Skip to content

Commit a37eee1

Browse files
authored
Merge pull request #13604 from Data443/feature/tacitred-defender-v3.0.1
Solution: TacitRed Defender Threat Intelligence v3.0.1 - Fix Content Hub Deployment
2 parents 9785e6e + 33b9e65 commit a37eee1

File tree

6 files changed

+14
-65
lines changed

6 files changed

+14
-65
lines changed

Solutions/TacitRed-Defender-ThreatIntelligence/Data/Solution_TacitRedDefenderThreatIntelligence.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
],
1010
"Metadata": "SolutionMetadata.json",
1111
"BasePath": "C:\\GitHub\\Azure-Sentinel\\Solutions\\TacitRed-Defender-ThreatIntelligence",
12-
"Version": "3.0.0",
12+
"Version": "3.0.1",
1313
"TemplateSpec": true,
1414
"Is1Pconnector": false
1515
}
6.42 KB
Binary file not shown.

Solutions/TacitRed-Defender-ThreatIntelligence/Package/mainTemplate.json

Lines changed: 8 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@
3333
"email": "support@data443.com",
3434
"_email": "[variables('email')]",
3535
"_solutionName": "TacitRed-Defender-ThreatIntelligence",
36-
"_solutionVersion": "3.0.0",
36+
"_solutionVersion": "3.0.1",
3737
"solutionId": "data443riskmitigationinc1761580347231.azure-sentinel-solution-tacitred-defender-ti",
3838
"_solutionId": "[variables('solutionId')]",
3939
"TacitRedDefenderTI_FunctionApp": "TacitRedDefenderTI_FunctionApp",
@@ -65,7 +65,7 @@
6565
"[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]"
6666
],
6767
"properties": {
68-
"description": "TacitRedDefenderTI_FunctionApp Playbook with template version 3.0.0",
68+
"description": "TacitRedDefenderTI_FunctionApp Playbook with template version 3.0.1",
6969
"mainTemplate": {
7070
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
7171
"contentVersion": "[variables('playbookVersion1')]",
@@ -82,7 +82,7 @@
8282
"metadata": {
8383
"description": "URL to the Function App code zip file"
8484
},
85-
"defaultValue": "https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/TacitRed-Defender-ThreatIntelligence/Package/functionCode.zip"
85+
"defaultValue": "https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/TacitRed-Defender-ThreatIntelligence/Playbooks/TacitRedDefenderTI_FunctionApp/functionCode.zip"
8686
},
8787
"workspace": {
8888
"type": "string",
@@ -205,34 +205,6 @@
205205
}
206206
}
207207
},
208-
{
209-
"type": "Microsoft.Authorization/roleAssignments",
210-
"apiVersion": "2022-04-01",
211-
"name": "[[guid(resourceGroup().id, variables('functionAppName'), 'Reader')]",
212-
"scope": "[[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]",
213-
"properties": {
214-
"roleDefinitionId": "[[subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'acdd72a7-3385-48ef-bd42-f606fba81ae7')]",
215-
"principalId": "[[reference(resourceId('Microsoft.Web/sites', variables('functionAppName')), '2024-04-01', 'Full').identity.principalId]",
216-
"principalType": "ServicePrincipal"
217-
},
218-
"dependsOn": [
219-
"[[resourceId('Microsoft.Web/sites', variables('functionAppName'))]"
220-
]
221-
},
222-
{
223-
"type": "Microsoft.Authorization/roleAssignments",
224-
"apiVersion": "2022-04-01",
225-
"name": "[[guid(resourceGroup().id, variables('functionAppName'), 'SentinelContributor')]",
226-
"scope": "[[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]",
227-
"properties": {
228-
"roleDefinitionId": "[[subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'ab8e14d6-4a74-4a29-9ba8-549422addade')]",
229-
"principalId": "[[reference(resourceId('Microsoft.Web/sites', variables('functionAppName')), '2024-04-01', 'Full').identity.principalId]",
230-
"principalType": "ServicePrincipal"
231-
},
232-
"dependsOn": [
233-
"[[resourceId('Microsoft.Web/sites', variables('functionAppName'))]"
234-
]
235-
},
236208
{
237209
"type": "Microsoft.OperationalInsights/workspaces/providers/metadata",
238210
"apiVersion": "2022-01-01-preview",
@@ -274,7 +246,9 @@
274246
"Azure Function"
275247
],
276248
"postDeployment": [
277-
"Deploy the TacitRedToDefenderTI playbook and provide the Function App URL"
249+
"1. Assign 'Reader' role to the Function App's managed identity on your Log Analytics workspace",
250+
"2. Assign 'Microsoft Sentinel Contributor' role to the Function App's managed identity on your Log Analytics workspace",
251+
"3. Deploy the TacitRedToDefenderTI playbook and provide the Function App URL"
278252
],
279253
"releaseNotes": [
280254
{
@@ -309,7 +283,7 @@
309283
"[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]"
310284
],
311285
"properties": {
312-
"description": "TacitRedToDefenderTI Playbook with template version 3.0.0",
286+
"description": "TacitRedToDefenderTI Playbook with template version 3.0.1",
313287
"mainTemplate": {
314288
"$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#",
315289
"contentVersion": "[variables('playbookVersion2')]",
@@ -518,7 +492,7 @@
518492
"apiVersion": "2023-04-01-preview",
519493
"location": "[parameters('workspace-location')]",
520494
"properties": {
521-
"version": "3.0.0",
495+
"version": "3.0.1",
522496
"kind": "Solution",
523497
"contentSchemaVersion": "3.0.0",
524498
"displayName": "TacitRed-Defender-ThreatIntelligence",

Solutions/TacitRed-Defender-ThreatIntelligence/Playbooks/TacitRedDefenderTI_FunctionApp/azuredeploy.json

Lines changed: 4 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,9 @@
1212
"entities": [],
1313
"tags": ["TacitRed", "Threat Intelligence", "Azure Function"],
1414
"postDeployment": [
15-
"Deploy the TacitRedToDefenderTI playbook and provide the Function App URL"
15+
"1. Assign 'Reader' role to the Function App's managed identity on your Log Analytics workspace",
16+
"2. Assign 'Microsoft Sentinel Contributor' role to the Function App's managed identity on your Log Analytics workspace",
17+
"3. Deploy the TacitRedToDefenderTI playbook and provide the Function App URL"
1618
],
1719
"support": {
1820
"tier": "Partner"
@@ -41,7 +43,7 @@
4143
"metadata": {
4244
"description": "URL to the Function App code zip file"
4345
},
44-
"defaultValue": "https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/TacitRed-Defender-ThreatIntelligence/Package/functionCode.zip"
46+
"defaultValue": "https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/TacitRed-Defender-ThreatIntelligence/Playbooks/TacitRedDefenderTI_FunctionApp/functionCode.zip"
4547
},
4648
"workspace": {
4749
"type": "string",
@@ -158,34 +160,6 @@
158160
]
159161
}
160162
}
161-
},
162-
{
163-
"type": "Microsoft.Authorization/roleAssignments",
164-
"apiVersion": "2022-04-01",
165-
"name": "[guid(resourceGroup().id, variables('functionAppName'), 'Reader')]",
166-
"scope": "[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]",
167-
"properties": {
168-
"roleDefinitionId": "[subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'acdd72a7-3385-48ef-bd42-f606fba81ae7')]",
169-
"principalId": "[reference(resourceId('Microsoft.Web/sites', variables('functionAppName')), '2024-04-01', 'Full').identity.principalId]",
170-
"principalType": "ServicePrincipal"
171-
},
172-
"dependsOn": [
173-
"[resourceId('Microsoft.Web/sites', variables('functionAppName'))]"
174-
]
175-
},
176-
{
177-
"type": "Microsoft.Authorization/roleAssignments",
178-
"apiVersion": "2022-04-01",
179-
"name": "[guid(resourceGroup().id, variables('functionAppName'), 'SentinelContributor')]",
180-
"scope": "[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]",
181-
"properties": {
182-
"roleDefinitionId": "[subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'ab8e14d6-4a74-4a29-9ba8-549422addade')]",
183-
"principalId": "[reference(resourceId('Microsoft.Web/sites', variables('functionAppName')), '2024-04-01', 'Full').identity.principalId]",
184-
"principalType": "ServicePrincipal"
185-
},
186-
"dependsOn": [
187-
"[resourceId('Microsoft.Web/sites', variables('functionAppName'))]"
188-
]
189163
}
190164
]
191165
}

Solutions/TacitRed-Defender-ThreatIntelligence/ReleaseNotes.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,4 +2,5 @@
22

33
| **Version** | **Date Modified (DD-MM-YYYY)** | **Change History** |
44
|-------------|--------------------------------|--------------------|
5+
| 3.0.1 | 11-02-2026 | Fixed deployment failure: Restored functionCode.zip package removed in prior commit. Removed workspace-scoped roleAssignments from Function App template to resolve InvalidTemplate error during Content Hub deployment. |
56
| 3.0.0 | 09-12-2025 | Initial release of TacitRed Defender Threat Intelligence solution with Azure Function and Logic App playbook for syncing TacitRed compromised credentials to Microsoft Defender Threat Intelligence. |

0 commit comments

Comments
 (0)