forked from Azure/Azure-Sentinel
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Azure Devops Auditing Packaging changes
Azure Devops Auditing Packaging changes
- Loading branch information
Showing
40 changed files
with
4,627 additions
and
0 deletions.
There are no files selected for viewing
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
50 changes: 50 additions & 0 deletions
50
Solutions/AzureDevOpsAuditing/Data/Solution_AzureDevOpsAuditing.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,50 @@ | ||
{ | ||
"Name": "AzureDevOpsAuditing", | ||
"Author": "Microsoft - [email protected]", | ||
"Logo": "<img src=\"https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Logos/Azure_Sentinel.svg\" width=\"75px\" height=\"75px\">", | ||
"Description": "The [Azure DevOps](https://azure.microsoft.com/products/devops/) Auditing solution for Microsoft Sentinel allows monitoring Azure DevOps [audit events](https://docs.microsoft.com/azure/devops/organizations/audit/azure-devops-auditing?view=azure-devops&tabs=preview-page#review-audit-log) to enable detection of malicious and/or unauthorized access and modification in the repository or pipelines. The streaming of [Azure DevOps Audit logs to Azure Monitor](https://docs.microsoft.com/azure/devops/organizations/audit/auditing-streaming?view=azure-devops) must be configured to start ingesting audit events.", | ||
"Analytic Rules": [ | ||
"Analytic Rules/ADOAgentPoolCreatedDeleted.yaml", | ||
"Analytic Rules/ADOAuditStreamDisabled.yaml", | ||
"Analytic Rules/ADONewExtensionAdded.yaml", | ||
"Analytic Rules/ADOPATUsedWithBrowser.yaml", | ||
"Analytic Rules/ADOPipelineModifiedbyNewUser.yaml", | ||
"Analytic Rules/ADORetentionReduced.yaml", | ||
"Analytic Rules/ADOSecretNotSecured.yaml", | ||
"Analytic Rules/ADOVariableModifiedByNewUser.yaml", | ||
"Analytic Rules/AzDOAdminGroupAdditions.yaml", | ||
"Analytic Rules/AzDOHistoricPrPolicyBypassing.yaml", | ||
"Analytic Rules/AzDOHistoricServiceConnectionAdds.yaml", | ||
"Analytic Rules/AzDOPatSessionMisuse.yaml", | ||
"Analytic Rules/AzDOPipelineCreatedDeletedOneDay.yaml", | ||
"Analytic Rules/AzDOServiceConnectionUsage.yaml", | ||
"Analytic Rules/ExternalUpstreamSourceAddedtoAzureDevOpsFeed.yaml", | ||
"Analytic Rules/NewAgentAddedToPoolbyNewUserorofNewOS.yaml", | ||
"Analytic Rules/NewPAPCAPCASaddedtoADO.yaml", | ||
"Analytic Rules/NRT_ADOAuditStreamDisabled.yaml" | ||
], | ||
"Hunting Queries": [ | ||
"Hunting Queries/AAD Conditional Access Disabled.yaml", | ||
"Hunting Queries/Addtional Org Admin Added.yaml", | ||
"Hunting Queries/ADOBuildCheckDeleted.yaml", | ||
"Hunting Queries/ADOBuildDeletedAfterPipelineMod.yaml", | ||
"Hunting Queries/ADOInternalUpstreamPacakgeFeedAdded.yaml", | ||
"Hunting Queries/ADONewAgentPoolCreated.yaml", | ||
"Hunting Queries/ADONewPackageFeedCreated.yaml", | ||
"Hunting Queries/ADONewPATOperation.yaml", | ||
"Hunting Queries/ADONewReleaseApprover.yaml", | ||
"Hunting Queries/ADOReleasePipelineCreated.yaml", | ||
"Hunting Queries/ADOVariableCreatedDeleted.yaml", | ||
"Hunting Queries/AzDODisplayNameSwapping.yaml", | ||
"Hunting Queries/AzDOPrPolicyBypassers.yaml", | ||
"Hunting Queries/Guest users access enabled.yaml", | ||
"Hunting Queries/Project visibility changed to public.yaml", | ||
"Hunting Queries/Public project created.yaml", | ||
"Hunting Queries/Public Projects enabled.yaml" | ||
], | ||
"Metadata": "SolutionMetadata.json", | ||
"BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions\\AzureDevOpsAuditing", | ||
"Version": "2.0.0", | ||
"TemplateSpec": true, | ||
"Is1PConnector": true | ||
} |
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
Binary file not shown.
603 changes: 603 additions & 0 deletions
603
Solutions/AzureDevOpsAuditing/Package/createUiDefinition.json
Large diffs are not rendered by default.
Oops, something went wrong.
3,958 changes: 3,958 additions & 0 deletions
3,958
Solutions/AzureDevOpsAuditing/Package/mainTemplate.json
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
{ | ||
"publisherId": "azuresentinel", | ||
"offerId": "azure-sentinel-solution-azuredevopsauditing", | ||
"firstPublishDate": "2022-09-20", | ||
"providers": ["Microsoft"], | ||
"categories": { | ||
"domains" : ["DevOps"], | ||
"verticals": [] | ||
}, | ||
"support": { | ||
"tier": "Microsoft", | ||
"email": "[email protected]", | ||
"name": "Microsoft Corporation", | ||
"link": "https://support.microsoft.com/" | ||
} | ||
} |