose configuration problems and more. \r \n\n\n**Data Connectors:** 1, **Analytic Rules:** 4, **Hunting Queries:** 4\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
9+
"description": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/valimail.svg\" width=\"75px\" height=\"75px\">\n\n**Note:** Please refer to the following before installing the solution: \n\n• Review the solution [Release Notes](https://github.com/Azure/Azure-Sentinel/tree/master/Solutions/ValimailEnforce/ReleaseNotes.md)\n\n • There may be [known issues](https://aka.ms/sentinelsolutionsknownissues) pertaining to this Solution, please refer to them before installing.\n\nThe [Valimail API](https://support.valimail.com/en/articles/10911206-api-overview) solution provides ability to bring the Valimail Configuration events to your Microsoft Sentinel Workspace to inform and to examine potential security risks, analyze your team's use of collaboration, diagnose configuration problems and more. \n\n**Underlying Microsoft Technologies used:**\n\nThis solution takes a dependency on the following technologies, and some of these dependencies either may be in [Preview](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) state or might result in additional ingestion or operational costs:\n\na. [Azure Monitor Logs: DCR-based Custom Logs](https://learn.microsoft.com/azure/azure-monitor/logs/logs-ingestion-api-overview)\n\nb. [Codeless Connector Framework (CCF)](https://learn.microsoft.com/azure/sentinel/create-codeless-connector)\n\n**Data Connectors:** 1, **Analytic Rules:** 4, **Hunting Queries:** 4\n\n[Learn more about Microsoft Sentinel](https://aka.ms/azuresentinel) | [Learn more about Solutions](https://aka.ms/azuresentinelsolutionsdoc)",
1010
"subscription": {
1111
"resourceProviders": [
1212
"Microsoft.OperationsManagement/solutions",
@@ -110,7 +110,7 @@
110110
"name": "analytic1-text",
111111
"type": "Microsoft.Common.TextBlock",
112112
"options": {
113-
"text": "Detects deletion of SPF delegations or DKIM keys, which are medium-severity events\nthat could degrade email authentication posture for a domain."
113+
"text": "This query searches for deletion of SPF delegations or DKIM keys, which are medium-severity events\nthat could degrade email authentication posture for a domain."
114114
}
115115
}
116116
]
@@ -124,7 +124,7 @@
124124
"name": "analytic2-text",
125125
"type": "Microsoft.Common.TextBlock",
126126
"options": {
127-
"text": "Detects when a DMARC policy is changed to 'none', which disables enforcement\nand leaves the domain vulnerable to spoofing and phishing attacks."
127+
"text": "This query searches for DMARC policies changed to 'none', which disables enforcement\nand leaves the domain vulnerable to spoofing and phishing attacks."
128128
}
129129
}
130130
]
@@ -138,7 +138,7 @@
138138
"name": "analytic3-text",
139139
"type": "Microsoft.Common.TextBlock",
140140
"options": {
141-
"text": "Detects when a single user performs more than 3 configuration changes or user\nadditions within a 1-hour window on any domain. An unusual burst of changes may\nindicate a compromised admin account, unauthorized automation, or insider threat."
141+
"text": "This query searches for a single user performing more than 3 configuration changes or user\nadditions within a 1-hour window on any domain. An unusual burst of changes may\nindicate a compromised admin account, unauthorized automation, or insider threat."
142142
}
143143
}
144144
]
@@ -152,7 +152,7 @@
152152
"name": "analytic4-text",
153153
"type": "Microsoft.Common.TextBlock",
154154
"options": {
155-
"text": "Detects high-severity user management events such as user deletion or deactivation\nin the Valimail Enforce platform, which may indicate unauthorized access or insider threat."
155+
"text": "This query searches for high-severity user management events such as user deletion or deactivation\nin Valimail Enforce, which may indicate unauthorized access or insider threat."
156156
}
157157
}
158158
]

0 commit comments

Comments
 (0)