|
33 | 33 | "email": "support@data443.com", |
34 | 34 | "_email": "[variables('email')]", |
35 | 35 | "_solutionName": "TacitRed-Defender-ThreatIntelligence", |
36 | | - "_solutionVersion": "3.0.0", |
| 36 | + "_solutionVersion": "3.0.1", |
37 | 37 | "solutionId": "data443riskmitigationinc1761580347231.azure-sentinel-solution-tacitred-defender-ti", |
38 | 38 | "_solutionId": "[variables('solutionId')]", |
39 | 39 | "TacitRedDefenderTI_FunctionApp": "TacitRedDefenderTI_FunctionApp", |
|
65 | 65 | "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" |
66 | 66 | ], |
67 | 67 | "properties": { |
68 | | - "description": "TacitRedDefenderTI_FunctionApp Playbook with template version 3.0.0", |
| 68 | + "description": "TacitRedDefenderTI_FunctionApp Playbook with template version 3.0.1", |
69 | 69 | "mainTemplate": { |
70 | 70 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", |
71 | 71 | "contentVersion": "[variables('playbookVersion1')]", |
|
82 | 82 | "metadata": { |
83 | 83 | "description": "URL to the Function App code zip file" |
84 | 84 | }, |
85 | | - "defaultValue": "https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/TacitRed-Defender-ThreatIntelligence/Package/functionCode.zip" |
| 85 | + "defaultValue": "https://raw.githubusercontent.com/Azure/Azure-Sentinel/master/Solutions/TacitRed-Defender-ThreatIntelligence/Playbooks/TacitRedDefenderTI_FunctionApp/functionCode.zip" |
86 | 86 | }, |
87 | 87 | "workspace": { |
88 | 88 | "type": "string", |
|
205 | 205 | } |
206 | 206 | } |
207 | 207 | }, |
208 | | - { |
209 | | - "type": "Microsoft.Authorization/roleAssignments", |
210 | | - "apiVersion": "2022-04-01", |
211 | | - "name": "[[guid(resourceGroup().id, variables('functionAppName'), 'Reader')]", |
212 | | - "scope": "[[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]", |
213 | | - "properties": { |
214 | | - "roleDefinitionId": "[[subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'acdd72a7-3385-48ef-bd42-f606fba81ae7')]", |
215 | | - "principalId": "[[reference(resourceId('Microsoft.Web/sites', variables('functionAppName')), '2024-04-01', 'Full').identity.principalId]", |
216 | | - "principalType": "ServicePrincipal" |
217 | | - }, |
218 | | - "dependsOn": [ |
219 | | - "[[resourceId('Microsoft.Web/sites', variables('functionAppName'))]" |
220 | | - ] |
221 | | - }, |
222 | | - { |
223 | | - "type": "Microsoft.Authorization/roleAssignments", |
224 | | - "apiVersion": "2022-04-01", |
225 | | - "name": "[[guid(resourceGroup().id, variables('functionAppName'), 'SentinelContributor')]", |
226 | | - "scope": "[[resourceId('microsoft.OperationalInsights/Workspaces', parameters('workspace'))]", |
227 | | - "properties": { |
228 | | - "roleDefinitionId": "[[subscriptionResourceId('Microsoft.Authorization/roleDefinitions', 'ab8e14d6-4a74-4a29-9ba8-549422addade')]", |
229 | | - "principalId": "[[reference(resourceId('Microsoft.Web/sites', variables('functionAppName')), '2024-04-01', 'Full').identity.principalId]", |
230 | | - "principalType": "ServicePrincipal" |
231 | | - }, |
232 | | - "dependsOn": [ |
233 | | - "[[resourceId('Microsoft.Web/sites', variables('functionAppName'))]" |
234 | | - ] |
235 | | - }, |
236 | 208 | { |
237 | 209 | "type": "Microsoft.OperationalInsights/workspaces/providers/metadata", |
238 | 210 | "apiVersion": "2022-01-01-preview", |
|
274 | 246 | "Azure Function" |
275 | 247 | ], |
276 | 248 | "postDeployment": [ |
277 | | - "Deploy the TacitRedToDefenderTI playbook and provide the Function App URL" |
| 249 | + "1. Assign 'Reader' role to the Function App's managed identity on your Log Analytics workspace", |
| 250 | + "2. Assign 'Microsoft Sentinel Contributor' role to the Function App's managed identity on your Log Analytics workspace", |
| 251 | + "3. Deploy the TacitRedToDefenderTI playbook and provide the Function App URL" |
278 | 252 | ], |
279 | 253 | "releaseNotes": [ |
280 | 254 | { |
|
309 | 283 | "[extensionResourceId(resourceId('Microsoft.OperationalInsights/workspaces', parameters('workspace')), 'Microsoft.SecurityInsights/contentPackages', variables('_solutionId'))]" |
310 | 284 | ], |
311 | 285 | "properties": { |
312 | | - "description": "TacitRedToDefenderTI Playbook with template version 3.0.0", |
| 286 | + "description": "TacitRedToDefenderTI Playbook with template version 3.0.1", |
313 | 287 | "mainTemplate": { |
314 | 288 | "$schema": "https://schema.management.azure.com/schemas/2019-04-01/deploymentTemplate.json#", |
315 | 289 | "contentVersion": "[variables('playbookVersion2')]", |
|
518 | 492 | "apiVersion": "2023-04-01-preview", |
519 | 493 | "location": "[parameters('workspace-location')]", |
520 | 494 | "properties": { |
521 | | - "version": "3.0.0", |
| 495 | + "version": "3.0.1", |
522 | 496 | "kind": "Solution", |
523 | 497 | "contentSchemaVersion": "3.0.0", |
524 | 498 | "displayName": "TacitRed-Defender-ThreatIntelligence", |
|
0 commit comments