Skip to content

Conversation

@mazamizo21
Copy link

Official Data443 Submission

This is the official submission from the Data443 organization for the TacitRed SentinelOne IOC Automation solution.

Changes

  • Standardized publisher information to 'Data443 Risk Mitigation, Inc.'.
  • Added comprehensive documentation.
  • Validated implementation.

This PR supersedes and replaces PR #13243.
Please close #13243 in favor of this one.

mazamizo21 and others added 30 commits November 26, 2025 17:28
- Cyren: IP Reputation and Malware URLs CCF data connectors
- TacitRed: Compromised Credentials CCF data connector
- Both solutions include workbooks, analytics rules, and custom tables
- All templates pass arm-ttk validation (102/102 tests)
- CCF data connector
- Workbooks and analytics rules
- All templates pass arm-ttk validation
- CCF data connector
- Workbooks and analytics rules
- All templates pass arm-ttk validation
…d cost warnings

TacitRed:
- Changed queryWindowInMin from 5 to 60 minutes (12x reduction in API calls)
- Added cost warning in connector instructions

Cyren:
- Changed queryWindowInMin from 240 to 1440 minutes (6x reduction - daily polling)
- Reduced rateLimitQps from 10 to 2
- Added risk_d >= 50 filter in DCR to filter out low-risk indicators
- Added cost warning in connector instructions

These changes reduce ingestion costs significantly while maintaining detection quality.
- Playbook to sync TacitRed compromised credentials to CrowdStrike IOCs
- V3 packaging: Name matches folder, BasePath correct, Version 3.0.0
- Includes packageMetadata.json and 3.0.0.zip
- Runs every 6 hours (reasonable for playbook-based automation)
TacitRed-LogicApp-Ingestion:
- Logic App with managed identity for TacitRed API polling
- Ingests to Sentinel via Logs Ingestion API (DCE/DCR)
- Configurable polling interval

Cyren-LogicApp-Ingestion:
- Two Logic Apps for IP Reputation and Malware URLs feeds
- Managed identity authentication to Azure Monitor
- Ingests to Sentinel via Logs Ingestion API (DCE/DCR)

Both solutions:
- V3 packaging compliant
- 3.0.0.zip with all required files
- arm-ttk validated
- TacitRed Logic App: Replace hardcoded dates with dynamic utcNow() expressions
- Regenerate all 3.0.0.zip files for all 5 solutions
- All CCF and Logic App solutions now use proper placeholders for secrets
TacitRed CCF + Logic App:
- TacitRed - Repeat Compromise Detection.yaml
- TacitRed - High Confidence Compromise.yaml

Cyren CCF + Logic App:
- Cyren - High Risk IP Detection.yaml
- Cyren - Malware URL Detected.yaml

Updated Solution_*.json to reference analytics rules.
Regenerated all V3 packages with analytics included.
- CCF data connector
- Workbooks and analytics rules
- All templates pass arm-ttk validation
…tRed analytic rules

- Remove duplicate Cyren solutions (Cyren-CCFThreatIntelligence, Cyren-LogicApp-Ingestion)
- Remove duplicate TacitRed solutions (TacitRed-LogicApp-Ingestion, Tacitred-CCF-Hub-v2ThreatIntelligence)
- Keep canonical CyrenThreatIntelligence and TacitRedThreatIntelligence folders
- Add TacitRed analytic rules with proper MITRE tactics (includes Reconnaissance for T1589)
- Update Solution_TacitRed.json to reference analytic rules
mazamizo21 added a commit to Data443/Azure-Sentinel that referenced this pull request Dec 18, 2025
mazamizo21 added a commit to Data443/Azure-Sentinel that referenced this pull request Dec 18, 2025
mazamizo21 added a commit to Data443/Azure-Sentinel that referenced this pull request Dec 18, 2025
@v-shukore
Copy link
Contributor

Hi @mazamizo21,

Please remove the 1.0.2 zip package from the solution.

Also, remove the packagemetadata.json and deploymentParameters.json files from the package folder. If these files are necessary, please keep them outside the package folder.

Additionally, create a folder named Image inside the Playbook folder and add all running playbook images into it.

Please also correct the format of the releasenote.md file.

Thanks!

@mazamizo21
Copy link
Author

Update: All Requested Changes Applied

Hi Microsoft Team,

Thank you for your feedback. We have addressed all the requested changes:

✅ 1. Removed 1.0.2 zip package

  • Deleted Solutions/TacitRed-SentinelOne/Package/1.0.2.zip
  • Only 3.0.0.zip remains in the Package folder

✅ 2. Moved packageMetadata.json and deploymentParameters.json outside Package folder

  • Before: Solutions/TacitRed-SentinelOne/Package/packageMetadata.json
  • After: Solutions/TacitRed-SentinelOne/packageMetadata.json
  • Before: Solutions/TacitRed-SentinelOne/Package/deploymentParameters.json
  • After: Solutions/TacitRed-SentinelOne/deploymentParameters.json

✅ 3. Created Images folder in Playbooks with running playbook screenshots

  • Solutions/TacitRed-SentinelOne/Playbooks/Images/TacitRedToSentinelOneLight.png
  • Solutions/TacitRed-SentinelOne/Playbooks/Images/TacitRedToSentinelOneDark.png

✅ 4. Fixed ReleaseNotes.md format

  • Added proper # Release Notes heading
  • Aligned table columns correctly

Thank you!

Data443 Risk Mitigation, Inc.

@v-shukore
Copy link
Contributor

Hi @mazamizo21, could you please grant me the branch access so I can make the necessary changes and commit them. Thanks!!

@mazamizo21
Copy link
Author

mazamizo21 commented Dec 31, 2025 via email

@mazamizo21
Copy link
Author

Verified: This solution does not contain any broken tacitred.com or cyren.com documentation URLs. The only TacitRed references are API endpoints (app.tacitred.com) which are functional and required for the connector to work.

@v-shukore
Copy link
Contributor

Hi @mazamizo21, we deployed the maintemplate in our Microsoft Sentinel workspace and checked, but the playbook isn't showing or loading, so we're unable to test it. Could you check in your workspace and share a screenshot here? Thanks!
image

Update TacitRed Platform link from generic data443.com to specific:
https://data443.com/tacitred-attack-surface-intelligence/

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude Opus 4.5 <[email protected]>
@mazamizo21
Copy link
Author

Hi @v-shukore,

Thank you for testing the solution! I've identified and fixed the issue with the playbook not showing/loading.

Root Cause

The playbookContentId1 in the mainTemplate was set to a generic string "Playbooks" instead of a unique identifier. This prevented Content Hub from properly registering and displaying the playbook after deployment.

Fix Applied (commit 02582c3)

  1. Changed playbookContentId1 from "Playbooks""TacitRedToSentinelOne"
  2. Updated displayName from "Playbooks""TacitRed to SentinelOne IOC Automation"
  3. Fixed dependency contentId reference to use the correct variable
  4. Removed unused variables for ARM-TTK compliance

The playbook should now properly appear in Content Hub after deployment. Please redeploy and let me know if you can see and test the playbook now.

Thanks!

- Add tacitred_logo.svg to top-level Logos/ directory
- Update Solution_TacitRedSentinelOneAutomation.json Logo field path from Workbooks/Images/Logos/ to Logos/
- Remove spaces between img tag attributes (svg"width= not svg" width=)
- Remove packageMetadata.json (not needed for this solution type)

Co-Authored-By: Claude Sonnet 4.5 <[email protected]>
@mazamizo21 mazamizo21 force-pushed the feature/tacitred-sentinelone-v1 branch 2 times, most recently from 33866c1 to 59a4da3 Compare January 13, 2026 14:20
- TacitRed-SentinelOne solution has no workbooks
- Revert accidental WorkbooksMetadata.json modifications
- Branch contamination from earlier operations

Co-Authored-By: Claude Sonnet 4.5 <[email protected]>
@mazamizo21 mazamizo21 force-pushed the feature/tacitred-sentinelone-v1 branch from 59a4da3 to abf9afd Compare January 14, 2026 01:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

auto-package New Solution For new Solutions which are new to Microsoft Sentinel

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants